Amazon AppStore la tienda de aplicaciones Android de Amazon ya está disponible en España. La AppStore que apareciera en USA antes del lanzamiento del Kindle Fire, aparece en Europa. Ya podemos disfrutar, de la aplicació diaria gratuita. La app gratuita del primer día fue Angry Birds (Sin publicidad),Fundas samsung Galaxy ace, la segunda Plants Vs Zombies (solo disponible en Amazon AppStore).

Sin duda,Carcasas Samsung Galaxy S4, la aparición en España de la AppStore es una buenísima noticia ya que podría ser el preludio del Kindle Fire. Aunque realmente, el Kindle Fire llega tarde contando que Nexus 7 salió a la venta en España esta misma semana. Además, esta guerra de contenido entre Amazon y Google en España, de momento, solo Play Store vende Películas y los libros de Amazon están disponibles desde la app Kindle. Así que a priori la ventaja competitiva por la gran cantidad de contenido a precios asequibles que tiene Amazon en América, en España no es tal.

Descarga Amazon AppStore



Gmail (for iPhone) height="245" title="Gmail (for iPhone)"/>

view all 5 photos in gallery



  • Pros

    Faster and more comprehensive search than Mail app. Supports multiple Gmail accounts. Color-coding for threaded emails. Ability to see folders in same window as email preview. Includes badges and push notifications.

  • Cons
    Little room for customization.
  • Bottom Line

    The standalone Gmail app for iOS searches your entire email so much easier and faster than the pre-installed Mail app, it’s definitely a recommended download, and could very easily become your primary app for Gmail.

By Jill Duffy

Since the release of the standalone Gmail app for iPhone (free), Google has tweaked and fine-tuned its mighty little program to be faster, cleaner, sleeker, and, now it includes support for multiple accounts, more comprehensive. You can already use Gmail on your iPhone, iPad, and iPod Touch via the bundled Mail app from Apple, but Google’s own app is simply a better experience, especially for search. Many people, I’m sure, will continue to the use Mail as their primary email application because of how it shows you many inboxes from multiple services at once, but you’ll want the Gmail app for search at the very least. And if you’re solely a Gmail user, it could—and maybe will—replace Apple’s Mail app.

View all 5 photos in gallery

Mail vs. Gmail
The Gmail app has a clean and clear design, with a collapsible menu pane appears to the left of the central interface, similar to the Facebook iOS app and the recently released Yahoo! Mail app (free, 4 stars) (and increasingly other apps, too). Toggle the menu open, and it nudges its way into view, taking up not more than half the screen so that it’s roomy and easy to read. Here, you can find the requisite Gmail folders, such as Important, Sent, Drafts, and Starred, as well as all the custom folders you’ve made. Labels, the Trash, and an All Mail button appear at the bottom of the menu, while the top contains a button that lets you quickly switch between your various Gmail accounts.


The Settings, also accessible from a button at the top of the main menu, has one invaluable feature for mobile users: controls for automated vacation response emails. Who hasn’t returned from traveling and forgotten to switch off that interminable out-of-office message? And, the moment you remember, you’re never by a computer. Now you don’t have to be.

There’s a menu listing for Chats, although it’s not an active messaging service; it’s just a folder (which appears in your Web-based Gmail account, too) where your chat dialogs are saved if you enable a setting). When you preview messages, the majority of text in the Gmail app appears in light gray type, indicating read messages. The only time you’ll see bold or black is for unread mail. Compared to the bold, black lettering of cascading point sizes used in the Mail app, Gmail’s text is much harder to read.

Open a message, and each person on the thread appears in a different color, using the same color-coding scheme seen in the Gmail website. Whoever initiates a new email has her name in green. The first respondent shows up in purple. The third is red, and so on. Threading the messages in this way is a signature Gmail features, which is why you won’t find anything similar in the standalone Yahoo! Mail app, even though the two are quite similar in several other respects. 

Message text appears in whatever color text the sender uses (usually black, with blue for hyperlinks), although other information, such as the sender details in a forwarded message, appear in a harder-to-read light gray.

