Pages

MySpace Sold to Ad Network for $35 Million

The day was animated web has finally arrived: MySpace was sold to an advertising network called Media specific for just $ 35 million. Mike Jones CEO leaves the company, and it seems that this will be a good staff. Jones said in an email: "In connection with the offering, we are conducting a series of restructuring initiatives, including a significant reduction in our workforce. I will help the specifics of the transition in the next two months before I left my role as CEO of MySpace. "






News Corp. said that MySpace was ready to sell in a call results in February. The media company reportedly hopes to receive $ 100 million from the sale.

In 2005, News Corp. bought the site for $ 580 million of its original owners, but the MySpace traffic has plummeted in recent years. All Things Digital reported that News Corp. will still have a 5% to 10% in the company.

Other reports this week said that nearly 50% of site staff may be cut after the sale, and it is likely that any iteration of the service will focus on music.

5 Things You Need to Know About the Security of Google Apps

Here are five tips to make sure that Google Docs and IT managers can coexist efficiently and safely. Even in companies that have disappeared from Google, IT administrators have more power than ever. At Google, users and their data are condensed into a single "virtual" local: a big change from distributed data, structured expansion through hundreds of network devices. In addition, this information is accessible through data access and management APIs. Companies with resources for development can write their own applications to integrate data stored in Google Docs with other processes and internal applications.





1. Sharing permissions are up to the user

Google Docs model delegates control and responsibility of the users. It all depends on end users, but rather that, in determining to whom the data is shared, so that information can potentially be made available to the wrong people or groups within a company, outsiders outside the domain, or the public Internet.

2. Location data

In Google Apps, information is created by users and is in their individual accounts (as opposed to a central location). Also, if you delete an account, so it is all data from that user. There is no concept of a shared central file server in charge of IT. Companies that use Google Docs need to understand what data users have and own before any deletion of accounts.

3. Access Privileges

Companies that use Google Docs need to identify and report on who has access to sensitive data. This is necessary not only to help secure the data in a collaborative environment, but to adhere to the audit and compliance. Keeping track of who is accessing and using information with an audit trail becomes a critical component in the protection of data against misuse of end users and administrators.

4. Data leakage

Companies using Google Docs should be able to inspect their data and receive alerts when action is required. For example, suppose a company has a top-secret project called "Project Monkeyfeet" that only authorized personnel want to know. Be alert every time you use the term in a Google document and change access permissions as needed. This helps protect data from internal and external threats.

Google Apps does not currently have this functionality baked in.

5. Data Loss

In addition to protecting their data, companies must be able to retain the records, data migration and backup without losing anything. Since the control is in the hands of users, enterprises need to protect themselves and deleted users and malicious wrong caused by human error. There is a much higher risk that an employee unknowingly delete a document or an administrator deletes a user - along with all the details of your property - that a system outage of Google Docs or failure.

Founder of Twitpic Noah Everett Arrested - @noaheverett

Twitpic founder Noah Everett (who has 2.8 million followers) tweeted that he was getting arrested and in the back of a cop car. To prove it, Everett decided to tweet a picture from the back of the cop car.

We can’t independently confirm what he was arrested for yet, or if he even was arrested. If true though, Everett has taken oversharing to a whole new level.

MasterCard taken over by hackers in support of Wikileaks

Hackers have attacked MasterCard website in protest against the blockade of the company Wikileaks. "! MasterCard.com down, that's what you get when you mess with @ @ wikileaks Anon_Central and enter the community of individuals lulz love: D" wrote @ ibomhacktivist, which seems to be related to the anonymous hacker collective. While MasterCard's site is online, there are reports that he was completely disconnected at one point because of the DDoS (Distributed Denial of Service).





In December 2010, hackers got Mastercard website, along with Postfinance and PayPal, for exactly the same reason: block WikiLeaks.

Shortly after the attack on MasterCard, Wikileaks acknowledged in his official Twitter account that many banks still do business with the organization. "The illegal blockade against WikiLeaks bank in the sixth month: The culprits: VISA, MasterCard, PayPal, Bank of America, Western Union, "said tweet.

LulzSec, the group of hackers that wreaked havoc on corporate websites and government in the past two months, recently disbanded. However, the group Anonymous hacktivist vowed to continue his hacking activities, and we can see evidence that they were not kidding.

How To Get Customer Feedback Online

Successful business owners know that no matter how busy you are, it is important to take time to get feedback from customers. Understanding what your customers think about their products and services can not only help improve quality, but can also give ideas on what new products and services their customers want so you can diversify their offerings.




While information was limited to a suggestion box or form on their website, there are now many low-cost approaches to obtain customer information and take the pulse of the customers. Here are four easy ways to make customer feedback an integral part of your business.

1. Conduct an online survey


If you have email addresses for their clients, conducting an online survey can be a great way to get variety of different opinions in a short period of time.

One of the most popular tools for online surveys is SurveyMonkey, whose low-cost, Web-based survey solutions are a natural fit for small businesses on a budget.


2. Create an online customer community


All businesses thrive in the comments, but some are more distant from direct experience and contributions of its customers. And according to Thor Muller, co-founder and CTO of Get Satisfaction, "these are the companies that are absolutely essential to have a constant flow of information."


3. Feedback Forum Use Organized


Another approach to obtain customer feedback on an ongoing basis is an opinion forum organized as UserVoice. Simple UserVoice hosted forums and widgets allow customers to submit and vote on ideas for the company, which then can become a priority list of feedback. You can also use the product to communicate with users when the ideas that have voted to be acted upon. And because UserVoice offers a free version of the product, any company with an online presence and an interest in the continuous feedback can provide a forum for comments.


4. Ask for feedback on Facebook and Twitter


Of course, if you are looking for quick customer reviews, obtaining this information can be as simple as posting a question or a survey on your Facebook wall or via Twitter - you can use this method to get quick ideas for new products, new brand or new store locations or business lines.

How to Get Facebook Users to Like Your Page

Properly managed, your Facebook page can quickly become second home for your business on the web, both in how well it takes on Google and the frequency with which it is accessed by its customers and the public.




Because their customers are already on Facebook (spend an average of 25-30 minutes each day on the site), which are significantly more likely to see messages from your brand within your News Feed that do often return to visit their website or any other means on their own initiative.

As fans engage with your page commenting, taste or content exchange, the brand awareness extends to the friends of that person, helping you to reach more customers. Once a user granted permission to contact them by the friendliness of its website, the market may continue for infinity, essentially for free.


