Computer
Tuesday, February 5, 2008
ImTOO Ripper Pack Platinum 4.0.52.0616
Dialup(56k) -01 h 31 m 18 s
ISDN(128k) -39 m 57 s
DSL(512k) - 10 m 00 s
Cable(1024k) - 05 m 00 s
T1(1484k) - 03 m 27 s
Recommadations :
ImTOO Ripper Pack Platinum Download - Download Here!
Monday, February 4, 2008
PPT File to videos
Publisher: VeryPDF.com Inc
Category: Utilities
Version: 2.01
License: shareware
Cost: 299$ (Free)
Size: 5.06 MB
Updated: 07 Sep 2007
Screenshot: view screenshot
Bookmark: ctrl+b
Key features:
Push-to-Talk
Push-to-Talk (PTT or P2T), originally introduced in the US by Nextel through its partnership with Motorola and its use of the iDEN technology is now poised to emerge as one of the premier voice-based VAS applications for many leading mobile communications service providers. Combining aspects of cellular mobile communications, presence detection, and walkie-talkie style communications, push to talk provides end-users with the ability to quickly find one another and engage in brief, burst-oriented style communication. Advances in market adoption and technology evolution of voice over wireless IP will enable improvements in Push-to-Talk (PTT).
Push to Talk Market
Rather then being a replacement of long, interactive communication, PTT is best suited for demands for quick communication among end-users. Due to the fact that PTT is provided in half-duplex mode (e.g. transmission occurs in both directions, but not at the same time – each party must wait to speak), the inability to interrupt lends itself to quick exchanges of information, as is the case with the market for business users that need to quickly exchange information and then get along with their business.
The market for PTT will continue to evolve and ultimately represent service opportunities for the more traditional markets (dispatch and mobile workforce users) as well as more mass market users such as the youth market, which is very community-of-interest oriented (e.g. staying in close with one’s close personal friends is very important) and will thus be very closely tied with other Unified Communications type services such as Mobile Instant Messaging and other Advanced Messaging Services, call management services, LBS, and others.
With a significant world-wide emphasis on Public Safety and Homeland Security, PTT will increasingly become important for government, public safety personnel and other officials as a communications tool (among other tools such as Wireless Emergency Service, Priority Service, etc.), serving the need for efficient communications during times of emergency, disaster, or threats.
Push to Talk Implementation and Operations
Voice Quality: The use of IP technology for PTT inherently ads the issue of voice quality of service (QoS), just as QoS is an issue with VoIP on fixed networks
Call-Set-up Time: The duration of time from the instance of selecting a user to engage in a PTT session to the time that one is able to initiate a conversation.
PTT Interoperability: Currently, PTT implementations are strictly proprietary based, creating a situation in which there is little or no opportunity for interconnection between PTT systems and thus no inter-carrier PTT communication for end-users.
Numbering Issues: For example, one decision point is to use of a single number (for both normal cellular and PTT) or a separate number for PTT calling.
Technology Supporting Push to Talk
At the core of PTT is an IETP standardized protocol known as Session Initiation Protocol (SIP) used for IP communications and Wireless Softswitch network infrastructure.
Being that it uses IP as a transport/bearer, PTT is highly dependent on the roll-out, expansion and improvements of 2.5G and 3G technology and infrastructure.
The Open Mobile Alliance (OMA) is working to standardize Push-to-Talk over Cellular (PoC) – see PTT Standardization (below).
Benefits of Deploying and Operating Push to Talk
Incremental Revenue
PTT represents incremental revenue to the wireless carrier, as it is an additional service that does not replace normal cellular mobile communications service, but rather is a VAS add-on to existing service.
Differentiation
Being a VAS, PTT represents a significant differentiator for both carriers that implement and optimize early as well as those that find clever ways to integrate PTT with other VAS services in ways that maintain differentiation even after PTT is more mature (for example: even after inter-carrier PTT is in place and optimized).
Cost Savings
Perhaps one of the greatest benefits that wireless carriers enjoy from PTT is the network cost efficiencies that are realized in at least two ways. Use of the underlying IP-based network with half-duplex transmissions has the advantage of both requiring less bandwidth (e.g. network and facility savings) as well as avoiding interconnection to the PSTN (e.g. savings against interconnection charges).
The Future of Push to Talk Service and Technology
PTT Standardization
OMA is standardizing the infrastructure and processes supporting Push-to-Talk over Cellular (PoC), which is the evolution of PTT from proprietary approaches to a more open approach that would operated uniformly and seamlessly between and among technologies and service providers.
