Our Recommendation

Monday, December 20, 2010

Shiny and feasts: Carc Nordstrom (Geeksugar) iPhone case

I love this time of year claiming many festive glow and flakes - I love the sequins! So naturally I love when I can wrap my iPhone to match. These fun CARC Nordstrom are to adjust 3GS iPhone and iPhone 4 and several fun and bright colors.

The case of snap - on are made of rigid plastic to protect your phone. And the best part? They are only $20 each!

Adobe Flash Media Enterprise Server 4 Released (EContent)

Adobe Systems, Inc. and Amazon Web Services LLC has announced the availability of software Adobe Flash Media Server 4 on the Amazon Elastic Compute Cloud (Amazon EC2), part of Amazon Web Services (AWS).

Adobe Flash Media Server on AWS allows users to provide multimedia experiments without the initial investment for a complete server licence. Small and medium-sized publishers, social media deployments on a large scale enterprise or client developers creating one-time events can use Adobe Flash Media Enterprise Server 4 distribution model based on the request of the user with AWS.

Adobe Flash Media Server on AWS allows customers to deploy and manage live content and the application across multiple platforms and mobile devices. With Adobe Flash Media Server on AWS, customers can use all of the Adobe Flash Media Enterprise Server 4 full functionality without the initial investment in software licences. Deployment is scalable. clients pay only for time transfer, and data from the server used.

website (www.adobe.com)

News relevant to the content industry and digital digital business content are displayed several times each week at www.econtentmag.com, in addition to news section which appears every month in the pages of EContent magazine. If you have any comments please email ecletters@infotoday.com.

Video: Analysis of the State of collaboration (feedburner)

This post is part of our chain of ReadWriteEnterprise, which is a resource and guide for it managers and technologists in the company. As you're exploring solutions for your business, discover this report provided useful ReadWriteWeb free courtesy of HP: the age of the exabytes

Net:Work logoDavid Coleman of collaborative strategies and Sameer Patel Sovos Group had a discussion moderated by JP Finnell mobility partner of the net Conference: work week in San Francisco last. Here Coleman and Patel talk adoption of Enterprise 2.0, the value of social media company in the company and the role of the learner in the workforce.

I like especially the part at 12: 00 mark minute where Patel spoke of how the role of the social technology adoption age is an exaggeration. He uses the example of his mother, learn how to use Skype as a good counter-example.

More than net talks: work can be found here, or you can take a look at some of the research related to the event might be more useful:


Blog comments powered by

Sunday, December 19, 2010

Budget of the European Union. Efforts to freeze EU budget in real conditions France Germany United Kingdom (eGov monitor) return

Prime Minister David Cameron efforts to freeze the budget of the European Union was supported by President Nicolas Sarkozy and Chancellor Merkel, as all three published an open letter to European Commission President yesterday praying for a real words freeze the budget of the Union European.

Leaders of the three large European economies have suggested that the budget of the European Union must not increase beyond the rate of inflation between 2014-2020.

In the letter, leaders stress throughout the EU Member States have to take rigorous measures to restore public finances to ensure public debt levels are durable and of the European Union must not be "exempt from the considerable efforts made by Member States to make their public expenditure under control".

"The measures taken in 2011 to curb the growth of European payment appropriations should be increased progressively to the years of the financial perspective and payment appropriations should increase, at best, no more inflation on the next financial perspectives, the letter says."

The troika calls for better spend European public money and says that this can be done by "European enhanced the effectiveness of expenditure, monitoring of specific commitment appropriations, looking for where we can acquire economic lever and simplify the financial framework."

This approach by the three major EU powers their place in a trajectory of collision with the European institutions including the Parliament and the Commission.  Many of the Commission consider that that letter questions right the open action. Earlier in the year, the Member States had reduced the budget proposed by the Parliament and Commission by half, and it seems that the battle between the Council and the rest of the European institutions are set to continue.

Mr. Cameron was clear at a press conference in Brussels Friday when he noted that "the Europe cannot be immune" the reduction of public expenditure, Member States are to implement.

The President of the European Commission Barroso has tried to suggest that this letter does not carry much weight.

He said: "We know sometimes member groups in an attempt to position itself". "What ultimately matters is proposal from the commission which is put forward, then discussions on the basis of this proposal.

Multicoloured titles by PixoPoint (Blogging Pro) plugin

Franky Branckaute wrote this post on 19 December 2010 in the creation of a link, WordPress Plugins

Add span tags to tiles: a plugin rather interesting by Ryan Hellyer's PixoPoint. The plugin does little, but that it might be useful for designers and fans sites technicolor.

This lightweight plugin, the code of can also be used in the functions.php of your theme, this plugin allows you to use different colors in your CSS based on the position of the word in the title.

Download atPixoPoint plugin.

Categories: Link, WordPress Plugins
Tags: Color, CSS, design, Ryan Hellyer titles

RSS grad returns Afghanistan (Feed Digest)

When Monica Brennon gathered families, friends and the media to host his son home leave Afghanistan Thursday, his son was happy, but admitted that he was not "too much surprise," knowing her mother.

It was great, though, to see friends, he had made in ROTC in high school in Sterling and return from his second war zone. Chad Gross, 21, already seen combat Iraq and Afghanistan while serving in the army.

This content is available to subscribers online only.

You are connected, but are not a subscriber line or do not have the package of service required to display the contents of this page.

Already an account online active subscriber?

Login now

If you want to become a Subscriber Online?
Please choose one of the following services:

Current subscriber Access Current subscriber Access The Baytown Sun is proud to offer our existing customers, free access to our Edition online.

Simply register as a user online. You will then need to your subscription account number and your login name. Make sure that write you your family name is all CAPS. Unclear that your account is listed? Do not know your account number? Call our customer service at 281-425-8066 or by email at customerservice@baytownsun.com Department

Edition online the Baytown Sun Online Edition of The Sun's Baytown Want to read your new hometown online?

Sign up for a single subscription online! Once you are a Subscriber Online, you can connect using your user name and password or by using your last name and subscription account number.

To move forward... we click until today!

Pass of the day (24 hours): $1.99 for 1 dayOne months: $10.25 daysThree 30 months: $30.75 90 daysSix months: $61.50 to daysOne 183 year: 123,00 $365 days How can I get my Member ID and password if I am a print subscriber? Contact Sun Baytown circulation department at 281. 425 8066, 8 H - 17 H Tuesday - Friday and 8 AM - 5 pm Sunday.How can I get my Member ID and password if I am a subscriber online only? Once you've registered and subscribed, your screen name and password saved will grant you access to any content that your subscription includes. You forgot your password? I am connected. Why I am unable to view the contents of this page? You probably saved account (enabling you to connect), but does not sign a package.
Select a package in the list of the services above for access.
"x" > 8 = 25 E kAm @ 9@>6 36 7@C E96 9@=:52JD ["D2: 5 96 [2?]"] [5 H2D =@@<:?8 7@ch2c5="" e@="" e:="">6 E @ 49: == @ FE] k ^ kAm am ~? 6 @ 7 9: D 7 C: 6? 5 D H9 @ H2D E96C6 E 8C66E 9: 925 7=@H? 9@>6 2 52J 62 C = J @? 9: D @ H? 9@=:52J = 62 G 6 7 C @ > E96 |2C:? 6 D E @ 36 AC6D6? [E] k ^ am kAmvC@DD'D 72E96C [$ E6A96? vC@DD [D2: 5 9: D]] D @ ? 925 4@?D:56C65 8@:?8:? E E96 @ |2C:? 6 D:? DE625 @ 7 E96 pC > J [3Fe E96 564: D: @? 42 > 6 5@H?] E: E @ >:? 8i w6 H2D 23 = 6 E @ DE2CE:? PC E96 > J; FDE 7: G6 52JD 27E6C 9: 89 D49@@= 8C25F2E @? -E96 |2C:? 6 D H@F=5 92 G 6 > 62? [E 2 b\>@?E9 H2: E] k ^ am kAm "w6 H2?" E E65 @ 8 @:? E E96 @ |2C:? r@CAD 6 [3Fe E96J H6C6?] "FB: 4 E < 6?@f89="" 7@c="" 9:=""> ["E96 6 = 56 C vC@DD D2: 5"] k ^ kAm am $ E6A96? vC@DD 9: D 6?4@FC2865 D2: 5 96 D @? E @ 8 @:? E @ E96 p: C u@C46 H96C6 96 D6CG65 [3Fe E92E H2D?] "E E96 5: C64E @? [96 564: 565 @?] k ^ am kAmq@E9 A2C6? D2: 5 ED r925 925 256 FA 9: D >:? 5 H92E 96 H2? E E65 @ 5 @ 9: 89 D49@@= 27E6C [2. 5 E96J DFAA@CE65 9 >:? 9: D 564: D: @?] "w6 d E AC@F5 @ D6CG6 ["9: D 72E96C D2: 5"] k ^ am kAmqC6."@? D2: 5 ["r925 42 > 6 E @ > 6 H96?"] 96 H2D ' f 2? 5 D2: 5 [' | @ > [x' > D: 8?:? 8 FA 7@C E96 >: =: E2CJ]'"k ^ am kAm $96 D2: 5 D96 6 A2C6? of C6D: DE H96?"] E96: C 49: = 5 C 6? > 2 <6 e92e="" 564:d:@?[="" 3fe="" d96="" 5@6d?’e="" 36=":6G6" :e’d="" 2="" 8@@5="" :562="" e@="" 7:89e="" :e]="" “|j="" 25g:46="" :d="" e@="" dfaa@ce="" e96="">- 36 =: 6 G 6:? [E96 >] k ^ kAm am $ E6A96? [vC@DD D2: 5 96'5 E2 = <65 e@="" 9:d="" d@?="" e@="" ecj="" e@="">2 <6 dfc6="" 96="" f?56cde@@5="" h92e="" 96="" h2d="" 86ee:?8="" :?="" e@]="" w@h6g6c[="" 96="" d2:5="" 9:d="" d@?’d="" 564:d:@?="" h2d="" 6i24e="J" c:89e="" 7@c="" 9:="">] "% 82 G 6 9 96J > 7@4FD 2?" 5 2 AFCA@D6? 5: D4: A = 5:? 6 [2. 5 D H92E 96 E92E? 66565] "k ^ am kAmk6>m#6A@CE |2C < u="6">:?" 8 42? 36 C624965 2E k2 9C67lQ>2:=E@i>2C<]7=6>:?8o[32JE@H?DF?]4@>Qm>2C<]7=6>:?8O[32JE@H?DF?]4@>k^2mk^6>MK^Am

Blog Link Building unique techniques 3 (Blogging Pro)

Guest author wrote this post on December 17, 2010 in blog tips

The link to your Web site, another site is a natural way the Internet is connected. When you think about it, regardless of where you start and you find yourself, a kind of hyperlink introduced you it and no doubt that they will serve medium when starting from the Web page.

