Search This Blog

Sunday, July 24, 2016

Apple may be planning an iPhone 7 release in early September, tech watcher says



Apple iPhone

Cue the lines at the Apple Store—the world could be just months away from the newest iPhone.

Evan Blass, a prominent Apple watcher with an accurate track record of predicting the tech giant's releases, posted a tweet early Saturday saying the latest iPhone iteration would be released the week of September 12. Thus far, Apple has given no overt indication that it's planning an event.


Recently, rumors surfaced that Apple was planning to push out three different iPhone 7s—with leaked photos depicting a larger screen and bigger storage capacity. At least one of those phones is said to be a professional version, Apple Insider reported this week.

Yet Blass, a reporter for VentureBeat whose cultivated a reputation as an Apple tipster, dismissed the idea that the smartphone maker would create a "Pro" version of the device. However, he added that Apple was likely to put out at least two new versions of its signature smartphone.

 
The 2 (two!) 2016 iPhone models are codenamed Sonora and Dos Palos.

Analysts had been expecting a September iPhone launch, but say the timing is key. An early September launch could give Apple's quarterly revenue a large boost.

"In terms of outlook, we think there is downside risk to current September quarter revenue estimates but we also believe that it is largely expected at this point," Mizuho Securities said in a recent research note. Apple's iPhone sales have taken a hit from a dip in Chinese demand, it said.

"We note that it is hard to estimate September shipments as it is highly dependent on the timing of the iPhone 7 launch," the firm said, adding that a new smartphone would create "upside" for the company's performance, depending on the launch date.

Monday, March 10, 2014

Protocol41

CMC/FAC in Cisco CUCME I got asked at work today to look in to CMC and FAC capabilities in Cisco UCME. Configuring these is fairly simple in CUCM (tick the boxes on the respective route patterns, create the required CMC/FAC codes) but I didn’t know how to do it in CUCME. So I went to find out. Client Matter Codes – Configuration Client Matter Codes (CMC) are codes that are used to represent a particular department/function/client and appear in call detail records to allow billing for calls to be done by department etc, or to log calls to clients in companies like law firms etc. In a CME setup we first need to ensure that the phones we need to have this feature are assigned a softkey template that includes the Acct (Accounting) softkey in the alerting and/or connected call states. ephone-template 1 softkeys alerting Acct Endcall softkeys connected Acct Hold Endcall Confrn Trnsfer Then, we must apply the particular template to the ephone(s) in question ephone 1 ephone-template 1 Once we reset the phones, they will display the Acct softkey in the alerting/connected states. Client Matter Codes – Usage To use the CMC feature in CUCME, the Acct softkey is pressed. After this, the user must enter the CMC in question and end it with a # symbol. Once this is entered it will show up in the show call active and show call history output and in CDRs if CDR logging is enabled on the CUCME. Forced Authorisation Codes – Configuration In CME, there isn’t an explicit FAC setup – instead we can use the after-hours configuration in telephony-service. In short, we’ll define every moment of every day as after-hours and configure specific patterns as after-hours blocked patterns. Then, we’ll configure each phone with a PIN that they can use to ‘log in’ and get around those after-hours restrictions. First however, we need to ensure that the phones have the login key available at the phone’s idle state. Let’s update the ephone-template we configured earlier ephone-template 1 softkeys idle Login Cfwdall Hlog Newcall softkeys alerting Acct Endcall softkeys connected Acct Hold Endcall Confrn Trnsfer Now that we’ve done that, we’ve got to define our after-hours time periods, and the patterns we’ll block (i.e. those that will require a login to dial) and (optionally) a non-default login timeout – i.e. how long they can get around the block pattern before having to log in again. In the example below, we are always blocking the 900T pattern (i.e. UK international calls using a PSTN access code of 9), and the login timeout is set to 5 minutes. telephony-service after-hours day Sun 00:00 23:59 after-hours day Mon 00:00 23:59 after-hours day Tue 00:00 23:59 after-hours day Wed 00:00 23:59 after-hours day Thu 00:00 23:59 after-hours day Fri 00:00 23:59 after-hours day Sat 00:00 23:59 after-hours block pattern 1 900T login timeout 5 We also have a few other options we can configure with this setup. Permanently blocked patterns (not really relevant if every time is after-hours, but useful otherwise) Special after-hours dates (e.g. 25th December, 1st January) After-hours exempt phones (e.g. super-important manager people!) An example of those features is given below telephony-service after-hours block pattern 1 90845T 7-24 after-hours date Jan 1 00:00 23:59 ! ephone 10 description :: IMPORTANT MANAGER PHONE :: button 1:10 type 7942 mac-address aaaa.bbbb.cccc after-hour exempt Now, let’s give some phones a PIN so they can dial the blocked patterns. ephone 11 description :: LESS IMPORTANT PHONE :: button 1:11 type 7942 mac-address aaaa.bbbb.dddd pin 1234 ! ephone 12 description :: LESS IMPORTANT PHONE :: button 1:12 type 7942 mac-address aaaa.bbbb.eeee pin 2234 Forces Authorisation Codes – Usage If you try and dial a blocked pattern during the after-hours time settings (which are, I believe, based on the time-zone configured in CME – so make sure that is set right!) you will get a reorder tone. If you press Login and enter your PIN and then try to dial it, the call will succeed. I think that’s about it… Update: It looks like CUCME 8.5 and above supports a propoer FAC setup, but I haven’t read this in any great detail yet: http://www.cisco.com/en/US/docs/voice_ip_comm/cucme/admin/configuration/guide/cmefac.html

