Other Posts

BitMate: A BitTorrent Client for Poor Bandwidth People

itTorrent is an excellent tool for sharing large files online, which is why millions of people use it every day. In developing third world countries, however, BitTorrent usage falls far behind, mainly because the transfer speeds are not that great on low bandwidth connections. Thanks to a new BitTorrent client, funded by a grant from the U.S. State Department, this […]

March 3, 2011 · 0 comments · Commentary

Android Malware DroidDream: How it Works

Yesterday, Google pulled more than 50 apps from the Android Market after they were found to contain the Android malware dubbed DroidDream. Similar to previous instances of Android malware that have been found on alternative Android app markets, the authors of DroidDream hid the malware in seemingly legitimate applications to trick unsuspecting users into downloading the malware—a growing trend in […]

March 3, 2011 · 0 comments · Commentary

Animation in Honeycomb

One of the new features ushered in with the Honeycomb release is a new animation system, a set of APIs in a whole new package (android.animation) that makes animating objects and properties much easier than it was before. “But wait!” you blurt out, nearly projecting a mouthful of coffee onto your keyboard while reading this article, “Isn’t there already an […]

February 24, 2011 · 1 comment · Commentary

Is Microsoft buying Nokia? An analysis of the acquisition endgame

The Elop and Ballmer duo on stage on February 11th was the main topic of discussion at this year’s Mobile World Congress. The reverberations of the Microsoft-Nokia announcement were felt even by the huge green robot tucked away at Google’s stand in Hall 8. Following the news of the Nokia and Microsoft tie-up, Stephen Elop’s appointment to the helm of […]

February 24, 2011 · 2 comments · Commentary

Controlling a Computer With Thoughts?

Researchers at the University of Pittsburgh have been awarded funding for two projects that will place brain-computer interfaces (BCI) in patients with spinal cord injuries to test if it is possible for them to control external devices, such as a computer cursor or a prosthetic limb, with their thoughts. The projects build upon ongoing research conducted in epilepsy patients who […]

February 17, 2011 · 0 comments · Commentary

Some File-Sharers Leave Trails To Their Front Door

Following the publication of a paper which investigates how using the same username across multiple web sites may expose Internet users to scammers, TorrentFreak decided to apply the same research idea to a random sampling of file-sharers, with some eye-opening results. A team of researchers from the French National Institute of Computer Science (INRIA) has just published their study of […]

February 15, 2011 · 0 comments · Commentary