Archive

Posts Tagged ‘Windows’

‘Gorilla Arm’ Will Keep Touch Screens From Taking Over

January 6th, 2013 01:20 admin View Comments

Input Devices

Hugh Pickens writes “With Windows 8, Microsoft has made a billion-dollar gamble that personal computing is taking a new direction and that new direction is touch, says David Pogue. It’s efficient on a touchscreen tablet. But Microsoft expects us to run Windows 8 on our tens of millions of everyday PCs. Although touch has been incredibly successful on our phones, tablets, airport kiosks and cash machines, Pogue says touch will never take over on PCs. The reason? Gorilla Arms. There are three big differences between tablet screens and a PC’s screen: angle, distance and time interval. The problem is ‘the tingling ache that [comes] from extending my right arm to manipulate that screen for hours, an affliction that has earned the nickname of gorilla arm.’ Some experts say gorilla arm is what killed touch computing during its first wave in the early 1980s but Microsoft is betting that Windows 8 will be so attractive that we won’t mind touching our PC screens, at least until the PC concept fades away entirely. ‘My belief is that touch screens make sense on mobile computers but not on stationary ones,’ concludes Pogue. ‘Microsoft is making a gigantic bet that I’m wrong.’”

Source: ‘Gorilla Arm’ Will Keep Touch Screens From Taking Over

Valve Reveals First Month of Steam Linux Gains

January 5th, 2013 01:34 admin View Comments

Operating Systems

An anonymous reader writes with news that Valve has updated its Hardware & Software Survey for December 2012, which reflects the first month of the platform being available for Linux. Even though the project is still in a beta test, players on Ubuntu already account for 0.8% of Steam usage. The 64-bit clients for Ubuntu 12.10 and 12.04.1 showed about double the share of the 32-bit versions. MacOS use also showed growth, rising to about 3.7%. Windows 7′s usage share dropped by over 2%, but balanced by the growth of Windows 8, which is now at just under 7%. The total share for Windows is still about 95%.

Source: Valve Reveals First Month of Steam Linux Gains

What’s In Steve Ballmer’s Inbox?

January 3rd, 2013 01:50 admin View Comments

Microsoft

Barence writes “When Microsoft last year launched Outlook.com, the company carelessly left the SteveBallmer@Outlook.com address vacant. It was snapped up by the editor of PC Pro, giving an insight into the type of emails the public sends to the Microsoft CEO. Among the messages sent to the account are complaints about the Windows 8 interface, a plea from someone who was ‘literally driven crazy’ by Windows Server product keys, and someone who wants Windows Phone’s calendar to remind him when he’s being paid. There’s also a more sinister complaint from someone who claims they were the victim of racial discrimination when applying for a job at a Microsoft Store.”

Source: What’s In Steve Ballmer’s Inbox?

Microsoft Says Google Trying To Undermine Windows Phone

January 3rd, 2013 01:08 admin View Comments

Google

First time accepted submitter Bent Spoke writes “In a bit of delicious irony, Microsoft laments Google is not playing fair by excluding access to meta-data on YouTube, preventing the development of the kind of powerful app readily available on Android. From the article: ‘In a blog post on Wednesday, Microsoft VP and deputy general counsel Dave Heiner said the software giant has spent two years trying to get a first-class YouTube app running on Windows Phone, but to no avail, thanks to the Chocolate Factory’s stonewalling. “YouTube apps on the Android and Apple platforms were two of the most downloaded mobile applications in 2012, according to recent news reports,” Heiner wrote. “Yet Google still refuses to allow Windows Phone users to have the same access to YouTube that Android and Apple customers enjoy.”‘”

Source: Microsoft Says Google Trying To Undermine Windows Phone

Microsoft Says Google Trying To Undermine Windows Phone

January 3rd, 2013 01:08 admin View Comments

Google

First time accepted submitter Bent Spoke writes “In a bit of delicious irony, Microsoft laments Google is not playing fair by excluding access to meta-data on YouTube, preventing the development of the kind of powerful app readily available on Android. From the article: ‘In a blog post on Wednesday, Microsoft VP and deputy general counsel Dave Heiner said the software giant has spent two years trying to get a first-class YouTube app running on Windows Phone, but to no avail, thanks to the Chocolate Factory’s stonewalling. “YouTube apps on the Android and Apple platforms were two of the most downloaded mobile applications in 2012, according to recent news reports,” Heiner wrote. “Yet Google still refuses to allow Windows Phone users to have the same access to YouTube that Android and Apple customers enjoy.”‘”

