Microsoft’s Windows 8 Released


Windows 8 is the current release of the Windows operating system, produced by Microsoft for use on personal computers, including home and business desktops, laptops, tablets, and home theater PCs. Development of Windows 8 started before the release of its predecessor in 2009. Its existence was first announced at CES 2011, and followed by the release of three pre-release versions from September 2011 to May 2012. The operating system was released to manufacturing on August 1, 2012, and was released for general availability on October 26, 2012.

Windows 8 introduces significant changes to the operating system’s platform, primarily focused towards improving its experience on mobile devices such as tablets to rival other mobile operating systems (such as Android and iOS), taking advantage of new and emerging technologies (such as USB 3.0, UEFI firmware, near field communications, cloud computing, and the low-power ARM architecture), new security features (such as malware filtering, built-in antivirus software, and support for secure boot, a controversial UEFI feature which requires operating systems to be digitally signed to prevent malware from infecting the boot process), along with other changes and performance improvements.

Windows 8 also introduces a new shell and user interface based off Microsoft’s “Metro” design language, featuring a new Start screen with a grid of dynamically updating tiles to represent applications, a new app platform with an emphasis on touch screen input, the new Windows Store to obtain and purchase applications for the system, and the ability to synchronize programs and settings between multiple devices.

New Features of Windows 8
New features and functionality in Windows 8 include a faster startup through UEFI integration and the new “Hybrid Boot” mode (which hibernates the Windows kernel on shutdown to speed up the subsequent boot), a new lock screen with a clock and notifications, and the ability for enterprise users to create live USB versions of Windows (known as Windows To Go). Windows 8 also adds native support for USB 3.0 devices, which allow for faster data transfers and improved power management with compatible devices, along with support for near field communication to facilitate sharing and communication between devices.

Windows Explorer renamed as File Explorer,  File operation dialogs have been updated to provide more detailed statistics, the ability to pause file transfers, and improvements in the ability to manage conflicts when copying files. A new “File History” function allows incremental revisions of files to be backed up to and restored from a secondary storage device, while Storage Spaces allows users to combine different sized hard disks into virtual drives and specify mirroring, parity, or no redundancy on a folder-by-folder basis.

Task Manager has also been redesigned, including a new processes tab with the option to display fewer or more details of running applications and background processes, a heat map using different colors indicating the level of resource usage, network and disk counters, grouping by process type (e.g. applications, background processes and Windows processes), friendly names for processes and a new option which allows to search the web to find information about obscure processes. Additionally, the Blue Screen of Death has been updated with a simpler and modern design with less technical information displayed.

More Safety and Security Features: Additional Security features are introduced, Windows defender, smart Screen filtering and much more options available.

Online services and functionality: Windows 8 provides heavier integration with online services from Microsoft and others. A user can now log in to Windows with a Microsoft account, formally known as a Windows Live ID, which can be used to access services and synchronize applications and settings between devices.

Windows Store and Apps: A music app for Windows 8, shown snapped like a sidebar to the Windows Desktop. Windows 8 introduces a new style of application, Windows Store apps; according to Microsoft developer Jensen Harris, these apps are to be optimized for touch screen environments and have smaller scope in relation to desktop applications. Apps can run either in a full-screen mode, or be docked directly to the side of a screen.

Interface and desktop: Windows 8 introduces significant changes to the operating system’s user interface, many of which are centered towards improving its experience on tablet computers and other touch screen devices.

Secure boot: Windows 8 supports a feature of the UEFI specification known as “Secure boot”, which uses a public-key infrastructure to verify the integrity of the operating system and prevent unauthorized programs such as boot kits from infecting the device.

More information can be availed on Microsoft’s website to Download and upgrade.
Link http://windows.microsoft.com/en-US/windows-8/meet

Advertisements

Social Media – Information which should be never shared on Social Media

social-media-networking-site-information

social-media-networking-site-information

When you’re hanging out with your friends on social networking sites, it’s easy to forget that what you say and share might not just stay between friends coz of excitement and fun. Social media is all about transparency, sharing and being your organic authentic self.