The following ten tips for unpaid Favorites:

Basics
Username sure your page
Create a custom landing page
As incentives for participation in competitions
Install a box like on your website
Take advantage of the database and contacts
Suggest your existing Facebook friends page
Promote your Facebook page everywhere
Do not ignore your Biggest Fans
Update, Listen and Participate

What Do You Love: Google’s Love Website

Google has launched a new service, called What's mysterious like that. It is a simple search box, similar to the Google home page, but returns the result of over 20 different Google services, like Google Translate, Trends, YouTube, Maps, Groups etc.
The results are presented in small boxes that can, in some cases, you can enlarge by clicking the icon in the lower right corner, and if you need more results, you can click the button in the upper right corner of the box and go directly to the chosen service.



The concept reminds us of iGoogle, a service that lets you add simple applications to your personalized portal. What do you like, however, instantly creates a mini-site on any term you choose, making it a good choice for users who do not have time to play with the options and simply want access to many Google services on one page.

The service, located at the address and google www.wdyl.com. com / whatdoyoulove /, you mark Google's copyright, but very little explanation, and so far has not been announced in any official Google blogs. Tell us what you like in the comments!



Twitter Launches Guide for Journalists

Twitter has become an invaluable tool for journalists with regard to the sources to find and share stories. Now, the microblogging site has published a guide that shows journalists best use of the tool in their daily cares.





The guide, entitled "Twitter for newsrooms," is a bit obvious to anyone using Twitter daily. No new information here, just tips on how to inform, interact with other users and followers and how to use the tweets in the process of reporting. But the fact that Twitter has launched an official guide for journalists is an indicator of the impact of social media on the news.

Facebook has recently launched a similar initiative, launching a page on Facebook for journalists, intended as a resource for journalists who want to incorporate social media in their reporting, networking and storytelling. The social network also began a program of journalists meetup.

20 Superb Photoshop PSD’s For Web Designers

One of the most common problems in the work of a web developer is doing all the graphic elements. If you have no knowledge of Photoshop, then he really is in trouble because for the average user interface is more important than the mechanism. Therefore, if you are a web designer who needs some good graphics, is in the right place. In this article we have compiled 20 excellent and without psd, you can use in your projects.










Google Sites Now Automatically Render for Mobile

Google Sites, a service that lets you create and collaborate on a simple website, just got a lot nicer in smartphones. Google has added an automatic mobile rendering of Google Sites for IOS 3.0 + 2.2 + Android devices as well as a mobile version of the list of Google Sites.



Now, when someone visits your site from Google sites in one of these devices, the page width will be adjusted to match the width of the device, and many other details such as sidebars and down links, should be addressed to look good on a smaller screen.

To activate, go to General Settings - More Actions - Administration site and click "Automatically adjust the site for mobile phones." You can also view the page from your desktop, selecting More Actions - Preview as viewer (mobile).

Switch Plug Saves Energy

Browse this Plug Switch and you will immediately see its value. Plug while the switch is in an offside position, and there is less chance of sparks or discharges. Once you connect, flip the switch and LED light, reminding you that there is no energy flowing through that connector, you might be encouraged to turn off when not in use. Our only complaint: the best LEDs very little energy, not to defeat the Plug Power Saver Switch purpose.




Jiang Gonglue Designer, currently studying at the Harvard Graduate School of Design in something with this design concept. The idea could be especially useful if the technology were installed in the power adapters that act like vampires, sucking the suction power 24 / 7, even when not using the device that is connected.







This is not the first meeting between Jiang plugs - he also created this colorful design he calls "Infinite USB", which gives the ability to Daisychain USB connectors, the solution of the problem of reducing the number of USB ports on the computer Portable many

LulzSec Shuts Down, Ends Hacking Campaign

LulzSec, the group of hackers who entered the CIA, the U.S. Senate, Nintendo, Sony and others, surprisingly announced that its dissolution.

LulzSec, short Lulz Security states that intend to operate only during 50 days in an attempt to revive the AntiSec movement, which opposes the security industry.

"Over the past 50 days have been disrupted and the exposure of corporations, governments often do the general population, and quite possibly everything else, just because I could," said the group of hackers on your ad. "All to entertain others selflessly - vanity, fame, recognition, all these things are the shadows of our desire that we all love."




The statement goes on to explain that the organization is not linked to your identity LulzSec and succeeded in bringing back the movement AntiSec. The group, in fact, encourages others to champion their cause. "We hope, desire, ask, even the movement is manifested in a revolution that can continue without us ... Together, together, we can set foot on our common oppressors and imbued with the power and freedom that we deserve."

As final parting gift, the group released a data dump of information allegedly taken recently with AT & T, AOL, Disney, Universal, EMI and the FBI.

The group has had its way with corporations and governments over the past two months. It took the CIA website, hacked servers, Sony, released confidential documents of the Government of the State of Arizona and attacked the website of the U.S. Senate. While an alleged member of LulzSec was arrested recently, the group said it was not their leader.

The end of LulzSec not mean the end of attacks by hackers, of course. Longstanding Anonymous hacker group is out there, and bet other groups are formed following the dissolution of the group. And with 277,000 + fans and a captive audience that will LulzSec bet one way or another. Also doubts dissolved authorities will stop their search for the masterminds.

Tips for Better Twitter Chats

Twitter chats are an increasingly common for people to discuss a subject line or passion. Basically, a group organized around a specific hashtag so people can follow a single thread of conversation on Twitter. Now there are hundreds if not thousands of newspapers Twitter chats going on, and for good reason. It is an easy, low-commitment way to participate in a conversation with others in your industry. It is also a great way to network and get new ideas.



1. Be clear about your goals entering the Chat

Some say there are too many Twitter conversations. How to create a new (rather than join existing ones) to help you or your company? When I spoke with the creators of a successful chat # wjchat, blogchat #, # and # smmeasure u30pro, said some of the wide-ranging benefits of doing things right. For a company that can position itself as a thought leader and grow brand awareness. For a person who can help you meet people in your industry and grow your personal brand.

However, it is not something to take lightly. You'll have to put in the time before we see serious results. If you're in business, be sure to talk about what success looks like before you begin your talk. Consider parameters such as number of participants, mentions of the brand, the feeling of mentions, and generating leads.

2. Choose a topic Care About People

How do you know if people care about your chat? That should already be discussed informally. "It is better to build a twitter chat about a topic of interest that is directly related to your brand," said David Spinks, creator of the # u30pro a Twitter chat for young professionals. "In the end, participants will interact even chat to your brand because you are that organized.

