Sunday, July 28, 2013

Narendra Modi fans launch Namo Android smartphone

namo_smartphone.jpg


A group, claiming to be "independent body of fans of Shri Narendra Modi", has launched the Namo Android smartphone that will be available 'soon'.

Namo, is short of course for Narendra Modi, the Chief Minister of Gujarat, and Chairman of Central Election Campaign Committee of Bharatiya Janata Party (BJP), one of India's leading political parties. Namo is also, the group shares, short for, Next-generation Android Mobile Odyssey, as the Namo phone is based on Android.

Explaining the motivation in releasing the phone, the group says on its website, "We are fans of Shri, Narendra Modi, our forthcoming future leader of our great nation India, we are manufacturing latest Android handset dedicated to the IRONMAN of modern India."

The website is scant on details about Namo, the smartphone, though it does mention some of the specifications. Namo will sport a 5-inch Corning Glass 2 display and be powered by a 1.5GHz quad-core Mediatek MT6589 chipset. It will have a 13-megapixel camera. The phone will supposedly come in 4 variants, with the amount of RAM and internal storage varying between 1-2GB and 16-64GB respectively. There's no word yet on the price or availability of Namo smartphone.

To be clear, it seems what the group plans to do is import off-the-shelf smartphones from China to rebrand and market them, similar to what many other Indian smartphone brands are already doing. Will the group be around to service the Namo smartphone if and when it runs into issues is anyone's guess.

"We are from land of Gujarat & in electronic smartphone business in China," the group says. "Our product is our way of dedication & respect to our great nation leader. We will be launching NAMO Android handset with Shri Narendra Modi "signature edition", for which process in under way! We will launch our handset very soon..

Friday, July 26, 2013

Cisco to buy Sourcefire, more network security deals seen

cisco-wall-635.jpg

Cisco Systems Inc said on Tuesday it plans to purchase cyber-security company Sourcefire Inc for $2.7 billion, a deal that analysts say should spark more acquisitions in the industry as large vendors seek to profit from growing demand for IT security.

Cisco, which has been seeking targets to boost its network security business, said it will pay $76 per share in cash for Sourcefire, a premium of 28.6 percent over its closing price on Monday of $59.08.
"We looked broadly at all the major players. Sourcefire fit perfectly," Cisco's business development chief Hilton Romanski said in an interview.

Cisco has made it a priority to improve its security and is pushing to offer multiple security capabilities in hardware, software and cloud. Sourcefire is strong in intrusion detection and protection appliances, which is one of the higher growth segments within security.

Sourcefire shares rose 27.8 percent to $75.51 in afternoon trading while Cisco stock was down 0.3 percent at $25.64.

Analysts said the valuation may be high but the deal made sense for Cisco, which has lost market share in network security to small, innovative rivals such as Juniper Networks Inc, Check Point Software Technologies, and Palo Alto Networks Inc.

Cisco wants to be the top player in security and shed its reputation of lagging in that area, company security head Chris Young told analysts on a conference call.

"We will not rest until we are the number one security partner for our customers, hands down," Young said.
More acquisitions should be on the way in the tech security sector, which Research firm IDC has said spending this year should generate 7.8 percent revenue growth for vendors.

"We view this morning's news as 'game changing' for the cyber security space as we expect a surge of consolidation to take place over the next 12 to 18 months," Daniel Ives, a tech analyst with FBR Capital Markets, said in a research note.

He added that larger technology players such as IBM, Juniper, Symantec, and EMC could look to acquire smaller security players to help drive growth given the high priority security has in IT spending.
Brian White, an analyst at Topeka Capital Markets, said Dell and Hewlett Packard could also be seeking to expand their security offerings, and the Sourcefire acquisition could be the beginning of more transactions.

Potential targets are smaller, more nimble companies that provide up-to-date network security to combat advanced hacking attacks. Security protection needs have grown more complex with the proliferation of web applications, social media and video streaming.
Palo Alto Networks, Fortinet as well as privately held FireEye and Barracuda Networks are considered top picks.

FBR's Ives said Fortinet could be worth around $39 a share for example. Fortinet shares rose 5.5 percent to $21.57 in afternoon trading.

Cisco said it will integrate Sourcefire, based in Columbia, Maryland, into its security business. Sourcefire founder and Chief Technology Officer Martin Roesch and other top executives will join Cisco's security group.
BMO analyst Tim Long said adding Sourcefire gives Cisco's business about 20 percent more scale and improves the cloud security offering.

"We see this acquisition turning Cisco's security business from low single-digit growth to mid high-single-digit growth," Long said.

Cisco said the deal should close during the second half of this year, and it expects the acquisition to be slightly dilutive to non-GAAP earnings in fiscal year 2014.

Young did not rule out further acquisitions because cyber security threats were constantly changing and adversaries were well-funded.
"As the landscape changes we will respond, organically and non-organically," Young said.
Cisco Chief Executive John Chambers said in December that Young had a "blank check" to overhaul the business.

RBC Capital Market analyst Mark Sue said in terms of acquisition targets "product, platform, channel integration will be important for Cisco, which has yet to be the customer's first choice for security".
Centerview Partners advised Cisco on the deal.
Sourcefire hired Qatalyst partners, according to a source familiar with the matter.
© Thomson Reuters 2013

Average Internet speed in India up 21 percent to 1.3Mbps: Akamai

internet-battle-635.jpg

Global average Internet speeds have crossed the 3Mbps mark, while average Internet speeds in India are slightly above the 1Mbps mark, according to Akamai Technologies' State of the Internet report for the first quarter of 2013.

Akamai is an Internet content delivery network and the report is based on data collected from the Akamai Intelligent Platform. According to Akamai, the measurements published in the quarterly State of the Internet Report are taken from requests made to Akamai's HTTP/S platform across more than 200 countries.

India ranks 114 globally, in terms of average Internet speed, at 1.3Mbps which was up 20 percent compared to the last quarter and up 21 percent compared to the same quarter, last year.

Peak connection speeds in India were at 10.6Mbps, trailing behind Thailand, Indonesia, Philippines and Vietnam. However, the peak speed has seen a 27 percent sequential increase and a 34 percent year on year increase according to Akamai.

Only 0.3 percent Internet users in India enjoy speeds of more than 10Mbps, while 2.4 percent have access to Internet connections with speeds 4 Mbps or more. Akamai gauges broadband adoption by looking at percentage of users getting connection speeds of 4 Mbps or more. This figure increased by 33 percent quarter on quarter and 66 percent year on year in India. 