In terms of search performance, the Gmail app outperforms Mail easily, because it searches your entire mailbox, whereas the Mail app restricts you from searching beyond the folder that’s open (usually, it’s Inbox). You can search all Gmail mail from the Mail app, but you have to first navigate to the All Mail folder within your Gmail account, and even there it’s restricted to the messages that are loaded. The Mail app gives you results letter-by-letter as it finds matches, in part because it’s only searching a limited subsection of your entire mailbox. Gmail waits until you’ve typed all your letters and hit “Search” before embarking on the hunt to match the terms anywhere in your mail.

Which Gmail iPhone App to Use?
Both the Gmail iOS app and the native Mail app connected to a Gmail account do a fine job of getting your messages to you when you’re not in front of a full-sized computer. Which one you choose is largely a matter of preference, although I think anyone who uses Gmail nearly exclusively will opt for the official Gmail for iPhone app from Google. It’s smooth, fast, and now supports multiple Gmail accounts.

Personally, I use about five email accounts regularly, two of which are Gmail-based, and I use both the Mail app and Gmail app. I like to see from the Mail app the activity across all my personal accounts, whereas I access office email from the Gmail app, where search often matters more than in my personal email.

If search is of the utmost essence, you’ll definitely appreciate the Gmail app, even if,iPhone covers, like me, you end up using both apps. Gmail is the clear Editors’ Choice for email on the iPhone.

More iPhone Apps Reviews:
•   Carcassonne (for iPhone)
•   Norton Mobile Security – Lost Phone Finder (for iPhone)
•   McAfee Personal Locker (for iPhone)
•   Keynote (for iPhone)
• &nbsp,iPhone 4 case; Pages (for iPhone)
•  more


monster wars

È il momento di passare dalla parte dei mostri, affamati di punti esperienza e monete d’oro, pronti a dare assalto ai castelli degli eroi nelle terre di Legendaria. Crea e comanda il tuo esercito di creature “malvagie” in un nuovo Tower Defense che unisce meccaniche RPG: questo è Monster Wars. Il nuovo titolo di Liv Games mostra la storia di una conquista vista dal lato dei mostri, coloro che vengono sempre massacrati e combattuti nei titoli appartenenti al genere, mettendoci nei panni di un esercito di cattivi.

Le meccaniche riprendono quelle dei classici Tower Defense,Custodia Samsung Galaxy Note 2, aggiungendo lo stile a scorrimento orizzontale e vari elementi RPG quali l’upgrade e il potenziamento delle nostre creature. Il gioco si presenta con una grafica 2D molto curata e ricca di animazioni e presenta oltre 60 livelli divisi in 7 principali ambientazioni. Se volete mettervi alla guida di un esercito “infernale”,Custodia Galaxy Note 3, recatevi su Play Store al link posto sotto al video di presentazione, ricordando che Monster Wars costa 0,73€:

Monster Wars
Sviluppatore: Liv Games
Prezzo: 0,73€

Clicca per installare


Sep. 16, 2013 — Today, most information is transmitted by light — for example, in optical fibres. Computer chips, however, work electronically. Somewhere between the optical data highway and the electronic chips, photons have to be converted into electrons using light-detectors. Scientists at the Vienna University of Technology have now managed to combine a graphene photodetector with a standard silicon chip. It can transform light of all important frequencies used in telecommunications into electrical signals.

Share This:

The scientific results have now been published in the journal Nature Photonics.

Computing Power Made of Carbon?

Both academia and the industry place high hopes in graphene. The material, which consists of a single layer of hexagonally arranged carbon atoms, has extraordinary properties. Two years ago, the team around Thomas Müller (Institute of Photonics, Vienna University of Technology) demonstrated that graphene is ideally suited to turn light into electrical current. "There are many materials that can transform light into electrical signals, but graphene allows for a particularly fast conversion,coque samsung galaxy s3 i9300," says Thomas Müller. So wherever large amounts of data are to be transmitted in a short period of time, graphene will in the future probably be the material of choice.

The researchers had to come a long way from the basic proof of what the material can do to actually using it in a chip — but now they succeeded. The Viennese team worked together with researchers from the Johannes Kepler University in Linz.

