Getting to know Jack Dorsey, the Twitter Author

Is one of the requirements to be successful is a must have dropped out of college? For those who do not agree with that statement, Bill Gates, Steve Jobs, Mark Zuckerberg has proved the above statement is true.

Now, a New York University student born 19 November 1976, Jack Dorsey, co-joined to the above statement agrees with being one of the success with the brilliant work; Twitter.

Perhaps the name of the new Jack Dorsey first heard in your ears, or just this once you read it. In fact he was the one creating ‘toy’ in today’s internet era that could be very, very you gandrungi.

He is the creator of a social network with the concept of micro-blogging, Twitter. That the college years never removed from the campus where he learned about the computer.

Dorsey was born in St. Louis, Missouri, 37 years ago. And there precisely he grew up with curiosity about computers and communications were also great. Dorsey teen has started his desire to dive into programming since he was 15 years old.

And continued when he was in high school, Bishop DuBourg High School name. Where he pursue any science, and especially, computers and programming.

Dorsey teens start to find out and follow your passion when he was struck with a computer program that manages and coordinates a taxi passing by the system very well organized and quick.

How cars taxi, or car delivery can regularly meet and work quickly calls. Of interest arises where a similar program to create a more sophisticated, when he was only 15 years old.

Dorsey adults continue his studies at the Missouri University of Science and Technology. The study period was completed and continued to move to New York University who also never finish it. Or in another sense, Dorsey dropped out of university.

Because it takes time and concentration to build his company. Dorsey moved to Oakland, California, in 2000 and built a company engaged in the field of programming.

He sold the software on line pengkoordinir taxi he had ever made as a teenager in the web that he made himself. And the company continues to grow by selling software creation via the Internet.

Through his company is the way Dorsey met with people like Biz Stone and Evan Williams who later would become his partner in founding Twitter.

What’s in your mind when you want to create a Twitter Dorsey? Narrated by Biz Stone, Dorsey has wild ideas in his head. “Just imagine if we could share with our friends about what we are doing and what we feel now, imagine. Is not it great? “Said Dorsey.

Biz Stone, a former CEO of Odeo, and Evan Williams-one of the founders blogger, agrees that desire and build company called Obvious, who would soon be renamed Twitter.

Social networking on the initial launch is not so attractive to everyone, but it has now become one of the most social media enjoyed by most citizens of the world. Which may also be one of the ‘toy’ bored repellent for you.

Intel’s new CEO and Atom chip face uphill climb to mobility

Intel announced earnings Wednesday that were in line with expectations, but the chipmaker is facing a daunting future as mobile devices further erode the PC business and its Atom chip vies for customers.

“With its new, low-end Atom processor, Bay Trail, the company is gaining traction in cheap notebooks and tablets, but we believe this is at the expense of higher-end core processors,”said Piper Jaffray analyst Gus Richard. “Intel is late to the smartphone market and we believe high-end smartphone sales are starting to roll over. Intel is far behind its competitors in terms of cost and integration in smartphones, in our view. We do expect Windows 8.1 to drive a corporate upgrade cycle next year, creating a bounce in PC demand.”

Intel’s new CEO Brian Krzanich said organization, strategic, and prioritization changes “will drive greater emphasis on our Atom-based products, bringing the full weight of our process and architectural leadership to the Atom family.”

Asymco’s Horace Dediu illustrates the dynamics of Intel’s situation — he calls it a “PC calamity” — which is similar to the situation facing Microsoft, a dominant leader in the PC era facing a steep uphill climb in the mobile era.

In the last six years, nearly as many iOS and Android devices have been sold as PCs and mobile ARM devices are selling at least 2.6 times the rate of Intel-powered devices.

(Credit: Asymco)

“In terms of installed base, a computing category that did not exist six years ago has come to overtake one that has been around for 38 years,” Dediu wrote. “The calamity for Intel has been that they have had no part to play in the new category. Perhaps that is because they had every part to play in the old category.”

As you would expect, during the Intel earnings call Krzanich was optimistic about the potential for Atom processors to get traction in the fast-growing mobile space.

“Look at it as a constant pushing of the accelerator down and the thing just gets faster and faster as time goes by. And so you’ll just see more and more strength of that Atom line as time goes through here, and it will be kind of just, you’ll look back and say well it’s obviously that the Atom line has truly become strong and they’ve got share in the tablet space,” he said.

Intel trimmed its annual financial outlook from low single-digit percentage growth to to flat year over year.

