Microsoft: Vision of Futuristic Technology

Microsoft Productivity Future Vision

When you see them, you may be surprised by my conclusion. Will technology really move that fast?

Just remember how quickly things moved in the past 10 years.
Ten years ago, there was no such thing as a multitouch consumer device — no iPhone, Android phone or anything even remotely like it. The original iPod was brand new, and there was no iTunes store for buying music. There was no Xbox, no YouTube, no Flickr, no Reddit. Google was just a search engine. Gmail, Maps, Docs, Calendar, Voice, Talk, Reader and many other Google services didn’t exist.
Facebook? Ha! Mark Zuckerberg was still in high school, and even MySpace was still years away.
In fact, virtually every aspect of today’s consumer electronics scene was nonexistent or even beyond imagining 10 years ago. Almost everything Apple sells right now — the iPad, iPhone, Siri, Apple TV, iMac, MacBook Air and other products, would have seemed like science fiction in 2001.
When most people imagine the future of technology, they envision better versions of what they’ve already got. But changing technology will sweep away almost all the products and services we use today.
Microsoft’s videos brilliantly capture what is likely to replace them.

Where did these videos come from?

Office Labs is one of Microsoft’s in-house think tanks. The initiative comes up with working concepts, some of which can be downloaded and experimented with (you need to be running Microsoft Office). Some of them are created by employees in their own time (similar to Google’s 20% time projects).
Many of the Office Labs concepts would require technologies and computing power that aren’t available yet. So the researchers create special-effects-laden videos and demos to communicate ideas. Microsoft also maintains an “Envisioning Lab” where close business partners can see and discuss the prototypes on display.

What to look for in the videos

In Microsoft’s vision of the future, connected computers and displays are built into everyday objects.
A woman’s eyeglasses whisper real-time translations of a foreign language in her ear. A coffee cup shows the drink’s temperature and has a display that indicates how high the liquid is inside. An electronic newspaper is as thin and flexible as actual paper, but it functions like a wireless connected multitouch text-and-video e-reader.
“Monitors” in the video are often depicted as clear smart glass. Call ‘em “Microsoft Windows.” What the heck.
A businessman uses a clear-glass display that is straight-upMinority Report, controlled with both touchscreen and “wave your hands in the air like you just don’t care” gestures. Both display and touch-input devices look like regular clear glass until they come to life with gestures. In some scenes, touch gestures become in-air gestures, as they extend beyond the screen.
On-screen buttons, dials and other controls appear as needed for the task at hand, then vanish when no longer required.
A clear-glass stylus is also used in one scene, suggesting a role for a pen.
Keyboards are depicted, both the onscreen and physical variety. But there’s a lot less typing in this future, as Siri-like voice assistance and dictation replaces most typing.
See-through glass displays, of course, are perfect for augmented reality. A mobile version is held up to a green plant, which is visible through the clear glass. But then the device recognizes the species, and throws information about it on the screen.
The window of a taxi turns into an augmented reality screen, pointing out to the passenger the building where her meeting is to take place the next day.
Other displays aren’t clear, but appealingly opaque. In many cases, surfaces that used to hold analog information tools themselves replace the tools. For example, instead of a whiteboard mounted on a wall — a standard feature in today’s conference rooms — the wall of the future is the whiteboard — computerized and connected, of course. Instead of a tablet on a table, the table is the tablet.
In one scene, two businesspeople each place a smart object on a smart table — a keychain fob and a flat phone or smartcard of some kind. From these devices, out spills their data, which can be manipulated on the table. The same thing happens at home, where a girl’s homework spills out onto the kitchen table, and cookbook instructions spill out onto the kitchen counter.
Data and documents can apparently be transferred from anything to anything else. One business-related example involves a drag-and-drop gesture from a desktop to a mobile device. In another scene, that same mobile device becomes a virtual keyboard for a desktop computer the user happens to be sitting at.
Another example shows a man “capturing” with a kind of take-a-picture gesture using a clear-glass remote control then moving data from a wall-mounted device and dumping it out onto his e-newspaper.
Videoconferencing has been perfected. What looks like a glass window into another classroom is actually a live, big-screen video chat connecting schools in India and Australia. In one scene, two children interact with each other, each speaking a different language instantly translated with cartoon-like speech bubbles.
Intelligent agents pay attention to what’s going on. The kids fingerpaint a dog onscreen, and the computer recognizes the image and animates it accordingly.
One very cool and versatile device shown in the video is a smartphone, a card-like gadget so thin that a woman uses it as a book marker. The card functions as a boarding pass, an airport map, a calendar, an augmented reality window, a 3D holographic display and more.
The phone splits into two halves about the size of playing cards, with one “card” displaying live video and the other held up to the ear for videoconferencing on the go. It even projects some kind of laser beam arrow on the ground, telling Mr. Future Businessman where to go.
Everything is connected to everything. Intelligent agents make decisions about when to inform the user about relevant data.

