Why Choose Dual SIM Mobile Phones?

Posted by John Onwuegbu | Wednesday, April 23, 2014 |

Dual SIM smartphones have been at the peak of popularity for the past few years and still the frenzy of the users about double SIM phones is ever growing. Dual SIM mobile phones offer the greatest advantages of getting the best tariffs of the leading mobile carriers as well as staying connected with two different phone numbers.

What are the major benefits of opting for mobile phones with double SIM (2 cards) solution except of course, cost advantage?

The comfort of using one handset instead of using two phones for every card is one aspect. As well as time effective solution as you need to take care only of one handset (charging, servicing, and installing additional apps). Dual SIM mobile phones give you a chance to store more contact information on two SIM cards which will be of great use for users keeping all contact information of their friends in phone contact list (for example: the popular smartphone Lenovo S920).

Moreover, double SIM handsets are the best solution for travelers who often visit areas of poor connectivity, as chances are rather low that both mobile carriers will have poor coverage in the region, thus you will still be connected with your dual SIM phone as one of the cards may still be available.

However opting for a double SIM mobile phone you should keep in mind some disadvantages such as: Low battery life - dual SIM smartphones commonly bite into battery life severely. So you should take care of a timely phone charging to keep in touch.

There is the idea that double SIM phones are poorly equipped and feature fewer options than single SIM mobile handsets. However experience has proven that every user can find an optimum dual SIM solution meeting all needs and fancies.

Read More>>

Special Report: Adapting Security to the Cloud

Posted by John Onwuegbu | Monday, April 21, 2014 |

Cloud Computing has come to stay in modern IT architectures, and adoption of cloud technology can potentially change an organization's security requirements and how organizations can adapt their IT and security infrastructure to address these challenges.

Quite a number of trends are pushing organizations to look beyond traditional approaches to IT and consider adopting cloud technology.

And these trends have clearly defined that organizations of all sizes can no longer keep their IT architectures strictly within the four walls of their data center. While most organizations are more likely to feel confident adopting and reaping the benefits of the latest cloud technologies, by developing a roadmap for their IT and security infrastructure.

Download the free whitepaper on "Adapting Security to the Cloud", to learn how adoption of cloud technology can potentially change your organization's security requirement.

Read More>>

Google pushes +Post ads to all Advertisers

Posted by John Onwuegbu | Thursday, April 17, 2014 |

Google first introduced +Post ads to limited number of advertisers as a new way to amplify content and create conversations across the web. +Post ads differs from the conventional "social ads", instead of streaming ads within Google+, Google will run it across the web, including news portals, blogs or other webpages, allowing brands to reach a larger audience.

It let brands take a piece of their public Google+ content, like a photo or video, and turn it into an engagement ad that runs across the Google Display Network.

The conventional "social ads" as implemented on sites like Twitter and Facebook, usually tagged "sponsored" content, sandwiched between posts from friends are what users have become accustomed.

Now, users will soon start to see new ads that look like posts from Google+, but outside of the social network.

+Post ads have been made available to all advertisers who meet a minimum of 1,000 Google+ followers.

The +Post ads is kicking off with two new features - promoted Hangouts on Air and automatic post promotion - to help brands create compelling ad experiences and make it easier to extend the reach of their social content.

Read More>>

Heartbleed Bug: What You need to Know?

Posted by John Onwuegbu | Friday, April 11, 2014 |

Heartbleed Bug is a vulnerability in the popular OpenSSL cryptographic software library underpinning major sections of the Web, which potentially exposes data supposedly encrypted from various sites. It allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet.

Robin Seggelmann, the coder, admitted that he "missed the necessary validation by an oversight."

The code in question was originally intended to enable a function called Heartbeat in OpenSSL's Transport Layer Security, which exchanges a packet of random data between your computer and a server to confirm they're connected.

Hackers, thereby can manipulate their computer to lie about how much data is in the original packet, allowing the server to give out the packet with data pulled from its memory before sending it back.

The Fixed OpenSSL has been released for Service providers and users to install the fix as it becomes available for the operating systems, networked appliances and software.

Read More>>

Microsoft finally Opens up WinJS as Open-source Software

Posted by John Onwuegbu | Thursday, April 03, 2014 |

Microsoft has been strongly trailing the path of openness on the web, lately. And for no obscure reason, than the repeated success stories of the likes of Google with Android, proving beyond doubt that open platform has its great benefits.

And today, Microsoft took a rather foreseen step in opening up the source code of the Windows Library for JavaScript (WinJS) under the Apache 2.0 license as an Open Source project by MS Open Technologies, according to Windows blog.

WinJS is a JavaScript library that was first created for Windows 8 to enable first class, native-quality experiences in Windows Runtime apps using familiar web technologies like HTML, CSS, and JavaScript.

WinJS becoming cross-platform means that web developers can now take advantage of high-quality controls and infrastructure to expand their reach beyond Windows to the web and non-Windows devices. Extending WinJS to other browsers and devices beyond Windows further extends their reach and allows them to bring the personality of Windows apps to the web without rewriting code or learning new skills.

The new WinJS is now live, give it a try by going to the Try WinJS site in your favorite browser, view and edit code, and check out the results.

Read More>>

Special Report: History of Cryptography

Posted by John Onwuegbu | Tuesday, April 01, 2014 |

Internet as an insecure channel for exchanging information with a high risk of intrusion or fraud, such as phishing, is no longer the predominant notion with the present encryption revolutions. Encryption is the process of encoding messages or information in such a way that only authorized parties can read it, which invariably reduces the likelihood that an intruder will be able to read the data.

This special report presents a brief history of cryptography and how encryption-related technologies have evolved and will continue to evolve as well as the measures Internet users should consider when implementing modern encryption.

The development of cryptography, paralleled by the development of cryptanalysis (breaking of codes and ciphers) and the discovery and application of frequency analysis to the reading of encrypted communications represent a changing point in history.

Download the free whitepaper for an easy to understand history of cryptography, and the different methods that have been used to protect the transfer of data.

Read More>>

Twitter adds new Mobile Photo-sharing features

Posted by John Onwuegbu | Thursday, March 27, 2014 |

Twitter has announced new mobile features which includes: photo tagging, which lets you tag the people in your photo; the other is the ability to include up to four photos in a Tweet. And also share a series of photos that automatically create a collage.

Additionally, both photo-tagging and Tweets with multiple photos will display in Embedded Tweets.

The ability to upload multiple photos started to roll out yesterday on iPhone, and is coming soon to Android and twitter.com. Meanwhile, Twitter users have been availed control on who can tag them in a new section in the security and privacy settings.

Albeit, Twitter's social networking model was not built around photos, it has gone ahead to adapt to what users wanted. Whether you’re on iPhone, Android or twitter.com, you can now view Tweets with multiple photos.

Read More>>