Apple Inc has paid US$60 million to Proview Technology (Shenzhen)
(深圳唯冠) to end a dispute over the iPad trademark in China that saw the
world’s most valuable technology company engaged in a protracted legal
tussle with a near-bankrupt Chinese firm.The lawsuit had hampered
some sales and delayed the launch of the new iPad in China. Prior to
the launch, Proview requested Chinese authorities in scores of Chinese
cities to order resellers to take all iPads off their shelves.The
court-mediated settlement, announced on the Web site of the Higher
People’s Court of Guangdong Province, will allow Apple to get on with
selling its popular tablet PC in one of its most important markets,
analysts said.“The settlement is great news for Apple. It just
allows them to get on with business and stop being distracted. The new
iPad has been so late to the China market that if they drag it any
longer, Apple will stand to lose quite a bit more,” said Wong Teck Zhung
(黃德俊), a Beijing-based analyst with technology research firm IDC.Apple
and Proview Technology (Shenzhen), a unit of Hong Kong-listed Proview
International Holdings Ltd (唯冠國際), have been negotiating to reach a
settlement since the court conducted an initial hearing in February,
after Apple appealed a lower court ruling against it.Apple had
said it bought ownership of the iPad trademark in various countries from
Proview, once a global monitor maker, but the Chinese company argued
the US firm dealt with only one unit of Proview.A Chinese court
ruled that Proview Technology (Shenzhen) owned the name in China.
Proview, which registered the iPad trademark in China in 2001, tried in
May to sue Apple in the US, but that case was thrown out. An Apple
spokeswoman declined to comment yesterday.The iPad dominates China’s tablet PC market with a market share of
more than 70 percent, though Lenovo Group Ltd’s (聯想) Lepads and Samsung
Electronics Co’s Galaxy Tabs have been gaining traction.Apple is
experiencing heady growth in Greater China — China, Hong Kong and Taiwan
— with second-quarter sales in the region increasing several-fold to
US$7.9 billion. From the launch of the iPad in the third quarter of 2010
to March this year, Apple shipped more than 6 million iPads to mainland
China, according to IDC.For Proview — which local media had said
was seeking as much as 10 billion yuan (US$1.57 billion) from Apple —
and its creditors, the settlement should be welcomed, some lawyers said.The
US$60 million will be paid into a court-designated account and used to
pay Proview’s creditors, a source familiar with the situation said.In
March, Taiwan’s Fubon Insurance Co (富邦產物保險), one of several Proview
creditors and a unit of Fubon Financial Holding Co (富邦金控), applied for
bankruptcy proceedings against Proview because of US$8.68 million in
outstanding debt.
What A Technology!!!!!!!!!!!
Thursday 12 July 2012
Sunday 1 July 2012
Top 10 Android Apps that are affecting Human mind in 2012!!!!!!
Hope you like to download these must have Android apps for your Android device. These applications are the top rated apps on Android market official website.
1- Androidify:
This is one of the best applications for modify an existing avatar or creating your own avatar, you can also cartoon your self with this must have Android app.
2- Calorific:
This is a stunning medical app for your Android device, it inform you
about calories level in your food, this app also equipped with Atkins diet plan.
3- Camera360:
Cameru360 is the best choice for photography lovers; you can use various filters and stunning effects on your pictures.
4- Color Blindness Test:
This is a fun app, which give you various tests to check your
eyesight power. I bet this fun app will fully entertain you in your free
time.
5- Double Twist Player:
Double Twist Player is a 3D stylish design music
player. This player is much better than the built in Android player
because it plays almost every audio and video format, you can also
update this player for new video codec.
6- Epicurious:
This is your new English tutor; this app is rich in various definitions of single words.
7- Episodes:
This is a miraculous application that gives you the freedom of
watching recorded episodes or watch live streaming of your favorite
reality show. You can also enjoy various foreign reality shows, without
paying any thing.
