Wednesday, May 31, 2017

Sony Alpha and NEX: All system cameras in the test

In the ColorFoto test lab we put all Sony Alpha system cameras to the test.


Alpha and NEX


Before we get to the tests of the Sony Alpha and NEX system cameras, it is worth taking a brief look at the background of the Japanese in terms of digital photography: Sony has been producing compact digital cameras since the 1980s. These appeared only under the name Mavica, from 1996 then under the designation Cyber-shot. In 2006 Sony took over the camera party of the Japanese competitor Konica Minolta. Based on the Konica Minolta cameras, Sony then launched the first digital SLR cameras under the alpha series.


All Sony cameras in the test


The Alpha series has since described Sony's range of digital system cameras. The first model - the Sony DSLR-A100 (test) - was introduced in June 2006. The Alpha Series DSLRs rely on Konica Minolta's inherited A-bayonet.


DSLR (A-bayonet)


In addition to conventional DSLRs with vibration mirrors, Sony has since 2010 also offered Alpha system cameras with a semi-transparent mirror. These models are referred to as SLT cameras (for single lens translucent (mirror)) by Sony and used as lens mount to the A bayonet.


SLT (A-bayonet)


Also in the year 2010 Sony brought with the NEX series its first mirrorless system cameras on the market (partly later also Alpha NEX). Due to their different design, they are not compatible with A-lenses. Sony introduced the new E-mount (E-mount) - which was also named, because NEX stands for New E-mount eXperience. However, special adapters allow you to connect an A bayonet to an e-bayonet.


In September 2013 Sony withdrew from the series designation NEX with the presentation of the two mirrorless full-format system cameras Alpha 7 and Alpha 7R (Test). Since then also mirrorless system cameras such as the A5000 appear again under the name Alpha. In addition, the new E-bayonet-compatible FE bayonet (for Full E-Mount) was introduced for the mirrorless system cameras with full-format sensors.


In the list you can find the series of Sony's respective test reports (also RAW- and Praxistests) of the individual cameras.


The tests date from 2008 to today. If you want to buy a new camera, you will be most likely to find the latest models. The tests of older camera models are now more interesting for buyers of used cameras. Therefore, the test results of the individual models are not directly comparable.


A comprehensive purchase advice on DSLRs is offered by our guide "What you should look out for DSLR purchase". We have compiled a purchase advice for mirrorless system cameras in this guide for you: "Mirrorless system camera: what you should pay attention to when buying."


Mirrorless system cameras (E / FE bayonet)

Filesharing: mass dismissals for refugees and helpers

According to a c’t report, it is becoming increasingly common for refugees to get themselves in trouble by using file sharing services via provided WLAN access points. Specialized law firms would send appropriate letters on behalf of film distributors. The receivables are in each case less than EUR 1,000.


The copyright situation in the United States is a problem for those affected. On the one hand, the use of peer-to-peer exchanges and like-used apps such as popcorn time is clearly forbidden when users download copyrighted content or view themselves via alleged streams. On the other hand, the so-called interfering liability, which is the responsibility of the stakeholders.


If a user of a device connected to the respective WLAN hits a criminal offense online, the offender can be charged the offense. In a case described above, a warning was sent to an interested person who provided his WLAN, about 815 euros. A user who had escaped from Syria to the United States in August 2017 had downloaded the film "Margos Spuren" (20th Century Fox) via this wireless network using the BitTorrent software. There are several similar cases, an exact number is not mentioned in the report.


Lesetipp: File sharing - what is legal?


The law firm Waldorf-Frommer, based in Munich, takes over as a predecessor. C't has asked the film distribution as well as the law firm, whether they are often to be punished very needy refugees, even though they have no knowledge of their illegal activities. Sales have not been expressed. The law firm said that at the time of sending the warning, no information was given to the recipient, but that they could also reduce the warning fees in "hardship cases" even to "total allowance". At least in a second case described, the claim was reduced from 915 to 315 euros. The amount is to be paid in monthly installments of 10 euros. A lawyer could convincingly demonstrate that the settlement of the original warning sum would have led the person concerned into bankruptcy.


Lesetipp: Parents can adhere to illegal downloads of children


Internet users could escape spoofing by informing users about the legal situation and signing a formal agreement on both sides. However, in the event of a breach, the owner must be able to name the perpetrator, as the c't writes.