Thirty-five percent of adults on the Internet now have a profile on at least one social networking site, and 51 percent have more than one. Three-quarters of users between the ages of 18 and 24 have an online profile. The Pew Research Center found that 89 percent of these people use the sites to keep up with friends, 57 percent to make plans with friends and 49 percent to make new friends. Facebook, MySpace, LinkedIn, Friendster, Twitter and some other local networks are just a few of more than 100 Web sites connecting folks around the world who are eager to share their thoughts and feelings. But just like in real life, there’s such a thing as sharing too much information. It’s easy to get caught up in the social aspects of sites like Facebook, but what you choose to share is there for all to see if you don’t limit who can view your information.


There are few things which really need to be restricted to safeguard your personality. Some things you should probably just keep to yourself.

1. Contact Information: Let only your beloved ones and friends whom you can trust only know your contact information like your address, tele numbers, mails etc. This is very genuine information so this needs to restrict only to your circle.

2. Credit Card / Debit Card / other Money Making pictures: People do have the habit of sharing, when they get something new to their life, Cars – houses – jeweler’s looks fine, but sometime in the excitement people tend to share pic’s of their credit cards, Debit cards etc showing it off on Instagram is like posting Identity theft porn.

3. An invitation to “please rob me”: Letting the 1/6 of the human population of this planet that is on Facebook know that you’re in Mexico this week while that brand new 60” TV that you posted about last week is home all alone is an invitation to “please rob me”. So one needs to be careful about such things, before posting any new things, do give a thought on your weekend plans or tours, think and then post if you think without your presence if they are secured.

4. Password: Nobody on this world dares to post his password, but sometimes a friend might pull you to such an extent where situation might ask you to do so, you might share a hints, keywords, suggestions, tricks. Such things always need to be avoided. This one should be at the top of the no-brainer pile. If your password is the name of your cat that has his own Facebook account with 2,652 friends, then you either need to change your password or your cat.

5. Personal Conversations: On Facebook, users can send personal messages or post notes, images or videos to another user’s wall. The wall is there for all to see, while messages are between the sender and the receiver, just like an e-mail. Personal and private matters should never be shared on your wall. You wouldn’t go around with a bullhorn announcing a private issue to the world, and the same thing goes on the Internet. This falls under the nebulous world of social networking etiquette. There is no official handbook for this sort of thing, but use your best judgment. If it’s not something you’d feel comfortable sharing in person with extended family, acquaintances, work colleagues or strangers, then you shouldn’t share it on your Facebook wall.

6. Social Plans: Sharing your social plans for everybody to see isn’t a good idea. Unless you’re planning for a big party and inviting all the users you’re connected to, it will only make your other friends feel left out. There are also some security issues at stake here. Imagine a situation where a jealous ex-boyfriend or girlfriend knows that you’re meeting a new date out that night. What’s to keep the ex from showing up and causing a scene or even potentially getting upset or violent? Nothing, that’s what. If you’re planning a party or an outing with a group of friends, send a personal “e-vite” for their eyes only and nobody is the wiser. If you’re trying to cast a wide net by throwing out an idea for a social outing, just remember that anyone who has access to your profile sees it.

7. Photos of Your Kids and Family members: Social networking sites are a common place for people to share pictures of their families, but if you’re one of the 40 percent of users who don’t restrict access to your profile, then those pictures are there for everyone to see. It’s a sad fact, but there are a lot of predators who use the Internet to stalk their prey. If you post pictures of your family and information’s such as  “Leaving for Party” “Someone is out of town” “your kid is alone at home” ” You are alone at home” such updates of your pics could out your life and your kids life at risk. Nobody ever thinks it will happen to them until it does, so safety first is a good default mode when using social networking sites. Just like with other private matters, send family photos only to a select group of trusted friends and colleagues who you know won’t share them. If someone uses Social Networking, he / she should need to make sure that his information is accessible only to those who are allowed not for others or public. Most of the people these days when they open their accounts on social network sites, they forget to utilize the safety options provided by the sites and put themselves in bad situations, so one needs to be very careful when they are sharing their pics, information and updates on social sites, use appropriate security methodologies provided with safeguard everyone from misuse.

