Monday, 3 February 2014

How about Live Streaming

Traditionally, the only way to view live video was on TV, and the Internet was able to handle text, image and audio content. However, when Internet speeds began to increase after the year 2000 or so, it became possible to download audio and video files directly to a computer before playing them - bitrates also improved over this period of time to offer this content in excellent definition and detail. The natural evolution of this process came with the introduction of broadband and fibre optic data services, and access speeds became fast enough to stream content in real-time without having to wait for a file to finish downloading.

This improved technology has now enabled broadcasters to provide live audio and video, and it is adaptable to various broadband speeds. In any developed nation, there will always be large fluctuations in connection speeds, but everyone can have the chance to access the same live content with variable quality settings. When a user starts to watch a live broadcast, an initial speed test is carried out in the background, and an image and audio bitrate is delivered to the user that streams as smoothly as possible. In the event that the feed begins to break up or buffer, the content will automatically step-down in quality. This technology to enhance the user experience is already in place for the major Video on Demand providers, and smaller operations can now use it to deliver programmes to their own fans as well.

Live streaming has also been developed to allow viewers flexibility over what they are watching - if the broadcaster decides to offer some extra features. It is possible to incorporate technology that pauses and rewinds live content, along with a facility to simply return to the live action with the click on a button. This is a great feature for live sporting events, as it gives the viewer their own 'Instant Replay' facility, and it is equally useful when the phone rings! Users can also be allowed to scroll through a live broadcast that is already in progress, which is useful if they need to catch up quickly.

This form of online broadcasting has to potential to be used by a wide variety of businesses, organisations and individuals, and it allows the public to engage in a way that only used to be possible with expensive investment in TV equipment. Bands and artists use it to provide intimate access to concerts and rehearsal sessions, while a business may decide to broadcast keynote speeches and press conferences. The Internet makes it possible for live streams to be accessed anywhere in the world - 24 hours a day, seven days a week. Content can be made entirely public, or access can be offered to selected users if that is more desirable using the same technology that protects conventional web pages. With HD technology becoming commonplace in this area, it has already caught up with regular broadcast television in a number of respects, and it is only a matter of time before it becomes the medium of choice for many.
Martin Jonson is director of the UK's Digital Downloading company providing exceptional quality at the lowest UK prices. He will complete your job quickly with the greatest care. You can connect with him on Google+.

Thursday, 30 January 2014

Cross-Platform Java Bot Used for DDoS Attacks



Java
The java platform is used in DDOS attacks by bot. The malicious Java application can be run on Windows, OS X and Linux machines. Kaspersky Lab researchers analyzed a malware that infects computers to form a botnet - a network of zombie computers - and use it in attacks distributed denial of service.

This botnet is controlled via IRC protocol to conduct targeted attacks on IP addresses. Attackers can adjust the intensity of the attack and its duration. It uses a data stream via HTTP or UDP. At least one target of this botnet was an email service.

The malware behind the botnet is written entirely in Java. Through this platform, it can be run on Windows, OS X and Linux. Still, it runs a Java vulnerability for which a patch exists since June 2013.

This vulnerability is present in the Java Runtime Environment with Oracle Java SE 7 Update 21 and earlier, and Java 6 Update 45 and earlier. This is not the first time a botnet infects the three most popular operating systems.

Opera 19 with Bookmark API Released!



Opera 19

Opera has been released its browser in a new version Opera 19 . The Opera19 web browser has the latest release of some interesting features that Google Chrome have already.

 Among other things, there is a new Bookmarks Bar for managing bookmarks, wallpapers for the individual design of the browser extensions and a new section for advanced user’s settings. According to the developer's blog, the new stable release will be presented with the version number 19.0.1326.47.

Opera thus offers very similar features, such as based on the same rendering engine flashing Chrome browser. The new bookmarks API brings a one - collapsible bookmark bar which can be operated under Windows simply by dragging and dropping. With the reintroduction of bookmarks a basic function comes back; which was completely lacked since version 15. Now Photos can be used in the browser as wallpaper (right click on photos that are opened in the browser - "Use Image as Theme" > ).

