Yahoo! Pipes goes live

February 9th, 2007

pipes

Pipes is a hosted service that lets you remix feeds and create new data mashups in a visual programming environment. The name of the service pays tribute to Unix pipes, which let programmers do astonishingly clever things by making it easy to chain simple utilities together on the command line.

Using the Pipes editor, you can fetch any data source via its RSS, Atom or other XML feed, extract the data you want, combine it with data from another source, apply various built-in filters (sort, unique (with the “ue” this time:-), count, truncate, union, join, as well as user-defined filters), and apply simple programming tools like for loops. In short, it’s a good start on the Unix shell for mash ups. It can extract dates and locations and what it considers to be “text entities.

It’s something different than the Google Reader we’ve all got used to, and it’s worth a try.

GMail is open for everyone!

February 7th, 2007

After a while where subscriptions were only possible in certain countries, GMail has recently announced that it opened registrations for users from across the globe. It has even posted a “Sign up” link on their front page. This comes after GMail experienced problems with German and British domains. Get your address for free, here.

Ultra smartphone trends - We’re bored of them before they reach the market

February 7th, 2007

iphone.jpg

Along with the iPhone came a new trend that has taken over just about everything. First, there was the “How’s it going to be like?” stage, when no details were revealed to anyone, and dozens of mockups (some closer to reality, some purely fictional) hit the internet, powered by curiosity. Earlier this year, everyone tuned in to MacWorld, where Steve Jobs presented the long-awaited product. Every detail, every photo and every single aspect of the long-awaited “iPod phone” (as Jobs himself says, iPhone is the best iPod they ever made) was covered in thousands of newspaper articles, tv shows, blog posts and so on.

The iPhone hasn’t reached the marked by now, and still there are a couple of rumours regarding (virtual) competitors. Driven by the media attention that the iPhone is getting, rival companies have started work on their own “iPhone”.

meizu-m8-cellphone.jpg

The first one sounds more like a joke than a real thing. It seems that, with some 4 months before the iPhone’s release to the masses, the japanese guys from Meizu created a phone that is almost a hundred percent identical to the iPhone. The photos show a smaller phone, with the icons placed in the same way (one icon has the Windows symbol on it, but the writing is in Chinese, so I can’t understand anything from it), with strikingly similar features (except from what looks like a small secondary camera on top). This is said to be the Meizu M8, and it’s, in my opinion, just an attempt to get some spotlight from the real thing.

asus-aura-concept-phone.jpg

Another “would-be” product that caught my eye is the Asus Asura, which is still in a concept phase. Azura has a design which is similar to the iPhone’s design, but in the same time it manages to bring something different to the table. It appears to be a normal, sliding phone (Although I’m not quite sure how this slidin mechanism will look like - it isn’t very clear from the photos), but what it has new is a QWERTY-type keyboard that popsout from one side, allowing the user of the phone to type a lot easier. Between the two models, I would say the latter has a real shot of success, but unfortunately it’s still in a design stage.

As I’ve said, the iPhone hasn’t even been launched to the general public, and already companies are rushing to copy its design and features. This might make it the best selling phone so far, or it might mean that users will get bored of it even before its launch.

Have Windows shutting down faster

February 7th, 2007

windowsshutdown

I am positive that you know what I’m talking about just after reading the title. After a while, your Windows practically refuses to shut down as fast as it used to, even though you successfully closed all of the running applications.

Microsoft says the issue is caused by a problem it experiences while trying to unload the current user’s profile, and they have published a HOTFIX for this.

Basically, you’re installing a new service, a service to help with slow log off and unreconciled profile problems. The User Profile Hive Cleanup service helps to ensure user sessions are completely terminated when a user logs off. System processes and applications occasionally maintain connections to registry keys in the user profile after a user logs off. In those cases the user session is prevented from completely ending. This can result in problems when using Roaming User Profiles in a server environment or when using locked profiles as implemented through the Shared Computer Toolkit for Windows XP.