Similarly, Akamai considers speeds above 10Mbps as high Broadband. In India there was a 102 percent increase quarter on quarter and  an 85 percent year on year increase in the number of Internet connections with speeds 10Mbps or more

Globally, around 46 percent Internet users enjoy speeds of 4Mbps or above, while 13 percent users have a 10Mbps+ Internet connection.

South Korea ranks number one in terms of average connection speeds at 14.2 Mbps, while Hong Kong ranks number one in terms of peak connection speeds at 63.6Mbps. Looking at adoption rates, Switzerland was at the pole position with 88 percent of Internet users enjoying connection speeds of 4Mbps or more, while South Korea topped the charts in the high speed broadband adoption category with 50 percent users getting speeds of 10Mbps or more.

Akamai also adds that there are 16.28 million unique IP addresses in India. Last quarter, India had 14.27 million unique IP addresses.

China, Indonesia leading sources of online attacks: Study

china-internet-problem-635.jpg

China and Indonesia headed the list of 177 countries named as sources of Internet attacks, a security survey said Tuesday.
The survey from US security firm Akamai found China remained at the top of the list in the first quarter of 2013, but its share of all attacks dropped to 34 percent from 41 percent in the fourth quarter of 2012.
"This decline is likely related to Indonesia making a sudden appearance in the second place slot," said Akamai's Bill Brenner, noting that Indonesia's share of cyber-attacks surged to 21 percent from just 0.7 percent in the prior quarter.
The United States was the third largest source, but its share dropped to 8.3 percent from 10 percent earlier.
The next largest sources of cyber-attacks were Turkey (4.5 percent), Russia (2.7 percent), India (2.6 percent), Taiwan (2.5 percent), Brazil (2.2 percent), Romania (2.0 percent) and Hong Kong (1.6 percent).
"We find that nearly 68 percent originated in the Asia Pacific/Oceania region, up from 56 percent in the fourth quarter of 2012, likely due to the massive increase seen in Indonesia," Brenner said.
"Europe accounted for just under 19 percent, while North and South America originated just over 13 percent combined."
Akamai also noted a four percent increase in the global average connection speed to 3.1 megabits per second.
South Korea had the highest average connection speed at 14.2 Mbps and remained the country with the highest level of "high broadband" adoption, growing to 50 percent, the report said.
The report estimated more than 733 million unique Internet addresses from 243 countries or regions connected to the Akamai platform, an increase of 3.1 percent over the previous quarter and 10 percent year over year.
Since a single IP address can represent multiple individuals in some cases, Akamai estimated the total number of unique Web users connecting to its platform during the quarter to be well over one billion.

Internet Explorer 11 developer preview now available for Windows 7

IE11-win7.jpg

Microsoft has released a developer preview version of Internet Explorer 11 (IE11) for Windows 7.

As promised by the Redmond giant after it released the consumer preview version of Windows 8.1 with the new iteration of the browser last month, the browser can be downloaded from Microsoft's Window's website.

Microsoft announced the development on its MSDN blog and said that Internet Explorer for Windows 7 offers the same improved performance, faster page load times, new standards support for next generation sites, and completely revised F12 developer tools, that the browser's Windows 8.1 version offers.

According to Microsoft, IE11 is the first browser to natively decode JPG images in real-time on the GPU (Graphics processor), that allows web pages to load faster and use less memory, reducing power consumption and improving battery life of devices. IE11 also boasts of being the first browser to render text on the GPU. Microsoft also claims that the updated version of Internet Explorer is the first browser to implement the W3C Resource Priorities standard allowing developers to specify which parts of the page are important and need to be loaded first. It also supports HTML5 link prefetching and pre-rendering, letting developers guide the browser anticipate where users are expected to go next and get those pages ready.

The update brings some under the hood changes including support for hardware accelerated 3D web graphics with support for WebGL. It also supports plug-in free HTML5 video and the latest standards for closed captioning, adaptive streaming, wherein the quality of the video is adjusted depending on the available bandwidth, and rights management.

Microsoft has also made improvements to its JavaScript engine, Chakra with Internet Explorer 11.

According to the company, IE11 on Windows 7 is 4 percent faster than IE10, and nearly 30 percent faster than Chrome in JavaScript benchamark tests like SunSpider.
IE11 also features a completely overhauled suite of in-browser F12 developer tools. These tools help Web developers diagnose and optimize their apps quickly and efficiently, a sper Microsoft.

The browser's Windows 8.1 avatar offers additional features optimised for touch-screens including  swipe gestures for going forward and back and supports Windows 8.1's side by side mode allowing users to browse two websites on different instances of the browser on one screen.
As with any preview software, users are advised not to use the software as their primary browser, as it's likely to have some bugs.

Friday, July 19, 2013

All you Usually Desired to Learn about How come My personal Pc Deep freeze Upward





Like a tech support team professional, each day wouldn't end up being total without having these queries in the clients phoning with regard to assist:


"My pc retains upon very cold. Exactly what will I actually do? inch


"My pc retains very cold upward! Assist! inch



WE actually obtained 2 e-mail that's therefore amusing as well as created me personally believe difficult too:

"Stop! Deep freeze! inch
"Stop pc deep freeze. Make sure you! inch


A lot of queries, queries, problems however it just about all comes right down to 2 main stuff that we have to perform more often than not: eager declaration as well as upkeep. Return to the fundamentals and do not believe this more than an excessive amount of the reason why it's doing this. It's absolutely no skyrocket technology. May be easy to state however it really is easy. Listed here are the items we have to perform:


NOTICE.
Believe outside the container, these people state. The main reason is probably not inside your pc however really the actual equipment a part of this. There can be a lot of points mounted on your pc, where this stuff tend to be switched on however you aren't with them, and also the second option is actually operating way too hard using the applications operating in the exact same inside your pc. These types of may also result in inconsistant along with Home windows allotted assets in order to several products in order to individuals products mounted on your computer. Change all of them away when you're not really with them or even a minimum of unplug all of them as the pc is actually switched off as well as reactivate your pc once more.


One more thing to see is actually when there is a brand new equipment which was mounted on your pc lately as well as following doing this, your pc began to deep freeze upward. For example, the actual movie greeting card specs may be excessive for the PROCESSOR or even it's not obtaining sufficient energy out of your power. Perform seek advice from your pc producer exactly what is the greatest update for the equipment prior to purchasing any kind of. The actual restore may set you back much more.