8- FlightBoard:
Are you a regular traveler? Then you must need this amazing
application because it containing a database of over 4000 international
airports, 1400 airlines and their route maps. You can also track flights
in real time and optimized GUI for tablets.
9- GasBuddy:
This application currently gives the information about the price of
gasoline in the United States and Canada only. So if you are living in
America o Canada than you must download this excellent application.
10- Glympse:
This application is integrated with Google maps, but gives you a more simple and easy navigation about your exact location.
INFORMATION TECHNOLOGY AND TERRORISM
Outdoor MAARS 350 |
Our societies have become totally dependent on information technology. As a consequence, attacks upon computer systems, both public and private, have become the norm: cyber criminals conduct fraudulent transactions and steal personal data and trade secrets; crackers (criminal hackers) break into computer systems, disrupt service, sabotage data, launch viruses and worms, and harass individuals and companies. Many of these attacks are serious and produce severe economic loss and damage. They are facilitated by increasingly powerful and user-friendly software tools, mostly available for free from thousands of websites on the Internet.
1.TERRORISTS USING INFORMATION TECHNOLOGY
Terrorist groups currently use computer technology to facilitate traditional forms of subversive activity. Quite simply, they are exploiting modern tools to perform common terrorist actions such as internal communication and co-ordination, propaganda and misinformation, recruitment and financing, information and intelligence gathering. The use of the Internet for propaganda purposes is particularly popular. Radical opposition groups such as Hezbollah and Zapatistas use it regularly to communicate their revolutionary programmes. Various neo-nazi and white supremacist groups in the United States also use the World Wide Web to recruit supporters and collect finance.
2.INFORMATION TECHNOLOGY AS A WEAPONS OR TARGET
Terrorist groups have used computer technology to threaten or attack national infrastructures, including national security infrastructures, and commercial firms. These attacks have reportedly generated actual damage only in the form of temporary disruption of services, public inconveniences, or financial loss. So far, no attack has led to violence, either physical or psychological, against civilians, or to major disruption. Probably the first politically motivated cyberattack was conducted by ethnic Tamil guerrillas, who in 1998 swamped Sri Lankan embassies with hundreds of e-mails over a two-week time. The attacks upon NATO computer systems during the Kosovo campaign in 1999 (see Ehlers’ report) could also be defined as cyberterrorism, although they were presumably conducted not by terrorists but by individual hackers protesting against the Alliance’s bombings.
3.COUNTERING CYBERTERRORISM
The threat posed by cyberattacks has been generally recognised by governments and international organisations. Several NATO nations have adopted protective measures for their critical infrastructures relying on information technology and specific laws of varying effectiveness dealing with computer-related crimes and cyberattacks.
The Clinton Administration has also proposed several initiatives, not all implemented because of financing problems or opposition in Congress, to defend the nation’s computer systems, such as:
· increasing federal R&D investments in computer security;
· designing a Federal Intrusion Detection Network (FIDNET) to protect vital systems in federal civilian agencies;
· establishing an Institute for Information Infrastructure Protection that will combine federal and private efforts to fill the gaps in critical research;
· establishing a Federal Cyber Service Training and Education initiative, which will fund scholarships to students who develop new programmes in computer security and agree to work in this field for the government for at least two years.
1.TERRORISTS USING INFORMATION TECHNOLOGY
Terrorist groups currently use computer technology to facilitate traditional forms of subversive activity. Quite simply, they are exploiting modern tools to perform common terrorist actions such as internal communication and co-ordination, propaganda and misinformation, recruitment and financing, information and intelligence gathering. The use of the Internet for propaganda purposes is particularly popular. Radical opposition groups such as Hezbollah and Zapatistas use it regularly to communicate their revolutionary programmes. Various neo-nazi and white supremacist groups in the United States also use the World Wide Web to recruit supporters and collect finance.