"A narrow waveguide with a diameter of about 200 by 500 nanometers carries the optical signal to the graphene layer. There, the light is converted into an electrical signal, which can then be processed in the chip," Thomas Müller explains.

Versatile and Compact

There have already been attempts to integrate photodetectors made of other materials (such as Germanium) directly into a chip. However, these materials can only process light of a specific wavelength range. The researchers could show that graphene can convert all wavelengths which are used in telecommunications equally well.

The graphene photodetector is not only extremely fast, it can also be built in a particularly compact way. 20 000 detectors could fit onto a single chip with a surface area of one square centimetre. Theoretically, the chip could be supplied with data via 20 000 different information channels.

More Speed, Less Energy

"These technologies are not only important for transmitting data over large distances. Optical data transmission also becomes more and more important for communication within computers," says Thomas Müller. When large computer clusters work with many processor cores at the same time,coque galaxy s3 i9300, a lot of information has to be transferred between the cores. As graphene allows switching between optical and electrical signals very quickly, this data can be exchanged optically. This speeds up the data exchange and requires much less electrical energy.


Si l’on cherche la prochaine innovation en termes de communication, il se pourrait bien que celle-ci réside dans les odeurs. En effet, la communication olfactive pourrait bien être la réalité de demain et notamment grâce au projet développé par Le Laboratoire : le Ophone, un appareil permettant d’envoyer des odeurs grâce à son smartphone.

L’Ophone est un nouveau produit en cours de développement par les chercheurs, artistes, designers et parfumeurs du Laboratoire, un laboratoire de recherche situé à Paris. Son but est de rendre la communication olfactive réelle et à la portée de tous. Le système fonctionne à la manière d’une imprimante contenant des cartouches d’odeurs et pouvant créer des alliances de nouvelles senteurs. A terme, l’Aphone pourrait créer plus de 10 000 odeurs et même enregistrer des nouvelles afin de développer sa base de données. 

Le système serait géré grâce à une application pour terminaux mobiles,Sandales Haut talon, smartphones notamment, nommé oTracks. L’application analysera les odeurs re&ccedil,www.sandalup.fr;ues pour la diffuser et permettra également de soi-même envoyer les senteurs souhaitées.


Les senteurs comme langage universel ?

Les créateurs de l’Ophone ont pour but de créer une nouvelle forme de communication, qui pourrait être comprise de manière universelle. Il s’agit d’un rêve ancien permettant de dépasser les barrières des langues et cultures. C’est l’idée que développe le fondateur du Laboratoire dans la vidéo ci-dessous.

Cependant, on imagine aussi assez facilement le développement de campagnes publicitaires et marketing utilisant les senteurs. Un avantage important pour des produits tels que les parfums, les produits cosmétiques ou encore alimentaires.


CIO - Paul Luehr knows a thing or two about security, the law and “Bring Your Own Device,” or BYOD.

Formerly a federal prosecutor and supervisor of the Internet fraud program at the Federal Trade Commission, Luehr is a managing director at Stroz Friedberg, a global data risk management company with a cyber-crime lab. He focuses on computer forensics, investigations and discovery.

BYOD has led to an increase of mobile devices, cloud storage repositories, different kinds of data types, and, of course, data theft by disgruntled employees. “The number of cases we have involving mobile devices has probably doubled in the last three years,” Luehr says.

While there’s a lot of hand-wringing over BYOD and mobile security-some would say it’s “over-hyped”-Stroz Friedberg deals with real cases concerning data breaches. Luehr sat down with CIO.com to talk about what kinds of threats he’s seeing, how companies are reacting, and where they’re falling short.

There’s been lots of talk about the mobile BYOD security threat. But is it real or hype?

There’s a two-pronged answer to your question. Broadly speaking, we usually break down threats against the network into two vectors.

The external vector, which would be the hacker coming in from overseas trying to penetrate the network, continues to come through the traditional avenues and not necessarily BYOD. The people who say that the threat is overhyped may be accurate if they’re talking about external threats.