OMA is seeking to offer the following infrastructure network elements:
PoC Server: Contains the PoC server-side logic, providing the following functions: end-point for SIP signaling and voice bursts, handles participant lists distribution, reporting to the charging system, and media distribution.
IMS Core: Contains SIP proxies and SIP registers. The Ue access the IMS Core for purposes of SIP signaling to the PoC Server. The IMS Core also handles AAA functions and triggering of personal and group instant talk sessions.
Group/List Manager Server (GLMS): Responsible for management of contact lists, group lists, access lists, and permissions management such as the Do-Not-Disturb (DnD) flag.
User Equipment (Ue): Terminal equipment (mobile phone) containing the PoC application software
OMA is also seeking to standardize the following processes: roaming, identification, addressing, and modes of operation (session establishment and answering).
Inter-carrier PTT
The evolution of PTT to encompass the ability to offer inter-carrier PTT service (the ability for end-users to engage in a PTT session between different mobile network operators), will entail network and service optimization in many areas including the following:
Interoperability: There is a need for basic interoperability between PTT systems, including interface and protocol interoperability.
Clearing and Settlement: There is a need for an efficient clearing and settlement system for managing charges between mobile network operators as they charge different rates for PTT service (e.g. supporting for roaming and any service charge differentials for things like international PTT)
Integrated and Robust Presence Detection and Management
Integration of Location-based Services
Multimedia Integration with PTT
Mobile Contact Manager
The above use case example illustrates the point that perhaps, even more so than MIM, PTT will spawn rapid expansion of Mobile Contact Manager (MCM) service. MCM represents a service (extension to PTT, MIM, and others) that allows for the management of contacts (personal, professional, and even ad-hoc) in terms of presence and availability, location, and contact details (phone number and other alias/addresses such as IM). The ability to quickly and efficiently manage the communications experience, such as add/modify/delete both pre-determined and ad hoc contacts will be of particular importance and synergy with PTT service.
Expansion of MCM will foster the further development and use of various community of interest VAS applications such as friend finder service, interactive mobile games (in the physical and virtual worlds), and more.
Downloadable PTT Client for the Cellular Phone
Push to Talk: Summary and Conclusion
Predictions for PTT
Growth of PTT usage will further commoditize long distance service, especially as inter-carrier PTT service is commonplace and optimized.
Evolution of PTT will represent a leading VAS and will spawn the introduction and growth of various synergistic/complementary capabilities and services including Presence and LBS-based services, MCM, and other Unified Communications.Additional Resources:Books about: IP-based Communication
More InformationRelated research (click here).,
Comments : Click here
Wednesday, January 16, 2008
I-Phone
The iPhone is available from the Apple Store and from AT&T Mobility, formerly Cingular Wireless, with a price of US$499 for the 4 GB model and US$599 for the 8 GB model. Apple intends to make the phone available in Europe in Q4 2007 and in Mexico, Australia, and Asia in 2008.FeaturesApple has released a video explaining many of iPhone's features through a series of demonstrations.
Touch screenThe 3.5 in liquid crystal display (320×480 px at 160 ppi) HVGA touch screen topped with optical-quality glass[3] is specifically created for use with a finger, or multiple fingers for multi-touch sensing. Because the screen is a capacitive touch screen, no stylus is needed, nor can one be used.[4] The requirement for bare skin to be used has caused concerns for users in areas with winter climates, as the removal of gloves is required to use the touchpad.
Other inputsThe display responds to three sensors: a proximity sensor that shuts off the display and touchscreen when the iPhone is brought near the face to save battery power and to prevent spurious inputs from the user's face and ears, an ambient light sensor that adjusts the display brightness which in turn saves battery power, and an accelerometer, which senses the orientation of the phone and changes the screen accordingly. Web browsing and music playing support three orientations, while videos play in only one widescreen orientation.
PhoneThe iPhone allows conferencing, call holding, call merging, caller ID, and integration with other cellular network features and iPhone functions. For example, a playing song fades out when the user receives a call. Once the call is ended the music fades back in.
CameraThe iPhone features a built in 2.0 megapixel camera located on the back. However, the iPhone is not able to record videos. It also includes software that allows the user to upload, view, and e-mail photos. The user zooms in and out of photos by "unpinching" and "pinching" them through the multi-touch interface. The software will interact with iPhoto on the Mac.
