Technology: Free iPhone Application

Use Wallet when you see an exciting article, movie or formula but don't currently have time to study or perspective it. Today in my blog post, you will discover the best 100+ iPhone applications for all your needs. We’ve taken the attempt to classify the applications and selected only those we believe to be the best ones and which will most likely be useful to you.

Simply media Pocket's practical bookmarklet and, voilà, the material helps you to save on your computer, product and smart phone. Easily review it at any time. It performs with internet explorer and more than 300 other applications. Price: FREE
There are lots of iPhone application available on the Google apps store you can download it free.
Google Best Apps for iPhone

An iPhone without applications would be like a zebra without its lines — simply and tedious. As we all know the capability to obtain and run third-party applications is the x-factor for iPhone gadgets, particularly mobile phones.
A list of the best iPhone apps available, from time-saving productivity tools to fun apps you won’t be able to put down.

SEO: Search Engine Optimization

Rand Fishkin recently filmed a Whiteboard Friday about paying one forward to people in your network with the hopes of having a hand to reach for some day when you need one. In the moment, it sounded like a loaded favor. “Here, let me give you something you didn’t ask for so I can offer a way to repay me.” Unfortunate.

As I drifted from my desk in thought, it became clear that actually, that is what link building really is. Regardless of how it is packaged, Rand’s technique is used by SEOs every day.

    “Dear Webmaster…”
    “Dear Blogger…”
    “Dear Reporter…”

Each outreach method includes a line about a great resource/article/idea that helps them, contributing to your SEO in the process. We are essentially offering (or begging for, really) something in exchange for a favor, also known as a link. So, how is how is going through an address book any different?

Most of us have tried broken link building, or what I call The Exchange. It reduces cold call syndrome by offering while asking. “Here are a couple broken links that you might have missed” is a much more successful ice breaker than “Hi, I work with… Hello?” The webmaster gets a gift and (hopefully) gives you enough time to ask one little, itsy-bitsy, tiny favor that would mean the absolute world to you. If this is a new concept, check out the many great resources on broken linking building tactics, like this and this.

The Exchange is a great angle, but it doesn’t give anything back to our digital or local communities. A webmaster catches a couple 404s, you get a link, but what about the kids?


Apple announces iPad with double storage capacity

Apple Inc (AAPL.O) said on Tuesday that it will sell a version of its iPad tablet computer with 128 gigabytes of storage, which is twice the capacity of its existing models.

Apple, which has sold more than 120 million iPads so far, said that the new iPad will go on sale February 5, in black or white, for a suggested retail price of $799 for the iPad with just Wi-Fi model, and $929 for the version that also has a cellular wireless connection.

Facebook’s Graph Search: the Ultimate Personalized Discovery Engine?


Facebook Graph Search is a social search feature the company announced Jan. 15. The feature is currently in private beta with a waitlist for individuals and businesses. You can join the waitlist here (scroll down to the bottom).

Facebook’s announced plan is to roll it out gradually to hundreds of thousands of individuals first (English only), then more broadly for PC-based users, then for non-English languages, and then on mobile.

It isn't clear how quickly this expansion will occur, but several Facebook product people are on record saying they still have work to do to figure out how to scale the computationally intensive searches across millions of concurrent users. (Think of crawling a user’s social and open graph connections across hundreds of thousands or potentially millions of nodes for every search.) Non-trivial engineering challenges stand in the way of mass availability of this feature set.

The potential for Facebook’s new Graph Search feature is huge. Brands, digital marketers, and publishers can and should be doing a number of things right now to benefit from it as it reaches critical mass.

A simple rule of thumb is that the more content that gets shared, liked, or commented on through Facebook, the greater the chances of discovery of that content through Graph Search.

What is Facebook Graph Search?

What Does it Do?

It's a very cool feature. When I type in a query, such as “friends who have been to Rome, Italy,” Graph Search traverses all of my relationships and those of my friends to find people who have visited Rome. It then pulls back these people and displays them alongside relevant content. This is a simple example that illustrates the difference between the kinds of results Graph Search returns and how search results from Google (or Bing) would appear.

Another key aspect of this feature is how it appears to include implicit affinities and experiences, in addition to explicit likes and shares people have done through Facebook. When you think about the significance of that, it’s pretty impressive.

