Jump to content

Saran999

Retired Staff
  • Content Count

    740
  • Donations

    $0.00 
  • Joined

  • Last visited

  • Days Won

    25

Everything posted by Saran999

  1. https://www.youtube.com/watch?feature=player_embedded&v=qaLxz0AgGiU https://www.youtube.com/watch?feature=player_embedded&v=bHh_YJp9MSs https://www.youtube.com/watch?feature=player_embedded&v=Yz7WIdyfHC0 https://www.youtube.com/watch?v=osnBG6nwqKU&src_vid=bHh_YJp9MSs&feature=iv&annotation_id=annotation_1014273011
  2. Paroxysm fit of passion; laughter; coughing; sudden violent action
  3. I wish to start a series of threads about the possibility to use simple, Linux based, OS distributions that are oriented to anonymity and privacy. There are few of them and I will discuss them in separate threads to better focus on possibilities and caveats. From the simple Tails to the more complex Whonix, passing through Anonymous OS and Occupy OS. The reason for this is to let aware that exists solutions to be able to leave few or no track of your browsing, if this topic may interest you. As an example, simply booting from a prepared USB key, with Tails or Liberte' on it, will change constantly your mac address and using TOR you will be more secure in your connections. REMEMBER: TOR will encrypt everything, but the headers of your HTTP requests. So, be wise If you mark your USB 'read-only' then, you will not leave any trace on it, and in any case, you will not leave any trace on your host computer. You may choose a Mac or a PC, and be able, after reboot, to have a clean and secure environment that will disappear simply when you shut down the chosen machine. In fact, Tails and Liberte', for instance, have a function that shut-down the computer whenever you remove your USB stick, and they do so very fast. No traces, nothing whatsoever. So, a friend PC, or a friendly (that accept your machine shut-down) internet cafe' may transform you in the perfect anonymous surfer. You may do many of the normal actions online, and if you are smart enough, you may create some mail account on Hushmail and manage them only through this method. This will greatly enhance your privacy and security. This topic is only to provide awareness and to avoid easy privacy leakages, trying to defend ourselves from the growing data gathering operated by commercial companies. For sure, most of those methods and OS will not avoid professional and direct internet surveillance techniques. So, you will not be able to freely break the law with the info provided herein. But as you already know, I'll never condone such actions. How many of you are concerned about privacy and security? How many of you want to learn more about this subject? Let's talk about it
  4. Saran999

    Evolution of Dance

    Lambada...
  5. Heck referring to a chemical reaction, pls have a look @ https://en.wikipedia.org/wiki/Heck_reaction So, one can say: 'what a heck of heck reaction!'
  6. Echolalia echo-like repetition of another's words
  7. Saran999

    I Love You Sweetheart ! ....