MultimediaThe layout of the music library differs from previous iPods, with the sections divided more clearly alphabetically, and with a larger font. Similar to previous iPods, the iPhone can sort its media library by songs, artists, albums, videos, playlists, genres, composers, podcasts, audiobooks, and compilations. The Cover Flow, like that on iTunes, shows the different album covers in a scroll-through photo library. Scrolling is achieved by swiping a finger across the screen.
Web connectivity
Wikipedia on the iPhone's Safari web browser.The iPhone has built-in Wi-Fi, with which it is able to access the World Wide Web (through a wireless network) via a modified version of the Safari web browser. The iPhone is also able to connect to the web through AT&T's EDGE network, but is not able to utilize AT&T's 3G/HSDPA network; Steve Jobs mentioned at the Keynote presentation that 3G support would be a future feature of a new version.[10] The use of the EDGE network instead of 3G has been criticized by analysts. When the user is not in a Wi-Fi hot spot, the iPhone's network connection will use the older EDGE network, which, before the launch, reviewers found that the EDGE network was "excruciatingly slow," with the iPhone taking as long as 100 seconds to download the Yahoo! home page for the first time.[8] Immediately before the launch, however, the observed speed of the network increased to almost 200 kbit/s.[11] This is probably due to the new "Fine EDGE" upgrades AT&T has been making to their network prior to the launch.
E-mailThe iPhone also features an HTML e-mail program, which enables the user to embed photos in an e-mail message. PDF, Microsoft Word, and Microsoft Excel attachments to mail messages can be viewed on the phone.[16] Yahoo! is the only e-mail provider that will be offering a free Push-IMAP e-mail service similar to that on a BlackBerry; IMAP and POP3 mail standards are also supported, including Microsoft Exchange. The iPhone will sync e-mail account settings over from Apple's own Mail application, Microsoft Outlook and Microsoft Entourage, or can be manually configured using the device's Settings tool.
Article From : Wikipedia
W32.Jeefo Removal tips
Type: Virus
Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows XP
W32.Jeefo detection is provided both for the W32.Jeefo stand-alone, first-generation executable and for a host application, which is infected with W32.Jeefo.W32.Jeefo infects the host application in three steps. The virus:
Imports the host's resources.
Encrypts data that represents the host application with the stripped resources.
Appends this particular data to the newly constructed executable.If W32.Jeefo detects that it is an infected host application, it will do the following:
Reconstruct the first-generation W32.Jeefo executable.
Drop it as Svchost.exe (36,352 bytes) into the %Windir% folder.Then, the dropped file will be run with the program parameter that specifies an infected application, which has dropped and run Svchost.exe.
It will quit.When svchost.exe (the first-generation W32.Jeefo executable) runs, it checks whether the program parameter specifies an infected application. If it detects that another application dropped and ran it, and that the application contains the following infection marker at a fixed file offset:Hidden Dragon virus. Born in a tropical swamp.it will perform the following actions:
Waits until the infected host quits so that its file is unlocked.
Reconstructs the original host by detaching appended data, decoding it, and moving the resources back to it.
Runs the reconstructed executable that does not contain W32.Jeefo code.In other words, when an application infected with W32.Jeefo is executed, the dropped W32.Jeefo first-generation program repairs it.If the operating system is Windows 95/98/Me, the first-generation W32.Jeefo performs the following actions:
Registers itself as a service process to hide itself from the task list.
Creates the value:"PowerManager"="%windir%\svchost.exe"in the registry key:HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices
so that the virus starts when you start or restart Windows 95/98/Me.NOTE: %Windir% is a variable. W32.Jeefo locates the Windows main installation folder (by default this is C:\Windows or C:\Winnt) and uses it as a destination folder.If the operating system is Windows NT/2000/XP, the first-generation W32.Jeefo performs the following actions:
Installs itself as the service, "Power Manager". The description of this service is "Manages the power save features of the computer."
Creates the PowerManagerMutant mutex. This mutex allows only one instance of the virus to execute in memory.Finally, W32.Jeefo initiates the infection routine that will enumerate and infect the Windows PE files.
NOTE: The first generation W32.Jeefo (36,352 bytes) will grow in size by the amount of resources imported from the host application.As the host application is appended with its resources stripped, the W32.Jeefo infection increases the file size of the host by 36,352 bytes.
Recommendations :
JeefoGui - Download Here