3. Being authentic

"The key to the true scope and success is to be authentic," said Robert Hernandez, founder of # wjchat. "# Wjchat is something organic and is a passion shared by others. ... If you have a topic you're passionate about, there may be others looking to connect with you." Do not do it just because you think you are supposed to. Do it if you are really looking for a way to participate and communicate with the community. Use that passion to continue the chat when you start slowly. Spinks says # first talk u30pro only had seven people and 150 tweets. Today, the typical conversation includes 150 people and 1,200 tweets. Maintaining participation and the right people and the community must find.

4. Choose a schedule and be consistent

Most Twitter chats occur once a week for an hour, but if you're starting, you may consider a chat biweekly or monthly, rather than because it is easier to add sessions to try to reduce consumption. Sheldon Levine at No. smmeasure said if I had to start over, could have done # smmeasure one every two weeks (instead of weekly) chat, simply because the time commitment involved. Mack Collier points # blogchat the importance of choosing a time that works for you and your audience. You want people to have time to join your chat. Collier suggested that "either in the middle of the day around lunchtime or in the central night around 7 or 8 hours."

5. Plan, but remain flexible

Most have a Twitter chat now approach each week. The aim is to facilitate the conversation without on the road or let go of the hands (easier said than done). "Also note that a Twitter chat for your brand will be another way for customers to express their grievances," says Spinks. "Chats Twitter move fast and can get out of hand quickly. It is in real time to the maximum." Prepare to almost every question up. If you are a business, make sure the person running the chat is someone who can speak on behalf of the company.

6. Bringing Thought Leaders

Do not be afraid to involve others, if you need a partner to develop and plan the chat room (# u30pro is operated by a team of four), or large "speakers" invited to help carry in public. Twitter chats are successful because the people in them. Do what you can to make the big people involved, especially when you're starting.

7. Thanks to those involved

If people take the time to participate with their talk, take a moment to thank them individually or in the chat itself. Collier has found great success following this strategy. "These are your rock stars, and should be treated as such," he said. "That just give them more incentives to spread the word and help you grow your community."

Laptops Powered by Typing

Australian researchers have discovered a way to harness the energy we use when writing to power a laptop. Using piezoelectricity, this method works similarly to cigarette lighters to create a spark when it strikes a piezoelectric crystal.





To power a laptop, however, a much thinner film of piezoelectric material that has to be developed using nanotechnology. It's so thin, that can be covered in various electronic components and integrated into a variety of widgets.

The idea of ​​eternal battery is amazing. Scientists are also looking for ways to feed the touch screen devices with piezoelectric film, putting everything you swipe and energy to good use.

Harry Potter online world

The long-awaited Harry Potter in digital format is coming to an end. The author JK Rowling has announced that its series, will finally be available as e-books. Although prices have not been revealed, the titles will be available in a new online world built around a series called Pottermore, which also unveiled today. To say that the Harry Potter series has become an international mega-success would be an understatement. Some 450 million Harry Potter books have sold worldwide since the first of seven novels published in 1997. The series has also broken box office records with seven theatrical releases and an end next July.



Besides being the exclusive home of Harry Potter e-books, Pottermore is a place where fans can interact with others and events in the books. After signing up for the free dive site, fans can "visit Diagon Alley, they fall in a house, cast spells and potions to help blend the house to compete for the House Cup."
Rowling said she has new material that will make its way to Pottermore.
"I wanted to give something back to fans who have followed Harry with such devotion in recent years, and the stories of a new digital generation," Rowling said in a statement. "As I have contributed to the site, all others can join by submitting their own comments, pictures and other content in a safe and enjoyable - Pottermore has been designed as a place to share stories with your friends as you travel through the site. "
Pottermore be launched to all muggles - non-magical humans - in October. However, those who want to come and help shape the site before then you can try to do so when registration opens July 31. The first 1 million people successfully "follow the owl," as Rowling teases, you win the right to enter the home page.

Haynes Manuals Coming Online

The iconic Haynes Manuals, the encyclopedic volume that contains all knowledge of any mechanical tinkering under the tree needs to repair his car, is finally available in digital form. Haynes called MOL (online manual), the house mechanical products are given the same information in confidence have been waiting for manual printing of more than 50 years. The manuals have been a mainstay in his garage, which contains hundreds of images and step by step instructions. To show the readers to do everything from a simple oil change to replace a power steering pump.





Haynes Manuals are a form of empowerment for car owners to save money and learn a lot about internal combustion engines, and to maintain and repair their own vehicles - like the writer did throughout college with the help several manuals Haynes and a series of pots.

The company has never published on-line auto repair manuals, but has now begun to demonstrate an electronic version of the manuals to major retailers Auto Repair in the United States.

So why now online manuals? As a result, Haynes acquired Vivid Holding BV digital shop three years ago, and online book represents a collaboration between Haynes and Vivid editorial crew.

MOL Haynes begin its implementation with the 50 most popular titles Haynes, who will be available by subscription in the fall of 2011. The Ministries of Labor also will be compressed and mobile use. As implementation continues, more titles will be added. Sales manual printing will also continue.

Obama hands military new cyber war guidelines

President Obama has signed executive orders that put the extent to which military commanders around the world can go in the use of cyber attacks and other computer operations against the enemy, and as part of routine intelligence from other countries.





The detail of the military orders must obtain presidential approval for a specific cyber assault on an enemy and the ability to weave cyber U.S. strategy in the struggle against war, defense officials and experts said cyber security The Associated Press.

Signed more than a month, orders cover a two-year effort by the Pentagon to draft standards in the U.S. the road to cyber warfare, and come as the U.S. begin working with allies in the global rules of the game.

Google hits record with 1 billion site visitors in May

One billion people worldwide visited Google in May, the first time a site has attracted many visitors in a month, according to ComScore.
The number of unique visitors to Google's sites rose 8.4 percent from 931 million a year ago to just over one billion - 1, 009.699 million to be exact.
Worldwide, the market researcher ComScore said yesterday, Google had its highest number in India and South Africa, which accounted for 14.3 percent and 13.5 percent of visitors respectively. The lowest figures were in South Korea and China, which accounted for 0.7 percent and 0.8 percent of total visitors from around the world, respectively.





Microsoft took the No. 2 spot with 905 million visitors last month, 15 percent from the previous year, according to ComScore. Facebook ranked third with 714 million visitors, up 30 percent from a year ago. Yahoo came in fourth with 689 million visitors, an increase of 10.8 percent over the previous year. Until last October, Yahoo had held third place, but since then Facebook has surpassed every month with the highest number of visitors.
Although Google captured the majority of visitors last month, users collectively spent more time on Facebook - 250 million minutes in May, compared to 200 billion minutes on Google and $ 204 million to Microsoft.