    Saaaaaad....but reality...
  8. It’s Saturday, folks, so calm down and have a laugh. Do this: Stop caring about Apple and Android and Microsoft and Google and the phone in your pocket and the platform of your dreams and all that. Instead, giggle at the following video clip in which Microsoft takes on Apple in a way that... you'll judge by yourself Microsoft knew that the clip would cause controversy, and they yanked it quickly, likely as planned. Whatever. It’s still farking hilarious and worth watching. If you can’t laugh, you can’t take a joke and that means you are three points of calcification from being a statue. Laugh! Enjoy: https://www.youtube.com/watch?feature=player_embedded&v=avO5FXj7K-c
  9. http://vimeo.com/37792362 1 Second Everyday is an app that lets users record one second of every day of their lives, effectively creating a lifetime supercut for the purpose of capturing and evoking memories. One second, the app stresses, is all it takes to bring back a whole day’s events. And it’s taking off. Creator Cesar Kuriyama states that his app’s downloads are in the hundreds of thousands. http://1secondeveryday.com/ The reality of a one-second app shouldn’t have come as such a surprise. Every new video application attaches another seemingly arbitrary number of seconds to cap off the clip. Instagram Video’s is 15, and Vine’s is six. The new video record-and-edit app MixBit’s is 16. But what do these numbers actually mean, if anything? What do the seconds in a clip say about what and how much one can convey, about the process of creation, about the user themselves? http://vimeo.com/65154352 Kuriyama states, “I have seconds that look incredibly boring, but represent ridiculously meaningful events in my life, and I have seconds that look gorgeous, but may have been relatively insignificant days of my life. Each second is a secret code to myself that only I know the hidden meaning of.” According to Kuriyama, viewing one second of an event is just enough time to evoke a whole memory of an event, or an entire day. Recording just one second of an occasion also lets users spend their extra time not recording or not taking photos to be present and experience the moment as is. A five-second difference in video length between Vine and 1 Second Everyday might not seem to amount to a lot, and in the physical sense, it does not. But the truth is, it’s harder to film short. It’s more difficult to convey a story in six seconds or in one second. The basics have to stay in, and clarity is a must. The questions then become how and who? How does one creatively and intelligently fit enough information into a few-seconds clip? And who is watching? Read more @ http://readwrite.com/2013/09/13/one-second-video-apps-number-of-seconds-in-your-video-app-says-about-you#awesm=~ohoSILx4rVgEX4
  10. When a company takes itself public, it can function like a shock to the internal system, especially at companies accustomed to operating in start-up mode. Money rushes in, some longtime employees cash out, and new pressures loom over management to increase revenue. So Twitter, the latest high-profile I.P.O., will probably face some significant changes. Many technology firms pledge to maintain a kind of nimble, hacker ethos after they go public. But Shai Bernstein, a professor at Stanford’s Graduate School of Business, has conducted research that shows that rarely happens — and his work suggests that companies move in the opposite direction. After a company goes public, he said, “I find there is a substantial decline in the quality of innovation.” His 2012 study, “Does Going Public Affect Innovation?” measured the number of patents and their influence before and after their I.P.O.’s. (It had a control group of companies who planned to go public, but did not.) In an interview, Mr. Bernstein identified five theories on why his research uncovered these findings. 1. Inventive People Cash Out For many early start-up employees, who are vital to the company’s success, an I.P.O. can be the payday they’ve been waiting for. “Those that are responsible for the more fundamental or core innovations before the I.P.O.? These are the guys who are more likely to leave,” he said. Whether they are going to invest in a sailboat or another start-up, the most valuable innovators who have been waiting around for a payday often see a public offering as the moment to move on. 2. Inventive People Keep Inventing, Elsewhere Talented tech employees might leave after an I.P.O. because of the company’s culture, too. A newly public company’s focus on revenue (or ads in the case of Twitter or Facebook) can change projects, assignments and priorities. If creative minds who want to “change the world” are not thrilled at the prospect of engineering incremental improvements, they may be headed out the door, he said. “Imagine that you have a brilliant idea,” said Mr. Bernstein. “It’s more attractive to explore that in a private setting where you are the owner, than in a public firm, where whatever ownership you had is now heavily diluted.” “They do seem to remain entrepreneurial,” he said — just not at the company their innovations helped build. 3. Management Clamps Down on Risky, Creative Work Twitter started as a side project created by developers working on a failed audio start-up, Odeo. But with new pressure to deliver on quarterly results, managers at the company may be less willing to back the kinds of hobbyist passion projects that were the very genesis of the company they are managing today. Mr. Bernstein said that the need to show growth every quarter, in both users and revenue, may shift Twitter’s focus away from risk-taking. “I see substantial decline in the quality of the work after the I.P.O.,” Mr. Bernstein said, with fewer influential patents and ideas. 4. Why Build Innovation When You Can Buy It? Newly flush with capital, many companies who recently took the I.P.O. route find that instead of relying on their original innovators, buying new technologies is more effective than building them. After an I.P.O., said Mr. Bernstein, there is a significant increase in the likelihood to acquire companies. For Twitter, which bought 10 companies in 2012, the shopping spree is likely to continue. According to Mr. Bernstein’s research, one can expect the social media network to keep buying other start-ups whose technology is superior to what it can produce in-house. 5. New Hires Arrive, with Different Priorities More access to capital often means that newly public companies can go on a hiring binge, and many do. “There is substantial employee turnaround,” Mr. Bernstein said of the newly public companies he studied. But if Twitter begins bringing on a fleet of new engineering talent, they no longer have the same incentives — namely stock options for a future I.P.O. — to attract star developers as they did before. New hires will arrive, but will be less a part of “building something big,” and increasingly part of growing and maintaining someone else’s ideas. Read more @ http://bits.blogs.nytimes.com/2013/09/13/5-reasons-that-innovation-at-twitter-might-take-a-hit/?_r=0
  11. Saran999