Source: Microsoft Says Google Trying To Undermine Windows Phone

Windows 8 Even Less Popular Than Vista

January 1st, 2013 01:02 admin View Comments

Microsoft

New submitter NettiWelho writes with even more bad news for Microsoft. From the article: “Windows 8 usage uptake has slipped behind Vista’s in the same point in its release. Windows 8 online usage share is around 1.6% of all Windows PC’s which is a href=”http://www.kitguru.net/software/operating-systems/benjamin/windows-8-proving-less-popular-than-vista/”>less than the 2.2% share that Windows Vista commanded at the same two month mark after release. Net Applications monitor operating system usage by recording OS version for around 40,000 sites it monitors for clients. The slowdown for Windows 8 adoption is a bad sign for Microsoft who experienced great success with the release of Windows 7. Data was measured up to the 22nd of December, so there is still time by the end of the month for Windows 8 to claim a higher percentage of the user base.”

Source: Windows 8 Even Less Popular Than Vista

New IE Vulnerability Used In Targeted Attacks; IE9, IE10 Users Safe

December 29th, 2012 12:47 admin View Comments

Internet Explorer

An anonymous reader writes “Criminals are using a new Internet Explorer security hole to attack Windows computers in targeted attacks, though the vulnerability could end up being more widely exploited. While IE9 and IE10 are not affected, versions IE6, IE7, and IE8 are. It’s great to see that the latest versions of IE are immune, but this new vulnerability is still bad news for Windows XP users and earlier since they cannot upgrade to more recent versions of Microsoft’s browser. “We are actively investigating reports of a small, targeted issue affecting Internet Explorer 6-8,” Dustin Childs of Microsoft Trustworthy Computing told TNW. “We will take appropriate action to help keep customers protected once our analysis is complete. People using Internet Explorer 9-10 are not impacted.”"

Source: New IE Vulnerability Used In Targeted Attacks; IE9, IE10 Users Safe

Ask Slashdot: Linux-Friendly Motherboard Manufacturers?

December 28th, 2012 12:14 admin View Comments

Linux

dotancohen writes “I am tasked with building a few Linux machines for a small office. However, many the currently available motherboards seem to be Linux-hostile. For instance, in addition to the whole UEFI issue, my last install was a three-day affair due to the motherboard reporting a Linux-supported ethernet device (the common RTL8168) while it was actually using a GbE Ethernet device that does not work with the legacy drivers and didn’t even work with a test Windows 7 install until the driver disk was installed. There are no current hardware compatibility lists for Debian or Ubuntu and I’ve received from Asus and Gigabyte the expected reply: No official Linux support, install Windows for best experience. I even turned to the two large local computer vendors, asking if they could provide Linux-compatible machines ready to go, but neither of them would be of any help. What globally-available motherboards or motherboard manufacturers can you recommend today?”

Source: Ask Slashdot: Linux-Friendly Motherboard Manufacturers?

Nvidia Display Driver Service Attack Escalates Privileges On Windows Machines

December 27th, 2012 12:17 admin View Comments

Security

L3sPau1 writes “A zero-day exploit has been found in the Nvidia Display Driver Service on Windows machines. An attacker with local access can use the exploit gain root privileges on a Windows machine. Windows domains with relaxed firewall rules or file sharing enabled can also pull off the exploit, which was posted to Pastebin by researcher Peter Winter-Smith.”

Source: Nvidia Display Driver Service Attack Escalates Privileges On Windows Machines

How Do YOU Establish a Secure Computing Environment?

December 26th, 2012 12:54 admin View Comments

Security

sneakyimp writes “We’ve seen increasingly creative ways for bad guys to compromise your system like infected pen drives, computers preloaded with malware, mobile phone apps with malware, and a $300 app that can sniff out your encryption keys. On top of these obvious risks, there are lingering questions about the integrity of common operating systems and cloud computing services. Do Windows, OSX, and Linux have security holes? Does Windows supply a backdoor for the U.S. or other governments? Should you really trust your Linux multiverse repository? Do Google and Apple data mine your private mobile phone data for private information? Does Ubuntu’s sharing of my data with Amazon compromise my privacy? Can the U.S. Government seize your cloud data without a warrant? Can McAfee or Kaspersky really be trusted? Naturally, the question arises of how to establish and maintain an ironclad workstation or laptop for the purpose of handling sensitive information or doing security research. DARPA has approached the problem by awarding a $21.4M contract to Invincea to create a secure version of Android. What should we do if we don’t have $21.4M USD? Is it safe to buy a PC from any manufacturer? Is it even safe to buy individual computer components and assemble one’s own machine? Or might the motherboard firmware be compromised? What steps can one take to ensure a truly secure computing environment? Is this even possible? Can anyone recommend a through checklist or suggest best practices?”

Source: How Do YOU Establish a Secure Computing Environment?

YOYOYOOYOYOYO