The addiction goes down for maintenance. Clash of Clans reported that it had to interrupt the game play for maintenance as a result users won’t be able to attack and gain some quick loots. It’s anticipated to come back quick
Qualcomm,announced the appointment of Sunil Lalvani as vice president and president of Qualcomm India, and the departure of Avneesh Agrawal, senior vice president and president of Qualcomm India and South Asia.
Lalvani’s appointment is effective from July 27 and he will report directly to Cristiano Amon, executive vice president and co-president, Qualcomm Technologies, Inc.
Further, Lalvani has more than 20 years of experience in sales, business development, strategic planning and business operations across the IT and telecom sectors.
He joins Qualcomm from BlackBerry, where he served most recently as managing director of India and SAARC (South Asian Association for Regional Cooperation).
In this role, Lalvani was responsible for overseeing and driving BlackBerry’s overall business strategy and growth in India and was focused on driving differentiated solutions for consumers and enterprise customers.
Moving on, Lalvani was also instrumental in leading a strong engagement with Carrier partners and ISV’s in India, to drive uptake of BlackBerry’s services portfolio in the India region.
Prior to that, Lalvani held the position of Director of Enterprise Sales. Lalvani also has worked at EMC Corporation, Nokia Corporation, Cisco Systems and SITA Equant Network (now Orange Business Services).
Lalvani holds a bachelor’s degree in electronics engineering from Bombay University and a post graduate diploma in marketing management from Xavier’s Institute of Management, India.
“I am pleased to welcome Sunil Lalvani as vice president and president of Qualcomm India. His broad industry experience and extensive leadership experience will enable us to strengthen existing strategic relationships, identify new opportunities for business growth and build new relationships in India,” Amon said.
He added, “Under Avneesh’s leadership, Qualcomm led a number of successful efforts to nurture the local ecosystem in India, including accelerating 3G smartphone adoption and 4G LTE deployment, helping Indian brands build new revenue streams and establishing Qualcomm as the premier technology brand in India’s telecom and handset ecosystem. I’d like to thank Avneesh for all of his contributions to these successes.”
@DigitalTrends Reported :
First it was Taylor Swift calling out Apple for its policy over artist royalties; now it looks like Kim Kardashian could persuade Twitter to introduce a feature users have been wanting for a long, long time — if it wasn’t for these high-profile celebrities, it doesn’t seem like we’d get anything done.
Kim’s not happy that you still can’t edit existing tweets. Right now, if you make a typo or want to rephrase what you’ve said, you have to delete the original tweet and start again from scratch, which isn’t ideal. The interesting part of the story is Twitter CEO Jack Dorsey replied to Mrs. Kardashian West saying it was a “great idea.”
Don’t get too excited yet though: BuzzFeed asked Dorsey if an editing feature really was on the way, and he replied saying: “I want us to question everything to make it better.” So in other words it’s a feature that’s definitely maybe coming to your timeline soon — but don’t forget to thank Kim Kardashian if it happens.
It’s a wonder that Dorsey has any time to reply to tweets at all. He’s currently serving as Twitter’s interim CEO (a job he has held in the past) while the company looks for a new boss. He’s also busy running Square, the mobile payments service, and there are rumors the firm is about to follow Twitter and become a publicly listed company.
The first order of business for the next Twitter CEO will be to attract a new swathe of users who are more familiar with Facebook and Instagram without alienating the 302 million tweeters who already send out 500 million posts per day. We’re also hoping an edit function is on his or her agenda too.
Rumors first emerged of such an app back in May, though it was originally believed it would be called Flow.
It’s clear that Microsoft doesn’t want to cannibalize its main Outlook email app with this latest offering — the company said it’s looking to target those situations when you just need to send snappy messages to coworkers.
With Send, Microsoft is doing away with subject lines and signatures — it’s all geared towards short-form conversations. So rather than using this for sending notes from meetings, it’s more about imparting key facts or asking quick questions such as “I’m running 10 minutes late” or “Where is the meeting being held?”
And while it does kind of resemble text messaging, it’s linked in with a user’s Outlook account, tapping email addresses rather than mobile phone numbers.
Only messages sent through this app will be visible within Send — but in Outlook, all messages will be visible from across both services.
Besides the initial geographic and platform restrictions, the Send app will also only work for those with Office 365 business and school email accounts, though once Microsoft has garnered feedback it does plan to open things up “in the coming months.” It will also be launching for Android and Windows Phone.
Today’s launch comes less than three weeks after Microsoft launched Tossup, an app designed to help you create impromptu polls around events. Other Microsoft Garage projects include Snipp3t, which launched in August of last year, theNext Lock Screen app for Android, andJourneys & Notes.