Following looking at the actual equipment component, it's right now time to examine the program component. Lots of explanations why the actual pc is actually behaving therefore: a lot of applications operating within the history, several new venture applications or symbols packed, unwanted documents as well as snacks consuming upward your own storage, incorrect car owner that requires upgrading, applications which are nevertheless surviving in your computer which you no longer require that could be inconsistant together with your additional applications as well as infections.


The next matter to complete is actually UPKEEP.


Every now and then, extra a while to check on your pc. Avoidance is preferable to remedy. Very first, that is the simplest move to make would be to cleanup your pc along with undesirable documents or even snacks. They are documents which are instantly packed inside your computer when you are browsing the web that you simply do not actually need. Do that frequently, a minimum of 3 times per week so that your pc will not stack up along with unneeded documents but still possess space with regard to essential types.


Following would be to look for the actual packed launch plan or even symbols in your desktop computer. Whilst your pc is actually booting upward, you may discover it requires period before you really make use of your computer. Exist a lot of symbols shown in your desktop computer? If that's the case, take away the symbols which you no longer require. These types of will not really remove this program. This program might be inside your plan documents it's simply the actual image that you're removing. Nevertheless, if it's the document a person made a decision to conserve inside your desktop computer and also you believe it is essential, you can test to maneuver this inside your abandoned desktop computer folder (if you cannot observe 1 in your desktop computer, produce a brand new folder using the exact same title) as well as can get on simply when it's needed. This can assist reduce the actual mess in your desktop computer.


Exist a lot of new venture applications in order to fill or even a lot of applications operating within the history? With regard to new venture applications, many of these will have to end up being packed very first before you make use of your computer. Attempt to examine if you want many of these applications as soon as your pc begins. Otherwise, you should use msconfig power to lessen the actual applications which are operating upon new venture. You may also make use of this power in order to disable any kind of applications you don't truly make use of or even you do not would like operating when you are making use of your pc.


One more thing to take into consideration may be the applications nevertheless surviving in your computer that you will no longer make use of. Attempt getting rid of all of them while using Add/remove applications. These types of will be your aged antivirus applications edition, prior edition of the gadget car owner, and so on.


Most detrimental of, this is often an concern along with malwares or even computer virus. Usually operate your own antivirus software program to check on your computer for just about any existence associated with computer virus or spywares. Perform examine, as well, in case your antivirus is actually up-to-date. Otherwise, it's not set up in order to identify any kind of brand new infections that may accident your computer. Furthermore, ensure that the actual firewall about this software program can also be allowed to safeguard a person through cyber-terrorist as well as any kind of harmful exercise that may get into your computer.


In the event that everything else isn't able, attempt going to or phoning your pc producer or even visit all of your closest pc middle to check on your computer.


GlassUp plans a sexier, cheaper take on Google Glass


A team of Italian designers has plans for a simpler, cheaper, and more stylish take on Google Glass. The GlassUp team announced Tuesday that it is raising money to produce its Glass competitor.
GlassUp, an IndieGogo project seeking to raise $150,000 to take its augmented eyewear to production, says that the team showed off its first prototype in January at the Consumer Electronics Show. The team hopes to deliver its first production models by February 2014 for an estimated price of $299, it said.
According to Francesco Giartosio, GlassUps’ chief executive, one of the chief differences between Google Glass and the GlassUp eyewear will be in how the device displays data; instead of projecting information onto the edge of the glass from an offset projector, GlassUp will use a dedicated lens embedded in the glass itself.

That will allows GlassUp to overlay monochromatic text directly “ahead” of the user’s eye, which Giartosio said was more ergonomic. GlassUp’s display has a resolution of 320 by 240 pixels.
GlassUp overlay
What life is like looking through GlassUp’s glasses.
With Google, “you have to lift up your eyes,” Giartosio said. “”It’s not comfortable and can’t be good for you continuously.” GlassUp weighs about 1.5 ounces, he said, with a battery life of 150 hours of standby time and 8 hours of normal usage
.
GlassUp is just one of a number of companies vying to be the next big thing in “wearable computing,” with the argument being that consumers will eventually grow too lazy to haul their smartphone out of their pocket. Instead, a number of Google Glass competitors have developed wrist-mounted devices including the Pebble or the rumored Apple iWatch to provide glanceable information.

But while Glass is a standalone device, GlassUp characterizes its glasses as “basically a second screen output for your devices,”  that connect via Bluetooth to your phone or tablet.

As such, it will be “read only,” only able to receive information—unlike Glass, which can be used to send information back and forth. GlassUp will also forego voice input—something that will arrive in a future generation, according to Giartosio—and there won’t be a camera included for recording photos and video, either. However, sensors including an accelerometer, compass, ambient light sensor, and a precision altimeter are included.

The GlassUp glasses include a touchpad on the right side of the eyewear, which GlassUp says will support gestures such as swiping, as a means to avoid tapping on your phone all the time.
GlassUp swipe
The information that GlassUp displays will be dependent on what sort of apps that you download. Giartosio says that GlassUp will develop five to ten apps on its own, and that 100 developers are already hoping to take a crack at GlassUp with their own apps.

The company envisions GlassUp projecting messages, tweets, and real-time directions on the screen, overlaying the “real world” that’s visible though the glasses. However, it’s difficult to see how apps that showed real-time translations of movies would work with GlassUp, as it lacks both a camera and audio sensors.

However, while Google has refined its industrial design, Giartosio says that GlassUp is located in northern Italy—right smack in the middle of eyeglass designers like Luxottica, Safilo, Marcolin, De Rigo, who design eyeglass brands like Ray-Ban, Oakley and others. The company will develop two models, a basic and a “sporty” model.

Samsung unveils super duper high-speed 1TB SSDs

Samsung Electronics will offer a range of faster SSD drives for consumers from next month, including a zippy new 1TB drive meant for everyday use.
The company’s “840 EVO lineup” will be two to three times faster than its existing 840 drives, depending on the capacity, it said Thursday. The 1TB version has a sequential write speed of 520MBps, over double its predecessor, while the 120GB model can reach up to 410MBps, about triple the older version.
As NAND flash prices fall and adoption of SSDs spreads in consumer computers and laptops, terabyte-sized SSDs have become the new battleground for manufacturers. Samsung announced its newest drives under the slogan “SSDs for everyone.”
Micron unveileda 1TB drive, the Crucial M500, for consumers in January at the International CES show in Las Vegas, pricing it under $600, or 60 cents per gigabyte, far below rivals at the time. The first 1TB SSD, from OCZ, launched in 2011, still sells for over $2,500 online.