Sunday, October 30, 2011

Look out: The 10 rising tech trends of 2012


By Jason Hiner

October 17, 2011, 4:17 PM PDT

Takeaway: At its annual Symposium, Gartner unveiled its list of the 10 most strategic tech trends of 2012, including a controversial demotion of the cloud.

Gartner analyst David Cearly peppered his audience of change-weary IT leaders with a new list of the tech trends that are going to rock their world next year as Cearly helped kick off the annual Gartner Symposium ITxpo on Monday night in Orlando.

This is always one of the most anticipated presentations of Gartner Symposium since it helps give a 20,000-foot view of the year ahead. At a conference that bombards IT executives with tons of research and statistics, it gives a little context at the beginning to put things in perspective for the rest of the week.




Here’s my breakout of the top 10, with select quotes from Cearly on the importantance of each of the items:

1. Media tablets and beyond - “The implications for IT is that the era of PC dominance with Windows as the single platform will be replaced with a post-PC era where Windows is one of a variety of environments IT will need to support.”

2. Mobile-centric applications and interfaces - “When building user interfaces for multiple screen sizes and operating systems, new types of tools are needed to take the data feeds from applications and transform them so they are usable on the target device… There is no automatic way to do this — it takes engineering skills to design the right outputs.”

3. Contextual and social user experience - “Context-aware computing (CAC) uses information about an end user or objects environment, activities connections and preferences to improve the quality of interaction with that end user or object.” This is where GPS, NFC, bar code readers, image recognition, augmented reality, and various types of digital sensors come together to make computing devices automatically adapt to the environment and streamline things for users.

4. Internet of Things - “This Internet of things will enable a wide range of new applications and services while raising new challenges. For example, objects will increasingly act as “users” of other systems. Imagine a scenario where a warehouse robot interfaces with the ERP system for self replenishment or a truck schedules it’s own maintenance. IT will increasingly have to consider how these scenarios impact issues such as software licensing.”

5. App stores and marketplaces - “With enterprise app stores the role of IT shifts from that of a centralized planner to a market manager providing governance and brokerage services to users and an potentially an ecosystem to support apptrepreneurs.”

6. Next-generation analytics - “We have reached the point in the improvement of performance and costs that we can afford to perform analytics and simulation for each and every action taken in the business. Not only will data center systems be able to do this, but mobile devices will have access to data and enough capability to perform analytics themselves, potentially enabling use of optimization and simulation everywhere and every time.”

7. Big data - “Another driver challenging IT is extreme information. Many organizations are beginning to realize they must to use this data for decisions, new analytic applications and pattern-based strategies… Big data has such a vast size that it exceeds the capacity of traditional data management technologies; it requires the use of new or exotic technologies simply to manage the volume alone.”

8. In-memory computing - “In-memory applications platforms include in-memory analytics, event processing platforms, and in-memory application servers… Running existing applications in-memory or refactoring these applications to exploit in-memory approaches can result in improved transactional application performance and scalability, lower latency (less than one microsecond) application messaging, dramatically faster batch execution and faster response time in analytical applications.”