Why these are great predictions

Everything in this video is being worked on, refined and developed. If you follow current trends for compute power, display technology, networking speeds, device miniaturization, flexible displays, touchscreens, gesture technologies and others, you get this Microsoft future.
And Microsoft itself is working on much of this. The intelligent displays are really just advanced versions of what’s possible now with a Microsoft Surface table. The in-air gestures are advanced versions of what Kinect for Xbox 360 users are already doing.
Industrywide, displays are getting bigger while devices are getting thinner and lighter. Companies have already developed versions of clear displays, augmented reality systems and all the rest.
The past four years have ushered in thin multitouch tablets supporting gestures and intelligent agent voice technology.
Although breathtaking to look at and consider, everything in Microsoft’s videos are fairly conservative predictions based on existing products or technology actively being developed.

Why Microsoft won’t build it

There tends to be little connection between companies that envision the future clearly and those who build it.
AT&T envisioned the future in 1993, for a special edition ofNewsweek magazine that came with a CD-ROM containing a series of videos.
Those videos suggested that in the future, people would read books online, get directions on screens in their cars, send a fax from the beach, pay road tolls wirelessly, buy tickets from ATM-like machines, make international video calls, open doors by voice command, use electronic medical records, attend meetings remotely with video and PowerPoint from a laptop, watch video-on-demand downloadable movies and take college classes online.
I remember those ads. They seemed pretty far-fetched to most people who saw them. Yet they were an accurate prediction of many of the technologies we now take for granted. AT&T’s predictions all came true, except for the one where they say, “And AT&T will bring it to you.”
If Microsoft is to lead the revolution, it would have to become a different kind of company. Microsoft has always had great R&D, but it has long struggled to get real products to the market in time to make a difference. Right now, Microsoft tends to be about three years behind industry leaders when it comes to cool new consumer technologies.
Microsoft could lead us into this amazing new future. But it probably won’t.
Microsoft’s breathtaking vision of the future will probably happen. But Apple, Google and other companies will probably bring it to you.

Nokia and Microsoft Windows 8 Phone Features

Nokia Windows 8 Phone
Microsoft and Nokia are holding a press conference on Sept. 5 in New York to discuss Nokia’s Lumia brand of Windows phones. While Verizon  isn’t expected to be part of that event, the carrier intends to roll out a Nokia phone later, said the person, who asked not to be named because the plans are private.
That would give Nokia a new beachhead at the top U.S. carrier, building on its longstanding relationship with No. 2 AT&T (T) Inc.
Features
Nokia Windows 8 Phone
Network
WiFi, GPS and 3G capability
Support By
Unity Technologies
Released By
Nokia (NOK) and Microsoft’s (MSFT)
Design
Unibody polycarbonate design
Content
Wildly creative and intelligently interactive 3D and 2D content
Voice Calls
Yes
Size
4.3-inch with curved edges
VoIP Service
Yes
Wireless Call
Yes
Games
Strong gaming ecosystem-PC, Xbox, and Mobile Devices
Modem
A voice-capable 3G modem
Radio supports
Quad-band 2G and peta-band 3G.
Skype
Yes
Released Date
November 2012.
Primary
Front-facing camera
Software
Able to run on devices with speedier, dual-core chips and high-definition screens
OS
Windows Phone 8 and Windows 8 Both
Graphics
high-caliber Unity3D graphics engine
GPS
Yes- telephonic voice capability
Windows 8 could support voice calls, it’s been suggested, after a Metro UI tile for phone functionality was spotted during a BUILD 2011 session last week. The slide, istartedsomething caught, has a Windows Phone 7 style “Missed Calls” dialog complete with times and dates of recent incoming voice calls. However, it’s also possible that this could be a VoIP service, or indeed some form of wireless call management when pairing a Windows 8 tablet or phone with a Windows Phone 7 handset.
Windows 8 phone
The next generation of Windows Phone devices will reportedly support the high-caliber Unity3D graphics engine. WMPoweruser notes that Unity3D developer Unite Technologies has announced it will support both Windows Phone 8 and Windows 8 when the two operating systems are released later this year. As the site writes, this is very significant because “developers will have a very easy time porting high quality, graphics-intensive games to Windows Phone 8 from the iPhone,” meaning that Windows Phone 8 will already have a strong gaming ecosystem ready to go when it finally launches.