Samsung has yet to reveal the price for its 840 EVO, which it said will go on sale in August in major markets. The company’s sequential read/write speeds are slightly faster than Micron’s product, as are its 98,000 input/output operations per second (IOPS) and 90,000 IOPS random read and write speeds.
The new SATA-based, 2.5-inch drives will come in sizes ranging from 120GB to 1TB, and will use Samsung’s NAND flash built using process technology smaller than 20 nanometers. The company’s previous consumer drives maxed out at 250GB.

Samsung also announced a new lineup of SSDs for enterprise storage, including a 1.6TB drive that has a sequential read speed of 2,000MBps and a random read speed of 740,000 IOPS. The company said it is the fist to build a 2.5-inch SSD based on NVMe (non-volatile memory express), an interface specification for solid-state drives that replaces the SATA interface now widely in use.

The 2.5-inch enterprise drives will also come in 400GB and 800GB sizes. Samsung said it plans to expand its enterprise offerings based on NVMe in the future.

Sony to sell 'world's first' SD card-based backup for PCs


Sony wants to simplify laptop backups.The company says it will soon launch a new line of SD cards and accompanying software that will allow laptop users to carry their backups along with them while on the move. The solution is meant to take advantage of the memory card slots that are increasingly standard on portable computers, but are rarely used other than for transferring data from digital cameras or camcorders.
Like other backup solutions, Sony's software allows the user to designate folders and specific files to be backed up, either when they are modified or on a schedule. The backups are encrypted using AES 256-bit, and the cards also require a password for access. The company's new "Real-time Backup Utility" software works only with its memory cards, but it is allowing trial downloads that work for 30 days with cards from other companies.

Sony announced the product on Thursday, and said it will be available in Japan from August 20 in 16GB, 32GB, and 64GB versions. The backup software will initially support only Windows-based machines. The cards are rated Class 4 speed, a standard that provides write speeds of at least 4MBps.
The company is still considering if and when it will launch outside of Japan, a spokeswoman said.
The largest 64GB version will cost around ¥14,000 ($140). That is about the three times the current price of a blank 64GB SD memory card with similar specifications. The software on the Sony cards also takes up about 10 percent of the space: the 64GB card provides about 57.6GB for user storage.
Developers have created versions of complete operating systems that can run off of SD cards or USB thumb drives, including versions of Debian Linux.

Symantec: Google Glass still vulnerable to Wi-Fi attack


Google fixed one Wi-Fi security problem with its wearable computer Glass, but Symantec says there’s another problem, which has been a long-known weakness in wireless networking.
The security vendor has been analyzing Google Glass in its labs and found a second issue that is just as harmful as the now-patched QR-code vulnerability found by Lookout Mobile Security, which was made public earlier this week.

Many Wi-Fi devices regularly look for networks that they have been connected to before, wrote Candid Wueest, a threat researcher for Symantec. The behavior is convenient for users, since they don’t have to manually connect to a known network, he wrote.

But for as little as $100, a hacker can buy a device that impersonates the known Wi-Fi network by borrowing the network’s name, known as its SSID (Service Set Identifier).

If a mobile device such as Google Glass looks for a known network with the SSID of “myPrivateWiFi,” a device called the Wi-Fi Pineapple can respond, pretending it is the network.

Wi-Fi Pineapple is intended as a tool for security researchers. It sits between a targeted device and the Internet. Once it has tricked a Wi-Fi device into thinking it is the legitimate network, it can then spy on the data traffic.

If the traffic between a pair of Google Glasses and a remote server is unencrypted, an attacker using Wi-Fi Pineapple can view it, a major privacy and security problem known as a man-in-the-middle attack (MITM).
The issue isn’t exclusive to Google Glass and could affect any device used, for example, by someone in a coffee shop. Savvy laptop and mobile phone users may be able to take steps to prevent data from leaking by using a VPN (Virtual Private Network). But the keyboard-less interface of Google Glass could make thwarting this style of attack more complicated.

In early June, Google fixed the vulnerability found by Lookout, which found that Glass would scan a QR Code instructing it to connect to a malicious Wi-Fi access point. Lookout, which told Google of the problem in May, then directed Glass to a malicious website that ran a known Android 4.04 vulnerability, which gave the security vendor complete control over the glasses.

Google issued several fixes, including one that required users to approve instructions contained in QR codes.
The fundamental problem of Wi-Fi devices looking for known networks isn’t an easy one to solve, Wueest wrote. Devices could check a hardware identifier, called the MAC (Media Access Control) address, of a Wi-Fi router and match it with the SSID. But MAC addresses are easily faked, he wrote.

“The more practicable solution is to treat every network as hostile and ensure that all the applications use encrypted communications like SSL [Secure Sockets Layers] or tunnel through a VPN,” Wueest wrote.
Google couldn’t immediately be reached for comment.

Source : PC WORLD LATEST TECHNOLOGY NEWS

PowerISO v5.6 Full Version

PowerISO allows you to create, convert, extract, compress, edit and encrypt images of CD / DVD, and open them using the built-in emulator. In PowerISO used compression-decompression technology in real-time image files with the extension of DAA, which significantly reduces the size of image files. Files Images can be cut into pieces of various sizes and in a compressed form to send through e-mail programs or write to other media. Most importantly - files can be used directly without decompressing. It works with all major formats of images: ISO, BIN, NRG, CDI, DAA, MDF, BWI, B5I, LCD, CIF, P01, PDI, NCD, PXI, GI, FCD, VCD, C2D. There is a built-in emulator CD / DVD-drive. 

 

PowerISO v5.6 Full Version

 Main Features

  • Support almost all CD / DVD-ROM image file formats (ISO, BIN, NRG, IMG, DAA and so on). 
  • Note: DAA (Direct-Access-Archive) is an advanced format for image file, which supports some advanced features, such as compression, password protection, and splitting to multiple volumes. It can be handled directly just like other formats, such as ISO, BIN, ... 
  • Supports on-the-fly burning. 
  • Supports UDF image file. 
  • Create image file from hard disk files or CD / DVD-ROM. 
  • Edit an existing image file. 
  • Can edit and burn Audio CD image file. 
  • Extract files and folders from image file. 
  • Convert image files between ISO / BIN and other formats. 
  • Make bootable image file, get boot information from bootable image file. 
  • Make floppy disk image file. 
  • Optimize files to save disk space while saving image files. 
  • Mount image file with internal virtual drive. Even if the image file is saved as DAA format, the virtual drive can handle that format directly. 
  • Support shell integration, such as context menu, Drag and Drop, clipboard ... 
  • Supports command-line parameters. 
  • Can open XBOX image file. 
  • Supports multiple languages 

Download From These Links





Windows 7 32bit & 64 bit Direct link


Minimum System Requirements for Windows 7

  • 1 GHz or faster 32-bit (x86) or 64-bit (x64) processor
  • 1 GB of RAM or 2 GB of RAM for the 64-bit version
  • 16 GB of available hard disk space or 20 GB for the 64-bit version
  • DirectX 9 graphics device with WDDM 1.0 or higher driver.

