12in1 SIM Card+USB Card Reader/Writer GSM Copier Cloner

The Sim card can clone all the data from your original Sim card including pin code

It can clone the ki and IMSI code

It can contain 12 different Sim card content, You may change your current phone number operation to another by the selection list

Easy to read the phonebook of Sim card and save to PC

Can write the phonebook saved in the PC to another new Sim card

Read, edit, backup telephone directory and SMS

Leisurely create, edit, backup mobile ring tones and pictures (only for Nokia phone)

Plug and play, easy to operation

via. http://www.lunershop.com/product_info.php?language=en&currency=USD&products_id=273

Big Content eyes Google Fiber deployment in Kansas City warily

Meanwhile, 180 miles to the north, in Iowa, Google is also getting busy. This week, the company announced plans to build a new $300 million data center in Council Bluffs, Iowa, just outside of Omaha. This facility is expected to continue to do what another Council Bluffs site did when it came online in 2009: host Gmail, Google Maps, Google+, and of course, search.

Given Google’s FCC filing from earlier this year, that Iowa station may also serve as a future IP video facility to be used in conjunction with Kansas City’s fiber service.

via Big Content eyes Google Fiber deployment in Kansas City warily.

Trustworthy Internet Movement

The goal of the SSL Labs surveys is to measure the effective security of SSL. After some experimentation with an assessment of substantially all public SSL sites (about 1.5 million of them), we settled on a smaller list of about 200,000 SSL-enabled web sites, based on Alexa’s list of most popular sites in the world. Working with a smaller list is more manageable and allows us to conduct the surveys more often. It also allows us to conduct more thorough analysis to look for application-layer issues that may subvert SSL security. In addition, focusing on popular sites – we believe – gives us more relevant results and also excludes abandoned sites.

via Trustworthy Internet Movement – SSL Pulse.

RIM’s future hangs on developer support for “new BlackBerry”

With its future up for grabs, Research in Motion at its annual BlackBerry World conference next week will focus on simplifying development for its soon-to-be-unveiled BlackBerry 10 operating system. HTML5 is one key technology in that strategy to create a viable ecosystem of applications for a new generation of mobile devices expected to ship by year-end.

via RIM’s future hangs on developer support for “new BlackBerry”.

The tablet that changed the whole market for tablets, and isn’t a tablet

Kindle Fire’s best feature is its ability as an e-book reader, according to reviewers. It is much more, however. For a list price of $199, customers get a seven-inch display, 8GB of RAM, free storage on Amazon’s cloud, WiFi and USB connections, the ability to run any Android-compatible app or game and automagical connections to media (for which you can pay Amazon) including e-books, music, movies and anything else you can find on the Internet.

Fire’s list price is $430 lower than the list price of the latest edition of the iPad and $249 less than Amazon’s discount price for a new ten-inch Samsung Galaxy tablet and $50 less than the seven-inch Samsung Galaxy.

via The tablet that changed the whole market for tablets, and isn’t a tablet | ITworld.

UCR Today: Scholars to Apply Facial Recognition Software to Unidentified Portrait Subjects

RIVERSIDE, Calif. — Anyone who has admired centuries-old sculptures and portraits displayed in museums and galleries around the world at some point has asked one question: Who is that?

Three University of California, Riverside scholars have launched a research project to test — for the first time — the use of facial recognition software to help identify these unknown subjects of portrait art, a project that ultimately may enrich the understanding of European political, social and religious history.

via UCR Today: Scholars to Apply Facial Recognition Software to Unidentified Portrait Subjects.

“Almost every portrait painted before the 19th century was of a person of some importance,” Rudolph explained. “As families fell on hard times, many of these portraits were sold and the identities of these subjects were lost. The question we hope to answer is, can we restore these identities?”

Its Samsung Day! Congratulations Samsung for being world’s biggest handset maker, and biggest smartphone maker

So it was 14 years of Nokia leadership in the most widely used technology ever seen on the planet. At its peak, there was a quarter in 2006 that Nokia had 40% of the global market for phones, and there were years when Nokia was as big as rivals numbers 2 and 3 combined, there were quarters where Nokia was as big as rivals number 2, 3 and 4 combined. Nokia had spread to be in the pockets of 1.3 Billion people, 19% of the total population alive on the planet. No other technology ever, indeed no brand is used by as many people as Nokia. Not Sony Walkmans or TVs, not Microsoft on the PC, not Coca Cola in drinks, not Levi’s in blue jeans, not Bic in pens. But now that King has been toppled. The King is Dead, Long Live the King. Now Samsung will take over and build even a bigger footprint, as mobile phone handsets keep spreading to new first-time users in India, Africa, Latin America etc.

via Communities Dominate Brands: Its Samsung Day! Congratulations Samsung for being world’s biggest handset maker, and biggest smartphone maker.

Engineers ponder easier fix to dangerous Internet problem

But the routers do not verify that the route “announcements,” as they are called, are correct. Mistakes in entering the information — or worse yet, a malicious attack — can cause a network to become unavailable.

It can also cause, for example, a company’s Internet traffic to be circuitously routed through another network it does not need to go through, opening the possibility the traffic could be intercepted. The attack is known as “route hijacking,” and can’t be stopped by any security product.

via Engineers ponder easier fix to dangerous Internet problem | ITworld.

In March 2011, a researcher noticed that traffic destined for Facebook on AT&T’s network strangely went through China for a while. While the requests would normally go directly to Facebook’s network provider, the traffic first went through China Telecom and then to SK Broadband in South Korea before routing to Facebook. Although the incident was characterized as a mistake, it would have been possible for unencrypted Facebook traffic to have been spied on.

China plans national, unified CPU architecture

According to reports from various industry sources, the Chinese government has begun the process of picking a national computer chip instruction set architecture (ISA). This ISA would have to be used for any projects backed with government money — which, in a communist country such as China, is a fairly long list of public and private enterprises and institutions, including China Mobile, the largest wireless carrier in the world. The primary reason for this move is to lessen China’s reliance on western intellectual property.

via China plans national, unified CPU architecture | ExtremeTech.

The other option, of course, is developing a brand new ISA — a daunting task, considering you have to create an entire software (compiler, developer, apps) and hardware (CPU, chipset, motherboard) ecosystem from scratch. But, there are benefits to building your own CPU architecture. China, for example, could design an ISA (or microarchicture) with silicon-level monitoring and censorship — and, of course, a ubiquitous, always-open backdoor that can be used by Chinese intelligence agencies. The Great Firewall of China is fairly easy to circumvent — but what if China built a DNS and IP address blacklist into the hardware itself?