Skip to main content

Home/ Open Web/ Group items tagged #software

Rss Feed Group items tagged

Gary Edwards

New cool list of Linux must-have programs - 1 views

  •  
    Excellent list with both quick and extended reviews.  Excellent recommendations and critique.
Navin Goel

Manage your car rental business with fast and efficient car rental software - 0 views

  •  
    The new age business requires you to manage your finances and resources effectively in order to maximize your returns on investment. The car rental software is the best solution when you are looking to manage vehicle fleet efficiently.
Navin Goel

Car rental software for car rental companies - 0 views

  •  
    With the growing need for effective vehicle management for operational efficiencies, you should deploy car rental software that can smoothen your daily activity of managing booking as well as using limited resources so that they are used in their full capacity.
Navin Goel

Car Rental Software Can Help You Manage Your Vehicle Fleet Effectively and Efficiently ... - 0 views

  •  
    Software can cut wastages and add to your productivity in car rental biz. Improve your biz efficiency with the employment of car rental software that leads to automated solutions of managing customer bookings, fleet management etc.
Navin Goel

Maximize your returns with the use of Car rental software « Car rental software - 0 views

  •  
    Blog post on how Fleet operators can bring in operational efficiency in their business functioning. The car rental software is designed to meet the growing demands of a travel company that needs to manage its resources effectively and efficiently.
Paul Merrell

German Parliament Says No More Software Patents | Electronic Frontier Foundation - 0 views

  •  
    Note that an unofficial translation of the parliamentary motion is linked from the article. This adds substantially to the pressure internationally to end software patents because Germany has been the strongest defender of software patents in Europe. The same legal grounds would not apply in the U.S. The strongest argument for the non-patentability in the U.S., in my opinion, is that software patents embody embody both prior art and obviousness. A general purpose computer can accomplish nothing unforeseen by the prior art of the computing device. And it is impossible for software to do more than cause different sequences of bit register states to be executed. This is the province of "skilled artisans" using known methods to produce predictable results. There is a long line of Supreme Court decisions holding that an "invention" with such traits is non-patentable. I have summarized that argument with citations at . 
Paul Merrell

BT sues over hyperlink claim | Networking | ZDNet UK - 0 views

  • The lawsuit, filed against Prodigy Communications Wednesday in a New York federal court, follows BT's claim in June that it owns the intellectual property rights to hyperlinks. BT says the patent, discovered in a routine trawl through its own patents three years ago, also covers a basic technology necessary for connecting computer users to the Internet. The telco aims to require all ISPs who use hyperlinks -- a fundamental Web technology -- to pay BT a licence fee.
Paul Merrell

Supreme Court Will Hear Arguments On Section 101 Software Patent Eligibility | Bloomber... - 0 views

  • The Supreme Court granted a petition for writ of certiorari on Dec. 6 in a case challenging software method and system patent eligibility under 35 U.S.C. §101, in Alice Corp. Pty. Ltd. v. CLS Bank Int'l ( U.S., No. 13-298, review granted, 12/6/13).The question presented by the patent owner in the case is:Whether claims to computer-implemented inventions--including claims to systems and machines, processes, and items of manufacture--are directed to patent-eligible subject matter within the meaning of 35 U.S.C. §101 as interpreted by this Court? 
  • The CLS Bank case is controversial because the U.S. Court of Appeals for the Federal Circuit, sitting en banc, failed to reach enough agreement on patent eligibility of computer-related claims to supply precedential jurisprudence. CLS Bank Int'l v. Alice Corp. Pty. Ltd., 717 F.3d 1269, 2013 BL 124940, 106 U.S.P.Q.2d 1696 (Fed. Cir. 2013) (en banc) (92 PTD, 5/13/13).Alice Corp. asserted four patents (U.S. Patent Nos. 5,970,479; 6,912,510; 7,149,720; and 7,725,375) directed to the formulation and trading of risk management contracts against alleged infringer CLS Bank International.The en banc court was 7-3 against patent eligibility of the method claims and 5-5 as to the system claims. Since the lower court had ruled that the system claims were ineligible, that judgment stands and all of Alice's claims are ineligible unless the Supreme Court overturns the decision. Eight members of the en banc court said that method and system or media claims should rise or fall together, but not for the same reasons.
  •  
    U.S. Supreme Court finally to decide whether software patent claims are legal? It looks like this may finally be the case. 
Paul Merrell