Download Links Here                      

You can download 'Windows7Ultimate' from given links for free.

Recommended:  Use Internet Download Manager for high speed and resumable downloads.

Thursday, July 18, 2013

How to surf free internet


Free Internet- Save money

This post is about how to browse internet for free. After going through lot of research work i have finally found a completely free way to surf internet.
This can be done through a software PD PROXY which provides free internet. All you need is mobile or net setter and make an account on there website and you can use free internet up to 100Mb/day.

STEPS

1. Sign up on http://www.pdproxy.com/signup.htm
2. Now, download the software from the website. Size of the software is just about 2  Mb.
3. Connect your net setter or phone with the computer via USB Cable.
4.It won’t work with wi-fi connection and you can’t make any ad-hock network through this.
5.The speed of the internet will depend on the Net Setter’s speed or operator’s speed.
6.Now, extract zip file and install it in your PC.
7.Launch PD PROXY through launcher.
8.Provide username and password of your account which you have created on www.pdproxy.com
9.Now, enjoy surfing internet for free upto 100MB/day.
10.Go on basic setting and select auto connect modem.

Hurry up, before they stop this facility.

This is the best option for the people who just surf internet. So why spent money when you get it for free through pd proxy. 

PLAY MOTION GAME IN WINDOWS 8 USING WEBCAM

As we know that Windows 8 is getting better and better day by day. it has some awesome collection of app and game on its own app store. But a few people who use windows 8 knows that it also support motion game using webcam.

 

There are few gaming consoles with motion detection features like Play Station Move and Xbox Kinect which allow us to play just with a motion controller and detector. But, the problem is that, these consoles are costly and everybody can’t have it. So, whats the alternative? Can the person with no gaming console can play the motion games? The answer is yes…!
Some of the interesting games are 3D Pinball Fx, Jetpack joyride etc . But here we will be talking about motion games that use webcam for the detection of motion.
The game is BALLSTRIKE and you can search it on the Store with the name BallStrike or you can visit the link below.

You just need to have a webcam to run this app. You simply have to stand in front of the camera. To clear levels of the game, you have to perform tasks like in which you use your body to twist, turn, kick, hit and jump to explode the balls.

Features of This motion game :

1. Its a Health fitness Game to burn your calories.
2.There are few levels of the game and if you like it, you can buy the Full version.
3.You will get augmented Reality Experience
4. It detects Motion via built-in Camera or attached Webcam.
5. It Calculates Burned Calories.

The amazing thing about this app is, it uses only Webcam as hardware which is very common. So everyone having webcam can try it. Also it shows the no of calories burned. So install the game and give a try yourself. You can share your crazy pictures through Facebook, Email and other social sites.

Download Ball Strike in Windows Store

Download BlueStacks App Player for Windows 7/8/XP/Vista (Offline Installer)


BlueStacks App Player
Are you one of those who preferred to buy an Android device rather than going for iOS or any other? If yes is your all, then chances are quite high that you have plenty of apps and games installed on it. Playing games and running apps on Android device, while on the go, is hell lot of fun. There are many incredible apps and games to enhance your experience with Android device.
Well, while playing the games and apps on your Android device, has the idea of playing them on your PC ever hit your mind. Have you ever wondered that if it is possible to run Android apps on PC or not? The answer is- Yes it is Possible! All you need is a software named ‘BlueStacks App Player‘ which will let you make this possible.

What is BlueStacks App Player?




BlueStacks App Player is a highly popular software and one of the best Android emulators that enables to run Android apps on Windows based PC. This is the first ever software of its kind. Since there are many people who wish to play Android apps on their PC, therefore, the BlueStacks app player has got a big user base. As of writing this post, this software has more than 5 million users across the globe.
With BlueStacks, you can all of your favorite apps and games on your computer. You can start using mobile apps such as WhatsApp, Viber and play Android games like Asphalt & Subway Surfers on your Windows based PC. To do so, all you need to have is the intended app or game. You might know that Android apps have .apk extension, so you need to have .apk file of the game or app that you wish to run on your PC. Of course, that is what you can download from Google Play. There is another good feature that you can search for apps and games within BlueStacks only. So, no pain of downloading them on PC first and then transferring to PC. Moreover, you can sync apps from your phone using BlueStacks Cloud Connect Android app.

Download BlueStacks App Player Offline Installer for Windows XP/Vista/7

Download BlueStacks App Player Offline Installer for Windows 8


PC Cleaner Pro 2013 v11.6.13.7.15 Full Version Free Download

PC Cleaner Pro 2013 v11.6.13.7.15 Full Version Free Download
PC Cleaner Pro 2013 v11.6.13.7.15 Full Version Free Download
We believe computers are meant to speed things up, not slow things down, so you can work smarter and faster. That's why we engineered PC Cleaner to provide outstanding antivirus and antispyware protection, and PC optimization tools that works quietly and efficiently, without slowing your PC down like other 