Based on the content I’ve shared, as well as the check-ins, posts, and comments I’ve made, plus the images I’ve tagged, etc., Graph Search can infer what I like, where I’ve traveled to, and so forth. The inclusion of implicit affinities is only possible due to Facebook’s massive scale and could ultimately be the component of Graph Search that makes the results valuable enough to get people to use the feature.

What is it Good for?

  • People Search – Finding people you’re connected to who have specific interests and experiences
  • Local (and Vertical) Search – Finding a business and/or events that friends have visited and/or liked
  • Media and Entertainment Search – Finding TV shows, movies, music, and games liked, watched, etc. by your friends
How Will Facebook Monetize it?
Facebook hasn’t announced how they will monetize the feature. The obvious opportunity is to charge for sponsored listings much like AdWords. There are a few other options as well, including:

  • Syndicate aggregated data to advertisers. Data would show what people are searching for, who/what they’re finding, etc.
  • Creation of premium audience segments for targeting across the network via the FBX.
Find more for Facebook Graph Search

Oracle's Java Headache Worsens

Oracle's efforts to patch the Java security flaws plaguing users have become complicated by a phishing campaign that sends messages masquerading as official updates with attachments that hijack computers instead. In the meantime, the flaws that Oracle is attempting to patch continue to be exploited. Reporters Without Borders was the target of the latest attack.

For Oracle and its Java programming language, the hurt just keeps on coming.
Fresh vulnerabilities have been discovered less than a week after Oracle updated Java to address two security flaws being exploited by hackers -- but wait, there's more. Net bandits launched a phishing campaign pushing bogus security updates for the software.
Meanwhile, a tech journalist and Harvard Business School professor lambasted Oracle's actual security updates as unethical.
 Oracle's Java Headache Worsens
The two new vulnerabilities were discovered in the latest version of Java, release 7 update 11 (7u11) by veteran vulnerability finder Adam Gowdiak, founder and CEO of Security Explorations.
"We have successfully confirmed that a complete Java security sandbox bypass can still be gained under the recent version of Java 7 Update 11," Gowdiak wrote to subscribers of the Full Disclosure mailing list.
"As a result, two new security vulnerabilities (51 and 52) were spotted in a recent version of Java SE 7 code and they were reported to Oracle today," he added. Since April 2012, Gowdiak has discovered 52 security bugs in Java 7.

Not Playing Nice in Sandbox

Sandboxes are a technique used by software writers to make applications more secure. Running the app in a sandbox can isolate the program's execution -- and if it's infected, reduce its ability to contaminate a system.
Java's sandbox is a popular target of miscreants, according to HD Moore, chief security officer of Rapid7
"A single failure in Java's sandbox turns into another exploit that wouldn't be a problem in programs like Chrome, Flash and Acrobat because it's so hard to skip the sandbox in those programs," he told TechNewsWorld.
While Oracle scrambled to fix Java, phishers began exploiting public awareness of Oracle's security update for their own gains.
"It's a social engineering approach, taking advantage that this Java exploit is being talked about in the media," George Tubin, a senior security strategist with Trusteer.

Publicity Attracts Phishers

The phishing campaign was first discovered by Trend Micro, which last week found messages purporting to be security updates from Oracle circulating the Internet with attachments containing malware. The malware doesn't exploit any Java vulnerabilities -- it infects a computer and takes control of it.
"This method of infection has become very, very popular in the past few years," Barry Shteiman, a senior security strategist with Imperva, told TechNewsWorld.
In addition to the direct delivery of malware via email, miscreants are also using emails containing links to websites promising to install a new version of Java, which actually install ransomware on a system instead, said Bogdan Botezatu, a senior e-threat analyst at Bitdefender.
"These fake updates do not exploit any flaws in Java," he told TechNewsworld. "They just install a Windows-based piece of malware that currently installs ransomware -- a type of malware that locks the users' computer screen and demands payment to return control to the user."

Attacks on Activists

While there is no evidence yet that the new vulnerabilities in Java are being exploited by hackers, old ones continue to be exploited, according to Jindrich Kubec, a security researcher with Avast.
Kubec has been tracking a series of attacks against social activist websites that exploit previously patched vulnerabilities in Java and several versions of Microsoft Internet Explorer. The latest assault in the campaign was discovered Tuesday at the website for Reporters Without Borders.
The attacks are designed to collect information about visitors to the sites, Kubec explained.
"I believe this serves as intelligence collection on the enemies of the Chinese state," he told TechNewsWorld.
It allows the Chinese to track what its perceived enemies do, as well as with whom they communicate. It also lets them identify websites that may have been overlooked by Chinese censors, Kubec noted.
"We've seen more than 40 sites in the latest wave, as of [Wednesday]. Most of them are still infected and under at least partial control of attackers," he added.

