This Blog is intended to serve the need of the Infocom Society of the world and particularly of Indonesia. Latest information on the development of ICT worldwide, including from Indonesia will be made available in this MASTEL 2020 Blog.
Thursday, June 24, 2010
Verizon offers Droid X to counter iPhone 4
Wednesday, June 23, 2010
Fedora 13 New Enhancements
Since its first version, in 2003, Red Hat's Fedora Linux has been the best place to track what's on the leading edge of Linux and open-source software. Of course, the trouble with running on the leading edge is that it's easy to get cut, and the Fedora distribution's fast development pace has required a certain amount of bug-squashing tolerance from its users.
Fedora 13, which began shipping in late May, boasts many of the leading-edge enhancements—and few of the rough spots—that I've come to expect from the popular Linux-based operating system. In particular, I appreciated the work the Fedora team has done in the area of security and permissions, with progress toward more granular rights management through Fedora's PolicyKit framework, and an implementation of the SELinux (Security-Enhanced Linux) framework that remained, for the most part, tucked away unobtrusively in the background.
In addition to serving as a sort of first look at the latest and greatest in Linux and open-source software in general—and future Red Hat Enterprise Linux (RHEL) releases in particular—Fedora 13 can serve in a full gamut of Linux roles, as long as Fedora-embracing users are prepared to upgrade their systems about once a year.
For this reason, smoother edges notwithstanding, enterprises in search of a more long-lived Linux distribution for production roles would do best to turn to RHEL, or, for organizations prepared to provide their own support, the freely available RHEL clone CentOS.
The fast-moving nature of Fedora 13 fits best with desktop and developer workstation roles, where users are most likely to appreciate the up-to-date versions of the desktop-oriented open-source software that ships with the distribution, including Version 2.30 of the GNOME desktop environment, Version 3.2 of the OpenOffice.org productivity suite and Version 3.6.3 of the Firefox Web browser.
Resource Library: |
|
Fedora 13 is available as a free download from http://fedoraproject.org/get-fedora, with separate versions that support the x86 and x86-64 platforms. Beginning with Fedora 13, the Power PC CPU architecture has been reduced to secondary architecture status, where its ongoing development will depend on volunteer efforts.
Fedora 13 in the Lab
I tested the x86-64 version of Fedora 13 on a Lenovo ThinkPad T60 and on virtual machines running under Fedora 13's implementation of the Linux KVM (Kernel-based Virtual Machine) virtualization host.
The x86 and x86-64 versions are available as DVD or CD images that comprise the entire distribution, as well as in Live CD and Live USB images that may be used to try out Fedora without modifying your hard drive. With the Live USB images, it's possible to save data from the live sessions on USB sticks, which makes them more convenient to use than the CD images.
Fedora 13 ships with a new, optional user management utility, called AccountsDialog, which will eventually replace Red Hat's system-config-users tool. The new tool puts a graphical face on some of the work that Red Hat has been doing to whittle away at the all-powerful superuser account in favor of more granularly parcelled permissions. For instance, where the existing utility runs as the root user from the get-go, the new tool launches without requiring administrator rights and asks for rights elevation as needed.
Red Hat has been moving in this direction over its past few releases, removing the requirement for administrative applications to run entirely with superuser rights, and tapping the PolicyKit framework to handle the permission-granting. What caught my eye in the new user tool is the option to configure users as Standard, Administrator or Supervised, with the unfamiliar-looking Supervised bucket as the default.
While the primary user account I'd created remained in the Supervised bucket, applications that supported the PolicyKit framework would ask for my system's root password when they required rights elevation. When I shifted my account to the Administrator class, the system asked instead for my account password. This change in permissions management sets the stage to give certain administrative rights to certain users, thereby allowing for finer-grained control over the system.
The move toward embracing PolicyKit within Fedora is still going on, and many tools still require root permissions. I used a command line utility, pkexec, to elevate my permissions to run some of these applications, but this tool does not work with graphical applications. For more information on the changes involving the user management tool and PolicyKit, see this mailing list thread: tinyurl.com/23d8xxq.
Elsewhere in the release, I was pleased to find that Red Hat's handy network management framework, cleverly known as NetworkManager, has picked up a command line interface to go along with the graphical tools to which it's been limited so far. The new utility, called cnetworkmanager, should be a welcome sight for those who work with headless Fedora servers and would like to use the same network configuration tool they've become accustomed to on GUI-based systems.