bloated security products.
Registry Cleaner
PC Cleaner will remove unused and old entries, including File Extensions, ActiveX Controls, ClassIDs, ProgIDs, Uninstallers, Shared DLLs, Fonts, Help Files, Application Paths, Icons, Invalid Shortcuts and more.
Increase Your PCs Performance
PC optimization is the quickest way to adjust your system settings at once. PC Cleaner will analyze your system & adjust your PC to function at its maximum potential performance.
Boost Your PCs Speed
PC Cleaner will tweak your complete system to help boost your PC speed and overall system performance. You could have faster downloads, uploads, web surfing and more.
Certified Virus + Spyware Protection
Certified Antivirus Pro will scan your complete system for malicious threats including: viruses, spyware,. rogue programs, trojans, adware, rootkit, dialers, worms, parasites and other potentially harmful programs that may be installed on your computer.
Security Defense
PC Cleaner will scan and check for windows vulnerablities within Windows system. Windows Update is a service provided by Microsoft. Security updates or critical updates protect against vulnerabilities to malware and security exploits.
Clean Your System
In using a computer from day to day youre going to accumulate system clutter. You can significantly increase your PC performance & stability by removing these files.
Privacy Protection
PC Cleaner is designed to protect you by cleaning up all the unwanted history data on your computer which could also put you at risk of identity theft.
Internet Optimizer
PC Cleaner will automatically adjust your internet connections to increase super fast web surfing, faster downloads including: music , movies games and video downloads.
System Optimizer
PC System Optimizer is the fastest way to adjust all your system settings at once. The PC Optimizer works by determining what type of PC you have and what programs you have installed. Then it will adjust system settings so that your machine will function at its maximum capacity.
Memory Optimizer
PC Cleaner will optimize your memory and recover wasted memory (RAM), space and improve system performance.
Startup Manager
Startup Manger allows you control of what programs are launched when you start your computer. You can disable unnecessary programs that are slowing you down.
Uninstall Manager
This feature lets you easily uninstall applications that you don't want you your computer.
BHO Manager
Stabilize your browser and speed up web efficiency by managing Browser Helper Objects and Plugins.
ActiveX Manager
Many ActiveX controls are actually beneficial, but malicious programs frequently use ActiveX controls in order to embed themselves on your system through browser security exploits or compromised security settings. PC Cleaners definition database contains a comprehensive list of malicious ActiveX objects, which will be automatically loaded to the blocked list. This file is updated continuously by our definitions team.
Duplicate File Remover
PC Cleaner Duplicate File Remover will easily find and remove duplicates and help you reclaim valuable disk space and improve data efficiency. Duplicate files are in most cases redundant and unnecessary, so keeping them is merely a waste of hard disk space.

 
Click Below to Download 
 

                                                             Key/ Serial Number:

                                                           5143-3572-0413-2156
                                                           2143-1576-2061-1810
                                                           3163-2775-8150-4058
                                                           6183-6676-2160-3582


 

Windows 8.1 steps up security with biometrics, encryption, and more


 


Most of the attention on Windows 8.1 Preview emphasizes the many interface changes and new features. In the background, Windows 8.1 also offers a number of security enhancements that will help keep the new OS in step with changing times—how we browse, how we share data among devices, and which devices we use. The improvements range from better browser security to built-in encryption, to remote wiping of business files. We even tracked down a few sneak-preview screenshots of things that have been announced but aren’t part of the Preview release.

IE 11 will have better default security

Windows 8.1 will include Internet Explorer (IE) 11, whose flashiest new feature will be support for multiple windows. The browser’s security enhancements should help keep the new experience exciting, but not scary.
The Enhanced Protected Mode (EPM) that was added in IE 10 will now be turned on by default in the old-style desktop application, instead of just the IE app in the newer Windows UI. When turned on, EPM enables a sandbox-like feature called AppContainer, which restricts IE tabs from accessing sensitive data and system files. Additionally, EPM uses 64-bit tabs, offering more protection against attacks than 32-bit tabs provide.
The EPM option is automatically enabled in the Advanced Settings of Internet Options for the IE 11 desktop application.
IE 11 will also let antivirus programs have deeper access to the browser. This will allow binary extensions—like the often exploited ActiveX controls—to be scanned by an antimalware program before they’re executed. This could also reduce the chances of malware infection or attack via rogue extensions and toolbars.
By default, Adobe Flash support will be included with IE 11. Adobe Flash updates will now be distributed via the Windows Automatic Updates (or Group Policy on corporate-managed PCs). This could help reduce the chances of exploits via out-of-date Adobe Flash add-ons.

Windows Defender adds network support

Windows Defender, the native antivirus program provided with Windows, will now include network-behavior monitoring. This will make it easier to detect the newer breed of malware that usually can’t be detected via traditional means, but rather through noticing anomalous activity on your company’s servers. Defender’s traditional virus detection capabilities remain, as well.
Windows Defender will likely appear just as it did in the first Windows 8 version, except perhaps with an additional setting for network monitoring in the finial release of 8.1 (click to enlarge).

Device Encryption embraces all Windows versions

Windows 8 RT is better known for what it lacks than for what it features, but one advantage it’s had over full-fledged Windows 8 is device encryption. This feature will now be available for all Windows 8.1 users. It will be enabled by default on most newer computers shipping with Windows 8.1, as well as supported devices that are upgraded to Windows 8.1 with a clean install.
The encryption is basically a simplified form of the BitLocker encryption feature found in the Pro, Enterprise, and Ultimate editions of Windows 8 and previous versions of Windows. The full BitLocker feature is still available in the Pro and Enterprise editions of Windows 8.1, giving power users and corporations more management capabilities. For consumers who create and use a Microsoft account to log in to Windows 8.1 (or use a domain account on a corporate network), your entire PC or device will be encrypted.
The Preview release of Windows 8.1 includes just the BitLocker encryption settings; we should see new Device Encryption settings in the final releas (click to enlarge).

Fingerprint recognition supported

Windows 8.1 will enhance its biometric support, including native support for fingerprint authentication for laptops and devices with a fingerprint reader. Instead of typing in your password, for instance, a quick touch with your finger could log you in. This biometrics support is reportedly being added throughout and could be used for things like Windows login, User Account Control prompts, Windows Store access, and other features of Windows. And it’s likely that we’ll see more biometrics support from third-party software vendors as well.
This leaked screen shot of an internal build shows what the fingerprint enrollment process might look like (click to enlarge).

Assigned Access locks device use to a specific app

One brand-new feature introduced in Windows 8.1 is Assigned Access, which will be available in the Pro, Enterprise, and RT editions. It lets you lock down the computer or device for use with a specified app. This feature can help prevent users from accessing other apps or interfaces, making deliberate or accidental changes, and protecting the privacy of other information on the device. You can see how this would be useful in an educational environment—or even for a family with a Surface RT tablet for the kids. A public location, such as a kiosk, is another likely scenario for Assigned Access.
Although Microsoft hasn’t included the Assigned Access feature or settings in the Preview release, this leaked screen shot of an internal build shows what the settings might look like.

Remote Data Control can protect selected data

In Windows 8.1, Microsoft has enhanced the OS’s remote data control capabilities. Businesses will be able to mark certain data on employee computers and devices that should be kept encrypted, and that data can be wiped remotely if the device is lost or the employee leaves the company. This feature will be especially helpful as the BYOD trend grows (personal files on the device aren’t affected).
Manually connecting to VPNs via the Networks list remains the same (click to enlarge).

