Diberdayakan oleh Blogger.
Tampilkan postingan dengan label Aren’t. Tampilkan semua postingan
Tampilkan postingan dengan label Aren’t. Tampilkan semua postingan

Kamis, 01 Mei 2014

Samsung’s apps aren’t appreciated by application samsung galaxy s

samsung galaxy s4 vs galaxy s3 s3 touchwiz aa
Samsung’s Galaxy branded devices might run Android, but it’s no secret that the company has worked hard to differentiate its software experience from the competition by adding its own custom touches. Beyond just providing a unique ‘look and feel’ through TouchWiz, Samsung has went so far as to create its own ecosystem of apps that often rival services offered by Google and by popular 3rd party app developers.
Although some of Samsung’s apps are well-appreciated by Galaxy fans, others feel that Samsung’s continued push towards bundled apps adds up to nothing more than a bloated smartphone experience — especially since many of these included apps can’t be deleted without root access.
it’s no secret that the company has worked hard to differentiate its software experience from the competition by adding its own custom touches
The big question is whether or not the average user actually utilizes the bundled apps that Samsung includes. With this in mind, research firm Strategy Analytics recently conducted a study that tracked more than 250 U.S.-based users of the Galaxy S3 and Galaxy S4 to get a better feel for what apps Samsung owners use the most. Although 250 users isn’t a large number, it’s enough for the research firm to form a rough picture.
BN-CL894_samapp_ER_20140422031118
The results? Strategy Analytics noted that some of the most popular apps among these users included Facebook, Instragram, Youtube and Twitter. Facebook commanded roughly 664 minutes of monthly use, 151 minutes for Instagram, 146.7 minutes for Youtube and 47.4 minutes for Twitter. To likely no one’s surprise, Google Play and Google Search were also high up on the list.
As for Samsung’s apps? ChatOn only commanded six seconds of use per month on average, and apps like Hub, Link, S Memo and S Voice didn’t fare much better. Other apps like S Health weren’t even specifically mentioned, though were apparently included in the broader “Samsung apps” category found within the chart above.
If Strategy Anayltics study is correct, it makes it rather clear that, despite Samsung’s best attempts, Samsung’s ecosystem takes a backseat position to Google’s own apps and to popular 3rd party apps and services found on Google Play.
What’s your own take? Based on your own experience, do you find Samsung’s included apps to be welcome additions that further enhance your Android experience? Vote in the poll and tell us what you think in the comments below.

Don’t forget to leave your feedback under and observe us on Twitter or grow to be our Facebook fan for all the most recent updates!



Writted by: totor

Senin, 21 April 2014

Your Clever Password Tricks Aren't Protecting You from Today's Hackers

Your Clever Password Tricks Aren't Protecting You from Today's Hackers

Security breaches happen so often nowadays, you're probably sick of hearing about them and all the ways you should beef up your accounts. Even if you think you've heard it all already, though, today's password-cracking tools are more advanced and cut through the clever password tricks many of us use. Here's what's changed and what you should do about it.

Blast from the past is a weekly feature at Lifehacker in which we revive old, but still relevant, posts for your reading and hacking pleasure. This week, in the wake of the Heartbleed bug, we though it was time to revive this post and dispel some myths that are still very common.

Background: Passwords Are Easier To Crack Than Ever

Our passwords are much less secure than they were just a few years ago, thanks to faster hardware and new techniques used by password crackers. Ars Technica explains that inexpensive graphics processors enable password-cracking programs to try billions of password combinations in a second; what would have taken years to crack now may take only months or maybe days.

Making matters much worse is hackers know a lot more about our passwords than they used to. All the recent password leaks have helped hackers identify the patterns we use when creating passwords, so hackers can now use rules and algorithms to crack passwords more quickly than they could through simple common-word attacks.