Hillary Clinton Supports Saudi Women2Drive Movement

U.S. Secretary of State Hillary Clinton publicly declared their support Tuesday for a campaign by Saudi women who have been pressuring their government to lift the ban on female drivers. Clinton said the efforts of courageous women, saying he was touched by the campaign. But he also stressed that the U.S. is not interfering with the movement. "These are Saudi women themselves," Clinton said at a news conference in Washington. "They are acting for their own rights."


The outpouring of support came a day after Victoria Nuland, a spokesman for the U.S. Department State, Clinton said he was exercising "quiet diplomacy" and that "the issue of driving up to par" during a recent conversation he had with Saudi Prince Saud.

"I do not ... no one can question the commitment of the Secretary of universal human rights of women, "Nuland said during the press conference in particular." I think she is doing a trial on the best way to support universal human rights for women . There are times when it makes sense to do it in public and there are times for quiet diplomacy. "

Observations on the quiet diplomacy Clinton came after some criticism for the lack of response to a request Change.org - with nearly 23,000 signatures - which asked the Secretary of State to show public support for the Saudi woman's right driving. On Tuesday morning, following statements by Nuland, Saudi women driving - a coalition of Saudi women rights activists, bloggers and academics - issued a news release expressing its disappointment.

"For U.S. diplomat to make any public statement on the matter sends exactly the wrong message to the Saudi government and, above all, women in Saudi Arabia," the letter said.

The women - Saudi and foreign-born - not allowed to drive in Saudi Arabia due to religious rules are often enforced by the police. No written law prevents women from driving. As a result, the movement Women2Drive - largely driven by social networks - was born, calling for women to drive their own cars on 17 June. Approximately 45 women did on that particular day, documenting its efforts on Twitter and YouTube.

Roger Ebert Defends Controversial Tweet About Ryan Dunn’s Death

Film critic Roger Ebert has taken his blog on the website of the Chicago Sun Times to explain his tweet controversy over the tragic death of Jackass star Ryan Dunn. Admission includes a few regrets, and a concession when they tweet was poor, but Ebert did not retract or apologize for the original tweet ". Friends do not let drinking and driving donkeys" "I offer my condolences to the family and friends, Ryan Dunn, Zachary and Hartwell," he begins, before going on to say: "I also regret that my tweet about the event was considered cruel. The intent was not so cruel. It was intended it was true. "





His explanation says, "I meant exactly what I wrote. I was not calling an idiot Ryan Dunn. In shorthand Twitter, I was referring to his association with" Jackass. "I was clear."

The blog entry will tell the chain of events that led to Twitter Ebert. In one particular passage, Ebert appears torn between justification and guilt:

"I do not know what happened in this case, and was probably too fast for Twitter. That was improper. I know that no one is conducting business in the street at 110 miles per hour, with some estimates - or fast enough anyway, out of a road and fly through the trees 40 meters before crashing. This is especially true if the driver has had three shots and three beers. Two people were killed. What if the car crashed another vehicle? "

Home Tweet Ebert Monday reverberated around the web, drawing the attention of a friend of Dunn and co-star of Jackass Bam Margera, the wrath of celebrity blogger Perez Hilton and supporters causing Dunn to banner page on Facebook Ebert. The Facebook page was removed by Tuesday morning, and later restored.

“Boost Comment” Lets Facebook Comments Box Plugin Admins Surface Quality Comments

Administrators of web sites using the Facebook plugin Comments Social Fund can now push the best comments in a post at the top thanks to a new option "comments Boost" moderation. While Facebook comments and rate of twenty users a reputation Reinforcement Review gives administrators the power to control the comments are more visible. For websites inundated by trolls and low quality comments like "First", the ability to control the order of the comments could be a big selling point for the comments.



Facebook relaunched plugin social commentary section of third party websites in March. Since then it has increased the size of the news feed stories generated by the comments, added the ability to export comments, as long as the options login AOL, Yahoo and Hotmail. He later added performance statistics Comments Box Analysis and a button for subscribing to discuss issues.

In mid-April, 50,000 websites have integrated the plugin, but plugin comments competes against have been in business for years and developed moderate flows more smoothly. Main advantage of Facebook in competition suppliers is their graphic comments plugin massive social, and its ability to leverage existing knowledge and commitment through exposure in the news feed. Besides Increases Facebook Observation shows Facebook is trying to use his reach and non-traditional features rather than basic functionality for drawing websites.

LulzSec Mastermind Suspect Arrested in England

A British teenager suspected of being the mastermind behind a notorious group of international teams hacking has been arrested in a raid by the FBI and Scotland Yard. LulzSec has been responsible for a series of security breaches on the Internet in organizations like the United Kingdom Serious Organised Crime Agency, the U.S. Senate and the CIA, and game companies Nintendo and Sony. A man aged 19, was arrested in a "pre-planned an intelligence-led operation" in Wickford, Essex, Metropolitan Police said.



The teenager is being questioned in the law of abuse of computers and the Statute of Frauds. He was arrested by officers of e-crime unit of force.

A Scotland Yard spokesman said: "The arrest follows an investigation of network intrusions and denial of service attacks against a range of international business and intelligence agencies for what is believed to be the same group of hackers.

"Searches at a residential address in Wickford, Essex, following the arrest last night has led to consideration of a significant amount of material. These forensic examinations are ongoing."

The Metropolitan Police and Essex are working "in partnership" with the FBI, the spokesman said.

The teen remains in custody at a central London police station.

Google To Digitize 250,000 British Library Books

Although Google has halted its own newspaper digitization project, the technology giant is still working to make books freely available online. The company announced Monday it is working to digitize about 250,000 out of copyright in the volume of the vast expanses of the British Library.
Items discussed will be selected by the British Library and operated (and paid) by Google, will be available for free on books.google.co.uk and the website of the British Library. Users can download and read articles through Google Books, as well as perform full text searches.



The 250. 000 works including books, pamphlets and newspapers dated between 1700 and 1870, covering major events such as the French and Industrial revolutions, the Crimean War, the invention of rail travel and the end of slavery, the Library British, said in a statement.

Google has partnered with more than 40 libraries in similar projects.

Consumers now spend more time on the mobile Web

Consumers spend more time on mobile applications on the web for the first time, says a new report.

Flurry comparison of moving data to comScore and Alexa statistics, and found that in June, consumers spent 81 minutes per day using mobile applications, compared with 74 minutes of web surfing. (See table below). The change comes as a combination tablet and smartphone shipments eclipsed those of desktop and laptop for the first time, according to a recent report by Mary Meeker, a partner at Kleiner Perkins Caufield & Byers.





Consumer spending time blast found a 9% increase, on average, the use of mobile applications. The report found that growth in the use of mobile applications came mostly more sessions per user, rather than longer sessions in general.

