Thursday 14 April 2011

Would Mark Zuckerberg lose 50% of Facebook?

'Once The World Is Yours, Everyone Wants A Piece'. Last year, Paul Ceglia, a New York businessman filed a lawsuit claiming that Mark Zuckerberg, the founder of Facebook, had signed a contract in 2003 that awarded Paul Ceglia $1,000 and a 50-percent stake in the fledgeling social network. In return, Ceglia said that he worked as a designer and developer on Zuckerberg's site, while Zuckerberg worked as a coder for Ceglia's StreetFax.com. Many have wondered why Paul Ceglia had waited 7 years to come forward. In addition, Ceglia had been arrested in 2009 and charged with criminal fraud.

This year, he has refiled his case and has brought forward more than a dozen emails allegedly written by Zuckerberg in 2003 and 2004. The bottom is the lawsuit:

1)In September 2003, Zuckerberg emails Ceglia about the "Harvard site," sharing his thinking about a potential revenue model. He also notes that the "facebook.com" and "pagebook.com" domains are unavailable.


2)Ceglia responds quickly, with his own thoughts about the business model and name. He also proposes that they keep the site free and sell coffee mugs and t-shirts, etc. In November, the lawsuit says, Ceglia provided Zuckerberg with another $1,000.


3)And now it gets interesting... Enter, the Winklevoss Twins--"upperclassmen that are planning to launch a site very similar to ours." Mark says he has "stalled them." And he asks for another $1,000.

4)For the rest of the year, Ceglia and Zuckerberg continue to discuss the Face Book and the Winklevoss twins. Then Zuckerberg asks for more money and a waiver on the January 1 completion date.

5)Ceglia pushes back. And Mark says he'll get the site online as quickly as he can.

6)On January 5th, Ceglia emails Mark saying where is the site and threatening to call Mark's parents. Mark says that's uncalled for.

 

7)On February 2, 2004, Zuckerberg emails Ceglia saying he thinks the "1% per day" of additional interest accruing to Ceglia for the delay is unfair (and possibly illegal). Zuckerberg asks for a 50/50 split.


8)The next day, Ceglia writes back, agreeing to the 50/50. He also again suggests they sell mugs and t-shirts and so forth on the site.

 

 

9)On February 4, 2004, Mark Zuckerberg launches "thefacebook.com". Mark emails Paul Ceglia and invites him to take a look.

10)Ceglia responds the same day, excited. He starts talking about expanding to other schools and cities.

11)Then, two days later, in a stinging email that appears to mark a sharp change in the relationship, Mark Zuckerberg tells Paul Ceglia that he's not going to sell "college junk" on the site. He also says that Ceglia hasn't paid him money he is owed for all the extra work he did.

12)The next day, Ceglia responds angrily. Then he again proposes ways to get some advertising on the site.

13)Two months later, Zuckerberg writes Ceglia an email telling him he's thinking of shutting down the Facebook site, because he's too busy to work on it and there's little interest in it among students. (This is while Facebook is growing like crazy). Ceglia gets really pissed off, and starts accusing Zuckerberg of pulling "criminal stunts".

 

14)The lawsuit then explains what Ceglia was referring to. It also explains how well thefacebook.com was doing.

15)Three months later, on July 22, from California, Zuckerberg writes to Ceglia, offering to pay him back the $2,000 Ceglia gave him. Zuckerberg mentions that he is "out in California working." He doesn't mention that he's working on an exploding new company called Facebook. And he wants to be relieved "of the obligation of having to answer to you"

16)The lawsuit says Zuckerberg did not send Ceglia the $2,000. A week later, Zuckerberg incorporated Facebook, Inc.

 

17)Ceglia says he never got any money from Zuckerberg, nor relinquished his ownership in the "face book" partnership.

The Amended lawsuit has been filed to the Federal Court. Again, Facebook says all these emails are "FAKE"

If these emails are real, Pail Ceglia stands to earn a huge payout from Facebook.





Source: Businessinsider.com & Huffington Post

RAM is volatile or non-volatile memory? & What is the difference between volatile and non volatile memory?

In general, we know there are two types of memory in our computer- Hard Disk and Random Access Memory(RAM). In our daily conversation, we always refer the RAM as memory and Hard disk as Hard disk.