So.cl, Microsoft’s bid for give battle in the social networking market

It’s still in beta. You can log in from Windows Live and through an account associated with Facebook. His forte would be in the videos and videoconferencing.

Microsoft does not want to fall behind. Over the weekend, the company decided to present So.cl, its new venture to battle hard in the social networking market.

The site, which is still in beta. This network is similiar Google Plus, which Facebook.According to reports, the new Microsoft product would aim to capture the dynamic nicheof students.

With a more visual interface, So.cl (which refers to the social word) emphasizes theparticipation of the media, to search for videos and chat by video, such as with Google +.

Among the new section appears the Video Parties, a space where you can create video channels group. In addition, the site incorporates searches Bing, with the intention of strengthening its presence on the web.

To enter the platform, users can do it through Windows Live and through an account associated with Facebook.

Removal Guide of Backdoor.Win32.Poison.ckym

Is your computer infected with trojan Backdoor.Win32.Poison.ckym? Having trouble getting off Backdoor.Win32.Poison.ckym by yourself? This step-by-step guide can help you safely and quickly remove Generic.dx!baaq virus.

Backdoor.Win32.Poison.ckym Description

Backdoor.Win32.Poison.ckym is very dangerous trojan that can allow allows remote access to your system. Backdoor.Win32.Poison.ckym hides in the system very secretly, it disguides as some important files which vary from different computers. Those pirate files hide away the original files and add themselves to the same locations, many people will not realize they are runing a virus when then click on the subrogated files. Backdoor.Win32.Poison.ckym is capable to take administrative control to the infected system and it shields your own security center, firewall and deactivate a lot other software. What Backdoor.Win32.Poison.ckym does is to make your computer more vulnerable and under attack. Backdoor.Win32.Poison.ckym exploits security holes in the back ground and connects malicious sites to download spyware to your system.

What Harms does Backdoor.Win32.Poison.ckym do to a Computer?

  1. Trojan Backdoor.Win32.Poison.ckym is installed/ run without your permission and won’t allow you to remove it.
  2. Trojan Backdoor.Win32.Poison.ckym compromises the infected computer and welcome all kind of parasites to enter the infected system.
  3. Trojan Backdoor.Win32.Poison.ckym gives difficulty to web browser activities and gives randomly redirects.
  4. Trojan Backdoor.Win32.Poison.ckym can modify import system files and registry entries which may deactivate a lot of functions on the system.
  5. Trojan Backdoor.Win32.Poison.ckym dreadfully slows down computer speed and makes your computer stuck frequently.

How to Remove Backdoor.Win32.Poison.ckym Completely and Safely

Backdoor.Win32.Poison.ckym has added a lot of registry entries and files to the system, you just need to find out the locations and delete them, and then virus will be gone. Please be aware that manual removal of Backdoor.Win32.Poison.ckym requires expert skills dealing with registry editor, program files, dll. files, processes, any mistake may lead to system malfunction. It is recommended to contact Tee Support online computer experts for help to get rid of Backdoor.Win32.Poison.ckym safely and quickly.