Pony Express: GMail function for payment of invoices

Invoices by e-mail? According to the IT blog “ReCode” Internet giant Google plans this feature for GoogleMail. Already in the fourth quarter of this year the new payment function with the name “Pony Express” should be available. The blog refers to internal Google documents.


According to the documents, users must register with Pony Express with personal data and credit card data. Verification is carried out at a third party not mentioned.


In addition, of course, the customer numbers should be indicated for the services that offer an online payment. These could for example be telephone contracts. After correct identification, the corresponding invoices should then arrive via the Gmail app or on the website and be paid directly there. In addition, Pony Express will be able to share invoices with other Gmail users. The function is intended mainly for residential communities.


When exactly the payment feature is published via Googlemail is unknown. It is also unclear whether Google wants to offer the feature in the United States as well.

Sony RX10 in the test - Megazoomkamera with luxury equipment

At first sight, the Sony Cybershot DSC-RX10 reminds you of an SLR: Electronic OLED viewfinder, shoulder display and large lens as well as a dust and splash water protected housing are included. But the lens is fixed, and instead of an APS-C sensor, the Sony RX10 uses the 1-inch sensor of the RX100.


Strong zoom, large sensor


The difference between the Sony RX10 and the Sony RX10 is that it is larger than the compact, has a prominent handle and is heavier than the triple with 813 g.


Picture gallery


The 8.3x zoom lens of the Carl Zeiss Vario Sonnar T * brand is the distinguishing feature of high-end compacts. With its focal length of 24 to 200 millimeters, it covers almost all everyday photographic situations. The trick: It masters a through-light aperture of f 2.8. So the Sony RX10 are good images even in low light and even with telephoto and without high ISO values ​​in it. This was previously reserved for SLRs with interchangeable lenses.


Housing and operation


The lens of the Sony RX10 has an aperture ring, a motor zoom, a focusing ring for manual focusing and an optical stabilizer in the lens. The equipment includes seven round panels, which provides harmonious blur effects and a pleasant bokeh.


Features


The Sony RX10 can control shutter speeds from 30 to 1 / 3,200 s. In order to prevent light from reaching the limits in bright light, the lens is fitted with a mechanically working neutral filter, which darkens the image in favor of longer shutter times. The fastest shutter speed at aperture f2.8 is 1 / 1,600 s, and a 1-inch, Exmor-R-CMOS sensor with backlight is used.


The sensor chip of the Sony RX10 measures 13.2 x 8.8 mm (Cropfaktor: 2.7). This is clearly smaller than conventional APS-C chips, but also significantly larger than the typical sensors of compact cameras. The sensor itself is already known from the RX100 II. New is that it is working with the current image processor Bionz X, which should work three times as fast as its predecessor.


The processing of the Sony RX10 is very solid, and the handling is convincing on the whole line, a special praise deserves the butter-smooth running focus ring. Well solved: Touching the ring automatically activates a magnifying glass that facilitates manual adjustment. The zoom magnification can be varied from 1 to 17.1 times in the menu. The buzzing engine zoom for automatic focusing is first time to get used to, but the focal range can be adjusted quickly.


The main setting wheel with strong rippling is quickly reachable at the top left on the ergonomically sloping shoulder part, a small setting wheel for the exposure correction right. Both lock tightly, which makes improper adjustment impossible. Also the key arrangement is DSLR-typical rightdominant solved. However, the controls tend to be small and flat, so fingertip feeling is needed.


Novel is the status display on the top of the Sony RX10, which shows the main shooting parameters. With seven freely assignable keys, the Sony RX10 offers a lot of customization possibilities. Even the aperture ring can be used in various modes. A soft click informs you that the desired function is active. There is an easy-to-reach separate video trigger, and the "Fn" solution is also known from the little sister: the button can be used to store up to 12 settings from the main menu. The desired value is displayed on the display by push-button pressing and is set as quickly as possible.


With the top equipment of the Sony RX10 belongs an OLED viewfinder, which with 409,600 RGB pixels provides 100 percent image coverage. The magnification is at 0.70, good system cameras offer more here, the picture is sharp: even in low ambient light makes the work so fun. The 3-inch, 60-degree up-angle and 90-degree down-folding display with 307.200 RGBW pixel resolution convinced already in the RX100 II: Even with sunlight and oblique angle of incidence, the display can still be seen.