Theoretically, our computers indeed has two types of memory but there are classified as Volatile and Nonvolatile. When a computer's power is turned off, volatile memory loses its contents. As for Nonvolatile memory, by contrast, does not lose its content when the power is removed from the computer, for instance when the computer is turned off or in case of a power failure or other loses of electricity to the computer.

Another word, volatile memory is temporary whereas Nonvolatile memory is permanent.

Based on the explanation above, could you differentiate now whether RAM is volatile or nonvolatile? And let me ask you one more question, Hard Disk is volatile or nonvolatile? Check out the answer at the bottom of the post. Thank you.


Random Access Memory(RAM)
Hard Disk



















ANSWER
Random Access Memory(RAM)- Volatile Memory
Hard Disk - Nonvolatile Memory



HTC's New Smartphone

HTC has announced its new smartphone- HTC Sensation (previously rumored as HTC Pyramid). Bottom displays the specification of the model:

Facebook's Top 5 Privacy Settings You Need To Know

1) Public Search Visibility
Do you want people to be able to locate and view a preview of your Facebook profile when they search for your name on a search engine? If not, it's crucial you disable your visibility on Public Search. As Facebook explains, "Public search controls whether things you've specifically chosen to share with everyone show up in searches on and off Facebook. It also controls whether people who enter your name in a search engine will see a preview of your Facebook profile."
To access: Click Account-->Privacy Settings--> Applications and Websites --> Public Search 

2) Facebook's Recommendations For 'Sharing On Facebook'

In an effort to simplify its privacy controls, Facebook has redesigned its "Sharing on Facebook" page to give users the option of tweaking their privacy settings with just a few clicks. What users are sharing, and with whom, is presented in a straightforward table, and with just a single click, you can limit your visibility to Friends only, Friends of Friends, or Everyone.

Facebook has also provided a "Recommended" setting--but you shouldn't assume that because it's recommended, it's what you want. The "Recommended" setting is still rather open, and shares a considerable amount of information about you with "Everyone," including your status updates, photos, and posts; your bio information and education; and any family or relationship status you've listed.

To access: Click Account --> Privacy Settings

3)Opt In Or Out Of Instant Personalization

Many protested Facebook's "Instant Personalization" feature when it first launched, and now Facebook is providing users with a way to disable it. As Mashable explains, Instant Personalization allows "websites like Pandora and Docs.com access some of your personal information and use it to instantly personalize your experience. Pandora, for example, will recommend streaming music stations built around artists you’ve Liked on Facebook in the past."

If you'd rather not have your information used by different sites to customize your experience, you can turn it off. Keep in mind, however, it is on by default, so you'll have to opt out of the feature. If you try to uncheck the Instant Personalization button, Facebook will remind you that it offers a "richer, more connected experience." Certainly, the information you're sharing with the feature is, by and large, harmless, but if it makes you uncomfortable, you can easily turn it off (or back on, later!).

To access: Click Account-->Privacy Settings--> Applications and Websites --> Instant Personalization 

4) What Friends Can Share About You

Here's one aspect of sharing on Facebook not everyone takes into account: You can share information about yourself, but your friends can also share information about you on the site. Facebook has renamed the privacy control "What your friends can share about you" and now refers to it as "Info accessible through your friends." Make sure you're comfortable with "what information is available to applications and websites when your friends use them."

To access: Click Account-->Privacy Settings--> Applications and Websites --> Info accessible through your friends

5) Control What's Always Visible To Everyone

There's certain "Directory Information" (like your name, profile picture, networks, and gender) that Facebook makes available to anyone searching for you on Facebook. However, you have the option to "significantly reduced the amount of information that is always visible to everyone," as Facebook explains. For example, you can restrict who can see your interests and pages, or who can view your education/employment information.

To access: Click Account --> Privacy Settings --> Basic Directory Information

Source: Huffington Post

Wednesday 13 April 2011

Why Screen Savers are developed?

I believe everyone knows what is a screen saver. Theoretically, screen saver is a utility that causes a monitor's screen to display a moving image or blank screen if no keyboard or mouse activity occurs for a specified time. Then when you press on the keyboard or move the mouse, the screen saver will disappear and the screen returns to the previous state. 