There are several ways, you can create links to your site. Those which as we all know include:

Commenting on relevant and your site web directoriesCommenting niche blogsWriting directoriesAdding article articles forum posts

All these methods provide reasonable links to your site, but many of them will be from sites that fail to provide you with a link "follow", are not accepted or include your phrase/keyword among others factors that may reduce the SEO benefit to your site in comparison with a link containing your phrase key on a respected site that is "dofollow."

Many of the above tactics have worked for years with great success, but it is clear that some of them offer to the community of the Internet as a whole is negligible.

Untapped or new ways of binding

View articles
Guest articles, this piece provide mutual benefit to both the blogger (me) and the webmaster to publish the contents of another Web site quality and get a link anchor to your Web site or a deep link to the content. Quality content can often lead traffic to your site as well as vital link juice and make a name for you as an author.

Addition to the lists
When them looking for competitors or to an analysis of your competitors, you may find many lists that contain your competitors sites in a ' 10? top page or the "present best" list Why not contact the webmaster and request inclusion? At least 30% of it worked for me, if it does not just add a comment. What you have to loose?

Broken links
When doing your usual link, construction of routine, keep an eye links that may be useful for your own site. If a hyperlink. Error messages are usually variety 404, which means that the page may no longer exist. Contact the webmaster and let them know the link has expired or is not reliable and that you have with a suitable replacement.

And now that you know some of my secrets, go and put in place or at least consider adding these tactics for your campaign. It is unlikely, as you probably already know that you'll see instant results, but more of a gradual measure success over time could be observed. Writing to a fellow webmaster, read what you wrote, you interested? Will answer you or make an effort for this person? If the answer is in either of these questions, I suggest that rewrite you your proposal so that it is not just another E-mail application or generic spam.

Last but by far not less quality and valuable contribution to the topic in question will give you the greatest chance of getting links with success, attracting new visitors and moving in the search engine ranks.

Guest author: this guest post is by Isaac Bullen wrote to host caring that provide Green Web Hosting solutions and provides a guarantee hosting to their clients.

Categories: Blogging tips
Tags: blog linking, link blog, linking techniques

EU interruption: heads of agreement On A break permanent device - UK to remain outside according to Cameron (eGov monitor)

Leaders from 27 countries met in Brussels last Thursday approved a permanent mechanism for rescue to succeed 750 billion euro temporary European financial stability Facility (EEHC) after 2013, when the GED mandate runs.

Prime Minister David Cameron told journalists unequivocally that the United Kingdom remains outside of the new permanent replenishment mechanism and would not contribute to it.

The new permanent mechanism bailou would require a change in the Treaty of Lisbon.  Germany has been demanding the tweaking of the Treaty of Lisbon to meet its Constitutional Court.

"Member States whose currency is the euro may establish stability mechanism to be activated if necessary to preserve the stability of the euro area as a whole." Granting of a financial assistance in the framework of the mechanism shall be subject to a strict conditionality, "the new text would read said Van Rompuy, the President of the European Council."

The heads of State 27 Member believe this small change would not require ratification referendum in any Member - State in the current environment, it is likely that such a referendum would have failed in some Member States.

No there is, however, no agreement on increasing the size of the existing bailout funds.  Jean Claude Juncker, Luxembourg Prime Minister and President of the zone euro has been arguing for increasing the funds available for the GED. However, week last, born from the meeting of the Board said it not there no agreement however, put money in the GED additional could be watched in the coming weeks.

Even if not mentioned in the text of the amended Treaty seems that leaders agreed in principle that private investors will have to share the cost of subsidies on a case by case basis in the future.

Leaders are also seeking to bridge the gap in economic performance between euro area Member States to protect the stability of the euro. France and the Germany are expected to produce proposals for this specific problem.

The European Central Bank is also continuing to buy sovereign debts to protect the euro and is expected to double its reservation of 5.8 billion to EUR 10.8 billion.

9 Ways to connect with Santa Claus on the Web (Mashable) (Yahoo!)

You don't have to head to the North Pole to connect with Santa this year. There is a sackful of online options that will help your toddler to connect with Christmas in the comfort of your home.

If you want to write to Santa Claus online, receive calls and personalized video messages or to prove that man in red is real, we found that new sites and services for you help.

So if you have children or you're just a big child yourself, get in the spirit of Christmas and have a read below to find the sites that are sorting your father online must this holiday season.

Is an excellent service online, you get immediate results that anyone who is eager for toddlers know can be a good thing. Complete letter "Dear father," draft standard, and moments later, you'll have one custom of the great man himself reading on screen or print.

After a relatively quick Q & A session requesting the name, age, choice of gift (with some response options fun in drop-down menus), this service-backed Google will generate sound quality "call" to the rugrat (s) in your life. In its reply, they can leave a message for Santa via a toll-free number.

You do not subscribe to this service to Disney, but it is worth only, or when you see the look on the faces of children as show them the names and photos up to on Santa's monitor because it checks to see if they are on the nice list. They are, of course.

"Dear father," download the Smilebox makes your young star of the show. You can customize the clip with personal info, and then add your child beautifully charming film lisping by his own Christmas wish list. Sharing options make it easy to send to the worship of the grandparents, aunts and uncles too video.

It is in the spotlight the Elves take children from 12 questions to verify whether they were good enough to get a nice list here. Service is the password you will need to submit your email to get a "key", but once you do you can check new anytime to make sure that your child is always on the nice list.

Another custom video message from Santa, PNP offering takes you through a few global issues for clip full features adapted for toddlers and older children and, Yes, even grown ups too. Santa Claus is beautiful with a rather splendid beard and authentic required manner. Recommended.

Ideal for rainy day (or snow!) activities during the school holiday period, this site is full of Santa Elf, Rennes, interactive stories on the theme of the North Pole and educational games for fun online. Recipes, crafts and printed matter for vacation offline activities ideas amuse children too.

Thanks to the NORAD and Google, you can track Santa's journey around the world on Christmas Eve, something guarantee get very excited children. This long tradition has been given a new lease on life life last years with the participation of Google, add a little magic positional millions of Christmas Eves throughout the world.

If you need a "proof" that Santa Claus exists (and do not have the skills of Photoshop to create your own), then fee, you can download your own photos and paste on a father Santa Caught Christmas of I. It'll cost you a penny under $10 via the site or from $0.99 via iPhone app - 9 Tools Web to keep your business running smoothly for the Holidays
-5 Happy musical competition for the holidays
-Holiday 10 free icon sets to give your site a winter Makeover [Gallery]
-Campaigns of good social creative holiday season 5

Image courtesy of iStockphoto, ilona75

Re: Thread.sleep () with java (ittoolbox.com) synchronization

Java group is your resource first objective technical discussion and support of peer-to-peer on Java programming language. It depends upon the target thread run. If the other thread
to run the same synchronization method is what current thread
sleep execution method and called. the other thread will not be
executed becoz locking the object is current thread that is in a State of sleep
then those who have completed execution of current thread synchronized method
the lock is released and then only another thread will have a chance to run
The synchronized method.

If another thread target executes is different, then the other thread will get
ability to run

Bank of America cuts WikiLeaks (Computerworld) services

IDG News Service - Bank of America joins the growing list of the financial and technology companies cut WikiLeaks, a move that comes in the middle of the speculation that denunciation site prepares to disclose information on the services.

"Joins the American actions previously announced by MasterCard, PayPal, Bank Visa Europe and others to discuss no transactions of any type we have reason to believe are destined for the WikiLeaks" the Bank said in a release issued Friday. "" "" "This decision is based on our reasonable grounds to believe that the WikiLeaks can be engaged in activities which are, among other things, incompatible with our internal policies for the treatment of payments," said the Bank.

WikiLeaks, reaction, November 28, caused global controversy with a cache of 250,000 leaks U.S. Embassy cables, was rapid. "Is your company? "business with Bank of America" said the late WikiLeaks twitter message Friday. "Our advice is to place your funds somewhere safer."

Founder of WikiLeaks Julian Assange said in an interview with CNBC Friday as WikiLeaks soon free information about banks. In an interview with the magazine Forbes last month, he said that WikiLeaks was prepared to reveal information about a bank that would show "unethical practices".