The sessions, usually consumed by the use of games and applications for social media, which was 47% and 32% of the total amount of time used for such applications.

If the statistics confirm the data is the vindication of Wired, which last year declared: "The Web is dead," and predicted that applications will soon exceed

Ryan Dunn Posted Twitter Pic Hours Before Death

Jackass Ryan Dunn movie star died in an automobile accident in Pennsylvania early Monday. He was 34.

Hours before the accident, Dunn posted a picture on Twitter, through his Tumblr blog, which showed drinking with friends.

An unidentified passenger also died in the accident. TMZ said Dunn was the driver of the vehicle and the speed could have been a factor.



News that the incident has caused the name of Dunn to become a trending topic on Twitter, and fans and celebrity friends Tweet in memory of the star. Many Twitter users are also using Twitter falling about the dangers of drunk driving - which links the photo Tumblr with fatal accident - although the exact circumstances that led to the crisis are still unknown.

Flickr user Eric Lewis published the picture below with a legend that says the photo shows what remains of Dunn's car.


Cryptic Dunn last photo is not the first of its kind. Last year, the famous plastic surgeon Frank Ryan died in a car accident, his final tweet was a picture of yourself and your dog. It was later discovered that Ryan was twittering while driving.

ICANN’s New Top Level Domains

On Monday, the Internet Corporation for Assigned Names and Numbers (ICANN) approved the creation of generic top level domains (TLD) for brands and organizations. Historically, only 22 general purpose approved TLDs, including. Com,. Org,. Net and many others have been through the web. A number of country code top level domains (Como Me and mind.) Also exist and over the years, many people from these countries have used the domains to your domain or a brand more memorable ( or in some cases, time) URL. However, the whole process of top-level domain is complicated and difficult to understand. We have been sucked down the rabbit hole of ICANN and the gTLD application process in the past, and is not something we recommend for the faint of heart. ICANN has said that between 300 and 1,000 new gTLDs could be created per year under the new program.



However, this figure assumes that ICANN can and try to process many applications in a timely manner. Thousands of applications could take years to evaluate and process.

ICANN says it is limiting the first batch of 500 applications and subsequent batches - or round - will be limited to 400 applications.

Applications will be accepted for new TLD between January 12, 2012 and April 12, 2012. This is the first round - or in batches. The following periods of application will be available in the future.

The rate of assessment of potential candidates is $ 185,000. According to the gTLD Applicant Guide, a $ 5,000 deposit is required "when the user requests a slot within the TAS application and payment of the remaining $ 180,000 submitted with the completed application."

This is just to start the evaluation process. Additional charges may be necessary during the course of the review process of the application, and this fee does not include additional infrastructure that can generate a gTLD.

ICANN believes that the evaluation process can be as short as nine months or twenty months, depending on the application, the intended use and other issues.

ICANN expects new gTLDs appear in the first year, but is likely going to be before 2013 end users see the new domains of action.

It depends on the timeline. If a user has already completed the process before the other party has requested, the TLD is delegated on a first come, first served basis.

If neither the applicant has completed the process, ICANN has a finer resolution process in place. Applicants will receive points in four different categories. An applicant who accumulates the most points, based on this set of criteria, will win the domain. In the event of a tie in points, the auction will take place and the top-level domain are the highest bidder.

In addition, community-based applications (ie applications of an organization or entity and not a particular brand or company) will have the opportunity to have a priority assessment in this process.

ICANN will notify applicants who are part of a contention. Applicants may choose to try to reach its own decision as a whole (for example, a compromise might be able to reach a more generic TLDs such as "soda" or "pizza").

This will be a very, very difficult to mitigate ICANN. Although users do not need to apply for a brand new domain, the evaluation will review any existing trade mark (worldwide) into account when considering the application.

Users can not "reserve" a TLD of a brand name that has to go through the same process as everyone else. In addition to checking the brand names for a TLD, ICANN will also consider similar names may be trademarks or service can be confusing.

In addition, trademark owners or other interested parties may file an objection during the evaluation process.

Applicant's Guide, still just a project, we do not have the final figures, but will cost thousands of dollars to object - not including further mediation or court costs.

One of the reasons that ICANN is charging fees for both the evaluation is that it is doing a lot of due diligence to address the feasibility of a top-level domain before granting organization. In addition, ICANN wants to prevent squatters Domain TLDs grasp.

Once a new domain is granted, the owner essentially becomes a recorder. That means if he or she wants to leave anyone willing to pay a fee to get your own domain in that TLD, they can. Moreover, the owner may limit the use of domain specific entities or prevent people without certain requirements to access the TLD.

Not in the immediate future. However, it is important to remember that these were years of the current structure of TLD to become a viable and affordable for people, not the Fortune 100.

Twenty years ago, was not common for brands, small businesses or individuals who have their own domains. Today, an astonishing number of existing records. It took a long time for the TLD market as we know it today to really start to open.

I bought my first domain name in 1999, I think I paid $ 45 for the registration of that first year. By 1998 or so, domain name registration was an investment of several hundred or several thousand. Now pay $ 8 or $ 9 for a com. O. Net, which includes private registration.

It will take time to process and monitoring aspects of the new gTLD policy be developed and automated. However, we hope that community-driven things like TLD. Music, sports. And movies. Become more available in the future.

Yes, as owning a TLD such as. Google o. Apple or Facebook. It may be something only large corporations or government entities can afford to do, but over time, we expect the process to begin to change, as did the com. and. net space.

Innovative Social Media Campaigns

In charge of the series social media campaign, supported by Oneupweb, Mashable gave an in depth look at the ingredients of eight seasons innovative social media at Ford, Mattel, Internships.com, Old Spice, Toy Story 3, Edge shaving gel, the voice and Buffalo Wild Wings.

Using Twitter, Facebook, YouTube, Foursquare and SCVNGR, among other social tools, these brands launched successful campaigns and social media participation worthy of applause.




1. Twitter + acts of random kindness = social success of a campaign


Edge Shaving Gel campaign Twitter # soirritating spread the word about his anti-irritation gel through acts of random kindness. Here is a look into this creative game.

In its first three months @ EdgeShaveZone met about 1,500 followers, hashtag # soirritating used about 6,800 times, and the attention of numerous media have contributed to the growing fashion - all of which probably contributed to the decision Edge to continue the campaign throughout 2011. Mashable recently spoke with Edelman Digital team running the campaign, the factors that have contributed to its success.

Read the full story here.

2. How social media helped Victoria Toy Story 3 at the box office


Toy Story 3 is one of the best films of 2010. As Pixar film 11, the third and final chapter in the world of Buzz Light year and Woody hit theaters in June 2010.