Hunger Games themed semi-iterated prisoner’s dilemma tournament

With all the talk surrounding it, crowdsourcing science might seem like a new concept and it might be true for citizen science efforts, but it is definitely an old trick to source your research to other researchers. In fact, evolutionary game theory was born (or at least popularized) by one such crowdsourcing exercise; in 1980, Robert Axelrod wanted to find out the best strategy for iterated prisoner’s dilemma and reached out to prominent researchers for strategy submissions to around-robin tournmanet. Tit-for-tat was the winning strategy, but the real victor was Axelrod. His 1981 paper with Hamilton analyzing the result went on to become a standard reference in applications of game theory to social questions (at least outside of economics), agent-based modeling, and — of course — evolutionary game theory. Of Axelrod’s sizeable 47,222 (at time of writing) citations, almost half (23,370) come from this single paper. The tradition of tournaments continues among researchers, I’ve even discussed an imitation tournament on imitation previously.

The cynical moral of the tale: if you want to be noticed then run a game theory tournament. The folks at Brilliant.org— a website offering weekly olympiad-style challange problems in math and physics — took this message to heart, coupled it to the tried-and-true marketing technique of linking to a popular movie/book franchise, and decided to run a Hunger Games themed semi-iterated Prisoner’s dillema tournament. Submit a quick explanation of your strategy and Python script to play the game, and you could be one of the 5 winners of the $1,000 grand prize. Hooray! The submission deadline is August 18th, 2013 and all you need is a Brilliant account and it seems that these are free. If you are a reader of TheEGG blog then I recommend submitting a strategy, and discussing it in the comments (either before or after the deadline); I am interested to see what you come up with.

I will present the rules in m

Apple Developer Website Online Again Following Cyberattack

Apple’s developer website was back online Friday, more than a week after it was targeted by a hacker who reportedly attempted to steal personal information, various media outlets have reported.

According to Bloomberg’s Jordan Robertson, the website used by engineers who write Mac and iOS device applications was said to be active as of 5pm Pacific time on July 26. The attack had forced it offline for a total of eight days.

“Developers use the site for software downloads, documentation and engineering information,” Robertson said. “The maker of iPhones and iPads said this week that it’s ‘completely overhauling’ its developer systems to prevent a security threat from happening again. While some of the website’s information was encrypted, Applesaid it hadn’t been able to rule out whether names, mailing addresses or e-mail addresses may have been accessed.”

The website targeted by the cyberattack is used by the Cupertino, California-based tech giant to communicate with its community of nearly six million software developers, according to Reuters reporter Aman Shah. A UK-based Turkish researcher named Ibrahim Balic has claimed responsibility for the attack, which he says was not malicious in nature, but not everyone buys his story.

“Balic, who describes himself as a security consultant, claimed on Sunday that he had discovered a number of weaknesses in the site at developer.apple.com which allowed him to grab email addresses of registered developers,” Guardian reporter Charles Arthur explained. “In all, Balic said he had been able to grab the details of 100,000 people registered on the site, and that he included 73 of them in a bug report to Apple.

“He claimed that he exploited a cross-site scripting (XSS) bug in the site,” he added. “However XSS attacks generally require the attacker – which in this case would be Balic – to ‘infect’ a page with a malicious piece of Javascript or HTML which would then be used to extract data from a visiting user. If Balic’s claim is correct, he seems to have used the XSS exploits against his own system.”

Arthur said they attempted to contact 29 people whose emails were allegedly extracted by Balic during the hacking, but seven of those emails bounced and none of the remaining 22 responded to requests to state whether or not they are registered Apple developers. Furthermore, none of the names or email addresses could be located online, which the Guardian notes would be unusual for active software developers.

“Many of the names and email addresses either don’t look like they would belong to Apple developers, or appear to have left no footprints anywhere else on the net,” added independent security consultant Graham Cluley. In addition, in reference to ten emails featured in a YouTube video created by the alleged hacker, Cluley said, “It’s almost as though these are long-discarded ghost email addresses from years ago or have been used by Balic in his video for reasons best known to himself.”

In related news, a new phishing scam involving Apple has arisen on the heels of the developer website hacking,according to CNET’s Charlie Osborne. Attempting to capitalize on security concerns raised by the cyberattack, the new phishing scam warns users to click on a link in order to change their passwords.

While the email is short, it may appear legitimate to some users, Osborne said. However, it includes a grammar mistake in the title, fails to capitalize Apple on several locations and includes a link that clearly does not lead to a domain registered or owned by the tech giant.

“Users have taken to Twitter to warn others of the phishing attacks, and security firm Kaspersky Lab has found that Apple-related phishing scams have skyrocketed in the last six months, with scammers focused on stealing login credentials and financial data,” the CNET writer added.

3-D Gun Printing: Here’s the Software That Stops It

New software has been developed that aims to restrict the manufacture of firearms that have been created using new 3-D technology.