Own Your Own Devices You Will, Under Rep. Farenthold's YODA Bill | Bloomberg BNA - 0 views

  • A bill introduced Sept. 18 would make clear that consumers actually owned the electronic devices, and any accompanying software on that device, that they purchased, according to sponsor Rep. Blake Farenthold's (R-Texas). The You Own Devices Act (H.R. 5586) would amend the Copyright Act “to provide that the first sale doctrine applies to any computer program that enables a machine or other product to operate.” The bill, which is unlikely to receive attention during Congress's lame-duck legislative session, was well-received by consumer's rights groups.
  • Section 109(a) of the Copyright Act, 17 U.S.C. §109(a), serves as the foundation for the first sale doctrine. H.R. 5586 would amend Section 109(a) by adding a provision covering “transfer of computer programs.” That provision would state:if a computer program enables any part of a machine or other product to operate, the owner of the machine or other product is entitled to transfer an authorized copy of the computer pro gram, or the right to obtain such copy, when the owner sells, leases, or otherwise transfers the machine or other product to another person. The right to transfer provided under this subsection may not be waived by any agreement.
  • ‘Things' Versus SoftwareFarenthold had expressed concern during a Sept. 17 hearing on Section 1201 of the Digital Millennium Copyright Act over what he perceived was a muddling between patents and copyrights when it comes to consumer products. “Traditionally patent law has protected things and copyright law has protected artistic-type works,” he said. “But now more and more things have software in them and you are licensing that software when you purchase a thing.” Farenthold asked the witnesses if there was a way to draw a distinction in copyright “between software that is an integral part of a thing as opposed to an add-on app that you would put on your telephone.”
  • ...1 more annotation...
  • H.R. 5586 seeks to draw that distinction. “YODA would simply state that if you want to sell, lease, or give away your device, the software that enables it to work is transferred along with it, and that any right you have to security and bug fixing of that software is transferred as well,” Farenthold said in a statement issued Sept. 19.
Paul Merrell

Popular Security Software Came Under Relentless NSA and GCHQ Attacks - The Intercept - 0 views