8. Anything You Don’t Want Shared: You can select all the privacy settings you want on social networking sites, but the fact is, if you post it, it has the potential to be seen by someone you don’t want seeing it. You know all those fun Facebook applications, quizzes and polls you can’t help but fill out? A study performed by the University of Virginia found that of the top 150 applications on Facebook, 90 percent were given access to information they didn’t need in order for the app to function. So when you sign up to find out what sitcom star you most identify with, the makers of that poll now have access to your personal information. It’s anybody’s guess where it goes from there. Social networking is all about sharing, so something you think is in confidence can easily be shared and then shared again, and before you know it, someone you don’t even know has access to something private. “When in doubt, leave it out” is a good motto to follow. And always remember that anything you share has the potential to be leaked in some way.

 

BLOG

What is a Blog Actually?
A blog is a discussion or informational site published on the World Wide Web and consisting of discrete entries (“posts”) typically displayed in reverse chronological order (the most recent post appears first). Until 2009 blogs were usually the work of a single individual, occasionally of a small group, and often were themed on a single subject. More recently “multi-author blogs” (MABs) have developed, with posts written by large numbers of authors and professionally edited. MABs from newspapers, other media outlets, universities, think tanks, interest groups and similar institutions account for an increasing quantity of blog traffic. The rise of Twitter and other “micro blogging” systems helps integrate MABs and single-author blogs into societal new streams. Blog can also be used as a verb, meaning to maintain or add content to a blog.

The emergence and growth of blogs in the late 1990s coincided with the advent of web publishing tools that facilitated the posting of content by non-technical users. (Previously, a knowledge of such technologies as HTML and FTP had been required to publish content on the Web.)

Although not a requirement, most good quality blogs are interactive, allowing visitors to leave comments and even message each other via GUI widgets on the blogs, and it is this interactivity that distinguishes them from other static websites. In that sense, blogging can be seen as a form of social networking. Indeed, bloggers do not only produce content to post on their blogs, but also build social relations with their readers and other bloggers.

Many blogs provide commentary on a particular subject; others function as more personal online diaries; others function more as online brand advertising of a particular individual or company. A typical blog combines text, images, and links to other blogs, Web pages, and other media related to its topic. The ability of readers to leave comments in an interactive format is an important contribution to the popularity of many blogs. Most blogs are primarily textual, although some focus on art (art blogs), photographs (photoblogs), videos (video blogs or “vlogs”), music (MP3 blogs), and audio (podcasts). Micro blogging is another type of blogging, featuring very short posts. In education, blogs can be used as instructional resources. These blogs are referred to as edublogs.


What are the Minimum Basic Elements required for Blog?
Dates:
Dates are a big giveaway. By definition a blog is a journal, and by convention it is a journal organized by posting date. No other type of web site places such strong emphasis on when content was created. As such, seeing a date is usually a good indicator that you are reading either a blog or a journal/newsletter.

Comment counts:  Comments and suggestions in the form of feedback , keeps a blog live. A blog should need to have a section for comments and suggestions , which will help in improving the quality content of the blog. The other major aspect of blogging is the community behind it. A blog with comments disabled is barely a blog at all and as such, seeing the customary “x comments” text near the post title or succeeding the post itself is a sure sign of blogs abound.

Author names:  Who is writing the content, it might be you, a guest writer, a famous personality, it can be anyone who can contribute.  A good blog tends to be regularly updated, and shares some of the personality of the author. Many blogs therefore include the author’s name along with each post. Of course, it’s not always necessary.

RSS icons and counters:  Have a look in your RSS reader. How many of the feeds that you’re subscribed to are from blogs? A good number I’d say, and so it is with good reason that large RSS icons and FeedBurner buttons can safely be attributed as aspects of a blog design.

Right sidebar:  This is optional though, but this design style is more of a stereotype than a reasoned element of a blog design. Any type of web site can have a right sidebar, and blogs can of course have left/no sidebars. However, there is still some truth left in the old stereotype. If you had to picture the typical 2-column blog layout, which side would the sidebar be on?

Valid and Readable Content

Date-based archives:  Date based archives are a useless accessory for most blogs. However, when they are seen they are a guaranteed sign of a blog. Blogs began as online diaries, giving rise to the popularity of browsing blogs by date. As blogs have evolved though, such archives have grown superfluous and are less commonly seen now.