In recent interviews, Assange did not name a speficic, but in an interview with IDG News Service Bank last year, he said "we're sitting on 5 GB of Bank of America, one of the drives of the Executive.

At this time, said Assange WikiLeaks was reflecting on how to present data. "This is a difficult problem." We might just dump everything into a single giant zip file, but we know for a fact that has a limited impact. To make an impact, it must be easy for people to dive and it looks and something to it. »

Recent publication of the Wikileaks from U.S. Embassy cables has aroused the wrath of Governments and a rash of attacks between WikiLeaks detractors and supporters.

In the midst of controversy, Amazon Web Services (AWS) has its servers WikiLeaks to break the rules of the service on the content which may injure others. Institutions PayPal and credit card payment for WikiLeaks service was interrupted.

Decline in services to financial institutions financial institutions have been affected and then with pro-WikiLeaks denial of service (DDoS) attacks.

Life Assange, meanwhile, has been discussed. Assange is wanted for questioning by the Swedish Government concerning the allegations of sexual assault of two women-related incidents in the month of August in the country. He was arrested earlier this month at the United Kingdom after the Sweden launched an arrest warrant. The United Kingdom High Court ruled that the Assange could be released on £ 240,000 ($ défrichait) on bail pending a hearing for the extradition of January.

U.s. Office of the Attorney General investigates Assange towards the release of the U.S. Embassy cables but has not yet charged.

Reproduced with the permission of IDG.net. History of copyright 2010 International Data Group. All rights reserved.

Updates to 10.0 dharma, rocks XBMC powerful additional and enhanced support [video] graphics acceleration (Gawker)

XBMC Updates to 10.0 Dharma, Rocks Awesome Add-on Support and Improved Graphic AccelerationWindows/Mac/Linux: XBMC, impressive open source and highly customizable media updates to XBMC 10.0 Dharma today with some serious changes under the hood - including an absolutely extraordinary complementary framework upgrade Center.

Last year at this time, XBMC team dropped the release of 9.11 Camelot. Camelot blew all further with a dramatically improved user interface and as your Media Center skins look us like a million bucks - literally, none of the visitors at my house never think that I have received free of charge.

In 2010, we saw various incarnations of the generation of Dharma as he squeezed beta and release candidate phase. From today, XBMC 10.0 Dharma is available for public release and it is quite an impressive upgrade. At first glance you might have trouble he say apart from 9.11 Camelot. Extraordinary style introduced in the latest version is always there and who better than ever with a few minor adjustments. The real magic in this release cycle is under the hood.

XBMC Updates to 10.0 Dharma, Rocks Awesome Add-on Support and Improved Graphic Acceleration

Let us be honest. I love XBMC, there is a good chance that you too love XBMC - he won five hive for best media center application and XBMC articles always collect much attention here. We have to claim that, historically, adding XBMC and customization experience XBMC was a walk in the Park. You have to comb forums XBMC.org read post after post and hope that make us the combing for you and write a nice guide. Modules were almost entirely hit or random and what worked in a cycle of generation may not work the next - or even between machines. This release cycle removes adhesive tape holding the additional support and replaces it with a complementary system based on the elegant and streamlined repository.

Sounds too good to be true? Check out the video below. I was able to install modules easily, to the right of the box, with a new installation. Instead of marinating in a lot of hand editing configuration files, look at how I easily download a new skin, add in some media scrapers and even add a video plugin to within a few minutes (any configuration or modification of the hand is necessary at any time).

XBMC Updates to 10.0 Dharma, Rocks Awesome Add-on Support and Improved Graphic Acceleration

If you're new to XBMC you think OH, well "that seemed easy enough!" but if you're a veteran of the XBMC, you are probably still in shock. I did not FTP in my installation XBMC, hand edit the configuration files or sacrifice all livestock to achieve. Adding media scrapers, music and modules subtitle, new skins, tools, videos and additional web interfaces to your Media Center remote control has never been this easy.

In addition to support additional awesome (and we do not insist enough what a great not forward this new framework complementary and repository is XBMC project) you will find even more improvements in the generation of the dharma, including:

Support for new media, including acceleration WebM VP8.Improved equipment for a large number of hardware configurations, including support for Windows Vista/7 and CrystalHD acceleration on all platforms - Linux and OS X users DXVA2 codecs will see major improvements with CrystalHD.Support for unencrypted Blu - ray playback.Integrated day including support for update or automatic update notifications.

For a detailed overview of all improvements to 10.0 Dharma XBMC see complete milestone here.

Excited about the new version and want to make your collection of media like whipping and customizing your XBMC experience? Information on how to get so many things with our practice guides:

Visit the link below to read more or go to download right to seize a copy of your operating system of choice.

Send an e-mail to Jason Fitzpatrick, the author of this post in jason@lifehacker.com.

How VMware differs from Amazon Web Services in its approach to import virtual machines (feedburner)

This post is part of our ReadWriteCloud, channel dedicated to covering the cloud and virtualization computing. The canal is sponsored by Intel and VMware. Read the case study on how the city of Santiago, the Spain turned to virtualization.

vizcloudkick.pngAmazon Web Services (AWS) import VMware image is somewhat like the Hotel California. You can check but you can never leave.

This is the point of view of VMware on AWS import virtual machines VMware. Without any real export functions, AWS is locking in customers who want to extend its infrastructure virtualized environment public cloud.

Matthew Lodge is Director, principal of VMware cloud services. We took with him this week to talk about VMware approach and how it differs from AWS.

Referred to in Tom Bittman, an analyst at Gartner Research, who says Lodge as safety and performance are two of the top concerns on the outskirts of the cloud infrastructures.

In short, is a distinct manner that VMware differs from AWS.

Hybrid is that VMware sees his next thrust. Making the move to import virtual machines VMware AWS is grateful a significant market opportunity. It also demonstrates VMware dominant position on the market.

But George Reese for a saw some problems with the AWS methods both VMware. Reese is the founder of EnStratus, a service that helps businesses to expand its data centers in the cloud clouds management. He says that AWS import method is too low. He told us via Twitter would be like a running application on its own separate mother. This motherboard will then be carried from one server to another.

The best solution is to be portable to the application layer and run your application on any virtual machine on your target operating system.

Lodge says VMware offers its customers security and control movement of the cloud.

In a blog in August, he wrote:

"Another area important that heard talk us time and was once again security." Consequently, security is a key element of vCloud Datacenter services. There are three parts to this: the security of cloud infrastructure itself, applications running in the cloud and authentication for users of clouds within your organization and access rights.

You told us that it was not enough that the infrastructure and applications are protected; security teams and Auditors should be able to verify and document too. To provide this service for Datacenter vCloud infrastructure a meet a strict set of physical and logical security controls with all newspapers available for inspection by the third-party auditors. We have developed a set of controls derived from the ISO 27001 and consistent with the SAS70 type II to this end, including the implementation of our service provider partners.

We also took advantage of the new vShield Edge and vCloud Director "monitor" complete virtual security, which provides a firewall stateful (again, newspapers are available for the audit), layer 2 VLANs and complete isolation of network layer 2. As a result, security and the implementation strategy automatically follow the application, regardless of the where he physically lands. (It will be more to this topic in another ticket blog.)You also receive complete role-based access control, authenticated against your own directory business so that you have the type access and authorization security that you're used to. »

AWS Lodge contends, a virtual firewall that does not provide a high level of security. You see it if there is an attack.

"They do not logs you off the firewall", said the Lodge. "If they are attacked they cannot see the logs to see if they actually get attacked." "They cannot see what is happening."

AWS maintains its network is secure and there is much to show for that to be true. But the situation changes when you start moving of virtual machines.

We'll get more into that in a future post on virtual networks and emerging awareness that require networks. Lodge and a host of others have a lot of insights into the topic that is worth exploring.

The bottom line: VMware offers a much more sophisticated than AWS service but flexibility and price AWS service make for a compelling alternative to VMware approach.

There are many other players in this space too. EnStratus is a cloud of world-class management service. Rackspace brings his own brand, with the acquisition of Cloudkick.

The new year? Our bet is that the cloud will become much more transparent. The difference is that by the end of 2011, everything is much more familiar to businesses and perhaps much easier to implement, too.

Blog comments powered by

Saturday, December 18, 2010

5 Tips for creating a truly useful tutorial (ProBlogger)

Notions of pillar and persistent content are not exactly new to bloggers - we know, we have some of our best shots of report and loyalty, and building repeat readership. Then, it follows that we should develop our pillar-content-writing skills.

Today, I wanted to watch a key pillar content type: tutorials. Several blogs post tutorial content in one form or another, even if it is not marked as such. We recently published a tutorial on Facebook albums ProBlogger here, and if your blog is the one who gives advice, you probably wrote a tutorial or two in your time.

The next time you write a tute, apply these tips and see if they make a difference in the quality and value of your content pillar.

Definition of deliverables for the tutorial is not to work on what you want to say: it is to work on what your audience wants to know. So you think a tutorial on the basics of pruning is good pillar content for your garden blog? Great. Your starting point should be your readers: what do know about pruning? What types of plants are they prune? They have no experience with pruning? What types of content can help them: diagrams, videos or descriptions?

Approach to your tutorial from the perspective of the users of your blog and you'll easily - and accurately - identify what should be produced deliverables of the tutorial. For example, you can focus this tutorial on pruning fruit trees for novices - people who have never cut a tree fruit in their lives. Your product deliverables or objectives, are that at the end of the tute, your readers feel confident to go outside and prune fruit trees in the garden. They know what tools they need and they know you exactly what they need to do to prune tree for maximum productivity next season.