Another cool Fedora 13 feature that caught my eye was BFO, a Fedora take on the BKO (boot.kernel.org) project that enables administrators to boot a machine from a very small disc image and run or install Fedora from the network. I installed one of my test VMs using a svelte 626KB BFO image and found the process more streamlined than with previous Fedora network installation attempts. I recommend editing the boot command from the GRUB (Grand Unified Bootloader) screen to point to a nearby mirror of Fedora. I typically opt for the kernel.org mirror here in San Francisco.
I mentioned at the top of this review that my tests using Fedora 13 were nearly free of SELinux issues: The mandatory access control framework, which comes enabled on Fedora, typically gives me some trouble during tests. This time around, all was smooth until I hit Bug 566332 while connecting to my BlackBerry 8330 phone via Bluetooth. On the bright side, this snag gave me the opportunity to see Fedora's new SELinux trobuleshooter panel icon, which is modeled after an automobile's check engine light. (source: Jason Brooks - eweeks.com)
Tuesday, June 22, 2010
Kindle and Nook eBook Device Price cut as a result of iPad Success
(source: David Clark - telecomasia.net)
Monday, June 21, 2010
Aircel India considers TD-LTE for 2.3GHz Band
Aircel considers TD-LTE for 2.3GHz
Tuesday, March 9, 2010
Nokia provides Skype App via Ovi Store
Nokia is the latest company to promote the availability of Skype voice over IP services, announcing on its blog March 3 that the application can now be downloaded free from its Ovi Store and is compatible with the latest version of Symbian.
The application enables users to make free Skype-to-Skype calls, receive calls to an existing Skype number, send and receive instant messages, as well as files, and to see when other Skype users are online. Nokia said it will work over WiFi or a mobile data connection.

“Making Skype available direct to consumers will help millions of users to keep in contact with the people that are important to them without worrying about the cost, distance, or whether they are away from a computer,” Shaw continued.
On Feb. 17, Verizon Wireless announced that in March it would make a Skype app available to customers with data plans and handsets running the BlackBerry or Android operating systems. Verizon additionally announced that the VOIP service would be allowed to run over its 3G network, in addition to WiFi.
A Skype app for the Apple iPhone is also in the works and can be expected, Skype announced on its site in earle February, “soon.”
The iPhone app, which would also have the option of running on AT&T’s 3G network, is so far delayed, Skype said, until it can get it just right — offering “CD-quality sound,” as well as tools such as a call-quality indicator, to offer feedback and allow users know exactly what’s going on with their calls.
Nokia believes that the Skype offering will drive new traffic to the Ovi Store, which it launched in May as its answer to the Apple App Store. Called a “smart store,” Ovi learns users’ preferences as they shop, and can show them inventory based on their location — or even what their friends bought.
“We’re seeing around 1.5 million downloads a day through Ovi Store now and believe that the Skype client for Nokia smartphones increases the amount of downloads further,” said Jo Harlow, Nokia’s SVP for smartphones.
The Skype application is currently available on handsets including the Nokia N97 and Nokia 6210 Navigator. A complete list of compatible models is available at the Nokia blog.
On March 2, Nokia introduced the C5, a smartphone on a feature phone budget, and new naming guidelines, to help us mere mortals translate the letter and number combinations in its devices’ names. Going forward, it will offer Cseries, Xseries, Eseries and Nseries handsets, each with a number between one and nine, with nine denoting the most advanced capabilities.
Wednesday, February 24, 2010
Google Gears will be replaced by HTML5 Application
Google Gears is the search giant's innovative technology for enabling offline applications. However, toward the end of 2009, Google announced that it was lessening its focus on Gears in lieu of support for HTML5, which provides Gears' offline capability and a lot more.
In a Feb. 19 blog post entitled "Hello HTML5," Ian Fette of the Google Gears team, said:
"If you've wondered why there haven't been many Gears releases or posts on the Gears blog lately, it's because we've shifted our effort towards bringing all of the Gears capabilities into Web standards like HTML5. We're not there yet, but we are getting closer. In January we shipped a new version of Google Chrome that natively supports a Database API similar to the Gears database API, workers (both local and shared, equivalent to workers and cross-origin workers in Gears), and also new APIs like Local Storage and Web Sockets. Other facets of Gears, such as the LocalServer API and Geolocation, are also represented by similar APIs in new standards and will be included in Google Chrome shortly."