Windows 8.1 expands VPN support

Many of us use a Virtual Private Network (VPN) to connect securely to a remote network, such as a corporate office. According to Microsoft, Windows 8.1 will support a wider range of Virtual Private Network (VPN) clients, although details aren’t available yet. Additionally, Windows will allow third-party apps to initiate VPN connections automatically, possibly eliminating the need for you to start the connection manually all the time.

A better experience and better security

Windows 8.1 Preview has a lot to like, but the security enhancements show that Microsoft is keeping up with the times. The BYOD trend means that personal devices are handling corporate data, so remote wiping and other safeguards are vitally important. Everyone browses the Web, so anything that makes IE safer is a good idea. VPNs and device encryption help thwart sniffers and thieves. And best of all, most of these security features are already available in some form in Windows 8.1 Preview, so you can check them out now.

Microsoft: We don't give NSA direct access to email


Microsoft does not give the National Security Agency direct access to its customers’ email or instant messages, contrary to previous news reports, a company executive said.
News reports last week suggested that Microsoft has helped the NSA circumvent the company’s own encryption in order to conduct surveillance on email accounts through Outlook.com, but company General Counsel Brad Smith said Tuesday that’s not true.

“We do not provide any government with direct access to emails or instant messages,” Smith wrote in a blog post. “Full stop.”

The company does not help government agencies circumvent its encryption, he added. “To be clear, we do not provide any government with the ability to break the encryption, nor do we provide the government with the encryption keys,” he wrote. “When we are legally obligated to comply with [government] demands, we pull the specified content from our servers where it sits in an unencrypted state, and then we provide it to the government agency.”

Microsoft on Tuesday asked U.S. Attorney General Eric Holder to permit Microsoft and other communications providers to share “more complete information” about how they handle national security requests for customer information, Smith added.
“We believe the U.S. Constitution guarantees our freedom to share more information with the public, yet the government is stopping us,” he said. The U.S. government has not responded to a June 19 request Microsoft made to publish the number of national security requests it receives, and the company hopes Holder will step in, Smith said.

Microsoft provides government access to data stored in its SkyDrive service and to Skype calls when presented with a legal order to do so, such as a search warrant or national security letter, Smith said. If asked for customer data in enterprise email or document storage, Microsoft attempts to redirect the requesting government agency back to the customer, he said, “and we notify the customer unless we are legally prohibited from doing so.”

Microsoft has never provided any government with customer data from any business or government customers for national security purposes, he said. In 2012, the company complied with four law enforcement requests related to business or government customers, he added.

Tuesday, July 16, 2013

What is Thunderclap?



If a tweet falls in the forest...
 
Social media is an easy way to say something, but it’s a difficult way to be heard. Thunderclap is the first-ever crowdspeaking platform that helps people be heard by saying something together. It allows a single message to be mass-shared, flash mob-style, so it rises above the noise of your social networks. By boosting the signal at the same time, Thunderclap helps a single person create action and change like never before.
 
You don't need a huge following for a successful Thunderclap.
 
A user with 200 Facebook friends could amplify her message better than someone with 3,000 friends. It all depends on your cause's voice and shareability—and how much your friends are engaged. Thunderclap has already reached millions of people. Check out some of the successful projects on our homepage!
 
The tipping point

The beauty of Thunderclap is that it sets the goalposts: one message, one number, one date. It's a common threshold you and your supporters work toward together. It's a tangible way to measure awareness.

To Join Thunderclap now Go to below Link
http://thndr.it/10MO1qX

Monday, July 15, 2013

USB Utility Charge Tool Is A Swiss Army Knife For The Modern Times




For most of us, Swiss Army Knives have lost their place in our pockets for daily use.  I mean, why would you really need a mini-knife, a mini-scissor and a mini-screwdriver head when you work in an office cubicle all day?  If you've been longing for something to take its place in your pocket, the USB Utility Charge Tool should make for a more useful contraption.
Instead of miniature blade tools coming out of its pocket knife body, the contraption features fold-out electronic connectors for charging your gadgets.  Basically, it's a charging cable sans the cable part, giving you the means to charge  wherever you are without the mess of wires in your pocket.



The USB Utility Charge Tool takes on the classic Swiss Army Knife form factor, but trades in the usual metal construction in favor of plastics in bright colors.  It comes with four flip-out connectors - USB, mini-USB, microUSB and 30-pin connector.  To use, just plug the USB to a power source (like a wall outlet with a USB slot or a laptop's USB port) and plug one of the other connectors to your gadget that needs extra juice, whether it be your phone, your iPod or your USB Misting Hairbrush.  The obvious omission, of course, is a Lightning connector, so iPhone 5 users will need to bring an adapter along.
If you have that extra space in your pocket waiting to be filled, the USB Utility Charge Tool should make for a handy and useful accessory.  It's available from Fred Flare, priced at $20.

GameKlip Mounts Your Phone Onto A PS3 Controller




Not impressed with the current roster of analog controllers for Android phones?  Not a problem.  Get the Sixaxis Controller app and turn any Dual Shock 3 controller for playing your mobile games.   Except it doesn't really solve how you can mount your phone onto the controller for a real analog handheld gaming experience.  Enter the GameKlip.

A mounting accessory, it's designed to attach a spare case onto your PS3 controller, allowing you to put your Android phone right on top it.  That way, you can turn your Samsung Galaxy 4 (or whatever phone you're using) into a proper handheld gaming device, letting you use real analog sticks and buttons to play Mass Effect Infiltrator, Modern Combat 4, or whatever other title you're currently obsessing over.


The GameKlip snaps onto the controller, giving it an arm of sorts where you can mount a spare smartphone case.  All components (the GameKlip, the controller and smartphone case) are meant to be attached permanently using an industrial-strength adhesive strip, essentially turning the Dual Shock 3 controller into a dedicated handheld gaming accessory.  The controller will remain usable for PS3 gaming, of course, although the stuff mounted on it will likely be distracting.




They offer two connection options: wireless (your phone needs to be rooted to make this work) or wired (using a proprietary cable they provide).  No extra software is required for wired play, although you'll need to download Sixaxis Controller from Google Play to use it untethered.
The best part?  The GameKlip Universal Casemount only costs $19.95, making it a very affordable way of bringing handheld analog controls into your mobile gaming adventures.  It's available now.