 In the available extensions, there are two major innovations; first one is, there is a blacklisting of add- ons as well as an inline -install option. On the other hand, there are still a number of smaller improvements that have been set out in detail in the change log.

In addition, Opera Software announced that it has provided a more than 700 enhancements in total for users benefit. Opera have currently created a few new settings with the Opera 19.0.1326.47 and Opera has made available the new version for OS X too. The updates are now available for free.

New Strontium Atomic Clock sets new world records in term of precision up to 5 billion years


 New Strontium Atomic Clock
The Atomic Clock model of National Institute of Standards and Technology works with Strontium. Many of the current technological devices use Coordinated Universal Time (UTC); which is one of the international unit of measure made reliable by atomic clocks around the world. But a revolution will perhaps take place in this area: a new type of clock that will pass the time; for a long time, even until the end of our time. JILA laboratory at the University Of Boulder, Colorado, has a unique design of its kind of Atomic clock.

It looks little bit strange but this clock is obviously not like the others. It is a new model of atomic clock, giving the most accurate time in the world! This clock was unveiled in the journal Nature and operates like other atomic clocks, with a jet of atoms, moving from an excited state to another (by stimulated by a laser), gives a frequency electromagnetism frequency which will define a second reference. This can be seconds, subsequently calculated the minutes and hours.

The set of more than 300 atomic clocks scattered on Earth and in orbit around the Earth to form a network giving the International Atomic Time, which is a yardstick used to disseminate the Coordinated Universal Time (UTC), itself is used to satellites, GPS, watches and other computers and everything in the planet. More than 300 atomic clocks in the world but the Boulder the new atomic clock differs here. Boulder first uses a material which is not listed as used in the process of other atomic clocks. This is a clock Strontium, while other atomic clocks using cesium.

It promises a still life and calculates the exact time upto5 billion years! And yet, the results are there and can be further refined, as explained by Jun Ye, the Department Head Search Clock affiliated with National Institute of Standards and Technology U.S. He told that they ready have plans to push performance even further progress in their clocks in the next five to ten years, he promised.

And if 5 billion years may seem sufficient precision for the common man in the search, whether the infinitely large or small, every second counts, and the technology in this field will be reliable, the more it will achieve positive results. By comparison, the atomic clock of the Observatory of Paris, which is one of the most successful operating Cesium clocks, could give the second with precision about 300,000 million years. Now, officials and the new NIST atomic clock model will apply to ask to accept the strontium in addition to or in place of cesium and it is only a matter of time!

Wednesday, 29 January 2014

Alleged fake WhatsApp Application brings banking Trojan


WhatsApp
Kaspersky warns of a new spam wave that attracts users with an alleged WhatsApp version for the PC. An alleged fake WhatsApp campaign reaches users via e –mail and the downloaded PC version turns out to be banking Trojan. They are sending mail stating that “Finally WhatsApp for PC and eleven pending friend requests are waiting for you!” This looks s sort of the youngest Hoax of cyber criminals out of users reached by e-mail, and points to a download of the alleged first official PC version of WhatsApp.

But instead of downloading the messenger they downloaded software which includes a dangerous banking Trojan, it steels the the private online banking information and passwords from the victim once downloaded and sends back to the culprit. Malware expert Dmitry Bestuzhev of Kaspersky Labs already last week warned in their website SecureList before the spam email campaign. So far, there is no official announcement of WhatsApp PC popular messaging service officially only and it is only as a mobile version.

So if you find one in Portuguese written message from Whatsapp in your mail inbox, then it could be a by a deceptive hoax that roams currently in the network. Instead of a Messenger download it downloads a hide PC Trojan. The email makes reference to a dubious download link that says “Download now ". The malware is disguised as a 2.5 megabyte MP3 file and not only sends private data to the criminals, but also invites up to ten megabytes of viruses and other malicious programs on the computer.

Perhaps the Brazilian WhatsApp users were the target of the attack, according to their post. Note: As long as you do not click on the download link, you are safe. Since the Trojans need to be installed manually in order to get into the computer.