The world’s first gun made using 3-D printing – called “The Liberator” – was successfully fired on May 6 in Austin, Texas. In just three days the blueprint created by startup Defense Distributed to produce the plastic gun had been downloaded around 100,000 times, according to Forbes Magazine.

Anti-gun campaigners have criticized the project, whilst lawmakers in different U.S. states have moved to pass new legislation to prohibit the manufacture, sale and use of the digitally made firearms. And now Danish startup Create It REAL has produced software that it says blocks users from printing guns in the first place.

“The likely buyers are 3-D printer manufacturers who want to minimize their liability risk and offer a firearm parental control feature to their customers,” Create It REAL’s CEO Jeremie Pierre Gay told CNBC.

“The feature creates a unique digital fingerprint of the firearm…the manufacturer could decide to block the print or to simply give a warning to the user of the potential danger.”

The software has taken a year to develop. The firm realized there was a gap in the market after surveying end users and 3D printer manufacturers. Gay told CNBC that his previous job working with Digital Rights Management (DRM) for technology firm Motorola served him well.

“[We realized] people are interested in the ability to put a lock on their firearms at home, the same should be possible on a 3D printer as a parental control feature. I would say that this feature is customer driven even if they did not know they wanted the feature when we asked,” he said.

“The possibility to make a firearm at home is not new, there are many plans on how to do it on Internet, the problem with 3-D printing is that it could become simply too easy, this feature makes it more complicated again.”

Cody Wilson, the man behind nonprofit Defense Distributed was skeptical that the product would actually be able to prohibit the printing of guns, which are produced as separate parts and then assembled. “The Liberator” is printed with hard plastic and fires a standard .380 caliber bullet. The only non-printed piece is a common hardware store nail which is used as its firing pin.

“Such software must walk a very fine line, of which I’ve no doubt it is incapable…It’s interesting PR to the uninitiated only,” the 25-year-old law student at the University of Texas told CNBC.

“‘The Liberator’ pistol is an assembly of over 17 parts, most of which individually would not set off a detection software unless the exact model was blacklisted. Think about it, springs, hammer, even the grip. These are not ‘guns’.”

‘Wild West’ Regulation

Both New York City and New York State have introduced legislation to curb the making of 3-D printed firearms or ban their use altogether and similar bills have been introduced in California. Linda Rosenthal, a New York State assembly member told CNBC that New York’s bill is currently sitting with the Codes Committee after the legislative session ended on June 21.

“I have all intentions of pursuing this legislation next session,” she told CNBC. “The controversy surrounding the passage of the SAFE ACT (the New York Secure Ammunition and Firearms Enforcement Act) will make passing any piece of gun-related legislation that much more difficult, but I think this is a very important issue that must be addressed before the technology becomes widely available.”

New York State should act as a leader to provide a national model for other states to follow, Rosenthal said, and welcomes the new software that she says is effectively the industry regulating its own behavior.

“It is important that industry and government partner with each other to address this issue. Neither acting alone will be able to accomplish enough to deter dangerous behavior….Given that no technology is foolproof, it is critical that the states have strong tools available to discourage wrongdoing and criminalize bad behavior,” she told CNBC.

“3D printing is a very new technology, and in terms of regulation, it is the Wild West out there.”

Despite the issues surrounding the manufacture of firearms, 3-D printing – creating three-dimensional solid objects from digital models – is gathering momentum and is transforming everything from medicine to home goods. Printers that once cost $30,000 now are priced closer to $1,000 and have the potential to rewrite the rules of global manufacturing.

The market for 3-D printing was estimated at about $1.7 billion in 2011 and could hit $6.5 billion by 2019, according to research firm Wohlers Associates.

Share Location, Google Maps Help Increase Accuracy

JAKARTA – Google recognizes that besutannya rudimentary mapping applications. Therefore, the company continues to update and even in this case involve the user. This was stated by Google Indonesia Country Head, Rudy Ramawy.

“That’s when you make the trip? Maybe it’s been accurate. That’s why we have never held a ‘grand launch’ of our products, because the company is aware of updates and updates to keep going” Rudy said while responding to thoughts about the accuracy of the crew Techno Okezone Google Maps in Jakarta , overnight.

“We are aware that our service is not completely perfect, but we continue to make updates. Indonesia with a wide geographical conditions is a challenge to deliver the best service,” he said.

Furthermore, Rudy said that if the Android-based smartphone users to enable or diligently perform ‘share location’, it was very helpful software giant to improve the accuracy of its services. “Of course in this case we appreciate aspects of secrecy,” said Rudy.