1. Press Ctrl+Alt+Del to open Taskmanager and stop Backdoor.Win32.Poison.ckym Process:

[Random].exe

2. Check the following directories and remove Backdoor.Win32.Poison.ckym associated files:

C:\Program Files\[random]

C:\WINDOWS\system32\[random]

C:\Documents and Settings\[user name]\Application Data\[random]

C:\Documents and Settings\[user name]\Local Settings\Temporary Internet Files\[clear all the files inside]

C:\Documents and Settings\[user name]\Local Settings\Temp\[clear all the files and folders inside]

3.The registry entries of Backdoor.Win32.Poison.ckym that need to be removed are listed as follows:

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] "[random].exe"

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{ } "[random].exe"

HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main “Start Page” =>"random"

Howto resolve problems with Microsoft Security Essentials

While one can always easily uninstall Microsoft Security Essentials from the Control Panel, should you find that your are unable to uninstall Microsoft Security Essentials, you may try to uninstall it manually or by using a Microsoft Fix it solution.

To know about the detailed steps required to uninstall MSE manually visit Microsoft KB2435760.

Important: But do check up the version of MSE installed on your computer first and do not use this KB articles for Beta versions or versions that begin with the numeral 2.

lternatively, if you find this task too daunting, simply download and use Microsoft Fix It 50535 to let it force uninstall Microsoft Security Essentials for you.

Microsoft Security Essentials Restore Tool

Microsoft Security Essentials has risen in popularity ever since initial betas were released to the public. Microsoft recently made available a beta of the upcoming Microsoft Security Essentials 2 suite, and many experts expect the final version to increase the popularity and acceptance of the security software further.

It may happen that users experience problems with the program, most likely after an upgrade or virus attack. Some Windows users have reported that the Security Essentials service is not starting on their system, others that the program itself wont  startup properly.

The MSE Restore Tool is a lightweight portable program that tries to repair Microsoft Security Essentials so that the program will run as planned on the system.

 

The restore tool performs four steps, which are outlined below:

1. It executes Microsoft Security Essentials with the restore defaults parameter to restore all settings to factory defaults, this is done with the command MsMpRun.exe -RestoreDefaults
2. It restarts and restores the Microsoft Antimalware Service
3. The repair tool registers all Dynamic Link Libraries that are used by Microsoft Security Essentials
4. The software restores all relevant Windows Registry entries related to Microsoft Security Essentials

The software works similar to the app Repair Microsoft Security Essentials tool Fix MSE.

The MSE Restore Tool requires elevated rights to repair Microsoft Security Essentials. It is furthermore only compatible with version 1.x of Security Essentials, and not the recently released 2.x beta.

The minimalistic interface displays two options, to restore Microsoft Security Essentials or to exit the program. A click on Restore Microsoft Security Essentials now will complete all four restoration steps outlined above.

MSE Restore Tool v1.0
Repair Microsoft Security Essentials using MSE Restore Tool v1.0.
To download MSE Restore Tool v1.0, click this link: Download MSE Restore Tool v1.0 now.
Documentation for the tool is available in PDF, to download click this link: Documentation for MSE Restore Tool v1.0.

Howto create PDF from Microsoft Office 2007

The other day I had to help a friend online, I needed to publish a paper in PDF.
I found that there is little clear information how.

Here are two plugins to publish in their XPS and PDF and Word files or Excel.

2007 Microsoft Office Add-in: Microsoft Save as PDF or XPS,

allows you to export and save to the PDF and XPS formats in eight 2007 Microsoft Office programs. It also allows you to send as e-mail attachment in the PDF and XPS formats in a subset of these programs.
Microsoft release two PDF related

2007 Microsoft Office Add-in: Microsoft Save as PDF,

allows you to export and save to the PDF format in eight 2007 Microsoft Office programs. It also allows you to send files as e-mail attachments in the PDF format in a subset of these programs.

Download links,

  1. 2007 Microsoft Office Add-in: Microsoft Save as XPS
  2. 2007 Microsoft Office Add-in: Microsoft Save as PDF

Spyware tips

Spyware is any kind of software that collects personal information on your computer, like surfing habits, browsing history, etc. in order to deliver advertisements for products or other services without the users consent.

A brief history of spyware

Spyware first started picking up steam around the year 2000, mainly as software that delivered annoying popup ads while browsing the internet.  Since then, it has created two major industries; the companies that deliver spyware for advertising revenue, and the many companies that create spyware removal software, both free and to purchase.