2.INFORMATION TECHNOLOGY AS A WEAPONS OR TARGET
Terrorist groups have used computer technology to threaten or attack national infrastructures, including national security infrastructures, and commercial firms. These attacks have reportedly generated actual damage only in the form of temporary disruption of services, public inconveniences, or financial loss. So far, no attack has led to violence, either physical or psychological, against civilians, or to major disruption. Probably the first politically motivated cyberattack was conducted by ethnic Tamil guerrillas, who in 1998 swamped Sri Lankan embassies with hundreds of e-mails over a two-week time. The attacks upon NATO computer systems during the Kosovo campaign in 1999 (see Ehlers’ report) could also be defined as cyberterrorism, although they were presumably conducted not by terrorists but by individual hackers protesting against the Alliance’s bombings.
3.COUNTERING CYBERTERRORISM
The threat posed by cyberattacks has been generally recognised by governments and international organisations. Several NATO nations have adopted protective measures for their critical infrastructures relying on information technology and specific laws of varying effectiveness dealing with computer-related crimes and cyberattacks.
The Clinton Administration has also proposed several initiatives, not all implemented because of financing problems or opposition in Congress, to defend the nation’s computer systems, such as:
· increasing federal R&D investments in computer security;
· designing a Federal Intrusion Detection Network (FIDNET) to protect vital systems in federal civilian agencies;
· establishing an Institute for Information Infrastructure Protection that will combine federal and private efforts to fill the gaps in critical research;
· establishing a Federal Cyber Service Training and Education initiative, which will fund scholarships to students who develop new programmes in computer security and agree to work in this field for the government for at least two years.
Google Glass coming to consumers in 2014
Google co-founder Sergey Brin would like Google Glass to be available "in a broad consumer offering" in 2014, he told Bloomberg.
The company introduced
"Project Glass" as it was known, in April. The augmented
reality-enhanced glasses let you record video, check your calendar, get
weather updates and see messages from your friends. At least those are
the features outlined in a video Google released at the time.Google had been coy about a release date for the product, though. On
Wednesday, Brin, speaking at Google's IO developers conference in San
Francisco, reintroduced Google Glass as it's now known with a splashy video showing skydivers using the technology.Regarding availability, he also announced that pairs of Explorer
Edition Google Glass will be available next year to developers for
$1,500 each.In the video above, Brin doesn't get into what kind of price point
Google Glass might carry in 2014. He does, however, state that Glass has
been a big priority for him, taking up half his time or more of late.What do you think? Are you looking forward to buying one of these in
2014? What's the most you'd pay? Let us know in the comments.
Google voice search Vs Apple's Siri
With Android 4.1 Jelly Bean, Google is taking a shot at iPhone digital assistant Siri.The next-generation Android OS, announced this week at Google I/O,
offers the ability to search for and find information about anything you
can imagine by simply asking.
Using the power of Google,
the company has incorporated its Knowledge Graph into searches, making
its answers more informative than Apple’s digital assistant in some
cases. In other cases, the Android-based voice search not so hot.
Google Nexus 7 tablet
The Nexus 7, imagined by Google and built by Asus, was leaked just
hours before Google I/O kicked off, with specs, pictures and even a
video making the rounds. The big deal was obviously the price. With
Amazon’s Kindle Fire beating all other major Android OEMs on price, the
Asus-manufactured Nexus 7 was announced at a launch price of USD 199.
Given that it’s a Google/Asus product, it will likely make its way
around the world, unlike the Kindle Fire.
Touted as the first 7-inch tablet with a quad-core processor, the
Nexus 7 is running an Nvidia Tegra 3 under its hood, supported by a
GeForce GPU. Google showed off the tablet’s portability as both an
e-reader and a media device. Available in two variants, 8 GB and 16 GB,
the tablet’s biggest expected drawback (at least for the
WiFi-hotspot-lacking countries of the world) will be either the absence
of 3G connectivity or the lack of external storage support. This will
also be the first product to ship with Jelly Bean.
Subscribe to:
Posts (Atom)