On Windows 2000 you can benefit from this service if the application event log shows event id 1000 where the message text indicates that the profile is not unloading and that the error is “Access is denied”. On Windows XP and Windows Server 2003 either event ids 1517 and 1524 indicate the same profile unload problem.

To accomplish this the service monitors for logged off users that still have registry hives loaded. When that happens the service determines which application have handles opened to the hives and releases them. It logs the application name and what registry keys were left open. After this the system finishes unloading the profile.

It practically reclaims the resources of the ended tasks. I tried this myself on a XP test system, and it worked like a charm.

The voice recognition website and its vulnerabilities

February 6th, 2007

midomi.jpg

The other day I stumbled upon midomi, a website that’s based on a brilliant idea. You know the times when you know a song by it’s rhythm, but not by its name? The website allows you to search through tunes by humming a part of the song, or directly by typing its name. I’ve tried out midomi and, honestly, I found no replies that matched the song I was singing. Well, to be entirely honest, I have no singing voice whatsoever, so that must be the reason for my bad search. But the website has its vulnerabilities, which I’m going to point out next:

1. The human factor
As it is the case in every project that relies on people, this website is no exception, and is exposed to human error. I’ve encountered several renditions that were far from perfect. Songs that are interpreted awful, or that are interpreted good but the background noise is too loud that it will disrupt any search. Plus, I’ve found songs by Eminem sung by girls, songs by Madonna and Fergie sung by men, and so on.

2. The machine factor
As it is the case with mobile phones, where, in order to access a Voice Tag, you have to repeat yourself several times, this type of search isn’t a hundred percent perfect. Even if you have tried your best to make the song sound as close as possible to the real thing, chances are that, even if the right search is displayed, it might be behind a dozen other bad results.

record.jpg

3. The spam factor
This is a constant threat to every person that runs a website nowadays. YouTube has plenty of spam (may it be in its videos, or in the users’ mailboxes, as I’ve come to know when I received a couple these past few weeks), and it is a much larger company. I haven’t found any spam messages, but I’m sure that, as the website will gain in popularity, they will appear. I’ve also run a small “experiment”, I’ve recorded a piece of a song (with my bad voice and all), and submitted it. No moderation, it went directly into the archives, waiting to be found by the next person. With this in mind, it would be fairly easy for somebody to add a piece of recording that can be described as spam.

With this in mind, I think that midomi.com will spend some time in Beta, as they have plenty to work on.

In Google we trust

February 6th, 2007

You might have seen these pictures before, but if you didn’t, I guess I can tell you that they perfectly reflect the truth. We trust Google with everything. Our agenda, our personal or confidential e-mails, our wanted information, our browsing privacy, and many many more.
Read the rest of this entry »

Firefox CAN be faster - 4 easy tricks

February 6th, 2007

firefoxlogoa

Now that we all know the hidden pages in Firefox, it’s time to go a bit deeper into tweaking your browser for optimal use. All of the operations will be made in the about:config page, so save your important stuff, open up a new tab, write about:config in the address bar and be prepared. I have gathered four tricks that will improve your Firefox experience, and here they are.

1. Fetch only pages that you click
Firefox mostly resembles to Google from this point of view. It has a built-in feature (enabled by default) that will pre-download the pages behind the links it thinks you MIGHT click. Google anticipates you might click the first result from the page, but how in the world can Firefox anticipate the link you’re going to click? Anyway, in my opinion this is just useless bandwidth usage, CPU power and HDD space. You’re practically downloading and storing pages you are not viewing. Here’s how you stop that in three simple steps.

In the about:config list, filter up your search after ‘network’ so it would be easier for you. Then, find through the remaining list options the key that says network.prefetch-next. It should be set to TRUE. Double click it, and it will turn to false. There we go, now Firefox will stop acting creepy and will only fetch what you click ;)
Read the rest of this entry »