  • The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate networks, according to documents from NSA whistleblower Edward Snowden. The spy agencies have reverse engineered software products, sometimes under questionable legal authority, and monitored web and email traffic in order to discreetly thwart anti-virus software and obtain intelligence from companies about security software and users of such software. One security software maker repeatedly singled out in the documents is Moscow-based Kaspersky Lab, which has a holding registered in the U.K., claims more than 270,000 corporate clients, and says it protects more than 400 million people with its products. British spies aimed to thwart Kaspersky software in part through a technique known as software reverse engineering, or SRE, according to a top-secret warrant renewal request. The NSA has also studied Kaspersky Lab’s software for weaknesses, obtaining sensitive customer information by monitoring communications between the software and Kaspersky servers, according to a draft top-secret report. The U.S. spy agency also appears to have examined emails inbound to security software companies flagging new viruses and vulnerabilities.
  • The efforts to compromise security software were of particular importance because such software is relied upon to defend against an array of digital threats and is typically more trusted by the operating system than other applications, running with elevated privileges that allow more vectors for surveillance and attack. Spy agencies seem to be engaged in a digital game of cat and mouse with anti-virus software companies; the U.S. and U.K. have aggressively probed for weaknesses in software deployed by the companies, which have themselves exposed sophisticated state-sponsored malware.
  • The requested warrant, provided under Section 5 of the U.K.’s 1994 Intelligence Services Act, must be renewed by a government minister every six months. The document published today is a renewal request for a warrant valid from July 7, 2008 until January 7, 2009. The request seeks authorization for GCHQ activities that “involve modifying commercially available software to enable interception, decryption and other related tasks, or ‘reverse engineering’ software.”
  • ...9 more annotations...
  • The NSA, like GCHQ, has studied Kaspersky Lab’s software for weaknesses. In 2008, an NSA research team discovered that Kaspersky software was transmitting sensitive user information back to the company’s servers, which could easily be intercepted and employed to track users, according to a draft of a top-secret report. The information was embedded in “User-Agent” strings included in the headers of Hypertext Transfer Protocol, or HTTP, requests. Such headers are typically sent at the beginning of a web request to identify the type of software and computer issuing the request.
  • According to the draft report, NSA researchers found that the strings could be used to uniquely identify the computing devices belonging to Kaspersky customers. They determined that “Kaspersky User-Agent strings contain encoded versions of the Kaspersky serial numbers and that part of the User-Agent string can be used as a machine identifier.” They also noted that the “User-Agent” strings may contain “information about services contracted for or configurations.” Such data could be used to passively track a computer to determine if a target is running Kaspersky software and thus potentially susceptible to a particular attack without risking detection.
  • Another way the NSA targets foreign anti-virus companies appears to be to monitor their email traffic for reports of new vulnerabilities and malware. A 2010 presentation on “Project CAMBERDADA” shows the content of an email flagging a malware file, which was sent to various anti-virus companies by François Picard of the Montréal-based consulting and web hosting company NewRoma. The presentation of the email suggests that the NSA is reading such messages to discover new flaws in anti-virus software. Picard, contacted by The Intercept, was unaware his email had fallen into the hands of the NSA. He said that he regularly sends out notification of new viruses and malware to anti-virus companies, and that he likely sent the email in question to at least two dozen such outfits. He also said he never sends such notifications to government agencies. “It is strange the NSA would show an email like mine in a presentation,” he added.
  • As government spies have sought to evade anti-virus software, the anti-virus firms themselves have exposed malware created by government spies. Among them, Kaspersky appears to be the sharpest thorn in the side of government hackers. In the past few years, the company has proven to be a prolific hunter of state-sponsored malware, playing a role in the discovery and/or analysis of various pieces of malware reportedly linked to government hackers, including the superviruses Flame, which Kaspersky flagged in 2012; Gauss, also detected in 2012; Stuxnet, discovered by another company in 2010; and Regin, revealed by Symantec. In February, the Russian firm announced its biggest find yet: the “Equation Group,” an organization that has deployed espionage tools widely believed to have been created by the NSA and hidden on hard drives from leading brands, according to Kaspersky. In a report, the company called it “the most advanced threat actor we have seen” and “probably one of the most sophisticated cyber attack groups in the world.”
  • The Project CAMBERDADA presentation lists 23 additional AV companies from all over the world under “More Targets!” Those companies include Check Point software, a pioneering maker of corporate firewalls based Israel, whose government is a U.S. ally. Notably omitted are the American anti-virus brands McAfee and Symantec and the British company Sophos.
  • The NSA presentation goes on to state that its signals intelligence yields about 10 new “potentially malicious files per day for malware triage.” This is a tiny fraction of the hostile software that is processed. Kaspersky says it detects 325,000 new malicious files every day, and an internal GCHQ document indicates that its own system “collect[s] around 100,000,000 malware events per day.” After obtaining the files, the NSA analysts “[c]heck Kaspersky AV to see if they continue to let any of these virus files through their Anti-Virus product.” The NSA’s Tailored Access Operations unit “can repurpose the malware,” presumably before the anti-virus software has been updated to defend against the threat.
  • Hacks deployed by the Equation Group operated undetected for as long as 14 to 19 years, burrowing into the hard drive firmware of sensitive computer systems around the world, according to Kaspersky. Governments, militaries, technology companies, nuclear research centers, media outlets and financial institutions in 30 countries were among those reportedly infected. Kaspersky estimates that the Equation Group could have implants in tens of thousands of computers, but documents published last year by The Intercept suggest the NSA was scaling up their implant capabilities to potentially infect millions of computers with malware. Kaspersky’s adversarial relationship with Western intelligence services is sometimes framed in more sinister terms; the firm has been accused of working too closely with the Russian intelligence service FSB. That accusation is partly due to the company’s apparent success in uncovering NSA malware, and partly due to the fact that its founder, Eugene Kaspersky, was educated by a KGB-backed school in the 1980s before working for the Russian military.
  • Kaspersky has repeatedly denied the insinuations and accusations. In a recent blog post, responding to a Bloomberg article, he complained that his company was being subjected to “sensationalist … conspiracy theories,” sarcastically noting that “for some reason they forgot our reports” on an array of malware that trace back to Russian developers. He continued, “It’s very hard for a company with Russian roots to become successful in the U.S., European and other markets. Nobody trusts us — by default.”
  • Documents published with this article: Kaspersky User-Agent Strings — NSA Project CAMBERDADA — NSA NDIST — GCHQ’s Developing Cyber Defence Mission GCHQ Application for Renewal of Warrant GPW/1160 Software Reverse Engineering — GCHQ Reverse Engineering — GCHQ Wiki Malware Analysis & Reverse Engineering — ACNO Skill Levels — GCHQ
Gary Edwards

