Thursday, 3 April 2014

Nokia Lumia 930 is on the way

Nokia Lumia 930
Nokia brings the small version of the Lumia 1520 on the international market - under the name Lumia 930. The Lumia 930 could resemble the American Lumia Icon. The Lumia 930 comes with 5- inch display, Snapdragon 800 and Pure View camera; these are the details available so far.

Nokia has presented at Microsoft's Build developer conference in 2014, a new Top Smartphone with Windows Phone. The Lumia 930 is the international version recently introduced in the U.S. as Lumia icon and a smaller version of the 6- inch model Lumia 1520.

The hardware specifications and other specifications are almost identical. The display of the Lumia 930 is 5 inches tall and has a resolution of 1,920 x 1,080 pixels. Inside, a Snapdragon -800 quad -core processor operates at a clock rate of 2.2 GHz. The RAM is 2 GB of size, the built-in flash memory of 32 GB. Slot for memory cards are not exist.

 In addition to quad-band GSM and UMTS, the Lumia 930 supports LTE on the frequency bands 1, 3, 7, 8, and 20 Wireless dominates the Smartphone after 802.11a/b/g/n and ac, Bluetooth runs in version 4.0. A GPS module and a NFC chip are in built.

The Lumia 930 can be charged wirelessly without tools, the necessary Qi technology is inside the housing. On the back a 20- megapixel camera with PureView technology is installed as in the Lumia 1520. This allows a clearer zooming than traditional Smartphones.

The six-element optics from Carl Zeiss, an image stabilizer is installed. The Lumia 930 has two flash lights for optimum illumination of the subject. It should come on the market with the new Windows Phone 8.1 and will be available in the second quarter of 2014 in other parts of Europe. The price will be 580 Euros.

Wednesday, 2 April 2014

How to find and Block who is stealing your Wi-Fi

Slow down in Internet Connect - Reason? 

There are always some instances when wireless Internet suddenly tends to slow down due to some unauthorized user stealing your bandwidth which could be the cause. In such a case, the intruder can access your WiFi network if the basic WiFi security has not been implemented. There are also many casual or even innocent bandwidth intruders who on seeing an available network and presuming it to be OK tend to borrow it.

This should cause suspicion if the intruder might be using your WiFi network without your permission and setting up a password could help in preventing them who could be infiltrating private connection. When they attempt to log in and if they are challenged with a password, they then are at a loss and finally give up and move out. There are also other set of people who with determination and skills tend to hack a secured network and probably end up in some serious criminal activity.

WiFi Security Measures 

A real cyber criminal is all out to steal something of value from anyone and may use the computer on the network for identity and financial information which could be beneficial to him. He could also use the internet connection to download files illegally or even hack other networks setting any innocent person as the culprit when the crime is traced back to the router since they have the tools and skills needed to tamper WiFi security measures especially if the password is weak.

Android with Solutions

With Android, it is now possible to resolve this issue and find out who has been sneaking some of the WiFi with an application which is a free network tool that can be downloaded from Google Play Store known as Fing. To get started is to connect the Smartphone or tablet to the WiFi connection to be tested and download the application by pressing the download button.

Once the download is completed, the tool is able to detect the trespasser. AT the top of the main page of the app is the name of your network as well as a refresh and the settings menu button. You could tap on the refresh button update and the application shows which devices are connected to your WiFi network indicating whether the router is a Smartphone or a computer.

Apple and Windows Built-in Utilities 

Besides this, there are other options in Fing like checking open TCP port, sending reports and much more. One of the advantages is to change the viewed IP name enabling the user to know who they could be on the app and who the infiltrators could be. Once this is done the intruder, simply click on the intruder and on the option to enter a name, provide a name for the IP address.

Apple and Windows computer have been equipped with built-in utilities which show the devices that are connected to the network and these tools could be used to check for unknown computers which should not be connected to your network. It is essential to know which device is authorized with each authorized computer to be assigned a computer name which can be recognized easily while printers have built in names which the user should be familiar with.

How to find a lost or stolen Android phone

Pattern Lock
Phones Equipped with Proper Tools in Locating Devices

Mobile phones hold plenty of information of the user and in the event of it being stolen or lost; it can be very disheartening to the person. Smartphone have now become part of our life and losing it could cause the user a lot of worry and tension. Since it has all important information related to the user, their contacts and addresses and even financial information, the user may be subject to losing all these information if their phone tends to gets into the hands of the wrong person.

In most cases, one would want the phone back with all the information safe. With technology making great headways in providing solution to every problem, retrieving a lost phone is not altogether an impossible task. Since our phones are already equipped with proper tools in locating devices as well as securing it from remote location, the problem of losing phone without any trace is a thing of the past. With the help of tools like Android Device Manager, and Lookout, user can now locate and get their phones back if stolen or lost.

Lock Screen Pattern or Password

Individuals could use Apps like AirDroid for remote access of files and information which are needed as well as utilize advanced features like remote camera access and SMS text messaging. The most important precaution and essential thing to do at first is to enable a lock screen pattern or password though this will not help to locate the phone but in the event of losing or it being stolen, the user’s information and privacy would be safe. Options for setting the lock screen information could be explored on the devices since there are some which have options for setting up lock screen information like the name and address of alternative number which can be reached in case phones are lost.

