|
|
lhgx Google Voice Search for Android supports 13 new languages
Vuni Mozilla weaves web OS in cloud (and bad haircut day)
Samsung s addition of the Android-based Galaxy Player to its line of mobile and entertainment options could create Apple s biggest mobile/media rival. Yesterday, Samsung confirmed that it will be unveiling a portable media player called the Galaxy Player at CES next week. The Galaxy Player is Android-based and its design and specs are clearly derived from Samsungrsquo Galaxy S smartphone. Those specs are:4-inch Super Clear LCD screen 800 times; 480 resolution 1GHz processorWi-FiBluetooth 3.0GPS3.2-megapixel rear cameraVGA front-facing cameraHD video playbackmicroSD card slotSoundAlive audio enhancing technologySupports Samsung Apps and Android Market1200mAh removable battery If those specs make you thi hydrojug traveler nk the Galaxy Player is essentially just a Galaxy S minus the calling capabilities, yoursquo;re right. The player is clearly design with the same market and intent as Applersquo iPod touch all models of which have been derivatives of an iPhone model that hit the market a few months earlier . One key difference is that an iPod touch is an ideal choice for any stanley spain one who wants all the iPhone features minus a specific carrier particularly here in the U.S. . Android handsets, on the other hand, are available on virtually every carrier in the world. The diversity of manufacturers also allows for Android devices that are specifically designed for media and/or gaming. Irsquo;m not sure if that will impact sales o owala r the popularity of the Galaxy Player relative t Xwug Survey shows global software market still sliding
Attacks could soon come in the form of a SQL injection or a buffer overflow attack Three computer science researchers are warning that viruses embedded in radio tags used to identify and track goods are right around the corner, a danger that so far has been overlooked by the industryrsquo high interest in the technology.No vir polene uses targeting radio frequency identification RFID technology have been released live yet, according to the researchers at Vrije Universiteit Amsterd stanley cup am in the Netherlands. But RFID tags have several characteristics that could be engineered to exploit vulnerabilities in middleware and back-end databases, they wrote in a paper presented today at a conference in Pisa, Italy.RFID malware is a Pandorarsquo box that has been gathering dust in the corner of our lsquo martrsquo; warehouses and home, the paper stated. The attacks can come in the form of a SQL injection or a buffer overflow attack even though the tags themselves may only store a small bit of information, the paper said. For demonstration purposes, the researchers created a proof-of-concept, self-replicating RFID virus.Patrick Simpson, a masterrsquo student at the university, needed only four hours to write a virus small enough to fit on a RFID stanley cup tag, something previously thought unworkable, said Andrew S. Tanenbaum, a professor at Vrije Universiteit Amsterdam. RFID tags can contain as little as 114 bytes of memory, he said.Tanenbaum expects vendors to be angry about the |
|