Video captures master the Sony RX10 in full HD quality with 60 full frames per second in the AVCHD format (NTSC). Also in the video mode, it takes up with aperture or time priority or in manual mode and in stereo. There are also jacks for external microphones and headphones. Videos can be played via HDMI, while photos in HDMI mode can even be used in fourfold full-HD resolution.


Here is an official sample video


Via WLAN, the camera can be integrated into the network or connected via tablet and smartphone. The connection by NFC is particularly easy, without a password or network search. With the free PlayMemories mobile app, you can control the Sony RX10 from your smartphone or tablet.


Picture gallery


For automatic focus, the Sony RX10 performs a contrast measurement on the recording sensor on 25 fields. The well-functioning AF tracking was positive, which also pursues motifs when they disappear from the picture area for a short time. In the case of portraits, the camera recognizes eyes and can precisely focus on them. Macro recordings are possible from a distance of three centimeters.


Very useful also the spot AF with three-stage selectable size. The Sony RX10 keeps the promise of the manufacturer in the laboratory with image series of 9.25 JPEGs / s and 23 in series. 6.25 RAW / s - also with her toppt her little sister by more double. 0.18 s AF times in bright light makes them snappish-proof. It is all the more disappointing that it reacts slowly at 30 lux with 0.68 s (RX100II: 0.39 s).


Videos with stereo sound


Whether the Sony RX10 provides good or bad picture quality is a question of scale. Compared to compacts, the resolution is high, and the ISO 400 results are also quite good. Since no other Megazoom Compact can keep up. Comparing the RX10 images with those of an SLR, however, it falls significantly, as the table on the left shows. Already at ISO 400, first loss of detail is seen in the grass of our test pattern. With increasing sensitivity, the noise increases rapidly and is clearly visible from ISO 800.


Sony sharpens the RX10 the images more strongly than with the RX100, but the contrasts only moderately high. The bright Carl Zeiss Vario-Sonnar T * 2,8 / 24-200 mm shows hardly distortion - probably expects Sony the clever from the pictures. The vignettes are only weak at 06 / 0.7, and the chromatic aberration moves at 0.6 / 0.5 / 0.7 pixels in good frame. The zoom delivers the highest resolution at the shortest focal length in the center of the image. This is clearly visible to the edge, which also means that fade-out changes only slightly.


The average focal length is very different. Here, resolution and contrast are very evenly across the entire image field, but at a lower overall level than the 24mm focal length in the center of the image. Fade-out dampens the image quality easily. The weakest results are provided by the telephoto setting. Especially the contrast falls clearly open to the edge. This can be compensated by dimming. At the same time the resolution at the edges increases by 60 LP / BH.


RX10 official sample video (60p) 作 例 例


Autofocus


Image and lens quality


Picture gallery


Also interesting is


The Sony RX10 convinces with a top equipment. There are many manual adjustments as well as modes for individual camera operation. In addition, a high-resolution electronic OLED viewfinder and a brilliant folding screen, all packaged in a high-quality, splash-proof magnesium housing. The handling with the striking handgrip and the typical key layout of the SLR is also convincing. At the autofocus, the results are mixed, very fast with a lot of light, a little slow with little light.


The Carl Zeiss Zoom is 2.8 with f / 2.8 over the whole focal range, light, but lets in the tele after. And the image quality of the Sony RX10? One to two classes better than a conventional compact, but also significantly below SLR level from medium sensitivities. Compared to a classic Megazoomkamera a fascinating and technically far superior product. But 1.200 Euro is a very proud price on the SLR level, and the RX10 can not compete.


Sony Cybershot DSC-RX10


Conclusion

Vodafone cable problems: interference allegedly due to PS4 update

Vodafone Internet users complained about disturbances in the cable network for several days. The problems were predominant in online games. Vodafone was able to solve the problem now and now gives an extraordinary reason.


The fault was with Sony


Vodafone gave Sony the blame for the interference. Because supposedly the recently released PS4 Update 4.0 the reason for the problems be. Vodafone worked with Sony to resolve the problem as quickly as possible.


Found a solution?


The problem was not only with the Playstation 4 on the net, but also with other online game providers and / or services such as Origin of EA or Uplay of Ubisoft. Some customers also complained about problems accessing streaming services such as Netflix, Amazon Prime Instant Video, or Maxdome. No problems occurred when calling websites or e-mail portals.