Vulnerability as Business Opportunity

Although Oracle has received kudos from some security experts for its rapid action on the latest round of vulnerabilities in Java, its update process drew criticism from tech writer Ed Bott, of Cnet, and Ben Edelman, an associate professor at the Harvard Business School.
In a column published Tuesday, Bott knocked Oracle for pushing third-party software with its updates and for being slow to notify users that updates were available.
"Oracle uses the updater to patch security flaws, which is proper, but to push third-party advertising software -- that's quite unusual" Edelman told TechNewsWorld.
"Security updates are supposed to be strictly business. You're supposed to use it to fix an urgent, genuine, technical problem and nothing else," he maintained. "Oracle is taking a security vulnerability and flipping it around into a business opportunity."

Transparency Report: What it takes for governments to access personal information

Today we’re releasing new data for the Transparency Report, showing that the steady increase in government requests for our users’ data continued in the second half of 2012, as usage of our services continued to grow. We’ve shared figures like this since 2010 because it’s important for people to understand how government actions affect them.

We’re always looking for ways to make the report even more informative. So for the first time we’re now including a breakdown of the kinds of legal process that government entities in the U.S. use when compelling communications and technology companies to hand over user data. From July through December 2012:

  • 68 percent of the requests Google received from government entities in the U.S. were through subpoenas. These are requests for user-identifying information, issued under the Electronic Communications Privacy Act (“ECPA”), and are the easiest to get because they typically don’t involve judges.
  • 22 percent were through ECPA search warrants. These are, generally speaking, orders issued by judges under ECPA, based on a demonstration of “probable cause” to believe that certain information related to a crime is presently in the place to be searched.
  • The remaining 10 percent were mostly court orders issued under ECPA by judges or other processes that are difficult to categorize. 
  •  
  • User data requests of all kinds have increased by more than 70 percent since 2009, as you can see in our new visualizations of overall trends. In total, we received 21,389 requests for information about 33,634 users from July through December 2012. 
  • We’ll keep looking for more ways to inform you about government requests and how we handle them. We hope more companies and governments themselves join us in this effort by releasing similar kinds of data.

    One last thing: You may have noticed that the latest Transparency Report doesn’t include new data on content removals. That’s because we’ve decided to release those numbers separately going forward. Stay tuned for that data.

Inviting kids to dream big: Doodle 4 Google 2013 is open for submission!



We’re always thinking about ways to make everyday life a little easier and a little more fun. But what would the perfect day look like? We thought we’d ask the most creative folks out there: today we’re announcing our 6th annual U.S. Doodle 4 Google competition, inviting K-12 students around the country to create their own “doodle” (one of the special Google logos you see on our homepage on various occasions). This year’s theme: “My Best Day Ever...” Breakdancing with aliens? Sure! Building a fortress of candy? Okay by us! Riding to school on a brontosaurus? You get the idea—but if you need more inspiration, take a look at our video here:
The winning artist will see their work on the Google homepage for a day, win a $30,000 college scholarship, and win a $50,000 technology grant for his or her school.

The judging starts with Googlers and a panel of guest judges. This year our judges include journalist and TV personality Katie Couric; music maestro Ahmir “?uestlove” Thompson of The Roots; Chris Sanders, writer and director of Lilo & Stitch and How to Train Your Dragon; and Pendleton Ward, creator of Adventure Time; among other great creative minds.

On May 1 we’ll open up a public vote for the 50 State Winners. They’ll be flown to New York City for a national awards ceremony on May 22. There, we’ll announce the National Winner, whose doodle will appear on the Google homepage the following day. In addition, all the State Winners will have their artwork on display at the American Museum of Natural History from May 22 to July 14.

Participating is easier than ever. You can download the entry forms on our Doodle 4 Google site and send in completed doodles by mail or online. All entries must be received by March 22 with a parent or guardian’s signature. We encourage full classrooms to participate too. There’s no limit to the number of doodles that come from any one school or family... just remember, only one doodle per student.

For more details, check out google.com/doodle4google, where you’ll find full contest rules and entry forms. Happy doodling, and good luck!