Months before Disney and Pixar embarked on a marketing campaign that includes large-scale television, print media and society. The use of Facebook and YouTube to help promote the film, the study of awareness and has successfully addressed demographics that traditionally do not attend the Disney animated films.

Read the full story here.

3. Lessons learned from the campaign, Old Spice and their imitators


Charles Caleb Colton once said, "Imitation is the sincerest (form) of flattery." Obviously, Mr. Colton was not talking about the success of the campaign for Old Spice (because the way he lived during the decade of 1700), but we are sure they have reiterated that sentiment if it was to see how many spin-offs of the miracle mentioned inspired marketing.

The campaign was launched just over a year - around the theme "Man your man could smell the same" - and captured the public imagination. Case in point: The original ad has won more than 30 million page views to date on YouTube.

His success also earned a legion of Old Spice students, so to speak - people who plagiarized ideas from commercials and applied them to their marketing efforts. Mashable talked with some of these companies - which have enjoyed success under the Old Spice model - on which aspects of the campaign worked for them.

Read the full story here.

4. Charlie Sheen was the Tweet Internships.com victory?


When it comes to brand building, there are basically two schools of thought. "Brainwash the masses," "build it and they will come" and

The latter is based on the belief that any publicity is good publicity. If you get your name out there, the rest will fall into place. A good example of this philosophy is to GoldenPalace.com, which recently bought the hair Justin Bieber, and in the past has bought the kidney stone of William Shatner of free publicity.

For now, Internships.com fits the latter category as well. If you've heard of the brand is most likely due to an effective single marketing campaign: An endorsement by Charlie Sheen on Twitter.

Read the full story here.

5. How Barbie and Ken met by the media


Exactly seven years after their separation issue in the Valentine's Day in 2004, the favorite lovebirds plastic of the United States together, sending the socialverse the memory lane. On the 50th anniversary of Ken and just in time for the launch of Valentine Ken doll her Sweet Talkin ', Mattel launched a marketing campaign to bring great pair of iconic doll, Barbie and Ken.

We talked to Lauren Bruksch, director of marketing for Mattel's Barbie, to get the scoop on the success of the social components of the campaign, the media.

Read the full story here.

6. Puppets and Social Media: Inside the Ford marketing campaign risky


On the heels of his successful and well received 2011 Ford Fiesta Movement and Facebook initiatives reveal Explorer, Ford has created an innovative campaign new media, this time to raise awareness and introduce consumers to the 2012 Focus.

In the center of the campaign is Doug, an irreverent and absurd Twitter, Facebook updates and load YouTube puppet acts as spokesman for the new car.

Mashable Kelly spoke extensively to peek behind the scenes at the campaign and report on how it goes.

Read the full story here.

7. First as the National Association SCVNGR brand scored big during March Madness

SCVNGR is a platform for location-based games - there are challenges in every place, and companies can also "script" their own challenges. Customers can place challenges (take a picture, given a plate) to earn points redeemable for prizes in the real world, like a free drink or 10% discount. The Cambridge-based company launched in 2008, and was founded by a deserter from 22 years at Princeton I wanted to add a layer of play to the world. And he did.

In January 2011, he partnered with Buffalo Wild Wings SCVNGR (BWW) - all 730 of its locations - for a campaign of 12 weeks before March Madness. The layer of competition to SCVNGR customers worked well with BWW, which thrive on competition, community and games. SCVNGR SVP of Marketing Chris Mahl says that what differentiates SCVNGR other location-based services is that it "is not an online check-base, [but rather] that goes beyond the objectives of the [and ] the goals of consumers. " The success of the campaign indicates that it may be true. BWW was the first national promotion SCVNGR, and the first three weeks, the game accumulated nearly 30,000 players. In the end, the campaign had 184,000 agents in 730 locations BWW.

Read the full story here.

8. Voice: How a TV program became a talk of the media 24 / 7 social

First came the television script, then the reality TV became the "it" format. But now that's getting old and stale, and that the public wants something new. Voice delivery, with a large participation and social responsibility viewing experience that has earned a place as the new show Rated this season. People are ready for a change in entertainment, and the voice is to offer a good alternative.

Mashable talked to Nicolle Yaron, supervising producer of the program, Adashek Andrew, social media consultant, and Alison Haislip, the correspondent of social media, social integration program means and why it is effective.

Saudis use social media to document the campaign of the Right of Women to conduct

Saudi women - and men who support them - are tweeting updates as we drive the cars through Saudi Arabia on Friday as part of an initiative that challenges a ban on women drivers.
A large number of tweets can be seen under the hashtag # Women2Drive. Most reports indicate that women have been able to drive freely without interference from the police. As a Twitter user @ Maialshareef said after posting a picture of her ready to drive away from home: "Ready to go, I saw the police car and did nothing."





Mohammad Al-Qahtani, co-founder and president of the Association of Civil and Political Rights Arabia, Twitter: "My wife, Maha, and I just returned from a trip of 45 minutes, was the driver through the streets of Riyadh."

An e-mail alert for Human Rights Change. org Benjamin Joffe-Walt editor indicates that at least one woman was detained by police, but accompanied home without being arrested.

Meanwhile, the campaign has received some support from high profile male Prince Alwaleed bin Khaled, who Twitter ". I support the movement and freedom of choice # of my sisters in Saudi"

Barack Obama to Start Tweeting From @BarackObama Account

U.S. President Barack Obama will begin regular tweeting from his official Twitter account.
In an update today, announced that staff would be re-elected President of the management of their presence in social media and Facebook and Twitter accounts. One representative also revealed that the Commander in Chief would be writing tweets of yours and that "Twitter, tweets will be signed by the President"-BO. "



@ Barackobama account has been active since 2007, when Obama was using social media in his campaign for the presidency.

However, since the account began to accumulate changes in 2009, we discovered that the President's staff, not the President himself, was actually the publication of the tweets.


On a visit to Shanghai, Obama told a group of Chinese students, "I've never used Twitter. My thumbs are too clumsy to write things on the phone. "In fact, the President sent a tweet to early 2010, when clicked in support of the account @ Redcross.

With the use of Republican candidates in the early media career in 2012, Obama's staff are building a strong social program and media campaign of the President. In all likelihood, personal tweets, "BO" will do much to raise the enthusiasm (not to mention retweets) of followers.

Apple Gives Back-to-School Promotion

Apple launched its Back to School promotion Thursday, offering students a gift card of $ 100 for the Mac App Store when purchasing a new Mac.
The promotion is valid from June 16 to September 20. International Apple stores are also taking part in the promotion, offering consumers gift cards in local currency (75 euros, 65 pounds, etc.).