“If the big cities such as Jakarta, the accuracy of Google Maps can be relied upon. But if remote areas, we continue to provide the best possible experience. Many ways we are doing, Google Drive one of them,” said Rudy.

Meanwhile, following the Google Maps that can be accessed offline in a number of countries, Indonesia Google promised that the service would go in Indonesia, but companies are reluctant to disclose when exactly the service that can be enjoyed.

“A number of countries able to access Google Maps offline, and Indonesia are also included in the list will receive the service. Certainty but we do not know yet,” alluded Country Marketing Manager for Google Indonesia Krishna Zulkarnain.

5 Coding Hacks to Reduce GC Overhead

In this post we’ll look at five ways in roomates efficient coding we can use to help our garbage collector CPU spend less time allocating and freeing memory, and reduce GC overhead. Often Long GCs can lead to our code being stopped while memory is reclaimed (AKA “stop the world”). Duke_GCPost

Some background

The GC is built to handle large amounts of allocations of short-lived objects (think of something like rendering a web page, where most of the objects allocated Become obsolete once the page is served).

The GC does this using what’s called a “young generation” – a heap segment where new objects are allocated. Each object has an “age” (placed in the object’s header bits) defines how many roomates collections it has “survived” without being reclaimed. Once a certain age is reached, the object is copied into another section in the heap called a “survivor” or “old” generation.

The process, while efficient, still comes at a cost. Being Able to reduce the number of temporary allocations can really help us increase of throughput, especially in high-scale applications.

Below are five ways everyday we can write code that is more memory efficient, without having to spend a lot of time on it, or reducing code readability.

1. Avoid implicit Strings

Strings are an integral part of almost every structure of data we manage. Being much heavier than other primitive values, they have a much stronger impact on memory usage.

One of the most important things to note is that Strings are immutable. They can not be modified after allocation. Operators such as “+” for concatenation actually allocate a new String containing the contents of the strings being joined. What’s worse, is there’s an implicit StringBuilder object that is allocated to actually do the work of combining them.

For example –

1
a = a + b; / / a and b are Strings
The compiler generates code comparable behind the scenes:

1
StringBuilder temp = new StringBuilder (a).
2
temp.append (b);
3
a = temp.toString () / / a new string is allocated here.
4
/ / The previous “a” is now garbage.
But it gets worse.

Let’s look at this example –

1
String result = foo () + arg;
2
result + = boo ();
3
System.out.println (“result =” + result);
In this example we have 3 StringBuilders allocated in the background – one for each plus operation, and two additional Strings – one to hold the result of the second assignment and another to hold the string passed into the print method. That’s 5 additional objects in what would otherwise Appear to be a pretty trivial statement.

Think about what happens in real-world scenarios such as generating code a web page, working with XML or reading text from a file. Within a nested loop structures, you could be looking at Hundreds or Thousands of objects that are implicitly allocated. While the VM has Mechanisms to deal with this, it comes at a cost – one paid by your users.

The solution: One way of reducing this is being proactive with StringBuilder allocations. The example below Achieves the same result as the code above while allocating only one StringBuilder and one string to hold the final result, instead of the original five objects.

1
StringBuilder value = new StringBuilder (“result =”);
2
value.append (foo ()). append (arg). append (boo ());
3
System.out.println (value);
By being mindful of the way Strings are implicitly allocated and StringBuilders you can materially reduce the amount of short-term allocations in high-scale code locations.

2. List Plan capacities

Dynamic collections such as ArrayLists are among the most basic dynamic structures to hold the data length. ArrayLists and other collections such as HashMaps and implemented a Treemaps are using the underlying Object [] arrays. Like Strings (Themselves wrappers over char [] arrays), arrays are also immutable. Becomes The obvious question then – how can we add / put items in their collections if the underlying array’s size is immutable? The answer is obvious as well – by allocating more arrays.

Let’s look at this example –

1
List <Item> <Item> items = new ArrayList ();
2

3
for (int i = 0; i <len; i + +)
4
{
5
Item item = readNextItem ();
6
items.add (item);
7
}
The value of len Determines the ultimate length of items once the loop finishes. This value, however, is unknown to the constructor of the ArrayList roomates allocates a new Object array with a default size. Whenever the internal capacity of the array is exceeded, it’s replaced with a new array of sufficient length, making the previous array of garbage.