However, have you ever thought of the reason screen saver is developed? Let's go straight to the answer. Screen savers originally were developed to prevent a problem called ghosting, in which images could be permanently etched on a monitor screen's (CRT monitor). Although ghosting is not a severe problem with today's Flat Panel Monitors but manufacturers continue to recommend that users install screen savers for this reason.

Furthermore, Screen Savers also are popular for security, business, and entertainment purposes. In order to secure a computer, a user can configure his/her screen saver to request for a password to deactivate it.

What is the difference between Hibernate, Stand-By and Turn off?

In general, we know that there are several shut down options exist, for instance, Hibernate, Restart, Hibernate and Stand-by. The question is do you know exactly the difference between each of them? Have you ever wonder what is the difference between Hibernate and Stand-by in your laptop?

In short, the Turn Off command removes power from the computer, whereas Hibernate saves all documents in the memory and then turns off the computer. As for Stand-By, it places the entire computer in a low-power state but does not turn it off. Another word, with Hibernate and Stand-by, the next time you resume work on the computer, the computer is restored to exactly like how you left it!

As for Restart command, it is a warm boot. Booting is a process of starting or restarting a computer. There are two types of booting- warm boot and cold boot. Cold boot is when you turn on a computer than has been powered off completely whereas warm boot is the process of restarting a computer that already is powered on.

Goggle +1

Google recently began rolling out an experimental social feature, called +1, which encourages users to search more socially.
If a user opts-in to this new feature, she can then click on the +1 next to search results that she finds most relevant and that could aid others in search. For now, Google says that a user's +1 recommendations will only be visible to contacts from other Google-based products, such as Gmail and Picasa, and Buzz. In the future Google will perhaps include contacts from other social networks like Twitter and Flickr.
What does this mean for you?
First, this search tool is totally optional. Only users who have a Google profile have the option of using +1. Those who already have a Google profile can visit the Google Labs and turn on this feature to begin integrating their personal preferences into their Google searches. When your contacts search for terms you've searched, they'll see your name and Google profile photo next to search results that you've already +1'd. You can view and manage your +1s from your Google Profile.
These +1s affect how Google ranks search results. A +1 recommendation will boost a link higher up the results list, that way pages that are popular with several +1 users will find their way to more +1 users. "If links were like votes originally, then likes are also votes -- but more trusted ones, especially when they are heavily used within someone's specific social network (friends don't generally spam friends)," writes Search Engine Land.
Users can also click +1 for Google advertisements and, eventually, may even see a +1 button alongside Facebook's "Like" button on non-Google websites. Google claims that your personal information won't be shared with third-party sites "unless you specifically consented to share your information with that site." Google advertisers will have access to some of your information, in order to send more relevant ads your way.
Business Insider has created a step-by-step process for blocking your +1 information from advertisers and turning off +1 on non-Google sites.

Source: Huffington Post

Samsung Galaxy Tab 2011 NEW PRICE

Discount Duration : Fri, 8 Apr 2011 - Tue, 31 May 2011

Company : Samsung
Promotion : From games to news, you can download your favourites from a range of over 80.000 apps. All apps run on the latest Android 2.2 operating system.
Products Offered :
  • Wi-fi . RM1.199