    iOS7 is a Must Have Upgrade?

    Apple revealed that the new iOS7 mobile operating system will be available for download on September 18th. iOS7 is quite different to the current iOS6 you have on your iPhone today. Colors, fonts and icons are just the obvious differences, but there are more. Are you ready for the new OS or do you hold off on upgrading. You will have to learn new stuff and get adjusted to where some of the features are on iOS7. Is the new factor bigger than the effort of managing the change? Usually I always upgrade right away. Although I do not feel any pain right now with the use of the iPhone. Will iOS7 dramatically change my iPhone experience? Probably not. Maybe some of the new features will make it into my daily routine. The biggest impact will likely be the new camera features of iOS7. But perhaps, the best reason to upgrade is the fact that the jailbreaking crew was waiting this update to release the much needed untethered jailbreak that will boost again my device with lots of app, and some manageable security risks. Of course expect slow downloads speeds when Apple opens the iOS7 downloads. You either hit right when they release it or you better wait a day until the dust settles. Watch Apple's iOS7 video below. https://www.youtube.com/watch?feature=player_embedded&v=F0ErUMeT7uE
  12. The trick to make a paper aeroplane fly forever isn’t in the quality of the paper or the intricacy of the folding, it’s in using an electric cooker to keep the paper aeroplane afloat in constant motion. https://www.youtube.com/watch?feature=player_embedded&v=t2sozrof3HY Just watch the video above, the paper aeroplane keeps going in circles and circles and circles over the cooker. Of course you may end up accidentally burning something but imagine the awesome points your childhood self would give your current day self.
  13. As expected, Apple’s Town Hall September 10th event went by without even a hint of a could-be iWatch, or any sort of wearable tech product. However, during the presentation Phil Schiller did tout an intriguing new iPhone 5S feature — the introduction of an all-new co-processor, dubbed the M7. The new iPhone 5S co-processor is dedicated to continuously measuring motion, be that via the accelerometer, compass and/or gyroscope. As Alex Colon explains, the M7 chip functions independently of the iPhone’s primary A7 processor, working on sensing when you’re walking, running or driving. Such a chip has plenty of applications, primarily for feeding data into health and fitness apps, but also for saving battery life when travelling, say by car, by stopping your iPhone’s constant hunt for in-range Wi-Fi networks. We already know that Apple CEO Tim Cook finds the emerging wearable technology space to be one of great intrigue, himself admitting to being a user of Nike’s FuelBand. Back at the D11 conference this May, Cook revealed he finds the wrist “interesting”, adding that wearable tech is an area that’s “ripe for exploration”. Beyond Cook’s own thoughts and observations, several Apple patents give further credence to the idea that Apple wants in on wearables. The M7 chip could just be the thing to get the ball rolling, setting a trend for a whole set of new apps that make use of its constant motion measuring. Eventually this new chip will inevitably make its way into a range of other products across the iOS product line, with it growing the number of supported apps. In due course, there will likely be a number of apps that a companion device — namely a wrist-worn gadget of some form — could support. Tracking your motion without the need to remember “Is my phone in my pocket?” Heading over to the restroom or leaving the office to make a coffee may seem like small granular activities, but to die-hard app trackers, say for those using a pedometer app, it all adds up. With some form of wrist device, it doesn’t matter if your phone skips the journey and stays at your desk. Read more @ http://gigaom.com/2013/09/13/apples-m7-chip-is-the-trojan-horse-for-its-wearable-computing-plans/