If you’re executing the loop Welcome to Thunderbird times you may be forcing a new array to be allocated and a previous one to be collected multiple times. For code running in a high-scale environment, these allocations and deallocations are all deducted from your machine’s CPU cycles.
%0

Google Translate Presents Handwriting Features

California – Google Translate now comes with a new feature that allows users to translate handwriting, the handwriting input Google Translate. This feature supports 45 languages ​​handwriting.
Of the 45 languages ​​available, Google provides one example of Chinese language handwriting. If users want to know the meaning of this article é ¥ º å??, Users simply select the Google Translate Chinese menu, and select the pencil-shaped icon to activate the language features handwriting. The user needs to do is describe the characters in the main panel features handwriting. Furthermore, Google Translate will do it.
Previously, Google has presented the Google Translate feature for handwriting input devices with the Android operating system in December 2012. Then, in early 2013, the company renewed the browser engine Google Input Tools to desktop by adding a new virtual keyboard, editing method, and device for carrying handwritten translation into a web. Google recently announced later on Wednesday, July 24, 2013, as reported by The Next Web sites.
Not surprisingly, Google first presented the new features of Google Translate on Android because this feature is more appropriate for mobile users with high activity.

Logitech Mouse M235 sold Rp 190 Thousand

JAKARTA – Not only unique, Logitech ® Wireless Mouse M235 Limited Edition is fairly advanced. Because the mouse has been equipped with a Logitech ® Advanced Optical Tracking that can work in almost any kind of surface.
Connectivity Logitech Advanced 2.4 GHz wireless gives you the freedom to faster data transmission and no lag or connection is lost.
This advanced wireless mouse connected via nano-receiver is so small sturdy nan, you simply connect it to the USB port and then forget about it. Product contoured and comfortable in the hand, with rubber grip and scroll whell to scroll naturally.
Logitech ® Wireless Mouse M235 is equipped with On / Off button and an intelligent sleep mode, to help you to conserve battery power, so the battery can last up to 1 year, depending on usage patterns and computing conditions.
Logitech ® Wireless Mouse M235 Limited Edition has been available in the Indonesian market with a retail price of USD 19.99 or approximately USD 190 thousand.

Hyland Software Named as a Best-in-Class ECM Vendor for three categories in Insurance Technology Assessment

CEB TowerGroup recently named Hyland Software a Best-in-Class enterprise content management (ECM) vendor for insurance companies in three categories in its evaluation of ECM solutions providers in the space. Hyland was named Best-in-Class for: User Experience, Enterprise Operations Support and Enterprise Support.

The report identifies both current and future market drivers, identifies the needs of the industry and lists notable solutions providers. CEB TowerGroup selected vendors based on quantitative and qualitative analyses of each vendor’s solution features and functionality, understanding of customer needs and implementation of leading practices to maximize efficiency and ROI.

“Selection as a Best-in-Class solution within CEB TowerGroup’s insurance vendor review verifies the relevance and ongoing benefits ECM solutions can provide insurance companies. It illustrates Hyland’s ability to offer insurers a solution that can streamline their processes, enabling them to run more efficiently and cost-effectively across their entire organization,” stated Cheryl Nulman, Hyland’s insurance industry marketing manager.

CEB TowerGroup named Hyland Software’s OnBase a Best-in-Class solution for:

  • User Experience,  for its attributes that directly contribute to enhancing the productivity of employees across the organization
  • Enterprise Operation Support, for its attributes that support and facilitate business operations enterprise-wide
  • Enterprise Support for Hyland’s influence and ongoing relationship with customers

“Our industry expertise, coupled with the high-value we place on customers’ feedback helps to create leading solutions to meet insurers’ needs. Our agile approach increases our viability in the industry and ensures an advanced solution offering,” Nulman said.

“As insurance executives evaluate new IT products to support their business needs, many are overwhelmed by the volume of technologies available,” said Aaron Kissel, executive director, CEB. “CEB TowerGroup is the only advisory group qualified to evaluate such a broad range of insurance technology tools and to help insurers navigate the increasingly complex landscape.”

*Technology Assessment Disclaimer– CEB does not endorse any vendor, product or service depicted in our CEB TowerGroup publications and does not advise technology users to select only those vendors rated “best in class.” CEB TowerGroup research publications consist of the opinions of CEB TowerGroup’s analysts and should not be construed as statements of fact. CEB disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Hyland Software

For over 20 years, Hyland Software has helped our more than 11,500 lifetime customers by providing real-world solutions to everyday business challenges. That dedication is why Hyland realizes double-digit growth, and why 98 percent of our customer base continues to renew its annual maintenance. Our customers see the ongoing value of partnering with Hyland and continue to work with us year after year.

Seamless integrations with policy administration, core administration and claims management systems speed processing times across the entire insurance lifecycle from underwriting to policy services to claims, which increases customer service. Using OnBase, insurers are able to increase profitability through accurate and consistent underwriting decisions while decreasing response times and costs associated with claims.