Given that Send is a Microsoft Garage project, it may never actually become an official Microsoft product. But it does actually seem like quite a good idea for mobile-centric workplaces — and despite losing market share elsewhere in the consumer realm, Microsoft still holds significant mindshare in the enterprise.
16th July 2015, The most popular Photo Sharing App Instagram went down for an hour. There were cases where the signed in users were automatically signed out. Also users couldn’t log in nor create a new account. This occurred worldwide keeping many user accounts at stake. Instagram reported the issue on their official Twitter Account (@instagram). There haven’t been any reports as to why this error occurred. The company worked and bounced back within 60 minutes and expects no such issues in the future.
You’re using internet while flying. Are you secure? Is your data secure? Venture Beat reports that Airplane ✈ Wi-Fi aren’t safe.
Airline passengers seem painfully unaware of the risks in this hacker’s paradise. Routehappy, a service that ranks flight amenities, reported in January that passengers on U.S. airlines now have a 2/3 chance of getting in-flight Wi-Fi on all the miles they fly. According to the report, the prevalence of domestic in-flight Wi-Fi has grown 1,600-fold since July 2013, and the expansion is of course driven by demand from passengers. Honeywell’s 2014 In-Flight Connectivity Report found that 85 percent of passengers had accessed Wi-Fi on domestic flights, and in-flight Wi-Fi influences flight selection for 66 percent of flyers.
So as travelers sate their appetite for Internet, criminals cash in on their vulnerability. If you pay bills, write work emails, or shop online, a hacker with only modest skills has a chance of getting your data.
Victims make the first mistake when they initially connect to the Wi-Fi network. Windows machines ask if the network is a Home, Work, or Public connection. Users who choose Home are telling their computer that it can share files with everyone else using the Wi-Fi network. That is low hanging fruit for cybercriminals.
Even if you choose Public, hackers have a lot of other attack options. Commercially available hacking devices, like the WiFi Pineapple, are particularly dangerous on flights. The Pineapple pretends to be a home Wi-Fi gateway as it connects unsuspecting users to airline Wi-Fi. This allows the Pineapple hacker to snoop on browsing activity and access files on the computer. The Pineapple could operate in overhead storage, unbeknownst to passengers.
From a technical standpoint, in-flight Wi-Fi connections are not better or worse than public networks on the ground. Airlines shouldn’t necessarily be held to a higher standard. Yes, they could monitor Wi-Fi traffic and detect malicious behavior with products like Silver Tail or FireEye, but it would make in-flight Wi-Fi prohibitively expensive. We pay enough for tickets, baggage, and Wi-Fi as it is.
That said, airlines and passengers can both take steps to minimize the risks of cybercrime at 30,000 feet.
First, airlines need to configure in-flight routers to block peer-to-peer (P2P) traffic – and then change the darned password. When Wi-Fi routers permit traffic between passengers, they create a pathway for attacks even without devices like Pineapple. Often, when routers are set up, the technician turns off P2P traffic yet doesn’t bother to change the manufacturer’s default password. This makes it easy for a hacker to crack the router and reactivate P2P traffic.
Second, my advice to business travelers: If you plan to look at any work data during a flight (email, files, anything), use a VPN connection and file-based encryption. Properly configured VPN networks will funnel all traffic to a proxy server inside your company’s network, where you are much safer.
Now, a lot readers might think, “Oh, well of course the company encrypts our computers.” What you probably have is “full disc” encryption. This only protects data in cases where the laptop is lost or stolen, and it is turned off. It won’t encrypt anything when you’re using in-flight Wi-Fi.
In contrast, “file-based” encryption individually hardens each file before it leaves your computer or device. Thus, if someone did intercept the data, they’d still have to contend with the encryption, which is enough to stymie all but the most elite hackers.
For a leisure traveler hoping to read a blog post or watch YouTube clips on a flight, a personal VPN is probably overkill. Make sure you have a comprehensive and up-to-date malware protection program. Select Public when you designate the Wi-Fi network. Don’t pay any bills or access any sensitive data, and avoid entering any passwords.
Every public Wi-Fi network comes with risks, but in-flight Wi-Fi gives hackers time to try out multiple attacks. If you need to work at 30,000 feet above sea level, take measures to protect yourself and your company.
Dave Bennett is chief technology officer at IONU Security.
There are two kinds of phones which sport Google’s untouched stock UI on them, Nexus devices and Android One devices. I believe that most of you are more than familiar with Nexus devices, but considering Android One’s limited availability, some of you have probably never handled such a device. The Android One project launched in India last year, and has been rolled out in a number of countries after that. What is Android One? Well, it’s Google’s way to release really affordable devices with stock Android installed on them. Google initially partnered up with three India-based OEMs to release Android One handset, and since then, the sales numbers haven’t been all that impressive.