  • Wi-fi + 3G . RM 1.599

  • From Everyday.com

    Open Source

           Most of the software that we purchased or downloaded is comes in the compiled ready to run version. Compile means that the actual program code that the developer created, known as the source code, has run through a special program called a compiler that translates the source code into a form that the computer can understands. It is extremely difficult to modify the compiled version of most applications and nearly impossible to see exactly how the developer created different parts of the program. Most commercial software manufacturers see this as an advantage that keeps other companies from copying their code and using it in a competing product. It also gives them control over the quality and features found in a particular product.
           Open source software is at the opposite end of the spectrum. The source code is included with the compiled version and modification or customization is actually encouraged. The software developers who support the open source concept believe that by allowing anyone who's interested to modify the source code, the application will be more useful and error free over the long term.
          To be considered as open source software by the software development industry, certain
    criteria must be met:
    • The program must be freely distributed (It can be part of a package that is sold
    though, such as Red Hat has done with Linux in the example below).
    • Source code must be included.
    • Anyone must be allowed to modify the source code.
    • Modified versions can be redistributed.
    • The license must not require the exclusion of other software or interfere with the
    operation of other software.
           Let's take a look at a real world example of open source software. In 1991, Linus Torvalds, a student at the University of Helsinki in Finland, developed a new operating system based on Minix, a derivative of Unix, which he dubbed Linux. Torvalds released version 0.02 of Linux under the GNU General Public License, which provides a good legal definition of open source software. A lot of people around the world downloaded Linux and began working with it. Many of these users were programmers in their own right and made modifications to the source code that Torvalds had included. Over the next three years, Torvalds received these modified versions from the other programmers and incorporated many of the
    changes into the baseline version and released Linux version 1.0 in 1994.
           A common concern for end-users who wish to use open source software is the lack of a warranty and technical support. Because the software's license encourages modification and customization, it is nearly impossible to support. This is why Red Hat Software, founded in 1994, created the "Official Red Hat Linux" and is able to sell this normally "free" software. The main value that Red Hat adds to the package is a warranty and technical support. For most businesses, the assurance of technical support has been a key factor in the decision to buy Linux instead of simply downloading it for free. In addition to Red Hat, there are several
    other companies that have packaged Linux, usually with additional software, for resale.
           Besides Linux, Mozilla (Netscape browser core), Apache (Web server), PERL (Web scripting language) and PNG (graphics file format) are all examples of very popular software that is based on open source.

    iPhone 5's Release Date

    According to Business Insider, Avian Securities released a note to investors stating that a key component supplier for the iPhone will begin manufacturing the next gen iPhone in September, leading them to predict the phone itself won't hit stores till late 2011 or even more likely, early 2012.
    The note also stated that the firm believes a lower price, lower spec iPhone may be put into production, though this is unconfirmed.
    Read the full note below:
    Supporting out comments over the last month, conversations with yet another key component supplier indicates that production for iPhone-5 will begin in September. This is consistent with Avian findings in the supply chain in recent months and we believe the consensus view is moving towards this scenario. In addition, our conversations also indicate the existence of a lower-spec/lower-priced iPhone in Apple's roadmap. However, while our contacts have seen the placeholder in the Apple roadmap, they do not yet have insight into specs or production timing. This leads us to believe that any launch is likely a very late 2011 or more likely a 2012 event. As a reminder, Avian has uncovered several data-points in recent months pointing to the existence of a lower-spec/lower-price iPhone. A lower-spec/lower-price iPhone has also been speculated in the press and gadget blogs, though we do not believe consensus currently discounts the existence of such a model.
    Source: Huffington Post

    Nokia X7 (Nokia's latest smartphone)

    The following is the specifications of the latest model of Nokia's smartphone, Nokia X7-00:

    Nokia X7-00

    Nokia's New Smartphones

    Nokia E6 & X7
    On Tuesday Nokia launched its first smartphones to run on the updated Symbian software (Symbian Anna) with new icons, enhancements and a faster browser. 
    The two models: the E6 and X7, have a longer battery life, better text input and new Ovi Maps applications with improved search and public transport routes.
    Nokia E6
    The Nokia E6, with a standard QWERTY keypad and high resolution touch display, is aimed at corporate customers, while the Nokia X7 is an entertainment-focused handset with a 4-inch (10-centimeter) display made for games.
    The world's largest cellphone maker did not price the handsets.
    Markets seemed unimpressed by the announcement, which comes as Nokia continues to struggle against stiff competition, especially from Apple Inc. and Research in Motion Ltd(RIM).
    More than 200 million phones, with 150 million more expected on the market, use Symbian technology, seen by some developers as clumsy and dated. At the end of last year, it was surpassed by Android as the world's No. 1 smart phone software.
    Nokia said the new, faster Symbian software, known as Symbian Anna, will be available for previously released top models, including the N8, E7, C7 and C6-01 devices "in coming months."
    Nokia X7-00
    In February, Nokia and Microsoft surprised the industry by announcing they were joining forces to challenge major rivals. Nokia said it will use Microsoft Corp.'s Windows Phone software as the main platform for its smartphones but will continue to develop and use the new Symbian software.
    But they have a tough battle ahead.
    The iPhone has set the standard for today's smartphones and Research In Motion Ltd.'s BlackBerrys have become the favorite of the corporate set. More recently, Google Inc.'s Android software has emerged as the choice for phone makers that want to challenge the iPhone.
    A key challenge will be to produce quality devices with a hip factor that helps position Windows Phone as an attractive alternative in a market where image plays a central role.
    Windows Phone 7, launched last year, has a lot of catching up to do both in the number of users and "apps" available for the phones.
    Nokia, which claims 1.3 billion daily users of its devices, said it hopes the partnership with Microsoft will lead to capturing the next billion users to join the Internet in developing growth markets.
    Last year, the Finnish firm retained its No.1 spot as the world's top mobile phone maker – a position it has held since 1998, selling 432 million devices – more than its three closest rivals combined. But market share has continued on a downward spiral – from a high of 41 percent in 2008 to 31 percent in the last quarter of 2010.
    Also, its share in smartphones has plunged – to 30 percent at the end of 2010 from 40 percent a year earlier. And, at the end of last year Nokia and the Symbian platform was surpassed by Android as the world's No. 1 smartphone software, according to Canalys research firm.
    Nokia, an Espoo-based company, near Helsinki, employs 132,500 people.

    Tuesday 12 April 2011

    Use Your Phone to Make Payment

    Did you know that you cell phone will soon replace your wallet? Nokia has announced that it will include Near Field Communication (NFC) chips in all its 2011's smartphones which could be used to make mobile payments. This action also has forced Apple to hire NFC experts and people believe that NFC chips will be included in the next generation of iPhone and iPad. Below displays a brief history of money from the Past to Present and to the Near Future of using mobile phones to make payments:


    Cell Phone will Replace your Wallet

    How To Stay Computer Virus Free




    While a lot of internet threats are rather over-hyped, there are some serious things to be cautious of when going online. Probably the biggest risk to the average internet user is malicious software. Commonly knows as "malware," this term refers to any program that exists solely to do harm. This may include damaging your computer or accessing your data without you knowing. Viruses, trojans, and spyware are all forms of malware. Now, malware can seriously mess up your system, and the idea of somebody having access to your personal info is understandably scary. Here are a few common sense tips you should always follow to help keep your computer clean.
    • Install anti-virus software. But not too much! A common mistake that people make is in thinking that having more than one anti-virus program will keep their computer twice as safe. On the contrary, this can cause both programs to stop performing correctly. Pick one solid program that you like. You'll also need to set up an automated scan. Folks who rely solely on manual scans run the risk of letting viruses slide by. The average computer user should schedule a scan for at least once a week. If your anti-virus software has real-time protection, that's even better.
    • Don't click on any pop-up ads. Pop-ups are notorious for installing sneaky things. Some sites have gotten really clever, designing pop-up ads that look like normal computer error messages. Think before you click. Read the error message carefully. If there are spelling mistakes, or if the error message is framed within a browser window, close it immediately.
    • Don't open email attachments from people you don't know. If you see a file name that ends in ".exe", delete it immediately. An .exe file is a program file. Even if you don't see a program file, look for clues that point towards the sender being less than trustworthy. If the text of an email seems overly generic and you don't recognize the sender, there could be trouble. When in doubt, reply and ask the sender to identify his-or-herself before downloading anything. Here's an example of an email that should raise warning flags:
    •  Be wary about downloading programs from sites you don't recognize. Now, that said, there's a lot of really great independent and user-made software out there. But before you click that "Download" link, do a little research. Internet users love to talk about their recent downloads, so if somebody else has had problems, a quick Google search should turn up their comments in no time. It's also a good idea to see if the program you want can be found through a reputable download source.

    What's the difference between Laptop and Netbook?

    In this modern world, the number of people who own a portable computer has been increasing and I believe many of us have actually come across the terms laptop and netbook but have you ever wonder what is the difference between that two terms?

    Laptop (somtimes also known as notebook) is a computer that has been designed to be made portable and comes with touchpad, optical drive and featuring a screen hinged to the keyboard. Generally the screen size of a laptop is about 13" and above. The most common laptops are come with 14inches and 15inches, based on individual's preference but of course there are 17" laptops as well and these laptops weigh more than 1.8kg in general.