Next, draw in your tutorial about. You can start with the key concepts, users will need to understand the list and a logical flow of content that introduces the concepts and then relies on them with practical information related to the implementation planning.

What you'll end up with is probably a series of steps. Make of these titles and subtitles in your tutorial. Make numbered headings if they have a place in the logical flow of information and if you want to attach a word like "step" or "stage" or task "for each of them." Make your subheadings also normative and unambiguous as possible and create for each statement that clearly indicates what information fall into each section. For our tutorial pruning, perhaps the first topic, "" step 1: prepare your cleaning tools. ""

Take into account the types of content, that you will use to communicate with your users. You can use images to illustrate certain points and videos to show others. Identify where you need type information specific to this point, before to start writing, since it is probably time when you are in your objective on what methods of presentation work better for your public tutorial - and make your content really invaluable pillar.

Each topic has its own language. Sometimes, this language can degenerate into jargon, but it is fair to say that if you are a teacher something readers through a tutorial, there is probably a topic-specific language they need to understand. Tute pruning, this language might include words such as:

pruning saw, shearsbud, spur, leaderchallis, cordonespalier, train, pleach

Write tutorial, get ready to introduce each term you will have in the flow logic information that you provided. You can italicize the first instance of each word, and then provide immediately thereafter, its definition. To do this, systematically, and your readers will understand that whenever they see a word in italics, it is something that they need to learn. They can also expect a definition. The italics will make it easy for them to find the definition again if they forget it later in the tutorial. definitions must be provided regularly to your valid italicizing and disable your tutorial.

In this way, your specific topic conditions become Word flags for readers: once they read your pleaching translate and understand what it is that they understand you more quickly the information in your tutorial - and the rest of your blog - that builds on this concept. Therefore will not share word "pleaching" with "training" or "formatting". Negates the value of your Word flags and undermines the comprehensibility of the content itself. Once you've explained a topic-specific term, use the accurately and consistently around the world.

When you set the tutorial you have worked on the places where different types of content could be better used to specific points. For example, an image of pruning shears probably communicate more clearly to our fans potential pruning a verbose description of the tool.

Whenever you include a primary content type that your tutorial employs different content-type, spell it out. Do not include images, audio files, PDF files or other downloads without explanation, and to make this as clear as possible and detailed explanations. If such additional information creates confusion, you will lose readers very you are trying to help.

Don't forget old writing writing tips: tell them that you are going to say, say, then tell them what you said? This advice applies very strongly to the tutorials. Your tute subheadings clearly what users learn in each section of content. Its introduction should establish exactly what the user will be learning from this tutorial and its conclusion should show how the tutorial delivered on those promises.

Your presentation could explain what readers learn - it addresses information or problem, it solves - in general terms, seeing that they may not have language necessary to enter into the detail specific topic immediately.

The ideal conclusion goes much further, though: he recalled the actual flow of the information presented and shows how that responds to the need or problem identified in the tutorial introduction. He basically explains to the reader how your tutorial to resolve their problem - and justification for why this pillar content is valuable and worth bookmarking, sharing, commenting on the favoriting.

I think that it is the basis for a great tutorial prerequisites. What more can add you?

Tron: Legacy: three dimensions of the mighty (Geeksugar)

This is more than 30 years that we saw last such as Tron on the big screen and oh my, how things have changed in its sequel Tron: Legacy. For those of you who play catch-up, Jeff Bridges will resume its role as Kevin Flynn, who in the original film, has been sucked into the virtual world of the grid and compete in the games of gladiator-like to survive. After defeat its enemies, thanks in part to his ally in the game, Tron (played by Bruce Boxleitner), happens to a company called many computer. Tron: legacy resumes here, tell us the history of Kevin in lightning reports. He went missing, leaving behind his young son, Sam.

Twenty years later, we find that Sam is rebel, ignoring his duties as a stakeholder in the many and are still grappling with his feeling of abandonment. Help him along to drive in the he tries to rescue Kevin in the virtual world, it is created and battle evil (and many more young appearance) twin virtual Kevin, vol. escape. This is a great facility for a storm action and drama, but unfortunately for Tron: legacy, weight is not always distributed between the two.

Learn more, including why I still think you should see the film theatres after the break.

Garrett Hedlund, Olivia Wilde, and Michael Sheen are three new additions to the world of Tron welcome. Hedlund he played directly as a soul lost looking for answers, so that the combination of power and naivety Wilde are an interesting mixture for a warrior of law. But the most memorable performance price Sheen. Although it is only on the screen for a few moments, it is fierce, flamboyant and entertaining. As for collaboration? In addition, it is like Kevin Flynn never left. Hippie humor adds a hilarious scenes of action-packed and lightens up key aspects like God's character. It is "the creator" anyway.

But let us be - Tron: legacy is not really as much about the history and character building as it's effects. No, it is not a film for reflection and deep, and sprinkled awkward moments that you then suddenly your high induced by the lightcycle. For example, when Sam and Kevin meet for the first time in 20 years, you would expect at this time for hot and tender, but instead of this, you are left feeling cold, like the grid itself.

That said, the film has strengths and spots at every turn. Original Tron has leased as revolutionary and advance of his time, despite technological limitations it face, and it is almost as if the Director Joseph Kosinski wanted to compensate for the lack of power of the computer later. He succeeds in significantly, gives us a Carnival of Visual light, superb effects and exceptional 3D. In fact, there is a moment at the end of the movie worth watching the entire film for - really feel you the effort put forth by the Visual effects team, and it certainly shows on the screen. Add pounding soundtrack put forward by the electronic DJ duo Daft Punk (which is oddly perfect for film), and you will need your own belt for a really fun ride.

I don't think the film attempts to hide the fact that its visual effects focuses, and I don't have a problem, whereas funny how I look at it. It is quite amazing to see how far the technology has come, allowing artists to create complex effects and breathtaking on the screen, which makes Tron: legacy merit the trip to the theatre.

Re: Implementation of the rest (ittoolbox.com)

Java group is your resource first objective technical discussion and support of peer-to-peer on Java programming language. To make the pot in your application and copy the shortcut pot or application
start up

That should work

Reprisals by pro-WikiLeaks DDoS overstated, says expert (Computerworld)

Computerworld - all titles to the contrary, attacks of hacktivist WikiLeaks against visa, MasterCard, PayPal and others last week were relatively small and disorganized, says one security expert.

"Despite the press attacks received, they were small potatoes,", said Craig Labovitz, Chief Scientist at Arbor Networks in Chelmsford, Massachusetts, and an authority on the security infrastructure of the Internet.

In a long post earlier this week, Labovitz on scale Arbor blog and refinement of the pro-WikiLeaks distributed denial of service attacks (DDoS) to 5 000 in 2010 confirmed DDoS attacks.

Conclusion of the Labovitz: WikiLeaks attacks were "trivial".

"I call it equivalent to strike a French trucker, cyber" Labovitz said in an interview Thursday. "This is certainly not a war, as claimed by some titles. It was a form of protest, but whose collateral damage. »

DDoS attacks aimed at sites owned by Amazon.com, MasterCard, PayPal and the transaction of payment Switzerland firm PostFinance, apparently in retaliation after each end accounts WikiLeaks or shot stopper WikiLeaks services. Similar attacks from Senator Joseph Lieberman (Conn-I) and Sarah Palin, the former Governor of Alaska sites. Both had blown WikiLeaks to release a trove of confidential cables from the u.s. Department of State at the end of last month.

But when Labovitz against these statistics compiled by Arbor - society provides anti-DDoS technologies to approximately 75% of the world - Internet service providers found wanting WikiLeaks campaigns.

Labovitz, tour of the initial attacks that targeted WikiLeaks itself nor later retaliatory strikes were DDoS floods massive or tune application-level attacks.

"The type of queries [application level] LOIC were rudimentary," said Labovitz, referring to a free tool called low orbit Ion Cannon, many pro-WikiLeaks attack used participants. "A sophisticated attack uses order queries, all right API calls bogs in the system. Hacktivist attacks showed no trace of either.

Nor were these massive attacks.

Labovitz said that the attacks of pro-WikiLeaks generated peak on 5Gbit/sec of traffic aimed at targets, although in 50Gbit/sec Arbor followed in several other flood DDoS attacks this year and only a fraction of the almost 70Gbit/sec view larger until 2010 attack.

And while LOIC more than 100,000 copies were downloaded last week, Labovitz said that the Arbor data showed that the maximum number of attackers WikiLeaks simultaneous retaliation is only in the hundreds, not thousands.

"The number of source what ip observed in revenge fallen WikiLeaks late middle attacks" or 5,000 DDoS attacks made Beaver validated last year, he said on the ticket blog.

Labovitz, who suggested that bases tried to recruit large networks of botnets, these collections of compromised computers were not actually used.

But while WikiLeaks attacks were easily blocked by most of the targets, this does not mean attack DDoS are not a serious threat to the Internet.

"The majority of attacks that see us can be treated," said Labovitz, but there are professionals with financial reasons that take a long time and money in very sophisticated DDoS attacks. "He hesitated to assign the precise reasons for such attacks top range, although some, he said, were clear extortion against ISPs and enterprises.

"While the WikiLeaks and reprisal attacks do not represent the beginning of"cyberwar"... the tendency of the militarization of the Internet and used DDoS as means of protest, censorship and attacked political concern," he wrote on the blog of Arbor "DDoS fuelled by the growth of professional opponents, massive Botnets and increasingly more sophisticated attack tools computer networks poses a real danger for the network and our growing dependence on the Internet."