Resource Library:
Obviously the move is not trivial, particularly with a specification that is still evolving, such as HTML5. Indeed, added Fette: "We realize there is not yet a simple, comprehensive way to take your Gears-enabled application and move it (and your entire userbase) over to a standards-based approach. We will continue to support Gears until such a migration is more feasible, but this support will be necessarily constrained in scope."
In an interview with eWEEK, Dylan Schiemann, CEO of SitePen and a vocal advocate for the open Web, said, "I believe that with projects like Chrome Frame, and HTML5 native support in Firefox, Safari and Opera, Gears served its purpose in moving the open web forward. Gears was an important experiment on new ideas for making browsers better for things that were not possible in JS, at a time when browser vendors were afraid to implement features that had not yet been standardized."
Meanwhile, Fette explains Google's moves in pulling back additional support for Gears, while specifying what will be supported.
"We will not be investing resources in active development of new features," Fette said in his post. "Likewise, there are some platforms that would require a significant engineering effort to support due to large architectural changes. Specifically, we cannot support Gears in Safari on OS X Snow Leopard and later. Support for Gears in Firefox (including 3.6, which will be supported shortly) and Internet Explorer will continue."
However, a former Google engineer familiar with the project, said, "I think Gears is dead and being superseded by Chrome and Chrome Frame. All of the people I know from the Gears team are working on Chrome."
The former Googler, who asked for anonymity, added: "If you look at the Gears blog you will see that Gears' support has not been a priority. The tech leads are on to other things. One is on Google Voice; the other is on Chrome Extensions. Ever since Chrome the bet has been moved to WebKit and putting all of the effort there. Gears may trickle along, but HTML5 has all of the features from it basically, so as soon as browsers support them Gears can die."
And die it will. Added Fette to summarize his post:
"Looking back, Gears has helped us deliver much-desired functionality, such as the ability to offer offline access in Gmail, to a large number of users. Long term, we expect that as browsers support an increasing amount of this functionality natively and as users upgrade to more capable browsers, applications will make a similar migration. If you haven't already, you will want to take a look at the latest developments in Web browsers and the functionality many now provide, reach out with questions and consider how you can use these in your Web applications. Gears has taken us the first part of the way; now we're excited to see browsers take us the rest of the way."
Meanwhile, some observers view the issue as strictly evolutionary and not a matter of Gears versus HTML5. A prominent supporter of the open Web and a key developer of various well-known, standards-based Web technologies, told eWEEK:
"The word 'versus' strikes me as odd. Gears predates a lot of the APIs that are taking up equivalent functionality in HTML5 and the experience with Gears informed (and continues to inform) many of the discussions around HTML5 API designs. For instance, AppCache is a simpler-to-use version of the Gears manifest-driven app capture. As close observers have noted, the Chrome and WebKit teams are working hard to implement HTML5 features and get them deployed. Gears represented a good way to introduce new features fast. HTML5 is the standardization and maturation of many of those features. This is what the market for renderer features looks like when it's working. Nothing 'versus' about it."
This industry insider—who because of his position at a competing organization asked for anonymity—added that the move to HTML5 could actually be better for offline Web applications. However, "there aren't very many of them [offline apps]. Fewer still built by companies whose names aren't 'Google.' So it's either neutral to positive. I'm going to go with 'positive.' A standard allows people to build without fear, and multiple browsers are implementing AppCache. That's a good thing, and frankly the best-case outcome of the Gears experiment."
Friday, February 19, 2010
Patriotic Hackers from two Chinese Schools
They also said the attacks, aimed at stealing trade secrets and computer codes and capturing e-mail of Chinese human rights activists, may have begun as early as April, months earlier than previously believed. Google announced on Jan. 12 that it and other companies had been subjected to sophisticated attacks that probably came from China.
Computer security experts, including investigators from the National Security Agency, have been working since then to pinpoint the source of the attacks. Until recently, the trail had led only to servers in Taiwan.
If supported by further investigation, the findings raise as many questions as they answer, including the possibility that some of the attacks came from China but not necessarily from the Chinese government, or even from Chinese sources.
Tracing the attacks further back, to an elite Chinese university and a vocational school, is a breakthrough in a difficult task. Evidence acquired by a United States military contractor that faced the same attacks as Google has even led investigators to suspect a link to a specific computer science class, taught by a Ukrainian professor at the vocational school.