Samsung Ativ Q Runs Android And Windows 8 Concurrently




We folk who love Windows 8 and all, the current roster of tablet apps just isn't anywhere as good as Android or iOS.  And that stinks.  The Samsung Ativ Q, though, offers the best of both worlds, combining Windows 8 and Android in a single hybrid notebook/tablet 
.
Not only can it run both OSes, it can have the two running at the exact same time.  No need to reboot into a new OS -- just switch from one to the other with the push of a button.   While the two platforms won't be sharing settings or applications, they can share files and folders, so it's almost like you're running a seamless Android mode on Windows (or vice versa).   Plus, this isn't Windows RT, either, but the full version, so you can have a single computer running both your favorite desktop tools and your favorite tablet apps.




The Samsung Ativ Q is a convertible computer that can be used either as a laptop or a tablet like many that came before it.  It uses a versatile hinge that lets you angle the display into more positions than the Kama Sutra (okay, maybe less), including taking the entire thing off for traditional tablet use.  Display is a 13.3-inch panel, with a 3200 x 1800 resolution and a 170-degree viewing angle, making it one of the best screens we'll probably see on a computer this year.  Other details include an Intel Haswell processor, support for the Samsung S Pen, 10 hours of battery life, and a full-sized PC keyboard.



Currently, availability has only been announced for the UK, where it's slated to debut later in the year.  No pricing has been given.

Microsoft Windows XP Pro Service pack 3 iso





HOW TO USE :-

  1. download zip file from below link
  2. extract .zip file 
  3. burn give iso image to CD 
  4. now install and enjoy it 

                                                            Click below to download

Can't email from QuickBooks in Windows 7


Try this:

1. Right click on your Quickbooks startup exe file and open properties.
2. On the compatibility tab select compatibility mode and run this program in compatibility mode for Windows Vista (Service Pack 2).
3. On privilege level check "Run this program as administrator". Press Apply/OK to close properties.
4. Start - Devices and Printers - add a printer - add a local printer - create a new port - local port and name it QBD_PDF.
5. Choose to install AMYUNI Technologies - Amyuni Document Converter 300 (click windows update button if it is not on your list).
6. If windows detects you already have a driver then choose to replace current driver. Name the printer Quickbooks PDF Converter - do not share printer - do NOT set as default printer. Finish
7. Start - Devices and Printers - Right click your QB printer, choose Printer - Properties and go to the advanced tab.
8. Remove any check marks in the 4 items with square boxes next to them (bottom part of screen) then select "Print directly to the printer" Hit OK to close the window.
9. Restart you computer and open Quickbooks. Open File - Printer Setup and make sure Quickbooks PDF Converter is the selected printer for any PDF operation you use    frequently. (on rare occasions you may not see the Quickbooks PDF Converter on the list, reboot again and you will get it).

You can now perform PDF operations in Quickbooks (works for 32 and 64 bit Windows 7 RC)


Computer Repair Lakeland FL
www.MyComputerGirl.com
863-521-1079

Problems with printing from QuickBooks???

Problems with printing from QuickBooks???
 

FIX 1
http://support.quickbooks.intuit.com/support/Articles/SLN40733

FIX 2
http://support.quickbooks.intuit.com/support/Articles/HOW12177

FIX 3
Since this is an ongoing issue and many have submitted on this topic... Outlook 2010 is an issue with some as well...

As an option until this is fixed, install cutepdf (it's free).

This will allow you to print to this driver (cutepdf) to create a pdf file that can then be emailed as needed.

Computer Repair Lakeland FL
www.MyComputerGirl.com
863-521-1079

Getting text message on phone and email

A client recently go a new Samsung Galaxy S4. I set up his exchange email account, which is through office 365. We noticed that he was receiving text messages on his phone as well as his email.

On the phone:

Open e-mail inbox go to settings, you will see your email address here with a tick
Press it and scroll down to "More Settings"
Scroll to "Sync SMS" and untick it.

Lakeland Computer Repair
www.MyComputerGirl.com
863-521-1079


Sunday, July 14, 2013

How to Measure Your Computer’s Security Performance

Increase Windows Security
You can find different applications to calculate & measure your PC graphics performance, its speed, memory, data transfer speed and lot more. But we don't have any other software to estimate and evaluate exactly how secure and protect our desktops are. If someone questions you how safe your computer is, you can start off telling the antivirus security software and anti-malware programs that you have installed but, this will not give you the security and safety measure. If you don't know what to be optimized in your system then you must install this software to give you some recommendation to improve your PC overall performance.

Check the Security Score of your Computer

OPSWAT Security Score is a free windows software which will run a scan in your laptop or computer to get the current status of your installed Antivirus security apps and it provides a score & rating and also tips or recommendations on how you can increase equally the score and the security measures of your PC. You can download and install the OPSWAT Security Score from their official website the size of the program is 5MB. This tools scans your firewall, hard disk encryption, patch management, antivirus, antiphising, public file sharing and backup,

 

How to Measure Your Computer’s Security Performance

 

OPSWAT Security Score Software

After Installing the OPSWAT Security Score at the first time you have to run a scan this can take a while so be patient. After the scan is complete you can get a overall score of your PC performance. The Green shade indicates no need any changes,the Grey shade indicates need some changes and the Red shade indicates must need changes. You can click on the chart's and see which part is need to be improved to get a high score. By clicking the i icon OPSWAT gives you some tips to boost up the performance. By getting the higher score you can steadily increase your computer performance.

Saturday, July 13, 2013

A boy called Sue

Kim O'Grady writes, "I understood gender discrimination once I added “Mr.” to my resume and landed a job".

The tl;dr version is: Kim was an experienced engineering/business person who was applying for jobs. Sent out dozens of resumes to top places, did not get a single interview. Sent out his resume to a bunch of lower tier places, still no interview. Finally, he realizes they are taking "Kim" to mean he is a woman. So he adds the prefix "Mr." to his resume, sends it out again, and immediately lands interviews.
My first name is Kim. Technically, it’s gender neutral, but my experience showed that most people’s default setting in the absence of any other clues is to assume Kim is a woman’s name. And nothing else on my CV identified me as male. At first I thought I was being a little paranoid, but engineering, sales and management were all male-dominated industries. So I pictured all the managers I had over the years and, forming an amalgam of them in my mind, I read through the document as I imagined they would have. It was like being hit on the head with a big sheet of unbreakable glass ceiling.
This is so sad. It reminds me of neurobiologist Ben Barres' experience, where after giving a seminar as a Ben after his transition from Barbara someone in the audience remarked, "Ben Barres's work is much better than his sister's."

The one I hear a lot in my field is, "X is a superstar" or "X is gifted", and always "X" is a man. I've never heard a woman referred to as a superstar or being gifted in her field. I've also never heard of a young woman referred to as a child prodigy.