9. Extreme low-energy servers - “The adoption of low-energy servers — the radical new systems being proposed, announced and marketed by mostly new entrants to the server business — will take the buyer on a trip backward in time. These systems will remove virtualization and lessen the shared use of systems. ”

10. Cloud computing - ”We could see the failure of the cloud to live up to the hype… The luster could wear off.” Gartner dropped the cloud from number one on the list for 2011 to number 10 for 2012. However, besides the hype issue, Cearly also noted that it’s partially because the cloud is getting absorbed into lots of other operational IT areas.

Cearly also noted how IT leaders should think about the “strategic technologies” on this list:


“A strategic technology is one with the potential for significant impact on the enterprise during the next three years. Factors that denote significant impact include a high potential for disruption to IT or the business, the need for a major dollar investment or the risk of being late to adopt… Companies should use the list as a starting point and adjust based on their industry, unique business needs, technology adoption model, and other factors.”

My take

It won’t surprise anyone that tablets are at the top of the list, and rightfully so. From both an employee and customer standpoint, tablets have been driving a huge change in the way people interact with information over the past two years and the process is likely to accelerate in 2012 as the price of tablets drop, Android’s tablet software improves, and Microsoft gets into the game with a legitimate play in Windows 8.

The biggest surprise was the demotion of cloud computing from number one to number 10. I think this was a bit of grandstanding on Gartner’s part because they know that journalists and the tech world would react strongly to it and write about it. But, I think they’re generally correct that a lot of enterprises are still balking at the cloud, or at least not jumping in with both feet. The cloud is being driven heavily by SMB and in order to fully come of age it will need convince bigger players to get on board for more than just a few fringe applications.

Other than that, I think big data, analytics, and apps should have all been a lot higher up on the list, while the Internet of Things is still a couple of years away from having a widespread impact — it’s going to require better, cheaper, and more ubiquitous mobile broadband.

Ubuntu 11.10 brings Ubuntu Unity closer to fine

Ubuntu 11.10 brings Ubuntu Unity closer to fine
By Jack Wallen

October 17, 2011, 7:57 AM PDT

Takeaway: With the release of Ubuntu 11.10, Ubuntu Unity makes some progress on the desktop front. Is it enough? Jack Wallen offers his take on the state of the desktop from Canonical.

If you’ve been following me long enough, you know since the inception of Ubuntu Unity my relationship with that new desktop has been one of love-hate. When Unity was first rumored and the designs and philosophy were made known, the relationship was one of love. But when 11.04 was released, that relationship quickly shifted to hate. But now, 11.10 is out and Ubuntu has had a chance to make good on their Unity promises. I have to say, after upgrading to 11.10 … I’m pretty impressed with the improvements.

I’ll preface the rest of this by saying it’s not perfect, but it’s closer to being a fine desktop than it’s previous iteration.

Now … just what has improved? Let’s take a look. I am taking this from the perspective of an end-user, so there will be no talk of development this or power-user that. What I am interested in is whether or not Unity has come far enough along for the average end user.

The Good



The Unity Dash has had a bit of overhaul, making it easier to access various pieces. Figure A shows the Dash in action. Click on the Dash icon to reveal a new overlay that allows you to do the following (via icon):
•Open up various categories of apps (Media, Internet, and More).
•Open up default apps (as configured within System).
•Find files.

You will also notice, at the bottom of the Dash overlay, a row of tabs. These tabs are (from left to right):
•Dash Home
•Applications
•Documents and folders
•Media



So what the developers of Unity have done is make it incredibly easy to get to various applications, files, and folders. This is a big plus for not just average users, but for any level of users. Another nice addition to the Dash is the ability to quickly filter results by categories. Take a look at Figure B (sorry, wallpaper is set to randomly change.)

Click on the Applications Tab in the Dash Overlay and you can then filter by various categories, making the search for that specific file or application much easier.

It is also possible now to eject external discs and USB devices from the Launcher. Simply right-click the device to reveal a menu offering:
•Open
•Eject
•Safely Remove

The not so good

The Metaphor is still the big issue. Most end users do not like change — of any kind. They don’t like drive letters to change, they don’t like the look and feel of things to change. This is the one glaring problem with driving such a grand, sweeping change such is Ubuntu Unity. New users will take one look at it and say “Where’s my Start button? Where are my icons?” There is no way around this and new users will just have to accept that change is an inevitability with the PC desktop. Even with Windows — change happens and users have little to no choice but to move on. Eventually the touch-screen friendly desktop interface such as Unity and Gnome 3 will be less a shock to users (granted it would help if Canonical would come through on the promise of touchscreen hardware to happily marry with the interface).