Slideshow: 10 BYOD Worker Types

But this leaves out another large dimension of security. BYOD policies certainly have raised the risk to companies with regard to the internal threat. Probably the most dangerous person to an organization is the disgruntled employee who is about to walk out the door. That person has access to the network. With BYOD, they have more ways to connect to that network and move information around.

I think that the security risk,Galaxy Note covers, in terms of the internal vector, is already here and quite large.

Have you seen a rise in BYOD data breaches in your business?

Absolutely, especially in the forensics area around employment matters. There are lots of cases we’ve nicknamed “Bad Leaver” cases, as in, somebody left and it was bad. When an employee leaves to a competitor, there’s often concern that the employee may have taken intellectual property.

In those types of cases, we’re seeing BYOD come front and center into the investigation. Rather than just looking at the server, email or desktop computer, now we’re often looking at the smartphone, iCloud or Dropbox account, or Gmail.

Most of the breaches we’re seeing are still directed at the servers where the most valuable and sensitive data resides. However, more and more mobile devices are an avenue to breach an organization. From a pure security point of view, BYOD is presenting many challenges.

You also have a change in attitude and practices, such as many people are involved in social media. We’re seeing the bright line between home and work disappearing. Employees are becoming a little bit lax about the type of sensitive information they bring home to work on, maybe a list of credit card numbers of customers or source code that a company relies upon to really distinguish itself in the market.

Once they bring it home, the [information] could be subject to sharing across different devices and repositories. Have they showed it to a friend or family member?

Companies respond by toughening up BYOD polices. Is this a good countermeasure?

Sound and comprehensive policies and procedures are certainly needed in the modern BYOD environment, but they’re often not good enough by themselves. Most policies need to be updated to take into account the various places that employees will be using their devices, such as home use, the avenues through which data can travel, and the different types of communication that are occurring, such as Facebook, Twitter and text messages. They also need to come with good training and practices behind them.

Recently, the head of my lab and I put together a top ten list of security assessments based on the breaches we’ve seen. One of them is the lack of any consequences for poor security at the individual level. We think it’s a good policy to make sure that security is not just part of an overall HR policy but, especially for some people, it’s part of their annual performance evaluation.

A bad leaver is going to wreak havoc anyway. Isn’t this more of an HR issue than an IT one?

Good policies come from the top down and through the HR department. There should be consequences for both good and bad behavior. That is the human side of it.

But it’s not just about the humans. You also have to have a lot of network controls in place. I don’t think HR can pass it off on IT, or IT can pass it off on HR. In fact, the number one issue we see in our security assessments is the lack of appreciation for security at the top levels of a corporation.

Does a BYOD policy open the door to hidden legal costs?

Yes. In bad leaver cases, the hidden legal costs come from the additional collection and review that must occur whenever you have a number of mobile devices involved in a case.

You’re going to have more data, more types of data, more devices, more repositories. Instead of grabbing a forensic image of a laptop or desktop, now you need to have four or five different forensic images to grab. In the messiest situation, you’ll have a lot of co-mingled data typically occurring on a home computer and in a home email or cloud-based account.

Not only do you have the collection costs to deal with, you also have an additional gatekeeping step that must be completed before attorneys can even put eyes on the information. More and more employees are demanding that their personal information be kept separate from the business information subject to litigation. Companies may have to hire a forensics shop like ours to separate the wheat from the chaff.

Have you seen BYOD lead to a security breach?

The most common way BYOD policies affect data security and breaches is in the cross-pollination of passwords. A person is probably using the same or very similar password as the one they use on their home devices.

We actually had a call with a client with the FBI on the line. In one of the large public data breaches that’s been highly publicized, the FBI saw the list of published consumer names, addresses and passwords and recognized one of the names – a high profile IT manager or engineer for a significant technology firm. The FBI called up the company to tell them that this person’s personal email account had been hacked and that they might want to check up and see if it affects them.

Sure enough, the person had been logging in from home into the corporate network using the exact same personal user name and password. Fortunately, no breach had occurred, and they were able to close that loop. It was just coincidence, luck and a good FBI agent to recognize that person’s name.

This shows the cross-pollination that often occurs when people start treating work devices as home devices and vice-versa.

Is there a mobile security blind spot?