Apple has a promotion back to the school each year, usually giving students an iPod (or in recent years, an iPod touch) after mail in rebate with the purchase of a new Mac.

University students, students accepted to college, their parents and teachers and employees in any degree to qualify for promotion. Apple also offers educational discounts ranging from $ 50 to $ 200 retail price of Mac productsThe promotion is good at Apple Stores, Apple Online Store for Education Apple authorized campus stores.

Open-Source Software For Web Developers

If you are a web developer and are looking for an alternative to costly tools, is in the right place. In this article I have collected some of the best applications are free and easy to use. Most people think that if it's free, it is not good or can not be compared with an alternative payment. Well ... not at all, or at least not in all situations. Check out this list and you will be surprised.




This article is divided into 8 categories:

1. Text editors and code (css, html, javascript)

2. The visual editor (WYSIWYG)

3. FTP / SFTP / SSH Clients

4. Image Editor

5. Modeling Tools

6. Servers

7. Databases

8. Database Administration

As always, if you have any suggestions, shared with us.

Text editors and code (css, html, javascript)
Bluefish - Bluefish is a powerful editor for programmers and web designers with many options to write websites, scripts and programming code. Bluefish supports programming and markup languages, and focuses on editing dynamic and interactive websites. Works in Debian, Ubuntu, Fedora, Gentoo, Mac OSX, AltLinux, OpenSolaris and Windows.

Notepad + + - Notepad + + is a free (as in "free speech" and also as in "free beer") source code editor and Notepad replacement that supports several languages. Runs on MS Windows environment, its use is governed by the GPL. Based on the powerful editing component Scintilla, Notepad + + is written in C + + and uses pure Win32 API and STL which ensures a higher execution speed and smaller program size. It runs on Windows.

Cssed - cssed is a small developer editor and validator, which is easier to edit CSS. This is an open source project, it means you can download the program but also its source. Being a CSS editor, is not limited to this language. cssed had some support for HTML (with embedded Javascript), XML, Javascript, Java, PHP, JSP, C, C + +, Apache configuration files,. htaccess, Python, Perl, SQL, SH and other languages ​​so it can serve well as versatile editor. Works on Gentoo, Debian, FreeBSD, OpenBSD, OS X, Windows.

Aptana - Aptana IDE is a free, open source, cross platform, JavaScript-centered development environment to create Ajax applications. It features code assist on HTML5, CSS3, Javascript, Ruby, Rails, PHP and Python. It also has FTP / SFTP support and a JavaScript debugger to troubleshoot code. It works on Windows and Mac OS X.

Eclipse - Eclipse is a platform for open source software written mostly in Java. In its default form is an IDE for Java, which consists of Java development tools (JDT) and compiler (ECJ). Users can extend its capabilities by installing plug-ins written for the Eclipse software platform, such as development toolkits for programming languages ​​and can write and contribute their own plug-in modules. Language packs are available for more than a dozen languages.

jEdit - jEdit is a mature programmer's editor text with hundreds (counting the time developing plugins) of person-years of development behind it. Being a Java-based solution that runs on multiple operating systems including: Mac OS X, OS / 2, Unix, VMS and Windows.

NetBeans - Development of desktop applications, web and mobile Java, PHP, C / C + + and more. It runs on Windows, Linux, Mac OS X and Solaris. NetBeans IDE is open source and free.

The visual editor (WYSIWYG)
Amaya - Amaya is a Web editor, ie a tool used to create and update documents directly on the Web. Navigation features are seamlessly integrated with the editing and remote access features in a uniform environment. This follows the original vision of the Web as a space for collaboration and not one-way publishing medium. Works on Windows, Debian, Ubuntu, Red Hat, Mac OS X.

KompoZer - KompoZer is a system of full web page creation that combines web file management and easy to use WYSIWYG web page editing. KompoZer is designed to be extremely easy to use, making it ideal for non-technical users who want to create an attractive and professional looking web site without knowing HTML code or web. Works on Windows, Mac OS X, Linux.

FTP / SFTP / SSH Clients
FileZilla - FileZilla Client is a fast and reliable cross-platform FTP, FTPS and SFTP client with lots of useful features and an intuitive graphical user interface. Works on Windows, Mac OS X, Linux.

FireFTP - FireFTP is a free, secure, FTP / SFTP client for Mozilla Firefox which provides easy and intuitive access to FTP / SFTP servers.

WinSCP - WinSCP is an open source client for SFTP, SCP client, FTPS client and FTP client for Windows. Its main function is to transfer files between a local and a remote computer. Beyond this, WinSCP offers scripting and basic functions of file manager. It runs on Windows.

PuTTY - PuTTY is a free implementation of Telnet and SSH for Windows and Unix platforms, along with an xterm terminal emulator. Works on Windows and Unix platforms.

Image Editor
Gimp - GIMP is a versatile graphics manipulation package. It is a very powerful and very easy to use. It works on Windows and Unix.

Inkscape - Inkscape supports many advanced SVG features (markers, clones, alpha blending, etc.) and great care is taken in designing a streamlined interface. It is very easy to edit nodes, perform complex path operations, trace bitmaps and much more. We also aim to maintain a thriving user and developer community by using open, community-oriented development. It works on Windows and Mac OS X.

Paint.net - A very good lightweight alternative to Photoshop. It offers layers, unlimited undo, special effects and a wide variety of useful tools. The download is about 2 mb so absolutely worth a look - I use this Photoshop when you are playing. It runs on Windows.

Modeling Tools
Dia - Dia is inspired by 'Visio' program of Windows, though more geared towards informal diagrams for casual use. Can be used to draw many different kinds of diagrams. It currently has special objects to help draw entity relationship diagrams, UML diagrams, flowcharts, network diagrams, and many other diagrams. It is also possible to add support for new shapes by writing simple XML files, using a subset of SVG to draw the shape. It runs on Linux, MacOS X and Windows.

ArgoUML - ArgoUML is the leading open source UML modeling tool and includes support for all standard UML 1.4 diagrams. It runs on any Java platform and is available in ten languages. It runs on Windows.

OpenOffice Draw - Draw - from a sketch of a complex plan, DRAW gives you the tools to communicate with graphics and diagrams.

Servers
Apache - The Apache HTTP Server is an open source HTTP server for modern operating systems including UNIX and Windows NT. Server that provides a safe, efficient and extensible, which provides HTTP services in sync with the current HTTP standards. It runs on Windows and Unix distributions.

Apache Tomcat - Apache Tomcat is the servlet container that is used in the official reference implementation for Java Servlet and JavaServer Pages. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. It runs on Windows and Unix distributions.