Despite the fact sales haven’t been going all that well, Google has confirmed recently that Android One program is here to stay, and they’ve also said that new devices will roll out soon. Well, it seems like that will happen on July 14, at least according to Economic Times. The upcoming handset will be manufactured by the Indian company Lava, and will cost around Rs. 12,000 ($190). The source also says that this handset will be powered by a MediaTek chip, and that it will feature a 5-inch display and 2GB of RAM on the inside. That’s not all though, the source also claims that this new Android One handset will be available for purchase in retail stores, not only via internet, while other Android One devices were available only online, which might have been one of the reasons why Android One sales haven’t exactly been booming thus far.
We still don’t know who did Google / Lava partnered up with as far as sales go, but it seems like they did a better job as far as availability goes this time around. It remains to be seen if Google intends to release more devices alongside this Lava-branded smartphone, or will other devices follow later in the year. Either way, stay tuned for more information, we’ll report back as soon as additional info becomes available. If you’re interested in this handset, mark July 14th on your calendars, and let’s see what Google and Lava have to offer to us.
Source: Economic Times
Via GSM Arena
Computer Science at MIT has always been one of the most admirable thing. The researchers are back with a bang and have found a way to repair the bugs automatically. The following article was published on News MIT :
At the Association for Computing Machinery’s Programming Language Design and Implementation conference this month, MIT researchers presented a new system that repairs dangerous software bugs by automatically importing functionality from other, more secure applications.
Remarkably, the system, dubbed CodePhage, doesn’t require access to the source code of the applications whose functionality it’s borrowing. Instead, it analyzes the applications’ execution and characterizes the types of security checks they perform. As a consequence, it can import checks from applications written in programming languages other than the one in which the program it’s repairing was written.
Once it’s imported code into a vulnerable application, CodePhage can provide a further layer of analysis that guarantees that the bug has been repaired.
“We have tons of source code available in open-source repositories, millions of projects, and a lot of these projects implement similar specifications,” says Stelios Sidiroglou-Douskos, a research scientist at MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL) who led the development of CodePhage. “Even though that might not be the core functionality of the program, they frequently have subcomponents that share functionality across a large number of projects.”
With CodePhage, he says, “over time, what you’d be doing is building this hybrid system that takes the best components from all these implementations.”
Sidiroglou-Douskos and his coauthors — MIT professor of computer science and engineering Martin Rinard, graduate student Fan Long, and Eric Lahtinen, a researcher in Rinard’s group — refer to the program CodePhage is repairing as the “recipient” and the program whose functionality it’s borrowing as the “donor.” To begin its analysis, CodePhage requires two sample inputs: one that causes the recipient to crash and one that doesn’t. A bug-locating program that the same group reported in March, dubbed DIODE, generates crash-inducing inputs automatically. But a user may simply have found that trying to open a particular file caused a crash.
Carrying the past
First, CodePhage feeds the “safe” input — the one that doesn’t induce crashes — to the donor. It then tracks the sequence of operations the donor executes and records them using a symbolic expression, a string of symbols that describes the logical constraints the operations impose.
At some point, for instance, the donor may check to see whether the size of the input is below some threshold. If it is, CodePhage will add a term to its growing symbolic expression that represents the condition of being below that threshold. It doesn’t record the actual size of the file — just the constraint imposed by the check.
Next, CodePhage feeds the donor the crash-inducing input. Again, it builds up a symbolic expression that represents the operations the donor performs. When the new symbolic expression diverges from the old one, however, CodePhage interrupts the process. The divergence represents a constraint that the safe input met and the crash-inducing input does not. As such, it could be a security check missing from the recipient.
CodePhage then analyzes the recipient to find locations at which the input meets most, but not quite all, of the constraints described by the new symbolic expression. The recipient may perform different operations in a different order than the donor does, and it may store data in different forms. But the symbolic expression describes the state of the data after it’s been processed, not the processing itself.
At each of the locations it identifies, CodePhage can dispense with most of the constraints described by the symbolic expression — the constraints that the recipient, too, imposes. Starting with the first location, it translates the few constraints that remain into the language of the recipient and inserts them into the source code. Then it runs the recipient again, using the crash-inducing input.
If the program holds up, the new code has solved the problem. If it doesn’t, CodePhage moves on to the next candidate location in the recipient. If the program is still crashing, even after CodePhage has tried repairs at all the candidate locations, it returns to the donor program and continues building up its symbolic expression, until it arrives at another point of divergence.