Take the password "Sup3rThinkers"—a password which would pass most password strength tests because of its 13-character length and use of mixed case and a number. Web site How Secure Is My Password? estimates it would take a desktop computer about a million years to crack, with a 4 billion calculations-per-second estimate. It would take a hacker just a couple of months now, Ars says:

Passwords such as "mustacheehcatsum" (that's "mustache" spelled forward and then backward) may give the appearance of strong security, but they're easily cracked by isolating their patterns, then writing rules that augment the words contained in the [2009 hack of online games service] RockYou [...]and similar lists. For [security penetration tester] Redman to crack "Sup3rThinkers", he employed rules that directed his software to try not just "super" but also "Super", "sup3r", "Sup3r", "super!!!" and similar modifications. It then tried each of those words in combination with "thinkers", "Thinkers", "think3rs", and "Think3rs".

In other words, hackers are totally on to us!

What You Can Do: Strengthen Your Passwords By Making Them Unique and Completely Unpredictable

We've suggested plenty of strong password tips over the years, but in light of the faster and newer cracking capabilities, these are worth reviewing.

1. Avoid Predictable Password Formulas

The biggest problem is we're all padding our passwords the same way (partly because most companies limit your password length and require certain types of characters). When required to use mix of upper- and lower-case letters, numbers, and symbols, most of us:

  • Use a name, place, or common word as the seed, e.g., "fido" (Women tend to use personal names and men tend to use hobbies)
  • Capitalize the first letter: "Fido"
  • Add a number, most likely 1 or 2, at the end: "Fido1"
  • Add one of the most common symbols (~, !, @, #, $, %, &, ?) at the end: "Fido1!"

Not only are these patterns obvious to professional password guessers, even substituting vowels for numbers ("F1d01!") or appending another word ("G00dF1d01!") wouldn't help much, since hackers are using the patterns against us and appending words from the master crack lists together.

Other clever obfuscation techniques, such as shifting keys to the left or right or using other keyboard patterns are also now sniffed out by hacking tools. As one commenter wrote in the Ars Technica article, hackers use keyword walk generators to emulate millions of keyboard patterns.

The solution: Don't do what everyone else is doing. Avoid the patterns above and remember the basics: don't use a single dictionary word, names, or dates in your password; use a mix of character types (including spaces); and make your passwords as long as possible. If you have a template for how you create memorable passwords, it's only secure if no one else is using that rule. (Check out IT security pro Mark Burnett's collection of the top 10,000 most common passwords, which he says represents 99.8% of all user passwords from leaked databases, or this list of 500 most common passwords in one page.)

2. Use a Unique Password for Each Site

We'll get back to password creation in a minute, but first: this is the most important security strategy of all. Use a different password for each site. This limits the damage that can be done if/when there's a security breach.

If you use the same password for everything, and someone gets a hold of your Facebook password, they have your password for every site you visit. If you have a different password for every site, they only have access to your Facebook account—so at least all your other accounts are protected.

4. Use Truly Random Passwords

You've probably heard that a random, four-word passphrase is more secure and more memorable than complicated but shorter passwords, as web comic xkcd pointed last year. This is true, but often irrelevant, because like we said: you need to use a different password for every account. If you can remember 100 different four-word passwords, be my guest. But for most of us, it doesn't matter how easy your passwords are to remember—there's just too many of them. (Though the passphrase approach might be good for, say, your computer login or the few cases you need to remember your password.)

Using a variation on the same password for each site isn't a good idea, either. Say you have a password like ro7CSfac2V3p1 for Facebook, and you use the variation ro7CSlif2V3p1 for Lifehacker, and so on for all your other sites. If a hacker gains access to one of those passwords, they can easily guess the others by replacing "fac" with the letters that might match other sites (or figuring out whatever your algorithm is). It's more difficult, but far from impossible, and it isn't secure enough to rely on—if you can remember it, someone else can probably figure it out.

So: The most secure option is to use a password generator and manager. If you want to keep your accounts safe, you need to use a truly random, long, and complex password, and use a completely different one for each account. How do you accomplish this? Use a password manager like LastPass, KeePass, or 1Password. Not only will they save all your passwords for you, but they can generate random passwords for you. It's easier to use and set up than you may think.