Text messaging underlies a lot of interest in what’s new and different.

In the old days, you really had two sources of documents that you were concerned about. One was email, the other e-docs, such as a PowerPoint presentation, a Word document,Galaxy Note 2 Cases, Excel spreadsheets, sometimes engineering drawings. You’d search the file server and email server implicated in the investigation, as well as the employee’s workstation.

With mobile devices, you have not just the devices and repositories but the type of information coming off those devices that’s different. In particular, text messaging appears only on the phones and nowhere else on the corporate network. Service providers can only provide you with information such as connection times and numbers connected, maybe volume of information, but they’re actually not saving the content of individual messages.

So while a bad leaver may have communicated with their new employer through maybe even a personal email account, now it’s increasingly common to see them text messaging their buddies across town and conveying private or valuable information that way. In the most nefarious cases, some messages on systems such as Snapchat are designed to disappear even from the phone itself.

Could mobile security be the downfall of BYOD?

If companies turn a blind eye towards mobile devices, they’re going to infiltrate the workplace anyway. A sounder course of action is to accept reality and realize that BYOD and mobile devices are part of our future, and then construct sound policies and practices.

You can’t control all actions, but what you should do is foresee those actions and control the consequences to the extent possible.

Tom Kaneshige covers Apple, BYOD and Consumerization of IT for CIO.com. Follow Tom on Twitter @kaneshige. Follow everything from CIO.com on Twitter @CIOonline, Facebook, Google + and LinkedIn. Email Tom at tkaneshige@cio.com

Read more about byod in CIO’s BYOD Drilldown.


Sony acaba de lanzar una nueva actualización para toda la familia Xperia Z, que nos encontramos a los Xperia Z, ZL, ZR y Xperia Tablet Z.

La actualización corresponde a la numeración 10.3.1.A.2.67,Samsung Galaxy Note 3, las mejoras que incluye, es la corrección de bug, perfilado la calibración de la pantalla, una mejor respuesta a las cámara y proporciona un cuidado mejor a las baterías. La actualización empezará a partir del Xperia ZR y recorrerá al resto de la familia en los posteriores días. Esta información lo ha confirmado Sony desde su cuenta oficial de Twitter.

Aunque la actualización es menor de lo que se pensaba,Carcasas Galaxy S4, en mi opinión Sony esta sacando constantemente mejoras y las va incluyendo dando un soporte excelente a sus clientes, ya que esto significa que aunque por el momento no venga la actualización, el fabricante japonés se preocupa por mantenerlos al día. Una política que podría tomar ejemplo otros fabricantes para sus dispositivos.

Fuente: XperiaBlog




La combinaison « intégrale », la combi longue, c’est joli et sexy, pour ceux qui aiment, on est d’accord.


Par contre, par temps caniculaire ou juste chaud, la combi intégrale c’est plutôt FBI: fausse bonne idée!


Je ne pense pas que l’effet sauna soit très flatteur lorsqu’il se transforme en sueur!



C’est le moment de passer au court et d’enfiler un combi short, nettement plus de saison et tout aussi mignon!


Vous n’avez toujours pas trouvé le vôtre?

Trop cher, trop mal coupé, le mauvais coloris, la mauvaise longueur?


Vous avez envie d’un bon basique pour pouvoir le porter de jour comme de nuit, à plat tout comme perchée sur des talons inouis, qu’on peut accessoiriser à l’envi?

&nbsp,ballerines femme;

J’en ai trouvé un, de combi, qui pourait bien remplir chacune de ces catégories!


Il a une forme basique mais travaillée, avec un effet plissé devant, un zip judicieusement caché, une forme suffisamment ample mais néanmoins facile à ajuster, il est en coton qui ne froisse pratiquement pas, sa couleur navy permet de le porter soit chic soit plus funky en lui ajoutant quelques accessoires flashy.


Le voici dans son plus simple appareil, puis ceinturé, très sobre, j’ai envie de simplicité.


Pour le reste, c’est à vous de jouer et de vous l’approprier! 

&nbsp,sandales femme;





Bref, une jolie pièce qui se trouve être à très bas prix, car il ne coûte que 24,99 euros au lieu de 59.