Quest Software Unveils 2011 Predictions for Cloud Computing, Virtualization and Identit... - 0 views

  •  
    Quest Software, Inc. (QSFT 25.89, -0.08, -0.31%) today unveiled 11 technology predictions for 2011 based on results of its annual survey conducted at The Experts Conference (TEC) U.S., hosted earlier this year by Quest. Survey results were analyzed by Quest experts to extract key insights and compelling trends. Based on analysis of this year's TEC conference survey responses from in-the-trenches IT practitioners, as well as historical perspective gleaned from conducting annual surveys, Quest offers the following 11 predictions about key technology trends and practices. To download the complete description of the predictions or to view the full survey data, please visit
cecilia marie

Software Support Saved My Spring Days - 1 views

Last spring, I was having trouble with a recurrent problem from a software I installed on my PC. It keeps on displaying errors on the screen which really got me ticked off. After 2 weeks of putting...

software support

started by cecilia marie on 10 Aug 11 no follow-up yet
shalani mujer

Effective Tech Software Support - 1 views

Before I used to to go to computer repair shops and have my computer repaired by technicians. However, it takes time and it is possible that it would take days. It was really that inconvenient for ...

software support

started by shalani mujer on 12 Sep 11 no follow-up yet
cecilia marie

Choosing the Right Software Support Provider is Everything - 1 views

I was having problems with my computer that I did not know what to do. So I searched the internet for a reliable computer software support service provider and I came across Tech Software Support....

software support

started by cecilia marie on 04 Nov 11 no follow-up yet
ma0477758

try it now free demo FACEBOOK AUTOPILOT - 0 views

  •  
    Facebook autopilot is a creative software, which can share on Facebook groups and comments just like a real human
  •  
    is a creative software, which can share on Facebook groups and comments just like a real human no api
Paul Merrell

Free At Last: New DMCA Rules Might Make the Web a Better Place | nsnbc international - 0 views

  • David Mao, the Librarian of Congress, has issued new rules pertaining to exemptions to the Digital Millennium Copyright Act (DMCA) after a 3 year battle that was expedited in the wake of the Volkswagen scandal.
  • Opposition to this new decision is coming from the Environmental Protection Agency (EPA) and the auto industry because the DMCA prohibits “circumventing encryption or access controls to copy or modify copyrighted works.” For example, GM “claimed the exemption ‘could introduce safety and security issues as well as facilitate violation of various laws designed specifically to regulate the modern car, including emissions, fuel economy, and vehicle safety regulations’.” The exemption in question is in Section 1201 which forbids the unlocking of software access controls which has given the auto industry the unique ability to “threaten legal action against anyone who needs to get around those restrictions, no matter how legitimate the reason.” Journalist Nick Statt points out that this provision “made it illegal in the past to unlock your smartphone from its carrier or even to share your HBO Go password with a friend. It’s designed to let corporations protect copyrighted material, but it allows them to crackdown on circumventions even when they’re not infringing on those copyrights or trying to access or steal proprietary information.”
  • Kit Walsh, staff attorney for the Electronic Frontier Foundation (EFF), explained that the “‘access control’ rule is supposed to protect against unlawful copying. But as we’ve seen in the recent Volkswagen scandal—where VW was caught manipulating smog tests—it can be used instead to hide wrongdoing hidden in computer code.” Walsh continued: “We are pleased that analysts will now be able to examine the software in the cars we drive without facing legal threats from car manufacturers, and that the Librarian has acted to promote competition in the vehicle aftermarket and protect the long tradition of vehicle owners tinkering with their cars and tractors. The year-long delay in implementing the exemptions, though, is disappointing and unjustified. The VW smog tests and a long run of security vulnerabilities have shown researchers and drivers need the exemptions now.” As part of the new changes, gamers can “modify an old video game so it doesn’t perform a check with an authentication server that has since been shut down” and after the publisher cuts of support for the video game.
  • ...1 more annotation...
  • Another positive from the change is that smartphone users will be able to jailbreak their phone and finally enjoy running operating systems and applications from any source, not just those approved by the manufacturer. And finally, those who remix excerpts from DVDs, Blu – Ray discs or downloading services will be allowed to mix the material into theirs without violating the DMCA.
Paul Merrell