For more information, I highly, highly recommend you read our guide on how to audit and update your passwords with LastPass for detailed instructions. Remember, the only secure password is the one you can't remember—and this is the only way to achieve that. Those clever password tricks we used to use just don't cut it anymore.

Lastly, make sure you turn on two-factor authentication for all sites that support it! It is, by far, one of the best ways to secure your accounts against hackers—even if they get your password, they won't be able to get access.

RelatedRelatedRelatedRelated


View the Original article

These Aren’t The Patent Trolls You’re Looking For

Editor’s note: Leonid (“Lenny”) Kravets is an IP attorney focusing on corporate development and strategy at InterDigital Communications, which develops technology for mobile devices, networks, and services. Lenny is a member of InterDigital’s Innovation Partners team, helping to create market value through external sourcing and incubation of technologies complementary to InterDigital’s internal innovation.

Over the past few years, the debate over so-called “patent trolls” has risen to a fever pitch. Businesses of all sizes have complained about the “horrible” effects of patent trolls. Legal scholars are performing studies to determine their impact. Every branch of the federal government has become involved in attempts to limit their efficacy: President Obama has issued Executive Orders on the issue; several patent reform bills are being debated in Congress; and the Supreme Court will hear a record number of patent cases in the 2014 term. All this, but no one has yet defined what a patent troll is.

Defining a patent troll

For the most part, the focus has been on the entity enforcing a patent in trying to determine who is and who is not a patent troll, but such definitions simply do not work. Some argue that patent trolls are synonymous with non-practicing entities (“NPEs”), companies that own or license, and sometimes enforce, patents even though they don’t actively manufacture products. This definition would include entities that perform what most of us would consider valuable activities, such as companies and universities who conduct research and development, but do not commercialize their own products.

Whether an entity is practicing a patented invention should not have any bearing in determining whether it is a “patent troll.”

Some have gone so far as to call companies such as IBM and Apple patent trolls simply because they have sometimes chosen to enforce patents that cover technologies that they are not currently practicing. These companies only seek a fair return on their research and development investment. It is precisely the return on investment provided by patents that allows these entities to invest the significant resources required for long-term research and development in a variety of areas.

Whether an entity is practicing a patented invention should not have any bearing in determining whether it is a “patent troll.” As we know, it has become incredibly cheap to start a company based on any idea. Setting up a small business that practices an invention is an insignificant expense compared to the costs of patent enforcement.

How would we require an asserting entity to prove they are an operating company? Would it be enough to have office space? Employees? Customers? Revenue? Regardless of the standard, requiring patents to be asserted only by practicing entities (or entities practicing the invention) would be an insignificant burden for any well-funded asserting entity.

Still others define patent trolls in terms of where their patents come from. Enforce your own patents? Great, go right ahead! Enforce patents you acquired? Patent troll! But the mere fact that the patent being enforced has been acquired from another entity should have no bearing on whether an entity is a “patent troll,” or whether they should be allowed to enforce.

Enforcing patents

Patents, at their core, are property rights, much like homes and cars. Companies maximize efficiency by outsourcing needs that fall outside the scope of their core competencies to third parties. Sometimes, it makes sense to outsource tasks such as technology development and enforcement to third parties. In the case of technology development, the transferability of patent rights is important to the research and development process because it allows companies to share technology in a well-defined and protected manner.

Labeling someone a patent troll immediately makes them appear to be un-innovative, a nuisance or, worse, a drain on the economy.

In the case of enforcement, often the only way to address wrongful conduct is by transferring the patent to an entity with the funding and experience to take on the wrongdoer. Simply transferring the asset to another interested party should not preclude or limit this type of justified enforcement. Furthermore, the transferability of patents helps reduce the risk to banks and investors in investing in certain classes of companies because when a business fails, patents are often the only valuable asset that remains.