The revelations were shared by the contractor at a meeting of computer security specialists.
The Chinese schools involved are Shanghai Jiaotong University and the Lanxiang Vocational School, according to several people with knowledge of the investigation who asked for anonymity because they were not authorized to discuss the inquiry.
Jiaotong has one of China’s top computer science programs. Just a few weeks ago its students won an international computer programming competition organized by I.B.M. — the “Battle of the Brains” — beating out Stanford and other top-flight universities.
Lanxiang, in east China’s Shandong Province, is a huge vocational school that was established with military support and trains some computer scientists for the military. The school’s computer network is operated by a company with close ties to Baidu, the dominant search engine in China and a competitor of Google.
Within the computer security industry and the Obama administration, analysts differ over how to interpret the finding that the intrusions appear to come from schools instead of Chinese military installations or government agencies. Some analysts have privately circulated a document asserting that the vocational school is being used as camouflage for government operations. But other computer industry executives and former government officials said it was possible that the schools were cover for a “false flag” intelligence operation being run by a third country. Some have also speculated that the hacking could be a giant example of criminal industrial espionage, aimed at stealing intellectual property from American technology firms.
Independent researchers who monitor Chinese information warfare caution that the Chinese have adopted a highly distributed approach to online espionage, making it almost impossible to prove where an attack originated.
“We have to understand that they have a different model for computer network exploit operations,” said James C. Mulvenon, a Chinese military specialist and a director at the Center for Intelligence Research and Analysis in Washington. Rather than tightly compartmentalizing online espionage within agencies as the United States does, he said, the Chinese government often involves volunteer “patriotic hackers” to support its policies.
Spokesmen for the Chinese schools said they had not heard that American investigators had traced the Google attacks to their campuses.
If it is true, “We’ll alert related departments and start our own investigation,” said Liu Yuxiang, head of the propaganda department of the party committee at Jiaotong University in Shanghai.
But when asked about the possibility, a leading professor in Jiaotong’s School of Information Security Engineering said in a telephone interview: “I’m not surprised. Actually students hacking into foreign Web sites is quite normal.” The professor, who teaches Web security, asked not to be named for fear of reprisal.
“I believe there’s two kinds of situations,” the professor continued. “One is it’s a completely individual act of wrongdoing, done by one or two geek students in the school who are just keen on experimenting with their hacking skills learned from the school, since the sources in the school and network are so limited. Or it could be that one of the university’s I.P. addresses was hijacked by others, which frequently happens.”
At Lanxiang Vocational, officials said they had not heard about any possible link to the school and declined to say if a Ukrainian professor taught computer science there.
A man named Mr. Shao, who said he was dean of the computer science department at Lanxiang but refused to give his first name, said, “I think it’s impossible for our students to hack Google or other U.S. companies because they are just high school graduates and not at an advanced level. Also, because our school adopts close management, outsiders cannot easily come into our school.”
Mr. Shao acknowledged that every year four or five students from his computer science department were recruited into the military.
Google’s decision to step forward and challenge China over the intrusions has created a highly sensitive issue for the United States government. Shortly after the company went public with its accusations, Secretary of State Hillary Rodham Clinton challenged the Chinese in a speech on Internet censors, suggesting that the country’s efforts to control open access to the Internet were in effect an information-age Berlin Wall.
A report on Chinese online warfare prepared for the U.S.-China Economic Security Review Commission in October 2009 by Northrop Grumman identified six regions in China with military efforts to engage in such attacks. Jinan, site of the vocational school, was one of the regions.
Executives at Google have said little about the intrusions and would not comment for this article. But the company has contacted computer security specialists to confirm what has been reported by other targeted companies: access to the companies’ servers was gained by exploiting a previously unknown flaw in Microsoft’s Internet Explorer Web browser.
Forensic analysis is yielding new details of how the intruders took advantage of the flaw to gain access to internal corporate servers. They did this by using a clever technique — called man-in-the-mailbox — to exploit the natural trust shared by people who work together in organizations.
After taking over one computer, intruders insert into an e-mail conversation a message containing a digital attachment carrying malware that is highly likely to be opened by the second victim. The attached malware makes it possible for the intruders to take over the target computer. (source: John Markoff -NYT)