XAMPP - XAMPP is an easy to install Apache distribution containing MySQL, PHP and Perl. XAMPP is really very easy to install and use - just download, extract and start. Works on Windows, Mac OS, Linux, Solaris.

Databases
MySQL - MySQL is the world's most popular open software source data with more than 100 million copies of its software downloaded or distributed throughout its history. With greater speed, reliability and ease of use, MySQL has become the preferred choice of corporate IT Managers because it eliminates the major problems associated with downtime, maintenance, administration and support.

PostgreSQL - PostgreSQL is a powerful source, open the object-relational database system. He has over 15 years of active development and a proven architecture that has earned a solid reputation for reliability, data integrity and correctness. Works on all major operating systems, including Linux, UNIX (AIX, BSD, HP-UX, SGI IRIX and Mac OS X, Solaris, Tru64) and Windows.

Database Administration
pgAdmin - pgAdmin III is the most popular and the role of wealth management and open source development platform for PostgreSQL, the database's most advanced Open Source world. The application can be used on Linux, FreeBSD, OpenSUSE, Solaris, Mac OSX and Windows to manage PostgreSQL 7.3 and above running on any platform, as well as commercial versions of PostgreSQL such as EnterpriseDB and Mammoth PostgreSQL.

phpMyAdmin - phpMyAdmin is a tool written in PHP intended to handle the administration of MySQL on the Web. Currently it can create and drop databases, create / drop / alter tables, delete / edit / add fields, execute any SQL statement, manage keys on fields.

Chrome encrypts Gmail

Google, which has found Gmail to be the target of hacking attempts from China, has been modified so that the Chrome browser always encrypted connections to the mail service.
Google Gmail has already changed to use encryption by default, as specified by the "https" at the beginning of a browser's address bar means that strangers sniff the network traffic can read your email. People can still get to the unencrypted version typing "http://gmail.com," but not more, to Chrome.





"From 13 Chrome, all connections to Gmail will be through HTTPS. This includes the initial navigation, even if the user types 'gmail.com' or 'mail.google.com' in the URL bar without the prefix https, "the programmers at Google, said in a blog post yesterday. He said the focus of defense against such attacks sslstrip, which can be used to hijack browsing sessions.
The technology used to apply encryption called TGV, which stands for HTTP Transport Security tight and allows a browser to specify that a Web site can only be used over a secure HTTP connection. HTTP, or Hypertext Transfer Protocol, is the standard that governs how Web browsers communicate with Web servers to retrieve a Web page.
The moves dovetail with Google's attempt to make security a major selling point of your browser. By improving the security of Chrome, the company benefits directly so that their services are less vulnerable and indirectly by making the Web a safer place for people to spend time personally and professionally.
Google is an important goal. It has been revealed that the attacks on Gmail, said it appeared to come from China - some in 2009 and again this year. To try to make it harder for the attacks, adding two-factor authentication of Gmail, which requires a code of mobile phone from a person and the common password.
Most people do not appreciate the measures Google is taking to ensure its Chrome browser-based operating system, Chrome OS, said Sundar Pichai, senior vice president of Chrome, in an interview at Google I / O, pointing to measures such as functioning plug-ins such as Flash and a PDF reader in a sandbox, using a boot process verified Chrome OS, and system of making Chrome OS encrypted file.
Chrome is also the vehicle for other ambitions of Google, for example to accelerate the Web. Aspects of this effort are improved SPDY called HTTP, a new capability of pre selected results pages to the screen much faster when a person clicks on the links, the technology called Native Client designed to run on the Web the software application much faster, and the image format that Google argues WebP is faster than JPEG.
It is not just making the Web faster and safer, however. When people use Chrome to conduct a search on Google, the company does not have any search result to share advertising revenue with makers of browsers such as Mozilla.
HTTPS access, Gmail is not just for safety measure only Google is doing.
Google is also trying to ensure that any user of Chrome and Gmail will be vulnerable to a problem raised its head in March when a subsidiary of a New Jersey company called Comodo was hacked, apparently by an Iranian.
Comodo and its subsidiary to issue digital certificates used by browsers to establish encrypted connections to Web sites, but the attack produced false certificates of encryption for Yahoo, Skype, Google and Mozilla. The theme of Comodo is a leading browser makers to rethink technology certificates.
Now, for some sites, like Gmail, Chrome can only get certificates from only a short list of suppliers, not the hundreds available on the global Internet. That list includes Verisign, Google Internet Authority, Equifax and GeoTrust, according to a blog post by Adam Langley, a programmer at Google. Add to the list is visible in the source code of Chrome.
In the long run, there is another important safety feature on the horizon: Google Chrome is the reconstruction of their technology, Native Client, gradually becoming more parts of the browser running on a more secure "sandbox", whose isolation computing resources of others makes it more difficult for attackers to take over a computer through a browser-based attack.
This measure will begin with a PDF reader Chrome, but will not activate until Google relies on technology, Pichai said.
A close cousin of security is privacy, for example, if a government wants to see if a dissident has visited a particular website. The browser makers are working to extend beyond the private browsing mode today, which leave no trace on the computer private browsing, ways that leave no trace on the servers, either.
For example, Chrome, Firefox and Internet Explorer all to find a technology to eliminate the local stored objects (LSO), which in practice means that it is harder for websites to track users through "Evercookie" . Cookies are text files that can be eliminated standard for browser users, but Adobe Flash Player, HTML techniques other plug-ins, and the new storage, there are more forms of Web browsers to store data even when normal cookies are deleted.
Evercookie are an open track down people. But there are subtle fingerprints of a browser leaves behind that can help identify who is using a browser, such as the Electronic Frontier Foundation Peter Eckersley documented in its report last year Panopticlick (pdf)
Chrome is based on the WebKit engine project which is also the basis of Apple's Safari. Now engineers are evaluating the idea WebKit 'track navigation resistant "to reduce the fingerprints.
An example, described in the documentation of WebKit navigation tracking resistance, refers to the user-agent string - the text of a Web browser sends a server to describe its version number, compatibility and system operation. Differences between individuals user-agent strings means that each one has enough information to reduce it to one thousand randomly selected browsers.
Even a thousandth of the total number of Web browsers is a huge number, of course, but there are plenty of other ways to narrow your search: time zone, installed plug-ins, fonts, and screen resolution, and more.
It is unclear how much appetite is not to hide fingerprints, however.
"I'm skeptical that doing these things will offer more than just a showcase, but definitely not want to discourage try," said Adam Barth WebKit developer, in a commentary. He asked for more information: "I would like to see us to track more difficult ... I would like to understand what you are buying and what we're paying for it."