Gregg Keizer covers Microsoft issues security, Apple, Web browsers and General technology breaking news for Computerworld. Follow Gregg on Twitter at Twitter @ gkeizer or you subscribe to flux RSS de Gregg Keizer RSS. Her address is gkeizer@computerworld.com.

Learn more about security in Computerworld security topic Center.

The CIO's New Guide to Design of Global IT InfrastructureIt is possible to eliminate the impact of distance? This article explores the key 5 principles that CIOS successfully is using to reshape IT infrastructure of any size. Learn how to be ready to adapt to your environment in a manner that supports supports distributed employees, anytime, anywhere collaboration and the need for business continuity during a disaster.

Read now.

The Benefits of Cloud ComputingDiscover what Chief Information Officer of BMC Software provides for the future of the cloud.

Read now.

The New Paradigm of Enterprise CommunicationsDiscover how to increase the mobilization of workers and productivity within your company, even in a robust economy. Alcatel-Lucent, article featuring research from Gartner shows how implementing context-sensitive technology can ensure collaboration communication and build a competitive advantage.

Read now.

Objective of Word: Where augmented reality translation and meeting (Mashable)

We have seen a number of translation for iOS devices, but Word Lens it seems that the most innovative and cool all.


The application allows you to translate the phrases written simply pointing your iPhone on camera. OCR application technology recognizes the text, which is then translated and appears on the screen of your iPhone instead of the original text.


With today's technology, it is not difficult to imagine an application like Word goal, but it is quite surprising if you remember that ten years ago it was in the field of science fiction.


The text is translated word for Word, which makes it quite limited application in the sense that you bring a book with it, but it is very well when you need to decrypt a sign or a restaurant menu in a foreign language.


The application itself is free, but you have to pay for individual language packs. Currently, only English Spanish, translation, and vice versa is available and package costs $4.99. You can install the application here.

Friday, December 17, 2010

Google News is News monitoring function (WebProNews)

 Google News Gets News Follow Feature Google Adds Call-to-Action for News Customization

Comment Friday, December 17, 2010 ViewComments By Chris Crum 2 Buzz This

Google has added an interesting new feature to Google News. Now, when you do a search, near the top of the results, you will see a button to follow news for that query. 

When you click the button, it will add that query to the topic list on the left-hand side of the screen, as well as create a custom section on the Google News homepage dedicated to that topic. 

For example, if I search on Google News for "facebook", and click the button, Facebook is added to my topic list:

Follow Facebook News on Google News

There is also now a Facebook section on my Google News homepage:

Follow Facebook News on Google News

Google has allowed you to customize your news experience in similar ways for quite some time, but the button simply provides a call-to-action, and like just like a call-to-action in an advertisement, it will encourage clicks and further use of this kind of customization, and therefore enhance the Google News experience for users. 

The result of this is keeping people interested in using Google News, and let's face it - it's not quite as critical of a go-to source for news these days, as many Facebook and Twitter users are using these services as news readers. 

Google has done a lot over the last year to keep Google News interesting, and it will have to continue to do so to keep traffic from going elsewhere. 

Twitter evaluation $3 g after $200 M financing round (Information Week)

Twitter has a domed financial war chest after Kleiner Perkins Caufield & Byers has reported that he led the 200 million fourth round of funding from venture capital to growing social networking phenomenon.

The new values investment Twitter to 3.7 billion, which is more than three times its value, a few months ago. The new infusion of money means that the company can continue its aggressive hiring and had to float a PIT in the foreseeable future.

Investment is something of a departure for Kleiner Perkins, who has recently focused on alternative technology. It also represents a return to more traditional technological investments, after his legendary success investing in Google, Amazon, Genentech, Juniper Networks and Sun Microsystems, to name a few of its investments successfully.

140 Characters "Twitter tweets" took the social networking world by storm, and there is a consensus among the first users its usefulness is that start. Twitter also named Mike McCue and David Rosenblatt, successful entrepreneurs, to its Board of Directors. Former CEO of DoubleClick, Rosenblatt sold that company to Google for $ 3.2 billion. MCue supplier of speech recognition TellMe sold to Microsoft for $ 800 million. McCue also conducts Flipboard, Kleiner Perkins helps create formats magazines for iPad Apple investment.

"We privileged and excited Twitter lead investor's most recent round investments" Kleiner Perkins said in a statement e-mailed to Bloomberg news. "We expect to help the company to become the next great Treasury Internet."

Investment firm follows in the wake of naming Mary Meeker venture capital firm Morgan Stanley Internet analyst as a partner.

SEE ALSO:

Skype Plans $ 100 million IPO

Twitter is News, social media

Twitter worm spreading by Google Link

In this Dark Reading Tech Center report, we explain how your security and your network teams can work together and to use common tools to detect the threats before your systems are compromised. Get it now (registration is required).

Lighting for periodic Gets Android, App Store, New York Times)

Reflections on the Self and the Wider World 36 Hours in Paris True Guitar Hero, With More Love and Less LeerRobert P. George from Princeton and Cornel West of Princeton discuss the corrosion of our values.In Seconds Before Blast, the Making of a Hero Abstract City: Let It Dough! a room for the forum for discussion on what signs of progress could be realistic at this stage.

Xerox creates a cool "intelligent document" display touch screen, New York Times)

The new system for revision of the document is a prototype developed by scientists at Xerox Research Centre Europe in Grenoble, France. If it turns into a product, it could help the masses for workers who have sieve stacks of documents and work as they do. The beneficiaries are lawyers, financial wizards legal trainees committed Government, sinister, medical assistants, Office workers and others. It reminds us that, for all the talk of a "paperless office", computers not brought too innovation through the process of screening through documents. It is nice to see some innovation that can take the drudgery of much of the information era jobs.

The researchers that you can use the system to find, open, sort and move thousands of documents with the touch of your finger. This means that you can sort millions of documents in hours instead of weeks. As you can see in the video promo of Xerox, table-top display lets users move documents with their fingers, as with a touch screen of the iPhone or smartphone. Only this screen is approximately 150 times larger, so that people can work together for him.

Documents can be placed side by side, scale up or down or stacked in a corner of a table, just as they may be on a real desktop. If you point to a number of relevant documents, the system learns what you are looking for and can provide similar, even if it means massive document search. Which can be very helpful for the process of discovery as lawyers research's electronic documents for a memo "smoking gun".

"When you consider the large number of documents involved in litigation, patent research, the Government's security and intelligence analyst reports, it is easy to understand how some review efforts involve millions of documents,"said Caroline Privault, head of research centre project.  "We believe that a tool such as this will have a major impact on the cost, accuracy and speed of examination of documents".

The system builds on the already introduced Xerox technology called CategoriX, which is currently used in services contentieux Xerox for legal discovery. It uses a touchscreen table Labsform PQ. The prototype is tested in pilot customers become available commercially.

Tags: paper, electronic documents, Xerox Rsearch Centre Europe

Enterprise: Xerox

People: Caroline Privault

Copyright 2010 VentureBeat. All rights reserved.

VentureBeat is an independent technology blog. "Read more".

Tron: Launch of Legacy Tie-ins iAds iPad project of Yahoo Search & blank magazine (Search Engine Watch)

"Blekko makes your Facebook like Searchable |". Main | "In New York wants to build the next Google"

New Walt Disney Co. Tron: Legacy film proved to be a strong marketing for technology companies that want to promote the potential of their products display online vehicle. Disney has established a partnership with Apple, Yahoo & Virgin in a movement that seems to launch the concept of advertising which mark the future of brand advertising.

Apple has launched its first iAd for iPad has adapted to the big screen touch report BtoBonline.

Advertising promotes the new Tron: legacy begins today in the theatres movie. IAD for iPad includes 10 minutes of video, to show times and you can buy singles of the Daft Punk soundtrack via iTunes. Also, a much discussed feature is the ability the announcement via email to friends of advertising.

tron-iad-121410.jpg
Image credit: AdvertisingAge

Recently, Yahoo in partnership with Disney to the grid game shows features new and faster - research as the film info area.

And earlier this month, multimillionaire and owner of Virgin Galactic (commercial vessel first in the world), Richard Branson, has launched a new concept in magazines specifically for iPad, called project. Jeff Bridges featured on the cover, with an interactive feature on the follow-up of Tron.

DRAFT coverage video magazine project on Vimeo.

Posted by Jonathan Allen on December 17, 2010 9 H 15

Olbermann suspends Twitter page after... (Feed Digest)

iol news pic Michael Moore dec 17Michael Angeles Moore.Los REUTERSFilmmaker - Keith Olbermann suspended its account Twitter Thursday after receiving a barrage of tweets wrath in the wake of an interview with Michael Moore two days earlier. "Countdown with Keith Olbermann" MSNBC host Moore spoke filmmaker decision contribute $ 20,000 to bail to Julian Assange, the founder of WikiLeaks accused of sexual crimes. Moore told Olbermann Assange is a "pioneer in freedom of expression" to display thousands of secret Pentagon documents on wars and Afghanistan Iraq on the Internet. Then Moore suggested that the arrest of Assange was a plot of Government to smear. "This thing m2 to high heaven," said Moore. "Load is the condom broke during consensual sex," Moore added. "" "". "This is a whole bunch of EH as I fear". Assange was arrested in Sweden after two women accused of rape. In both cases, women reported that the Act began as consensual, but they changed their minds after a condom broke one and the other after a condom "was no longer in use", as the New York Times put it. Exchange between Moore and Olbermann has caused a storm of tweets wrath, suggesting Olbermann and Moore were too flippant when discussing charges Assange raped two women. Many of the tweets were no doubt with the permission of Tigerbeatdown.com, started a campaign online shame Moore for his 'apologism rape. " It also takes Olbermann to task for re-tweeting a link to a story that identifies women who accuse them of rape Assange their. Olbermann blocked tweets Tigerbeatdown, their unlocked, then stated that it has been done with Twitter, for now, anyway. "I will unlock all blocks, wish you a Merry Christmas and I will suspend the account until / if this frenzy is stopped," he tweeted on Thursday. Olbermann did not respond to a request. -Reuters

OFCOM proposes UK telephone number prefix re - org (TheRegister.co.uk)

OFCOM has proposed simplifying non-geographic codes, calls to 0800 free mobile numbers and to finally end the folly of using digital 0845.