Register Through Android Device Manager

The main option in locating your phone is to ensure that the device is properly registered and accessible through the Android Device Manager which is a handy tool released by Google in 2013 using the advent of Google Play Services making sure of equipping all updated Android device with it though some of the devices have the features enabled out of the box. To get started, one could ensure that the Android Device Manager is enabled as a device administrator by going to Setting > Security and Screen Lock > Device Administrators, on the Android device.

Name of the menus and exact location may differ among phones and hence exploring or checking the user manual for specific device would be helpful. Thereafter the option of Android Device Manager could be checked. This will also be appropriate to head into the device’s location setting, making sure the GPS services are enabled and functional.

Though the GPS is not required in locating the device, it would make the reading accurate with a clear idea of the exact location of the device. Next is to go to Google Setting application and select Android Device Manager from the list of options and check on `Remotely locate this device’ and `Allow remote lock and factory reset’, which will be self explanatory once you reach the browser based dashboard, which is a simple user interface enabling to locate all devices from a remote location.

How Satellite Internet Services Work

Satellite Internet access is the system that lets you get Internet connection through communication satellites. Internet access services are typically brought to users by means of geostationary satellites, capable of providing high data speeds.
The whole system relies on the following primary components:
  • A satellite in a geosynchronous Earth orbit (GEO);
  • Several gateways (ground stations) that relay Internet information via radio waves;
  • A very-small-aperture terminal (VSAT) dish antenna located at the premises of the subscriber.
Other components of satellite Internet systems include a modem that links the network of the user with the VSAT antenna, and a NOC (network operations center) that monitors the entire system. The satellite works with a Star network topology that allows a practically limitless number of VSATs to be connected to the network.

The Satellite as the Central Piece of the Satellite Internet Puzzle

The broadband satellite networks have GEO satellites of the latest generation at their center. These satellites are positioned 35,786 km above the equator and operate in Ka-band mode (18.3-30GHz). They are designed for broadband applications and use narrow spot beams meant to target a smaller area compared to the earlier communication satellites that used broad beams. This technology allows the assigned bandwidth to be used multiple times, and the capacity is higher than what conventional satellites could offer.
The satellite works as a bridge, allowing the connection between points situated on the ground. It is the middle of the so called bent-pipe architecture. This term describes the shape that the data path takes between antennas, with a satellite placed at the bend point.
There is also a set of antennas at the satellite, receiving communication signals from the Earth and transmitting signals to target locations.

Gateways to the Sky

Following the important changes in satellite technology that took place over the recent years, ground equipment has also evolved, as a consequence of higher integration and increased processing power.
The Gateway Earth Station, or simply Gateway, is also known as a teleport, ground station, or hub. Sometimes, the term is used to describe just the portion including the antenna dish, or it can describe the entire system, with all the associated components.
The gateway receives the radio wave signals emitted by the satellite. A modem situated at the gateway location performs a demodulation of the incoming signal into IP packets that are then sent to the local network.
The gateways manage traffic to or from the Internet. The system of gateways provides all the services necessary for satellite and terrestrial connectivity. In the continental part of the United States, the gateways must have a direct unobstructed view to the southern sky. Since the satellite’s orbit is geostationary, the antenna can point at a fixed position.

What Are the Dishes Good for?

In order to get satellite Internet access, a user must have some additional components installed, besides a PC and a router.
The outdoor unit is a reflective radio antenna having the form of a dish, constructed from a variety of materials. It must have a direct view to the sky, in order to allow adequate line-of-sight to the satellite. The antenna must be positioned correctly and, therefore, a set of four parameters is necessary: azimuth, elevation, polarization and skew.
The indoor unit necessary to get satellite Internet connectivity is a modem that acts as an interface between the outdoor unit and the customer’s equipment. It controls satellite reception and transmission.
If you want to know more about satellite Internet reviews, here you will all the details that might be of interest to you.
Written by Robert Kleymore
Internet technology expert, MIT graduate and a passionate blogger.

Tuesday, 1 April 2014

Yahoo is working on its own video streaming service

Yahoo CEO Marissa Mayer starts again an attack on rival Google. Now let forth it’s own video streaming service. CEO Marissa Mayer has apparently already with some YouTube Stars in conversation. Your goal here is to draw the most popular video - faces with alluring marketing promises and higher advertising revenues on their side.

Yahoo! the great portal, which failed to capture Dailymotion, would have opted for the internal development of a more generous service for content creators as similar to that of YouTube. We know that streaming video is one of the strategic developments of Yahoo. The portal had tried to seize the French Dailymotion in 2013 for 300 million dollars. And a rapprochement with Hulu was also considered but everything was unsuccessful.

Yahoo would therefore consider that it would be best to take things in hand since, Yahoo is developing a service that would arise as a competitor to the Emperor YouTube. To stand out, the group would provide more favorable conditions for the creators of content, the means by Yahoo service to attract the stars of the streaming service.

Moreover, according to sources, this platform is not open to all users but renowned contributors who have already acquired legitimacy on other services can only participate. Another specialty is videos are also published on the pages of the portal to provide greater visibility. The fight will be tough, however, in 2013 YouTube have captured 21 % of the income of video advertising.

 Thus the Yahoo boss may take in a sore spot in the house of Google. For some time now complain numerous popular YouTube artists declining advertising revenue they receive from clicks of the audience. The CNBC Partners even reports that Yahoo had already convinced some artists.

Yahoo cannot capture the video throne very easily therefore it see the strategic considerations before a competing offer that - unlike YouTube - focuses primarily on quality content. To ensure this, Yahoo initially offers only commercial producer the ability to upload videos.