Trump administration pulls back curtain on secretive cybersecurity process - The Washin... - 0 views

  • The White House on Wednesday made public for the first time the rules by which the government decides to disclose or keep secret software flaws that can be turned into cyberweapons — whether by U.S. agencies hacking for foreign intelligence, money-hungry criminals or foreign spies seeking to penetrate American computers. The move to publish an un­classified charter responds to years of criticism that the process was unnecessarily opaque, fueling suspicion that it cloaked a stockpile of software flaws that the National Security Agency was hoarding to go after foreign targets but that put Americans’ cyber­security at risk.
  • The rules are part of the “Vulnerabilities Equities Process,” which the Obama administration revamped in 2014 as a multi­agency forum to debate whether and when to inform companies such as Microsoft and Juniper that the government has discovered or bought a software flaw that, if weaponized, could affect the security of their product. The Trump administration has mostly not altered the rules under which the government reaches a decision but is disclosing its process. Under the VEP, an “equities review board” of at least a dozen national security and civilian agencies will meet monthly — or more often, if a need arises — to discuss newly discovered vulnerabilities. Besides the NSA, the CIA and the FBI, the list includes the Treasury, Commerce and State departments, and the Office of Management and Budget. The priority is on disclosure, the policy states, to protect core Internet systems, the U.S. economy and critical infrastructure, unless there is “a demonstrable, overriding interest” in using the flaw for intelligence or law enforcement purposes. The government has long said that it discloses the vast majority — more than 90 percent — of the vulnerabilities it discovers or buys in products from defense contractors or other sellers. In recent years, that has amounted to more than 100 a year, according to people familiar with the process. But because the process was classified, the National Security Council, which runs the discussion, was never able to reveal any numbers. Now, Joyce said, the number of flaws disclosed and the number retained will be made public in an annual report. A classified version will be sent to Congress, he said.
saiedootech

طرق تحسين أداء الألعاب وتطبيقات الهواتف 2023 - سـعـيـدو تــــك - 0 views

  •  
    طرق تحسين أداء الألعاب وتطبيقات الهواتف المحمولة، حيث تتضمن أنظمة التشغيل العديد من الأخطاء التي تؤثر بشكل أو بآخر على أداء الجهاز، ولكن من الجيد أن الأجهزة تتم تحديثها بشكل متكرر، وتلك التحديثات تعمل على تصليح الأخطاء الموجودة.........
  •  
    طرق تحسين أداء الألعاب وتطبيقات الهواتف المحمولة، حيث تتضمن أنظمة التشغيل العديد من الأخطاء التي تؤثر بشكل أو بآخر على أداء الجهاز، ولكن من الجيد أن الأجهزة تتم تحديثها بشكل متكرر، وتلك التحديثات تعمل على تصليح الأخطاء الموجودة في الجهاز........
saiedootech

كود معرفة رصيد اتصالات مجانا - سـعـيـدو تــــك - 0 views

  •  
    معرفة رصيد اتصالات او معرفة الرصيد عموما لكل الشبكات هي خدمة أساسية تقدمها شركات الاتصالات جميعا إلى جميع عملائها ومن ضمنهم شبكة اتصالات، ويعتبر معرفة رصيد اتصالات خدمة من خدمات عديدة ومتنوعة تقدمها شركة اتصالات......
  •  
    معرفة رصيد اتصالات او معرفة الرصيد عموما لكل الشبكات هي خدمة أساسية تقدمها شركات الاتصالات جميعا إلى جميع عملائها ومن ضمنهم شبكة اتصالات، ويعتبر معرفة رصيد اتصالات خدمة من خدمات عديدة ومتنوعة تقدمها شركة اتصالات......
1 - 20 of 34 Next ›
Showing 20 items per page