  14. When the iPhone 5S and 5C were made official earlier this week, one thing was clear: Apple now has a very leaky ship when it comes to the details of its next generation products. Most of the hardware features Apple introduced to its smartphones were already known about, and on stage the words “as you may have already heard” were repeated a few times, confirming Apple reads the rumors. And now we move on to more iPad leaks, which are probably the real deal, too. We’ve seen images of the fifth generation iPad leak already, and it looks as though Apple is trying to bring the look of the iPad 5 in line with the styling of the iPad mini. This has been confirmed by the latest leak through the reliable source that is Sonny Dickson. He has managed to capture images of what appears to be the iPad 5 next to the iPad mini 2. The iPad mini hasn’t changed much, where as the larger iPad looks like someone just grabbed the corners of the mini and stretched it out a bit. Both look to be the same thickness, but the iPad 5 is expected to have a much thinner bezel to make it smaller while carrying the same 9.7-inch Retina Display. The iPad 5 will definitely be getting a performance bump just like the iPhone 5S came with, but all eyes will be on the iPad mini 2. That’s because Apple is expected to kit it out with a Retina Display, meaning it will require a major spec bump in order to cope with the higher resolution display. Maybe that’s the reason it’s the same thickness as the larger iPad–to allow for a larger battery and better cooling for those higher performance components. Hopefully we won’t have long to wait before both new tablets get official. With the new iPhones coming to market this month, Apple’s focus will be on the iPad and iPad mini refreshes in the coming weeks. Read more @ http://www.geek.com/apple/ipad-5-and-ipad-mini-2-side-by-side-images-leak-1570611/
  15. An oversized smartphone with Zeiss optics and PureView camera technology? We wouldn't expect anything less from Nokia, but it's nice to see the rumors roll in, all the same. Noted Weibo leaker Houdabao has managed to get his hands on a large Lumia device with a PureView 20-megapixel camera, Zeiss optics and Verizon branding. The post describes the devices as a "big big Windows Phone," which sounds an awful lot like the rumored Lumia 1520. The speakers and camera flash are in slightly different locations than the leaked image we saw earlier this month, but we're willing to chalk that up to carrier variations. Nokia hasn't said anything official just yet, but rumors suggest that the device will be officially unveiled later this month. Read more @ http://www.engadget.com/2013/09/13/verizon-branded-lumia-1520-variant-leaked-in-china/
  16. Phone maker considered Google OS A team within Nokia had reportedly worked to run Android on the company's Lumia handsets, however the Microsoft takeover is expected to halt the project, according to a New York Times report. The tests are said to have achieved success well before the companies began negotiating the $7.2 billion acquisition, though the efforts were kept secret. Nokia has been criticized for signing an exclusive deal with Microsoft in 2011, forcing the Finnish handset maker to embrace Windows Phone for its range of Lumia handsets. As Microsoft's mobile OS struggled to gain traction, competitors such as Samsung embraced Android as it rose to dominance in the smartphone arena. The Windows Phone exclusivity deal reportedly left Nokia with an opt-out option after 2014. A threat of switching to Android is not believed to have been a factor in the acquisition talks, though the quiet Android development suggests Nokia had been reconsidering the ongoing partnership. A separate report last week suggested Microsoft and Nokia had kept secrets from each other, despite their tight collaboration on Windows Phone. Windows Phone executive Joe Belfiore claimed a lack of communication caused problems during development. Microsoft suggests its purchase of Nokia's mobile phone division will strengthen its position in the market and help Windows Phone gain market share. Read more @ http://www.electronista.com/articles/13/09/13/phone.maker.considered.google.os/
  17. If you're among those eagerly awaiting a working invisibility cloak, get ready to be jealous. A South Korean skyscraper may get one before we humble (and highly visible) humans do. International architectural firm GDS Architects reports that it's received a construction permit to begin building "the world's first invisible tower." The Tower Infinity will stand 450 meters (1,476 feet) and be situated in Cheongna, near the Incheon Airport just outside of Seoul. Like other concepts for invisibility cloaks that have tantalized the geeky imagination, this one relies on optical illusion. The glass-encased Tower Infinity, also called City Tower, will be fitted with a high-tech LED facade that integrates projectors and 18 strategically placed weatherproof optical cameras. The cams will snap