The researchers tested CodePhage on seven common open-source programs in which DIODE had found bugs, importing repairs from between two and four donors for each. In all instances, CodePhage was able to patch up the vulnerable code, and it generally took between two and 10 minutes per repair.
As the researchers explain, in modern commercial software, security checks can take up 80 percent of the code — or even more. One of their hopes is that future versions of CodePhage could drastically reduce the time that software developers spend on grunt work, by automating those checks’ insertion.
“The longer-term vision is that you never have to write a piece of code that somebody else has written before,” Rinard says. “The system finds that piece of code and automatically puts it together with whatever pieces of code you need to make your program work.”
“The technique of borrowing code from another program that has similar functionality, and being able to take a program that essentially is broken and fix it in that manner, is a pretty cool result,” says Emery Berger, a professor of computer science at the University of Massachusetts at Amherst. “To be honest, I was surprised that it worked at all.”
“The donor program was not written by the same people,” Berger explains. “They have different coding standards; they name variables differently; they use all kinds of different variables; the variables could be local; or they could be higher up in the stack. And CodePhage is able to identify these connections and say, ‘These variables correlate to these variables.’ Speaking in terms of organ donation, it transforms that code to make it a perfect graft, as if it had been written that way in the beginning. The fact that it works as well as it does is surprising — and cool.”
Microsoft India chairman Bhaskar Pramanik has shared that by the end of 2015, Microsoft will open their three hyper scale data centers in India. Although not yet confirmed, but speculations are rife that these three locations would be Pune, Mumbai and Chennai.
Microsoft will invest $22.7million in creating state of the art, advanced cloud based data centers.
Bhaskar said, “If the government has to address 1.2 billion citizens then it needs hyper-scale data centres at an affordable cost, with technology and flexibility.”
Is Microsoft Eyeing Major Government Contracts?
Earlier this year, we had reported thatMaharashtra Govt. will store all citizens’ record on Microsoft’s Azure Cloud platform. But considering the risk involved in storing sensitive data on a server which is located out of India, there are much security concern raised over this development.
It seems that Microsoft is now considering lapping up other such large scale Govt. contracts as well, and the best way to answer security concerns is by having a local data center. Once this comes up, then Microsoft would be the leader in this segment, as no other MNC have announced their plans to open data centers in India.
As of now, Microsoft’s Cloud business in India is growing at a breakneck speed of 105% year on year, and establishing a full fledged cloud based data center will push their growth story even further.
This is clear from Bhaskar’s statement as he said, “In a sense, we will be the market maker and get the Indian clients to move more to the cloud at a faster pace”
Earning Customer’s Trust
As per reports, Microsoft has already started private preview of their data center services, as they have rolled out their cloud based data center services to 100 customers from various verticals such as manufacturing, banking, finance and start-ups.
As per Bhaskar, these customers will receive this service for three months, after which they will formally launch the services nation-wide.
High level talks are already on with senior Government officials for contracting major projects concerning cloud storage and data mining. Domestic data center is certainly the best way to earn trust of both the customers and Government.
In a blog post released Wednesday, Google noted, “In order to scale up by the next order of magnitude, Broad and Google will work together to explore how to build new tools and find new insights to propel biomedical research, using deep bioinformatics expertise, powerful analytics, and massive computing infrastructure. Collaboration between the world’s premier genomics and biomedical research center and the most advanced computing infrastructure can help develop a new generation of tools and services that will enable scientists — from large academic institutions, commercial organizations, or small research labs in remote corners of the world — to uncover a wealth of biological insight.”
Google Genomics was begun two years ago “to help the life science community organize the world’s genomic information and make it accessible and useful,” and now, as the program forms new partnerships, it is breaking new ground and discovering new potential applications. And as growing amounts of data is gathered, the cloud is becoming more and more necessary as a storage unit for the veritable treasure trove of knowledge produced by researchers across the world.
“Large-scale genomic information is accelerating scientific progress in cancer, diabetes, psychiatric disorders, and many other diseases,” noted Eric Lander, president and director of Broad Institute in a statement. “Storing, analyzing, and managing these data is becoming a critical challenge for biomedical researchers.” Luckily, with this new collaboration with the Google Cloud Platform, storing and processing large amounts of data will no longer be as daunting a task.
“Through our collaboration with Broad Institute and our work with the Global Alliance for Genomics and Health and the life science community, we believe we can make a difference in improving human health,” the Google blog post reads. “By making it easier for researchers to ask big questions and find answers amid complexity, we hope to unleash scientific creativity that could significantly improve our understanding of health and disease.”