    As for a netbook, it is also designed to be made portable and also comes with touchpad but without a optical drive which means you could not insert a CD/DVD and play with a netbook unless you have a external optical drive. In general the size of a netbook is only about 9inch to 13inch. The most common netbook would be the Dell Mini 10v which is come in 10inches. In term of weight, a netbook weigh about 1.3kg and above but in general a netbook is lighter than a laptop.

    Basically the above is just the physical characteristics between the two terms. As for the aspect of performance and the tasks that could be performed by them please refer to the table below:

    Monday 11 April 2011

    Iphone 5

    5 Rumors about Iphone 5

    1) A later launch date. As far as I am concerned, Apple used to launch its i-phone products around the mid of June every year and last year Apple actually launched its iPhone 4 at Apple's annual Worldwide Developers Conference(WWDC) event. However, recently Apple hinted that this year's conference would focus on software. Hence, the release date for the Iphone 5 is rumored to be around August or September this year. 

    2)Near Field Communication(NFC). Will the iPhone 5 be equipped with Near Field Communication technology that allows users to make payments through their iPhones? Nokia has announced that it will include the NFC chips in all its smartphones and I perceived that this announcement has effectively forced Apple to follow. Furthermore, Apple has hired its own NFC experts therefore many believe that NFC-enabled iPhones & iPads are in the progress. It is just a matter of time that smartphones will replace wallet.

    3) A redesigned Antenna. It is no surprise that Apple will definitely improve its antenna as its antenna issue in the iPhone 4 has caused many iPhone users reported losing signal strength when they held their phones in a certain way. Apple might move the antenna behind the Apple logo in order to alleviate the problem.

    4)An Aluminum Back. Due to the complains about the iPhone 4's glass covering becoming scratched or cracked the iPhone 5 might be featured with an aluminum back.
    5)A Faster Processor. It is not exactly a shocker that Apple will introduce the A5 chip for the upcoming iPhone as Apple has introduced the A5 chip for its iPad 2.

    Firefox 4 vs Internet Explorer 9 vs Google Chrome 10:

    If you are to compare Firefox 4, Internet Explorer 9 and Google Chrome 10, are u able to differentiate and determine which is the fastest web browser? 

    Recently, CNET's Seth Rosenblatt has run through a series of tests for each of the web browsers mentioned above to determine their assess boot time, memory usage, and performance of both JavaScript and HTML5. (*During these tests, all browser extensions and add-ons were disabled.) The booting speed was measured by clicking the browser's icon and timing how long each took to fully load six websites: talkingpointsmemo.com, aol.com, youtube.com, nytimes.com, giantbomb.com and cnettv.cnet.com. Firefox took home the gold, opening in 17.8 seconds. IE9 was second with 21.86 seconds, and Chrome was third with a boot time of 26.22 seconds.
    Rosenblatt then loaded the same six websites and examined each browser's memory usage. Again, Firefox 4 was the champ, utilizing the least amount of memory (148,020 kb) during the test. IE9 followed with 205,616 kb used. Chrome required the most memory (390,532 kb) to complete this task.
    "Though the competition is extremely close in some cases--especially JavaScript rendering--Firefox 4 is strongly favored by HTML5 processing, boot time, and memory usage," Rosenblatt concluded. "Overall, I'd judge from these results that Firefox 4 is the winner this time around."
    In terms of safety, Chrome and Firefox seem to be the browsers of choice. The two were both unchallenged at this year's PWN2OWN hacking competition, according to Computer World. All three aim to protect the user's identity through secure browsing and anti-tracking options. 
    Internet Explorer has traditionally been ranked the most popular browser. Last week, downloads of the Firefox 4 Release Candidate outstripped downloads for the IE9 RC. Mozilla reported that Firefox 4 was downloaded over 5million times within its first 24 hours, while Microsoft reported only 2.35 million downloads within the same time frame. Although download figures don't always represent usage figures, Firefox 4 may pose a serious threat to IE9.
    In a nutshell, the champion is:










    Source: Huffington Post