real-time pictures of the area directly behind the building, digitally stitch the images into a panorama, and project them back onto the building's reflective surface. That will create the illusion that viewers are looking straight through the structure to the other side, making it appear to blend into the skyline at certain times of day. "The tower subtly demonstrates Korea's rising position in the world by establishing its powerful presence through diminishing its presence," reads a description on the GDS site. "Korea will have the unique position of having the 'best' tower by having an 'anti-tower." Do note, though, that the concept's not just about symbolism. "This same technology also allows the tower to become a 450-meter-tall billboard screen and urban focal point for all arriving at Incheon," GDS says in a statement. No word year on the relationship between the structure's invisibility and planes from the nearby airport. In addition to possessing superhero capabilities, the tower will house a 4D theater, a water park, landscaped gardens, and the third-highest observation deck in the world. GDS has not revealed a target completion date. Read more @ http://news.cnet.com/8301-17938_105-57602884-1/whered-that-building-go-korea-to-get-invisible-skyscraper/
  18. Following revelations about the NSA’s covert influence on computer security standards, the National Institute of Standards and Technology, or NIST, announced earlier this week it is revisiting some of its encryption standards. But in a little-noticed footnote, NIST went a step further, saying it is “strongly” recommending against even using one of the standards. The institute sets standards for everything from the time to weights to computer security that are used by the government and widely adopted by industry. As ProPublica, the New York Times, and the Guardian reported last week, documents provided by Edward Snowden suggest that the NSA has heavily influenced the standard, which has been used around the world. In its statement Tuesday, NIST acknowledged that the NSA participates in creating cryptography standards “because of its recognized expertise” and because NIST is required by law to consult with the spy agency. “We are not deliberately, knowingly, working to undermine or weaken encryption,” NIST chief Patrick Gallagher said at a public conference Tuesday. NIST chief Patrick Gallagher (right) testifies before the Senate in June. NSA director Keith Alexander is on the left. (AP/J. Scott Applewhite) Various versions of Microsoft Windows, including those used in tablets and smartphones, contain implementations of the standard, though the NSA-influenced portion isn’t enabled by default. Developers creating applications for the platform must choose to enable it. The New York Times noted earlier this week that documents provided by Snowden show the spy agency played a crucial role in writing the standard that NIST is now cautioning against using, which was first published in 2006. The NIST standard describes what is known as an “elliptic curve-based deterministic random bit generator.” This bit of computer code is one way to produce random numbers that are the cornerstone of encryption technology used on the Internet. If the numbers generated are not random but in fact predictable, the encryption can be more easily cracked. The Times reported that the Snowden documents suggest the NSA was involved in creating the number generator. Researchers say the evidence of NSA influence raises questions about whether any of the standards developed by NIST can be trusted. “NIST's decisions used to be opaque and frustrating,” said Matthew Green, a professor at Johns Hopkins University. “Now they're opaque and potentially malicious. Which is too bad because NIST performs such a useful service.” Cryptographers have long suspected the standard in question was faulty. Seven years ago, a pair of researchers in the Netherlands authored a paper that said the random number generator was insecure and that attacks against it could “be run on an ordinary PC.” A year after that, in 2007, two Microsoft engineers flagged the standard as potentially containing a backdoor. Following the criticism, the standard was revised in 2007 to include an optional workaround. The NSA has long been involved in encryption matters at the standards institute. "NIST follows NSA's lead in developing certain cryptographic standards," a 1993 Government Accountability Office report noted. A 2002 law mandates that NIST set information security standards