More not so good

Why is it the developers of Ubuntu Unity have decided that configuring the desktop is just not something we mortals need. Sorry people, but I am a serious tinkerer on the desktop. I want my desktop cake and I want to eat it too! But alas — configuring the Unity desktop is just not meant to be (outside of changing your desktop background.) This does need to change. People (even new users) want to configure that desktop!

Even more not so good

I’m still not sold on the Apple-like application menu. No more do applications have their own menu. You want to access an application menu, you have to have that application in focus and then go up to the main bar at the top of the window. This isn’t terribly efficient when you have many windows open.

And speaking of many windows open — I want, nay need, my sloppy focus. I do not like to have to click on titlebars (or any location within the window) to give a window focus. I am all about making as few clicks and points with the mouse as possible. Give me sloppy focus and auto-raise back!

Android 4.0: Eight new features that actually matter

Takeaway: Google unveiled Android 4.0 “Ice Cream Sandwich” on Wednesday and showed off lots of eye candy. Here’s a look at the useful stuff.

Google and Samsung teamed up for a joint announcement on Android 4.0 “Ice Cream Sandwich” in Hong Kong on Wednesday. Samsung was involved because it’s manufacturing the first Android 4.0 device, the Galaxy Nexus, which becomes the latest “Google phone,” following in the footsteps of the Nexus One and the Nexus S.

Thankfully, the announcement was dominated by updates about Android 4.0, which reunites the platform around one OS for both smartphones and tablets. On Wednesday, Google was mostly talking about Android 4.0’s smartphone features and there were a lot to like.

While Google showed off plenty of the improvements were just eye candy, here’s my list of eight new features in Ice Cream Sandwich that will actually be quite useful:

1. Android Beam

This is a secure peer-to-peer sharing mechanism using NFC that lets you quickly send content or information from one Android device to another. My colleague Larry Dignan said it reminds him of using IR to beam a digital business card on the old Palm devices. Hopefully, Beam will prove to be more versatile and reliable.

2. Data usage tools

Android 4.0 integrates its own built-in tools for tracking and controlling your data usage so that you don’t go over your data plan cap and owe your carrier extra money at the end of the month. This is more important than ever with the inevitable advent of usage caps in 4G.

3. Voice typing

There’s a new “voice input engine” in Ice Cream Sandwich that allows you to dictate an extended message like an email or a text message. Don’t confuse this with the iPhone’s new Siri digital assistant, but it could be a very useful feature for when you’re in the car.

4. Face unlock

Google has introduced facial recognition to its unlock screen. Instead of using a PIN or pattern recognition, you can now choose facial recognition as your login/unlock method. In the demo at the announcement, the feature failed, so this could need a couple iterations before it works smoothly.

5. Universal copy-and-paste

Android already has copy-and-paste but the various Android skins from the OEMs (and even some apps) implement it differently. In Android 4.0, Google has improved the feature and made it universal.

6. Quick responses to calls

When you receive a call but choose to send it to voicemail, you can now select from a series of canned messages (like “Sorry, in a meeting” or “Call me back in 20 min”) and an automatic text message will be sent to the caller.

7. Screenshots

You can now take screenshots in Android by holding down the power and volume-down buttons. Thank you! This is especially helpful for us journalists, but it’s also useful for IT and business pros who need to put together documentation or show an employee how to do something in Android. No longer do we have to install the whole SDK just to take a simple screenshot.

8. Camera improvements

The camera app has gotten a big upgrade. Google promises “continuous focus, zero shutter lag exposure, and decreased shot-to-shot speed.” I have my doubts about zero shutter lag, but if they’ve improved significantly on the laggy camera app in most Android phones then it will be a welcome upgrade.

Wednesday, September 29, 2010

Computer hackers have unleashed the first virus designed to damage targets in the real world - opening the door to a new era of cyber-warfare.

