The G1, the first phone to run the search giant's mobile platform, has been a magnet for tech-savvy people, consumers more than 1 million handsets since October 2008. Now wireless operator T-Mobile wants Google's second Android phone, which will be available later this summer, to attract a broader audience and sell even more briskly.
To reach the rank and file, T-Mobile is retraining its staff and commissioning new applications for the phone. It also created a new brand, called myTouch, to highlight the ways users can personalize the device. "We know we'll get tech-oriented folks, but our real focus is the [general] consumer," says Sajal Sahay, T-Mobile USA's director of product marketing. The phone will go on sale in August for $199 with a two-year contract.
The changes begin with the name: It will be the T-Mobile myTouch 3G with Google or myTouch 3G for short. The idea, says Sahay, is to promote the idea of a phone "made by you, for you," since people are more likely to bond with gadgets they can customize.
Microsoft Corp. last week issued 10 security updates that patched a record 31 vulnerabilities -- 18 marked "critical" -- in Windows, Internet Explorer, Excel, Word and other applications.
The bugs are the largest number that Microsoft has patched in a single month since the company began its regular update program in 2003. The previous record of patches for 28 flaws was set last December.
"This is a very broad bunch," said Wolfgang Kandek, chief technology officer at security company Qualys Inc.
"You've got work [to do] everywhere -- servers and workstations, and even Macs if you have them. It's not getting any better. The number of vulnerabilities [Microsoft discloses] continues to grow," he added.
Of the 10 bulletins, six patched some part of the Windows operating system, three patched an application or component in the Office suite, and one fixed several flaws in IE.
Eighteen of the 31 bugs carried Microsoft's most serious label in its four-step ranking, while 11 were tagged as "important," the next-lowest level, and two were judged "moderate."
Andrew Storms, director of security operations at nCircle Network Security Inc., suggested that users first patch the IE bugs.
iPhone 3G S users are still experiencing delays activating their new smartphones, but Apple apparently wants to make it up to users.
Apple began notifying affected customers via e-mail on Sunday that they may experience additional delays for another two days due to "system issues" and "high activation volumes," according to readers in various blogs who claim to have received the e-mail. The problems began immediately after the new iPhone's launch Friday.
As a way of apology for the delays, the same e-mail said Apple plans to offer customers a $30 credit iTunes Store credit for "the inconvenience this delay has caused."
Here's the entire text of the e-mail:
Dear Apple Customer,
Thank you for your recent Apple Store order. We appreciate your patience and apologize for the inconvenience caused by the delay in your iPhone activation.
We are still resolving the issue that was encountered while activating your iPhone with AT&T. Unfortunately, due to system issues and continued high activation volumes, this could take us up to an additional 48 hours to complete.
On Monday, you'll receive an email from Apple with an iTunes Store credit in the amount of $30. We hope you will enjoy this gift and accept our sincere apologies for the inconvenience this delay has caused.
Governments and companies should limit the snooping they do on web users.
So said Sir Tim Berners-Lee, inventor of the world wide web, who said that growing oversight of browsing could have a pernicious effect.
A greater part of the value of the web lay in the lack of constraints on what people could do with it.
He also warned that attempts to censor what people could say or what they could do online were ultimately doomed to failure.
"When you use the internet it is important that the medium should not be set up with constraints," he said.
The internet, said Sir Tim, should be like a blank piece of paper. Just as governments and companies cannot police what people write or draw on that sheet of paper so they should not be restricted from putting the web to their own uses.
"The canvas should be blank," he said
While governments do need some powers to police unacceptable uses of the web; limits should be placed on these powers, he said.
If people know that where they go online and the terms they look for are under scrutiny it could have all kinds of pernicious effects, he warned.
Repressive regimes, such as China and Iran, that work hard to limit what people can do online would struggle to maintain that control over time, he said.
It might seem a no-brainer when you’re asked about the meal of fishes. But, you would really feel excited to know the food habits of different species. Before going deep into the in-depth information, you should know about the types of fishes according to their food habit. if you want to know about What do Fish Eat Please go this site. hardenshoes.com/what-do-fish-eat
Ep, glad to see you come back and tidy up...did want to ask a one day favor, I want to enhance my resume , was hoping you could make me administrator for a day, if so, take me right off since I won't be here to do anything, and don't know the slightest about the board, but it would be nice putting "served administrator osnn", if can do, THANKS