A small minority seems to think that any kind of patent assertion is undesirable, and therefore that anyone who asserts a patent is automatically a patent troll. Infringers have been quick to take advantage of this strategic opportunity.

Regardless of the merits of a case, labeling someone a patent troll immediately makes them appear to be un-innovative, a nuisance or, worse, a drain on the economy. The label leads to the so-called patent troll receiving significant negative attention in the press and the public, which can be a disadvantage in front of a jury. It is akin to calling someone a “bully” just because they pushed someone, without knowing anything more about the situation. The result is that anyone daring to assert a patent, no matter how legitimate, risks being labeled a patent troll.

Determining abuse

Instead of worrying about who is asserting a patent, we should focus on whether the asserting entity is abusing the patent system. Analyzing the conduct of an entity rather than just looking at its identity is necessarily more complex. However, such an analysis allows us to focus on eliminating the objectionable activities that we perceive as being detrimental. I propose that there be two main types of objectionable conduct: the enforcement of low quality patents, and the enforcement of patents without a reasonable basis for assertion.

First, assertion of low-quality patents (patents that likely should not have been allowed by the Patent Office in the first place), regardless of the entity doing the enforcing, should be eliminated. Such enforcement results in wasting time and resources by the opposing party in determining the merits of the case. Often, such patents are asserted in the hope of receiving nuisance settlements for less than the cost of litigation.

Instead of worrying about who is asserting a patent, we should focus on whether the asserting entity is abusing the patent system.

While these types of cases are generally only a nuisance to large companies that can quickly determine the merits of such a case, they can be a significant disruption to smaller companies that do not have the same resources. In addition, low-quality patents are generally readily available on the market (often at a low price) because they draw less acquisition attention from large companies and defensive patent aggregators. This allows abusive entities to readily and cheaply acquire and enforce these low-quality patents.

Long term, the best way to deal with the problem of low-quality assets is by improving patent quality. Improving patent quality will require investment on both the part of the USPTO and the patent-filing community at large. Unfortunately, the focus on improving patent quality seems to have been lost in all of the debate regarding patent trolls, as witnessed by the fact that none of the bills at various stages of debate in Congress even mention patent quality.

Second, any enforcement of a patent right (regardless of the quality of the patent) should require some reasonable investigation of whether a defendant is actually practicing the patented invention. The added burden and cost of an investigation will prevent the enforcement of patents against parties that do not have any relationship to the patented technology.

Under the current law, little-to-no investigation is necessary to launch a patent litigation. As a result, some entities have filed frivolous lawsuits in order to attempt to settle for nuisance amounts. Furthermore, this low bar for filing a patent lawsuit has allowed some patent owners to indiscriminately send demand letters to hundreds of recipients, without any investigation of the potential infringement, or any explanation how the patent applies to the recipient.

Demand letters notify the recipient of the sender’s patent rights and request that the recipient take a license to the patent or face a lawsuit. The recipients of such demand letters are typically unsophisticated in patent matters, and the receipt of such a letter can cause a significant disruption. The indiscriminate sending of such letters is not meant to enforce any legitimate patent rights, but only to fund the war chest of the sending entity, and to establish favorable royalty rates for the patent owner.

Requiring a pre-filing investigation of infringement, and raising the available sanctions for parties bringing frivolous patent cases (judges already have the discretion to apply sanctions under the so-called Rule 11, though they rarely exercise it) will help to eliminate this type of conduct, because parties will be more loathe to indiscriminately send demand letters if their access to courts for enforcement is limited.

Focusing on eliminating the enforcement of low-quality patents, and requiring some amount of investigation into infringement before enforcing a patent, will go a long way toward addressing the problem of abusive patent enforcement. Of course, there are many other proposals that attempt to deal with this problem, but such proposals often focus on the wrong issues, such as the identity of the enforcer and the recipient. Any type of entity can enforce a legitimate patent right, and similarly, any type of entity can abuse patent rights. Therefore, proposals that do not focus on the patent being enforced are unlikely to be effective in dealing with the actual problem of abusive patent enforcement.