and lists the NSA merely as one of several other agencies that must be consulted. Asked how often standards are reopened, NIST spokesperson Gail Porter, said, “It’s not frequent, but it does happen.” She added that it would be “difficult to give you an exact number of times.” Asked whether Microsoft would continue to use the encryption standard in some of its software, a spokesperson said the company "is evaluating NIST’s recent recommendations and as always, will take the appropriate action to protect our customers." The NSA declined to comment. Read more @ http://arstechnica.com/security/2013/09/government-standards-agency-strongly-suggests-dropping-its-own-encryption-standard/
  19. It wasn’t ever seriously in doubt, but the FBI yesterday acknowledged that it secretly took control of Freedom Hosting last July, days before the servers of the largest provider of ultra-anonymous hosting were found to be serving custom malware designed to identify visitors. Freedom Hosting’s operator, Eric Eoin Marques, had rented the servers from an unnamed commercial hosting provider in France, and paid for them from a bank account in Las Vegas. It’s not clear how the FBI took over the servers in late July, but the bureau was temporarily thwarted when Marques somehow regained access and changed the passwords, briefly locking out the FBI until it gained back control. The new details emerged in local press reports from a Thursday bail hearing in Dublin, Ireland, where Marques, 28, is fighting extradition to America on charges that Freedom Hosting facilitated child pornography on a massive scale. He was denied bail today for the second time since his arrest in July. Freedom Hosting was a provider of turnkey “Tor hidden service” sites — special sites, with addresses ending in .onion, that hide their geographic location behind layers of routing, and can be reached only over the Tor anonymity network. Tor hidden services are used by sites that need to evade surveillance or protect users’ privacy to an extraordinary degree – including human rights groups and journalists. But they also appeal to serious criminal elements, child-pornography traders among them. On August 4, all the sites hosted by Freedom Hosting — some with no connection to child porn — began serving an error message with hidden code embedded in the page. Security researchers dissected the code and found it exploited a security hole in Firefox to identify users of the **Tor Browser Bundle**, reporting back to a mysterious server in Northern Virginia. The FBI was the obvious suspect, but declined to comment on the incident. Reached by phone, Marques’ lawyer declined to comment on the case. Marques faces federal charges in Maryland, where the FBI’s child-exploitation unit is based, in a case that is still under seal. The apparent FBI-malware attack was first noticed on August 4, when all of the hidden service sites hosted by Freedom Hosting began displaying a “Down for Maintenance” message. That included at least some lawful websites, such as the secure email provider TorMail. Some visitors looking at the source code of the maintenance page realized that it included a hidden iframe tag that loaded a mysterious clump of Javascript code from a Verizon Business internet address. By midday, the code was being circulated and dissected all over the net. Mozilla confirmed the code exploited a critical memory management vulnerability in Firefox that was publicly reported on June 25, and is fixed in the latest version of the browser. Though many older revisions of Firefox were vulnerable to that bug, the malware only targeted Firefox 17 ESR, the version of Firefox that forms the basis of the Tor Browser Bundle – the easiest, most user-friendly package for using the Tor anonymity network. That made it clear early on that the attack was focused specifically on de-anonymizing Tor users. Tor Browser Bundle users who installed or manually updated after June 26 were safe from the exploit, according to the Tor Project’s security advisory on the hack. The payload for the Tor Browser Bundle malware is hidden in a variable called “magneto.” Perhaps the strongest evidence that the attack was a law enforcement or intelligence operation was the limited functionality of the malware. The heart of the malicious Javascript was a tiny Windows executable hidden in a variable named “Magneto.” A traditional virus would use that executable to download and install a full-featured backdoor, so the hacker could come in later and steal passwords, enlist the