AOL partnered with the National Cyber-Security Alliance in 2005 to conduct a study about spyware, and found that 61 percent of people surveyed had some form of spyware, 92 percent of which didn’t know it was present, and 91 percent of which did not give permission for it to be installed.

While spyware started out as being mildly intrusive, just displaying advertisements and such, spyware has grown into a virus like industry.  Spyware these days can changecomputer settings like redirecting web traffic, disabling operating system features, essentially disabling the user’s ability to use the computer properly.

Some spyware today even goes as far as searching for known spyware removal software and removes them upon installation, making their software that much harder to remove.

The spyware threat keeps getting worse

Once the term Spyware was well known, and spyware removal software was more abundant, the spyware industry looked to be stomped out of existence for a short time.  But the companies that create spyware started using more advanced techniques to infect their users, and started making their software harder than ever to remove.

Infection can happen many ways now.  Spyware can be bundled with any type of other software, and most commonly through software that is “required” to perform some sort of function on a website.  For example, you might want to download a file from a website, but in order to do so they require you to use their software to retrieve the file, and by agreeing to their terms of service you are also agreeing to install their bundled spyware.

Spyware can be installed from several other methods as well.  Here are some of the most common methods:

  • In file sharing networks like Limewire, spyware companies cloak their files to appear like movies or songs, but once you try to play them it installs their software
  • Popup windows that claim you are “infected” with spyware and to click on their box to remove it, but what it’s really doing is installing spyware on your system
  • Some websites cloak their spyware inside of ActiveX controls (like an embedded movie player), installing their software once you agree to install the ActiveX component
  • Toolbars for your internet browser

Some of the nastiest spyware I’ve seen lately is nearly impossible to remove, even with good spyware removal software and a good computer technician.  One that I came across recently not only persisted after removal, but Windows essentially stopped functioning entirely after removal was attempted since the files were so extremely embedded into theoperating system.

Spyware Removal

Back when spyware was first introduced, it wasn’t really that hard to remove if you knew what to look for, like unrecognized programs in the startup section of your registry, etc.

Spyware today is not so easy to remove.  Not only are they hidden from your list of installed programs, but even if they are listed, removing from there doesn’t normally get rid of the software.  Most of today’s spyware has services that run in the background looking to see if the program is removed or stopped, and reinstalls or starts it back up again if this is detected.

My favorite program for removing spyware is Spybot Search and Destroy.  It’s not only free, but it’s very good at its job as well.  Spybot doesn’t just remove spyware, it also has features to help block future infections, a feature naturally called “immunization”.

There are a few others I have used in the past as well, like AdAware.  Microsoft also has a free product called Windows Defender that features automated scans, and has the abilty to detect spyware and keep it from being installed once installation is detected.

Always do your homework before installing any software that claims to remove spyware, since this is a very popular technique lately to install even more spyware, forcing you to purchase their software to get rid of what they installed in the first place.

Software

Windows Mobile 7

Microsoft’s Windows Phone 7 promises to bring together contacts, photos, music and video into one smooth mobile experience. It’s holistic design aims to bring together web content, applications and services into a single view port, making you master of all you survey. Microsoft is introducing the new mobile OS at Mobile World Congress 2010, in Barcelona next month.

A New Home

The home screen, or Start, on Windows Phone 7 Series can be customized with live “tiles” that show the latest updates from the Web. In a radical departure from the earlier versions, the new one stop home screen provides access to contacts, web content, social networking services and local applications. Big, finger-loving notice icons or “tiles” for calls, text messages, email and of course Facebook etc stare you right in the face. Large, iconic text for menus, and content transitions slide a user into and out of different views. If you thought it’s just a pretty skin, think again. This is a brand new OS with fresh underlying code, not a mere rehash of the old guard offering a new user interface experience.

Social Networking

The OS is also heavily focused on social networking, providing integrated contact pages which show status updates from multiple services and allow fast jumps to richer cloud content (such as photo galleries). Rather than relying on applications and skins, Windows Phone 7 comes with social networking support wired right in.

Xbox Live and Zune Integration

The Xbox Live integration offers LIVE games, avatars and profiles and Zune’s features seem to be copy pasted directly in to the new OS. In fact Zune users will not be surprised by the new OS’s interface. Zune HD games run like hell on the Tegra Chip it uses. Will they play well with the Snapdragon chips, Windows Phone will most probably prevail with? Or are we going to see OMAP4 and Tegra 2 devices? Stay tuned for more updates.