The proposals are complicated and present several options on their 482 pages, but the idea is to have all numbers starting with 01, 02 or 03 to be defined by geographic, having put aside 07 mobile, do 0800 free for everyone, while putting aside the prefixes 0843/4/5 and 0871/2/3 business rate numbers and keeping 09 prefix designated for the call rate of the premium. OFCOM has even provided some sample graphics to show simple things could be.

Ofcom's suggested logos

We're also provided with an example of how these icons may be used:

Ofcom example of on-screen pricing

Putting aside the fact that the person will develop three books signs next to an invitation to call, it should be noted that the text of the example presents an other options suggested by OFCOM to make it easier to understand - charging tell the customer exactly how revenues are divided, to help them understand how much is happening at a cost.

But it is free calls from mobile that has attracted most attention. A call to any number starting with 0800 is currently free for a fixed line, but costs up to 40 pence a minute a mobile, apparently confuses many people. OFCOM makes much play that lower income groups are often those in relying on a mobile and therefore then took that call companies or departments to 0800 numbers.

But it is good to recall that nothing comes for free - calls to 0800 numbers are free of charge for the caller only because they are paid by the company receives the call, which will have to pay more to receive the call on a mobile network.

More important is the possibility that this review will conclude the ineptitude of the non-regional 0845 numbers which have been designed to allow all the world make a local call and then excluded bundles of operator and therefore eventually cost much more. Web sites such as SayNoTo0870 provided since long time appropriate for those who know enough companies telephone numbers to their, but OFCOM report is intended to deal with that by allowing companies to replace these figures with 03 equivalents.

But not fast. Even if the proposals are accepted and passed without incident, OFCOM expects that implementation to take a few years, so we are going to pay for our mobile 0800 calls and be seen overcharging collective equipment for 0845 and 0870 calls for some time, even if the end is in sight. ®

What iOS applications must be in the Mac application vault? (NY Times)

Instapaper

This is perhaps a strange request since Instapaper works pretty well as a browser-based application, but I would still like to see. Instapaper and Reeder applications provide best reading experience on iPhone and iPad, in my opinion and Reeder for Mac has already shown that kind of experience can be translated successfully on the desktop. A similar iOS Instapaper application with a way of reading full-screen would completely satisfy my needs read Mac.

Birds in anger

It can be perfectly adapted to a touch interface, but I think still angry birds could work on the Mac. Especially now Apple Magic Trackpad allows Mac to use based on the Enter key. It is not as satisfactory as slinging avian destruction tools simply in related, but it will probably provide yet many hours of distraction.

Facebook

Whereas the social network has not yet issued iPad application yet, is probably asking a lot, but I would love a native OS X Facebook client. The web is great, but I actually prefer to application iPhone most of the time, because I find it easier to navigate and less distracting. The best part is it strips all applications from third-party is probably also the reason why an application OS X Facebook will never happen.

WhatsApp/Kik/Viber

I love having a Messenger system that replaces texting on the iPhone, and I'd like to see be able to reach the Office as well. At one of these would make other obsolete IM clients and keep really connected me anywhere in the world without having really be signed a service (as they worked persistent in the background the way they do on the iPhone). In the same vein, an application as Viber might work well for providing an iPhone Mac voice dedicated, calling solution.

I could go on and on other applications and games I could benefit from using on the Mac, but my point is: there is huge potential crossover for iOS successful Bank application Mac applications.

What iOS applications do you think would best operate on OS X?

Content of GigaOM Pro (sub req is):

Copyright 2010 GigaOm. All rights reserved.

Thursday, December 16, 2010

With Twitter Deal Kleiner Perkins Spends for stamp (Giga OM)

It was a time when white shoes business venture, Kleiner Perkins Caufield & Byers, was money first hot new business creation which defines the categories. Nowadays, it seems that do so, the company Canada road is best can try edge its way into hot Internet start-up to a massive premium. A good example is the recent funding for Twitter. VOLATILE leads an investment of 200 million towers which platform values the rapid growth of social information, Twitter a sum exorbitant 3.7 billion. At this price, assuming that some, if not all previous investors participated in the round, volatile obtained between 4 and 5 percent of Twitter.

Now perhaps main partner of the volatile John Doerr would pull a comment archives. He said that "I rarely paid so much for so little of a company," when referring to the beginning of the volatile investment in Google. And at a time when the volatile was a real kingmaker Internet.

But this is not the first time, the firm has contributed to a piece of warm startup. Even if the company speaks its Zynga connection, he had to spend big to crush this party. The company recently launched sFund 250 million (Social Fund), a way for them to a foot in quick resume the digital media industry movement and social.

It is a striking contrast to the days when he supported Sun Microsystems, Genentech, Compaq, Netscape, Amazon, Google and @ home networks - companies that defines their categories but also created entire industries. The new social revolution has adopted the mantle of investor uber on Fred Wilson based in New York Union Square Ventures (Twitter, Etsy, Foursquare) and Accel Partners (including investments include Facebook and General).

As an investor, it must be at the beginning of tracking trends, particularly in the field of the Internet, where things morph to reduce speed. Talk of the third wave in 2010 is the kind of suddenly discover Lady GaGa today.  But volatile is not much choice. As we wrote earlier, volatile takes a hairpin turn sharp hair high speed is trying to change its impetus for Internet and digital media investment-specific technology investment. Hiring Mary Meeker was the right move, now with Twitter, investment fund is betting that it will regain its stamp?

Nevertheless, to Twitter, this money is going to be useful, especially it has tried to expand its footprint and takes a much more important role. The San Francisco-based company is growing at a great clip, but it must devote to its scaling and at the same time solve the dilemma of a business model. He was not properly understood where sales (and profits) will come.

Yesterday, Erick Schonfeld has pointed out that Twitter could be seen a slower growth in United States, who is not a good sign, whereas the United States (and Europe) continue to be the Internet markets only monetizable. Twitter, I wrote earlier, will see significant growth in emerging economies of the Internet as the India, the Brazil and the Indonesia in the coming years, which is not enough for businesses in the United States monetizable.

However, as long as there are people looking to spend heavily to hang with the cool kids, trio of Twitter co-founder Evan Williams, Biz Stone and CEO Dick Costolo do not have much to worry about.

Content of GigaOM Pro (subscription req is):

Publish an eBook on Amazon? Your questions answered. (Blogging tips)

December 7, I crossed off the coast of a goal on my list of career - to publish a book on Amazon. After I have instructions, it is fairly easy by the way in which. I can now download in as little as 15-30 minutes (fast if not for my type of personality that forces me to try to get everything is perfect).

Anyway...

After that I got my book on Amazon, there are a few things that I wished I had known that would have made the experience much better. Here, I want to give you the heads so that you can relax and enjoy the realization.

Your eBook Amazon publication notice

The guidelines had been told that my book would be published within 24-48 hours. I kept waiting to receive a notification from Amazon in my Inbox that told me that he was alive. So I do perspire waiting, I wanted to know that I was indeed an author published from Amazon.

This WAS a milestone important career.

Well, my sister is my book on the site and sent me the link. She was a published the same day I - Yes, we were racing and won by just a few hours L).

Know your self-Published on Amazon eBook

You will need to open your account via the DTP Amazon * publication interface (interface Edition ebook Amazon) and click on "reporting". This is where you can follow what was going on with your ebook, for example, at what stage it is at in the process of publication to see if you have sales, the list of your titles, sales UK, reports etc.

Just know that you will not receive an email from Amazon to your email account. You must log in to your Amazon account.

FYI, DTP is an acronym for digital text platform.

Your description of the Amazon eBook product

Once my ebook was going live, the description of the product was not there. I was like "What is up with that? I started to download still think that, perhaps, that (I) would help to know I provided, so it wasn't the problem.

But I have a background editing and something I do however intuitively. True enough, I was hunting autour Forum Edition of the book on Amazon and found a response which says that the description of the product is usually published one or two days after the book itself alive.

AND he went increasingly say that this post that if you keep re-uploading, there will be delays it published much more time.

Therefore, if you see your published book and there is no description for product it (and you know that you have provided one), not sweat it. He will accompany in a few days. Simply relax and enjoy the fact that you are now in the world, published author!

How to publish an eBook on Amazon - the quick and easy way

Here are the instructions easy to follow on how to publish a book on Amazon.

And as I clicked in my ebook Amazon Edition account for information on this item, my second book is almost on-line on the site. Next year, my plan is to publish at least 50 titles on the site - but it's a topic for another post.

Google image search is for hyper (Search Engine Journal)

If 2010 has proved anything about Google, the search engine giant is dependent on the speed. The range of updates to speed-oriented showed clearly just where focus the company resides. Now, as 2010 draws to a close, they quickly add functionality: search for faster image update.

According to the search engine Land, search Google image is some caffeine of its own. Caffeine, the reorganization of Google data processing reorganization resulted in for instant updates on the web is finally rubbing on image update - a process which has long been notoriously slow.