Où? Chez GAP, pardi!


Autre bonne nouvelle: les fameuses compensées de Monsieur Hardy sont très bien bradées elles aussi.

Je les ai dénichées à 44,99 euros, donc à moitié prix.


Quand on sait que j’ai réussi à cavaler tout le week end juchée sur ces sandales boisées sans avoir à sacrifier le moindre de doigt de pied, je dis Mister Hardy: bien joué!


Plus de photos ici 


Ya sabemos que en Android, no solo existe Google Play,Carcasas iPhone 5C, sino que hay alternativas, hoy os presentamos otra,Carcasas iphone 5, se trata de F-Droid.

Se trata de un repositorio de aplicaciones Libres para Android fácil de manejar y con una amplia gama de apps. Es decir que si una de estas apps te gusta pero puedes ayudar a mejorarla puedes modificarla y volverla a subir, eso si hay que tener en cuenta sobre que licencia se basa la app.

Cuando nos instalamos la app, veremos que su interfaz es muy sencilla y ligera con tres pestañas a la cuál puedes acceder a los diferentes contenidos. Os explicamos las diferentes pestañas y su funcionamiento:

La primera es dónde podemos descargar las apps junto a la licencia, la segunda un listado de apps instaladas en nuestro dispositivo y una tercera sobre si existe actualizaciones (podemos actualizar pero si nos falla nos dan la posibilidad de volver a una versión anterior).

Si estas interesado en instalarte este repositorio en tu teléfono o tablet, descarga su app del sitio oficial o desde nuestra ficha:

  • F-droid


Feb. 20, 2013 — The potential benefits of successful development of an inertial confinement fusion-based energy technology justify investment in fusion energy research and development as part of the long-term U.S. energy R&D portfolio, says a new report from the National Research Council. Although ignition of the fusion fuel has not yet been achieved, scientific and technological progress in inertial confinement fusion over the past decade has been substantial. Developing inertial fusion energy would require establishment of a national, coordinated, broad-based program, but achievement of ignition is a prerequisite.

Share This:

"The realization of inertial fusion energy would be a tremendous achievement capable of satisfying the world’s ever-growing need for power without major environmental consequences," said Ronald Davidson, professor of astrophysical sciences at Princeton University’s Plasma Physics Laboratory and co-chair of the committee that wrote the report. "These possibilities form an extremely compelling rationale to continue R&D efforts toward this goal."

Inertial fusion energy technology (IFE) would provide an essentially carbon-free energy source with a practically unlimited supply of fuel. IFE relies on a process in which a fuel pellet the size of a pinhead is compressed by an external energy source,http://www.bigcase.com.au/, raising the temperature and density enough that the nuclei of the some of the fuel atoms fuse together, releasing nuclear energy. The aim is ignition, in which the fusion energy produced by the initial compression causes the remaining fuel to undergo fusion.

"The fuel used in the fusion process is lithium and deuterium; deuterium is derived from water and therefore virtually unlimited," explained Gerald Kulcinski, associate dean for research and director of the Fusion Technical Institute at the University of Wisconsin, Madison, who served as co-chair of the report committee. "And unlike nuclear fission plants, it would not produce large amounts of high-level nuclear waste requiring long-term disposal. The potential is for a sustainable energy source that could power the Earth for millions of years."

U.S. research on inertial confinement fusion has been supported by the National Nuclear Security Administration (NNSA) of the U.S. Department of Energy. NNSA’s objective is nuclear weapons stockpile stewardship, but much of the R&D is also applicable to IFE development. There are several external energy source or "driver" technologies under development: lasers, particle beams, and pulsed magnetic fields. NNSA’s National Ignition Facility, located at Lawrence Livermore National Laboratory, recently completed a National Ignition Campaign aimed at achieving ignition. While much was learned in the process, ignition was not attained. In view of this result,coque note 3, the committee concluded that a range of driver technologies should continue to be pursued, rather than choosing a single technology at this time.

Report: http://sites.nationalacademies.org/xpedio/groups/depssite/documents/webpage/deps_081572.pdf

Pagina successiva »