Hardware

With regards to hardware, the 7 Series devices will all sport a specific CPU and speed, screen aspect ratio and resolution, memory and button configuration and will not partner with UI customizers like Sense or TouchWiz. Which means every Windows Phone 7 will sport a single Windows Phone identity regardless of carrier or device brand. Which means they will all look shockingly similar at first sight. Carrier collaborations  include AT&T, Deutsche Telekom AG, Orange, SFR, Sprint, Telecom Italia, Telefónica, Telstra, T-Mobile USA, Verizon Wireless and Vodafone while hardware partners include Dell, Garmin-Asus, HTC, HP, LG, Samsung, Sony Ericsson, Toshiba and Qualcomm.

Is it time to conclude already? I think the game is just beginning. When I sat down to write about the burning hot smartphone OS market, I was thinking iPhone OS vs Android vs Blackberry vs Palm. Little did I know an old timer was going to make a radical new entry into the fray all over again. And it appears like Microsoft has finally got it after all these years. Burning bridges and adopting a radical approach may not be enough to come out tops but it sure as hell has brought them face to face with the top warriors of the smartphone war.

Microsoft despises Google Buzz

Google Buzz

We all know the boom that caused google, google announcing the buzz a couple of days ago. A completely unexpected product, which was incorporated in all gmail accounts. Given the apparent fail a wave of google, is a move that certainly did not expect. Mainly by not having read the rumors about the new service. (is that had?). And is that when incorporated into Gmail accounts, Google Buzz, a product becomes extremely comfortable. Personally, I find this an interesting product.

Yahoo! For its part, considers it a clone of its own service Y! buzz, but I can guarantee that Y! Buzz, do not have the convenience of Google Buzz, and is that including such a feature added in the gmail account was an excellent move. Microsoft reactions were swift, dismissed the service as “a social network”.
Google Buzz
The Microsoft case is special because it is threatened on several fronts and the usual fight with Google in Internet investor sum being Facebook.

The fear of microsoft is logical to address the enhancement it makes to the already excellent mail client Gmail and other Google tools and third companies, on an open platform compatible with Picasa, Reader, YouTube, Flickr, Blogger Twitter, and will be extended to other applications through an API.

By not being included in Google Buzz, we can assume that Facebook is the enemy to beat, and its relationship with Microsoft is clear. Only time will tell what the future holds the newborn google buzz.

New technology developed by Microsoft for photography: DNA Image

dna computerMicrosoft together with the National Center for Missing and Exploited Children (NCMEC) has innovated a New Image DNA Technology to fight against child abuse. Microsoft has done withe their own dedicated Microsoft Research section and Dartmouth College. This Technology is a revolutionary step in the mission of stopping child abuse.

With this Technology of Image DNA, the system fetches the images that resemble each other, no matter whether they have been edited, resized, etc. and then logs them. The images are then matched using a certain methodology. This process involves the inspection of several aspects like monochrome of the image, chopping the image into smaller bits and the intensity gradients are turned into a signature. Despite of any edition the signatures will still retain originality. Thus, facilitating the system in looking for its replicates. there may be some similarities that could do comparison of the QR codes, thereby allowing the same cells to compare their images. Hence, this process aids the system in finding the images with similar gradients and duplicates of the Image across the web world.

The ISP’s are then provided with all the signatures, data strings to map the counterparts of the Image. To take full advantage of this Technology, government needs to issue a policy so as to do the authorization of the ISPs and content providers in order to enable to use this Technique of Image DNA. Microsoft is donating this Technology to the NCMEC, that later on will be licenced to other law enforcement agencies all over the world. Besides that this methodology of Image DNA can be efficiently used in indoor, internal networks of law enforcement for identifying the same victim at multiple station, this system could even be used to

While this could well be used in closed, internal networks of law enforcement to determine the same victim across multiple situations and abusers, this system could also be enabled to disentangle the Internet and ISP networks for its replicated data. With the invention of the New Image DNA Technology, Microsoft again has led the society in mission of fighting against child abuse and harassment cases.

Ref : http://blogs.zdnet.com/igeneration/?p=3655