While Google has not made an official announcement, they recently confirmed that they "made a few changes to increase the speed at which update us images in our index. So what this means for users and webmasters? For users, the update will be cooler and more specific content on the web. However, for webmasters, this means something much more.

While the images already took months to load in the search for the image and heavy equivalent length of time to change position, new media and position shifts can now see in a few days. This enables images add your content and to engage in active emo (search media optimization) more critical and more useful than ever.

But, as indicated, this increase in speed is only a predictable part of the current objectives of Google. In 2010 alone, promoting the browser chrome (known for its faster loading time), the introduction of caffeine (described in detail above), major at the moment, so fast that they occur before you have even the results of the research been typing) Google change, and announcements about the OS chrome (what Google calls to the operating system faster and more secure so far) show how full Google plays to this quality demand.

Bing Incoroprates ' instant response "in the search (Search Engine Watch) image user interface"

"Bing includes FanSnap event search |". Hand

Bing has made it easier to find the images that you want by automatically sort your categories image results. The "Instant response" feature creates a toolbar above the image search with proposed amendments to your search results.

The feature is a useful way of sorting in ambiguous image search terms.

For example, the query "Air Force One" could be searched for United States Presidents "private jet", but also, it might be a search for a type of shoe.

bing-airforce1.png

As you can see form the image above, predicts Bing research may need clarification and lets you view segmented in a single click, without having to retype the query results.

bing-airforce2.png

Posted by Jonathan Allen on December 15, 2010 4 H 54

JC Penney model advances social sales. 3 Tips for businesses them more you want to follow the trial (Marketingvox)

J.C. Penney has became the first major retailer pass its inventory full line at Facebook, allowing buyers not only display their products, but also buy into the social media site. As with most social sales efforts, shoppers can see what their friends have purchased food for their new and - we hope JC Penney, view - click it on by to see the catalogue.


It is a natural evolution for the online retail model. "Retailers want their routes where their customers are," said Jason Taylor, Vice President of global products for Usablenet, strategy builds Facebook for J.C. Penney operation. "They have recognized that Facebook is another place, they must be in front of their customers." (from Fast Company).


JC Penney is not the first retailer to try this model. Procter & Gamble, sell pampers and other household items from his Facebook page. On a smaller scale, candidates from Wharton MBA Cherif Habib and Stephan Jacobs has recently launched a private sales site that speaks to students at colleges and is accessible from Facebook, according to the portfolio. Their market go strategy is simple: empowering students top college marks the page via the channel they use most. Then there is the weight of the Wharton alumni association networking.


3 Advice if you want to track the combination


JC Penney, with some 250,000 products for sale on Facebook, is the most ambitious social sales effort so far. This model gains traction and better know the industry accumulates, brands should bear in mind the following:


1. Buyers on Facebook have different expectations about the sales process. Very different. This is a much more egalitarian, unbridled atmosphere with potential buyers often ask detailed questions and wait for an almost immediate response. Nowhere elsewhere undoubtedly is the function of service customer-marketing-sales so tightly integrated as a social site for sale. If you cannot do this right, it would be preferable not to make all the.


2. The social part still does not work to your advantage. Sell something on a social network. Buyer tells a friend. Friend, which complies with the notice of the purchaser, goes on your site and purchases the product too. Lather with SOAP, rinse, repeat. This is how it is supposed to work in any case, but recent research suggests that the recommendations of friends just go up online. WSL strategic retail, for example, finds that online buyers tend to value the views of sites review for more information about the products in addition to their online social networks.


3. Be wary of new technologies – or at least their return on investment promised. Commitment of the trade mark on Facebook? Okay, fine, we know that he pays off the coast in a way or another if done correctly. But most of these channels is themselves – even prove the Twitter enormous amount of success. Remember not Twitter, presale offer that it deployed with great fanfare this year? It seems indeed as another no tool sales itself with companies able to offer discounts on a first-come, first served basis. But earlier this year, Twitter has decided to put aside early on behalf of other products probably more successful.

LinkShare reports record growth in Cyber week (magazine.websiteservices.com)

Performance marketing leader LinkShare has reported record year of growth during the feast of Thanksgiving shopping period with same store sales increase by more than 50% on Black Friday and over 45% on Cyber Monday.

Strong growth was seen in a wide variety of categories of products with the highest performing segments being luxury, clothing and personal care, which saw the triple digit earnings year on year.

LinkShare network data reflect the greater tendency of consumers in their research and their holiday shopping earlier in the year. As soon as the first half of November, shoppers began their research vacation and continued until Thanksgiving weekend purchases making a full week of the Cyber.

While Friday black and Cyber Monday remained better days performers LinkShare advertisers and publishers, Saturday and Sunday between were also very strong, see 58 per cent of the sales report-year increased during this period.

The performance of the LinkShare Network continues to exceed clearly global retail e-commerce growth. According to comScore, overall retail sales over year were on Black Friday of 9% and 16% on Cyber Monday, compared to 50% and 45% in network LinkShare, respectively.

Protect your business in a world of WikiLeaks (NY Times)

Entrepreneurs and business leaders should be regarded as a wakeup call and examine how they protect their confidential business information and intellectual property from unauthorized disclosure. Often, the greatest danger comes from leaks internal rather than external security violations. To date, WikiLeaks site depended mainly on an employee or otherwise initiated which first and foremost the leakage of confidential information.

Confidence is not enough to protect your business, so here are some tips to reduce the potential risk of your company a leak and the legal responsibility.

Identify your information "mission critical" and keep on a need to know basis.

What information would be detrimental to your company if it has been disclosed, and who has access? Even if you are not a top secret as Coca-Cola formula, your company has probably trade secrets must be protected and even potentially embarrassing information which would be negative about your brand or reputation light to shine. In General, trade secrets are determining how that gives your business an advantage in the marketplace and may include business plans and others even private - information that is in the form of customer lists.

Not forget your confidential information of the company to receive protection under the act as a trade secret, you must start taking reasonable precautions to protect them - usually by restricting access to this information.

Legally, protect your information.

In addition to restrict access, you can configure additional legal protections to discourage illegal leaks. Confidentiality or nondisclosure agreements must be signed by all employees and independent contractors, and also by existing and potential trading partners. Always ask the parties sign the agreement before share you any sensitive information.

Consider adding a section to your HR manual spelling the responsibility of each employee to protect confidential information. Policies can discourage illegal leaks and give you a legal advantage should information out, despite all your efforts.

Track and monitor access to, and limited copying of confidential information.

Bradley Manning, the soldier who allegedly stole it documents classified military personnel and their past WikiLeaks, had claimed to listen to a CD of Lady GaGa, while he was actually copy cables classified on the same CD.

This could have been easily avoided if there were technical measures in place to prevent an employee to copy information onto a CD drive or zip. That reasonable security measures are in place, unusual behaviours monitoring can also help identify suspicious activity that might indicate a potential leak.

Protect yourself from responsibility to the user if you are a service provider.

Small businesses should take a lesson from the big suppliers who refused service on site WikiLeaks. Amazon, PayPal, visa and others cite shortcomings in their terms of service as justification for refusal to Wikileaks service agreements. If there is pressure from the Government on these service providers, it is likely that the primary motivation of WikiLeaks dumping was to protect themselves against liability for alleged illegal WikiLeaks activities. Learn from these companies and good contracts has implemented to protect your company - responsibility and avoid being at the mercy of the actions of someone else.

Charley Moore is the founder of rocket lawyer legal services website and legally easy blog editor. He argued this VentureBeat column.

Copyright 2010 VentureBeat. All rights reserved.

VentureBeat is an independent technology blog. "Read more".

Hello fring, This Is Android & money call (Giga MB)

Firstly, Skype and Nimbuzz indicated how even though they do. And then there are the spectacular launch of Viber. And now fring told us that they see their quarterly earnings grow at a rapid clip, thanks to the popularity of its Android app which is stimulating demand for its service fringOut. Apparently, mobile VoIP finally has its day in the Sun.

"We have been together $ 10 k daily revenue of phones Android," says Jake Levant, Vice President of marketing based in London/Tel-Aviv fring is a multi-platform video and voice application in 3 G and Wi - Fi networks. The company saw a flurry of high growth through expanding Android ecosystem. "We are on track to double our revenues in the first quarter of 2011," added the rising. The company makes money by offering good markets, called fringOut, for people who want to reach contacts outside the fring network call plans.

What is permitted: incorporation more cameras front in new smartphones that video platform possible service fring call. In addition to the iPhone, HTC EVO popular Galaxy phones Samsung and tablets have front facing camera, for example. The availability of video calls makes folks install fring and use it later for outgoing calls.

Even if fring began life of Nokia Symbian platform, its recent growth comes to iPhone Apple and Android smartphones from Google. Currently, Android represents one third of its total installed base and is growing at a rapid clip, especially in countries such as South Korea. In North America represents 40% of new downloads of fring, which makes it one of the strong growth of the company. The company says it has more than ten million users enabled service and the majority of calls is destined for the Canada India, the United Kingdom and the Australia.

Society is still waiting for Apple to launch its service on the iPhone, fringOut clearance however, the majority of revenues coming from the North American fringOut Android phones. But the Android ecosystem has its own headaches with wild variances in device capabilities, different versions of Android available and custom user interfaces. As a result, fring must modify its app for various handsets and from different manufacturers. Nevertheless, it is perfect with rising because Android is what turbo-charging its activities.