computer in a DDoS botnet, and generally do all the other nasty things that happen to a hacked Windows box. But the Magneto code didn’t download anything. It looked up the victim’s MAC address — a unique hardware identifier for the computer’s network or Wi-Fi card — and the victim’s Windows hostname. Then it sent it to a server in Northern Virginia server, bypassing Tor, to expose the user’s real IP address, coding the transmission as a standard HTTP web request. “The attackers spent a reasonable amount of time writing a reliable exploit, and a fairly customized payload, and it doesn’t allow them to download a backdoor or conduct any secondary activity,” said Vlad Tsyrklevich, who reverse-engineered the Magneto code, at the time. The malware also sent a serial number that likely ties the target to his or her visit to the hacked Freedom Hosting-hosted website. The official IP allocation records maintained by the American Registry for Internet Numbers show the two Magneto-related IP addresses were part of a ghost block of eight addresses that have no organization listed. Those addresses trace no further than the Verizon Business data center in Ashburn, Virginia, 20 miles northwest of the Capital Beltway. The code’s behavior, and the command-and-control server’s Virginia placement, is also consistent with what’s known about the FBI’s “computer and internet protocol address verifier,” or CIPAV, the law enforcement spyware first reported by WIRED in 2007. Court documents and FBI files released under the FOIA have described the CIPAV as software the FBI can deliver through a browser exploit to gather information from the target’s machine and send it to an FBI server in Virginia. The FBI has been using the CIPAV since 2002 against hackers, online sexual predators, extortionists, and others, primarily to identify suspects who are disguising their location using proxy servers or anonymity services, like Tor. Prior to the Freedom Hosting attack, the code had been used sparingly, which kept it from leaking out and being analyzed. No date has been set for Marques’ extradition hearings, but it’s not expected to happen until next year. Read more @ http://www.wired.com/threatlevel/2013/09/freedom-hosting-fbi/
  20. Don't expect to see Apple's iWatch until the back half of 2014. Unnamed sources in the upstream supply chain in Taiwan claim that Apple's upcoming iWatch is suffering from low yield rate problems, meaning that many components are failing tests during manufacturing. Because of this, component suppliers are only able to provide 30 percent to 40 percent of their original order volumes. Currently, Apple's wearable tech is slated to arrive in the second half of 2014, probably this time next year, if the company doesn't suffer any additional setbacks. However, Apple hasn't officially announced the device, so a specific release window is mere speculation at this point. Prices are also expected to be around $149 to $229, although that could change before the supposed fall 2014 launch. The rumored Apple device is reportedly being built using powder metallurgy technology, and then processed by computer numerical control (CNC) equipment. Inventec and Quanta Computer are supposedly manufacturing the device, with the former handling 60 percent of the orders and the latter 40 percent. Sources claim that Apple is shooting for a design that's not only thin and light, but elegant in appearance. However, this design is supposedly posing as a great challenge for not only chassis suppliers, but the component makers and process service providers. Sources claim that many Taiwan device makers are trying to land related orders, including FIH Mobile, Compal Communications and Arima. These companies have established teams focused on reeling in smartphone orders from both established players and new entrants. This most recent report indicates that the iWatch "delay" is more likely due to manufacturing problems than Apple biding its time as it watches competitors cough up solutions. Like the iPhone and iPad, Apple is undoubtedly ignoring everything its competitors are doing and developing innovative tech that will set the smartwatch standard for years to come. Read more @ http://www.tomshardware.com/news/apple-iwatch-low-yeild-rate-supply-chain-taiwan,24225.html
  21. Try this Genie at http://en.akinator.com/ He can guess any actor or character you have in mind just posing few questions...
  22. I admit it, your post has a better Marissa picture
  23. I still think to the girl waiting in line...
×