The Stuxnet worm is the first known malicious software designed to destroy or sabotage factories, power plants, refineries or other industrial installations.
We are used to Trojans and viruses roaming the internet harming computers and causing financial damage, but Stuxnet is in a league of its own.
The worm targets closed and highly secure industrial networks.
After being introduced with a USB key, Stuxnet slips past four previously unknown vulnerabilities in the Windows operating system, so-called "zero day" vulnerabilities.
It is rare for malicious software to exploit even two of them.
Each one can take months for hackers to identify and more time to write software to exploit.
The worm then hunts for specific types of computers made by German company Siemens.
Having found its host, it lies dormant, waiting for a certain moment to override the computer's control of industrial machinery, with potentially disastrous consequences.
This new breed of malware could wreak the kind of damage only previously seen in Hollywood disaster films.
Imagine a nuclear power station's cooling system being overridden, for example.
Or a railway's signals system thrown into chaos.
Experts estimate developing the Stuxnet worm would have taken a highly specialised team between six months to a year.
Israeli cybersecurity strategist Gadi Evron says the worm is so advanced it is almost certainly state-sponsored.
"This would require a lot of resources on the level of a nation state.
"Taking into account the intelligence required to attack a specific target, it would be virtually impossible that this is a lone attacker sitting at home."
Less impressive, though, is the spread of the worm's infection.
"The attack managed to infect, over several months, something like 30,000 to 50,000 PCs in many facilities and corporations worldwide," Uri Rivner from internet security company RSA told Sky News.
Such a wide dissemination has helped expose the worm's existence and helped efforts to neutralise it.
It also raises questions about the likely target for the worm.
Iran says computers at its nuclear plant in Bushehr have been compromised by the worm but will not reveal the extent of the damage.
Some figures suggest 60% of the Stuxnet infections are in Iran.
That has led to a highly speculative finger of blame being pointed at Israel.
Is the Jewish state trying to disrupt Iran's alleged nuclear weapons programme?
We will probably never know. Other unknowns also remain. Has the worm already achieved its goal, or is it lying in wait to carry out its sabotage? Is Iran the intended victim, are other countries at risk?
And, more worryingly, the worm is a trailblazer.
Other hackers can learn from its pioneering methods to produce more sophisticated malware threatening other networks in the future.

Wednesday, September 22, 2010

Courses in Institute of NanoTech

I am so pleased in bringing the facility towards your doorstep in supporting our community to grow in Information Technology.The courses which are offered here is highly and equally standard to the courses which are conducted by the major institutions in the major cities.My aim is to provide the same facility to my Village yougsters who are willing to walk forward in the Information Technology field while obtaining a good carrier in their life.Hope almighty allah will be with me for this service....

COURSES

1.IIntroduction to Information Technology-Fundamentals of Hardware and Networking,Fundamentals of Operating systems such windows and Linux,Fundamentals of Programming Languages such C++,Java,.Net,Fundamentals of web design and Development such PHP,Mysql,Photoshop,Dream weaver....

2.Diploma in Hardware and Networking-Computer peripherals-CPU,VDU,Input Devices,Output Devices,Processor histories and types-Pentium 1,11,111,1v,v,Pentium D,Dual Core,Core 2 Duo,Core 2 Duo Quad,Celeron,AMD etc.....,Windows XP,Vista,Windows 7,Windows server 2003 ,Windows Server 2008,Fedora 13,Ubuntu 10.10,Red Hat Enterprise Linux 5.5 etc.. installation and configuration.DHCP,DNS,Proxy,Subnetting,RRAS,WSUS etc.......

3.MCP-Windows Vista Windows 7 client Operating system and Windows Server 2003 or Windows Server 2008 for Server operating System.

4. MCSA-Windows Vista or Windows 7,Windows Server 2003/Windows Server 2008,Exchange Server 2003 or 2007

5.MCSE-All 8 Modules for MCSE

6.MCTS-Windows Server 2008 or Windows 7

7.Web Design and Development-Php,Mysql,Dream Weaver,Photoshop and Flash.

8.Micorsoft Certified Desktoptop Publishing Technician
9.Microsoft Certified Database Administrator

10.Office Programme-Microsoft Office 2010-Word,Excel,Powerpoint,Outlook,Publisher,Infopath and Access

11.Computer for Kids-Typing practice,Office 2010,Operating System functions....

12.Cisco Certified Network Associate-640-802,security,voice etc....

13.Cisco Certified Network Professional-Route,Switching and Troubleshoot

I welcome you to come and enjoy the benefits fo NanoTech to enhance your carrier in the Information Technology Field.....