Content of GigaOM Pro (sub req is):

Google Chrome OS comes Under Fire from leaders in the industry (Search Engine Journal)

Google chrome OS has launched its pilot qualified testers pre-beta program. However, while Google enthusiasts around the world are practically drooling to get their hands on the Cr48, not everyone is a fan. Several industry technology leaders openly criticized the Google operating system.

Prominent free software advocate Richard Stallman warned that the OS would be a forfeiture of the data control. As indicated on the goalkeeper, Stallman said that Google's OS is bound to lead careless people "computer." Risks, says, include losing the legal rights of the data; While you must personally submit a mandate signed for anyone looking for the files on your computer, you may even not be aware that your data are requisitioned if it is stored in the cloud. "They can even not to give the company a search warrant," says Stallman. While he speaks against the cloud across, Stallman feelings have been clear for some time; Two years ago he said this over-using cloud computing was "worse than stupid."

Stallman privacy concerns extend beyond criticism of the new operating system from Google. He feared the popularity of the cloud will eventually eliminate equipment to control your own data.

However, it is not only a sceptic posed against the new system. Former when Paul Buchheit, a name associated with constantly Gmail (in the Buchheit project Google) also gives the system a less friendly prod. He predicted that "ChromeOS will be killed next year (or merged with Android)." Buchheit, this is not a question of security or access data, but redundant, because chrome OS and Android serve purposes remarkably similar but different platforms.

While early critics abound, testers are plugging away to the chromium OS and buyable are expected on the market in mid-2011.

WordPress: All The Now phones Belong To Us (Windows 7 telephone) (Blog Herald)

After the unveiling quietly their Windows phone WordPress Web site has just announced their official Windows phone 7 application is now live to the masses download.

In this regard, the first version of WordPress for Windows phone 7, you'll find most of what you just wait WordPress applications. It is easy to write and edit pages on the move and posts, you can upload photos, and check the statistics and moderate comments. It is all easily accessible from the action dashboard. In future versions of the application we also hope to implement video download - tell us what you want to see!

To navigate to the application a panorama view is used, something unique to Windows 7 phone platform that works very well to manage a blog or a website. (WordPress official blog)

For those who ask why it has been excluded from the video download, it has more to do with the Windows 7 phone platform that lack of foresight of WordPress (issue Ad Astra Consulting experienced in the creation of WPTumblr).

The promo video above, the application looks as if it supports the options formatting such as bold, italics, underline and strike through, as well as the ability to insert links and create some blockquotes (features I have long in my iPhone application).

WordPress in partnership with iSoftStone to help create a formal application for fans of WP, which supports the WP.com and self hosted WordPress blogs.

So far, WordPress is the first platform to launch a formal application on Windows 7 phone and is the only one with a formal application in each major smartphone which includes BlackBerry, Nokia, Android and iPhone powerful.

With more than one million users using their formal application in 5 different mobile OS, mobile-verse embrace heavy WordPress could help CMS development not only in places where computers are considered a luxury, but also exceed his chief rival (i.e. Blogger).

Tags: Windows phone, WordPress

Wednesday, December 15, 2010

WordPress now available on Windows phone 7 (Weblogtoolscollection.com)

 

There is good news for all Windows 7 phone / users of WordPress, Windows 7 phone now has an available WordPress application. In the first version of the application, you can edit posts and pages, photo upload, check statistics and last but not least, moderate comments. Sometime in the future, the possibility to download videos is added to the application. The new WindowsPhone.wordpress.org site is where you'll find the latest news on development with user support forums. The first page of the Web site has also a slider on the side right provides an indication of what it is like to use the APP based on the presentation of cursor, everything relating to the application seems to be on simplicity, as the phone itself platform.

Phone Windows 7 WordPress

The application is open source, you can contribute code to help improve the product. For more information on how to get involved, see site Web Windows phone to begin development. You can also follow the evolution of the project on Twitter via WPWindowsPhone account.


Application is not without problem same as Richard Hay de Windows observer discovered. Keep an eye on this post for later updating.


Loading ...Loading...

heading

Have hijacking my blog by an SBI! Coach (subject)

Last week one of my websites was undesirable. What is unusual about this, right? One of my blogs receives more than 50 spam comments daily. But what is curious is how is - and who has done.

Due to the volume of spam, I've set my Word Press blogs so I can moderate all comments first. If I there would be thousands of advertisements of drugs and designer boots. On a blog, we receive legitimate comments 2-4 per day.

If last week, I received a new comment. Pretty standard. Then 3, then 5 more. Ultimately, received 15 comments from the same person. First of all, it was just commenting on posts, adding pieces. Comments progressed, that person has obtained more courageous and began to be critical content and suggest that readers find out his site for more information. They came over a period of 2 hours, with a large amount of text in each.

It has clearly been done manually - but it is an attempt to misuse any how you look at it. Of course, Word Press comments create a link to the Web site or blog the commentator. Used correctly, it is an interesting feature. But this blatant of attempt to siphon off my traffic was not so easy to use. The obvious goal was my blog with links to its site of floods.

And I find it so odd about the thing that was done by a SBI! Coach. SBI - or site it build - is a company that sells Web site skeletons as an opportunity for business. I am curious if this attack is standard corporate policy, or if this 'coach' going rogue.

I approved some comments to publish, but removed all the links. But most I just removed. Most were simply unnecessary style link-drop feedback.

How about you? How would you have handled this? East-ce-ce never happened to you before?

Latest articles | Newsletter | Facebook | Bryan on Twitter | Bryan on LinkedIn

Twitter funding values society to 3.7 billion (Reuters)

Twitter CEO Evan Williams speaks at a news conference as the website Twitter.com is launched, in San Francisco, California September 14, 2010. REUTERS/Robert Galbraith

Twitter CEO Evan Williams spoke to a conference press such as the website Twitter.com is launched in San Francisco, California on 14 September 2010.

Credit: Reuters/Robert GalbraithBy Alexei Oreskovic

SAN FRANCISCO | Wednesday, December 15, 2010 5: 24 pm EST

SAN FRANCISCO (Reuters) - Twitter raised $ 200 million in funding in a deal that values society microblogging to 3.7 billion, less than a year after that he began his first serious efforts to make money.

Investment from the Silicon Valley Kleiner Perkins Caufield & Byers venture capital firm and current investors, Twitter said.

The money will be used to Twitter grow the company, said in a post on his blog corporate Wednesday Twitter. Blog blog not specified and a spokesman declined to offer details.

Twitter, which was September, 175 million users is networking among new fast growing harvest Internet social services. Include Facebook and Zynga.

The company has added two new members of the Council - FlipBoard Director General Mike McCue and DoubleClick CEO David Rosenblatt.

Shifts are two months after the company four years provided the position of Chief Executive Dick Costolo, the architect of its advertising efforts, a sign that the money is a priority for the service.

Costolo told Reuters in May that Twitter provided to hundreds of advertisers for its system of advertising at the end of the year. He said previous assessment that $ 1 billion business meant that onus on Twitter to grow a business that can generate hundreds of millions of dollars in revenue.

Twitter had raised $ 160 million in four rounds of funding earlier.

AllThingsDigital first tours $ 200 million financing technology blog. Told that Kleiner Perkins fight global DST Russian investment firm. Twitter spokesman confirmed that the figures are accurate.

Twitter, which allows users to send messages text of 140 characters or Tweets disciples, is one of the most popular social networking Web and it is difficult for the Web services such as Google Inc. and Yahoo! Inc. established.

Investors watch service closely, hoping one day public shares of the company.

(Reported by Alexei Oreskovic.) Additional reporting by Jim Finkle. (Editing by Robert MacMillan)

Push offers TV in Facebook, All Facebook profiles

TV guide Internet click has partnered with Facebook. Tap into graphic data and social profile allows sharper suggestions that shows to watch.



Click site seems to make good use of Facebook Connect immediately to welcome you on the site as soon as you are connected.


If you go to y on the social network TV guide page, you can stay logged in. Otherwise, you will be prompted to do so in the upper right of the screen.


Click home page suggests that I may watch "The Cosby Show". Before I tell you if I even saw a full episode of the show, it is time to make a disclosure. I have long ag0 robbed in my profile to reduce the amount of ad targeting flashed me on Facebook. Not something appears in a "favorite" fields, click a view favorites with my friends.


While I was busy making this disclosure, I see the show featured on click was changed to "The Big Bang Theory." Once, the site told me who else loves it.


Under custom suggestion, I see "click staff Picks" and scroll down shows me a bunch more based on the employees observe. I would like to know if those manifested for visitors including Facebook profiles list of favorite forms of entertainment.


On a side note, my Visual Bookshelf on Facebook profile includes many books that became the television series. That click is not suggesting that I watch "True Blood", I have the suspicion that the recommendations are based solely on information contained in the "favorite" fields on profiles.


What do you think of click and it gives you suggestions?  How that reflect your interests and those of your friends?

eBay makes Mobile Application Developer (News Pro XML)

eBay said today that it has acquired Critical Path Software, a developer who has worked with the enterprise applications including eBay for iPhone, StubHub, eBay, classifieds and shopping .com iPhone apps mobile applications. Terms of the agreement were not released.

"We are very serious to innovate in the mobile commerce, and this acquisition underlines our commitment to bringing the very best and brightest in the field of eBay, said Mark Carges, Global Chief Technology Officer and Vice President, products, eBay places."

"Integrating the Critical Path Software eBay team is a great victory mobile shoppers everywhere worldwide;" combined with the talent on our team today, we can make shopping and sale anywhere, anytime, for almost anything, even better. »

About the author:
Mike is a WebProNews staff writer. For the latest news from supporting visit WebProNews.