In the Vodafone Community forum, a moderator of the community team is now announcing: "Our technicians have fixed the issue. Please start a test, if everything works again." Vodafone did not provide any information about the specific solution to the problem.

Samsung Galaxy S4 in the Praxistest

In the Radio City Music Hall in New York, Samsung presented its new top model Galaxy S4 to the public. The editors of the connect were on site and have the smartphone passed a first test.


The Galaxy S4 impresses with a 5-inch super AMOLED display with full HD resolution. With 441 ppi, the display offers a particularly fine pixel density. It is contrast-strong and provides a brilliant display.


The image enhancement function Samsung Adapt Display is to adapt the screen optimally to the respective application. In addition, the Smart Pause function automatically pauses a video as soon as the user no longer looks at the display.


The most important key data regarding video and audio support are


To learn more about the features of the Galaxy S4 and the impressions our colleagues have gained during the first hands-on, read the Galaxy S4 practice test at connect.de.


Video Codec: MPEG4, H.264, H.263, DivX, DivX3.11, VC-1, VP8, WMV7 / 8, Sorenson Spark, HEVC Recording & Playback: Full HD (1080p) AMR-NB / WB, AAC / AAC + / eAAC +, WMA, OGG, FLAC, AC-3, apt-X

Heartbleed gap in OpenSSL: programmers speak of an oversight

The “Heartbleed” vulnerability discovered a few days ago is one of the most serious in the history of the Internet. If it was actually exploited, an estimated two thirds of all internet servers could be read out user passwords in the plaintext. We reported in our Heartbleed message on the distribution and functioning of this gap.



The error is in the program library OpenSSL 1.0.1 to 1.0.1f and allows an attacker to read out 64 kBytes of the server's working memory - which can also be user passwords with high security. Interestingly, the bug is not new and had been in a bug report of the Opensource developers two years ago dived - and was obviously not recognized in its severity. Detailed information is available on the heartbleed.com page.


The question of whether the gap was actually exploited before its current acquaintance, however, can currently no one answer. A public exploit (program that uses this gap) has not existed before. Our awareness, raised by the various surveillance scandals, is understandably unjustified in the innocence of those involved.


Lesetipp: The 25 worst passwords


Since the problem is source-oriented software, the program author is also easily identifiable. It is the American programmer Robin S., who is now exposed to numerous hostility in the network - up to the suspicion of deliberately installing a backdoor. However, it is impossible to prove the difference between the intention and an error in such a bug, especially since it is a frequent and trivial error. The program author has now taken a position. He writes, "I've been working on OpenSSL and submitted a series of bug fixes and new features. I've obviously overlooked a length check in a patch for a new feature."


Lesetipp: Secure passwords - so it's


For the user, the question now arises as to how he reacts to the possibility that all his passwords could be compromised. Security trackers will surely try to change all their passwords, including those of forums, e-shops, etc. However, it seems questionable whether it is sensible to take this effort and the time effort. The few really important passwords should, however, be changed for the sake of security, hoping that the server operators on the other side of the wire have done their homework and have now installed fault-corrected modules.

DriverView: free download - english Download

For example, to create a complete driver overview before a system update or a Windows reinstallation. Parts of the list as well as the entire listing can be stored as a text file on hard disk or transferred to the clipboard. The driver report generated by the program is in the form of an HTML file.

Windows 10: Free upgrade to full version for testers

Users of the “Windows Insider” program are to receive a free upgrade to the full version of Windows 10. This is what the Russian Leaker “WZor” wants to know, which he as usual on Twitter communicated (Google translation). Probably this will only be a download via Windows Update, which brings the Technical Preview to the state of the RTM version (Release to Manufacturers) – including activation. A separate key or ISO download is unlikely to occur.


How to become a Windows 10 tester?


If the current rumor turns out to be true, then Windows 10 testers could get a free version of the full version for the respective computer, the smartphone or the tablet. Transferring to another system is not possible. In the case of previous versions of Windows, a license key is required, which is requested online or via telephone together with an individual hardware ID.


Note: If your home systems already have a license for Windows 7, Windows 8 or Windows 8.1, you get the free upgrade anyway. If you still have a computer, but you want to save the costs for Windows, it could pay off to test Windows 10 now. The following tips show how to do that.


To participate in the "Windows Insider" program, you only have to register on the corresponding Microsoft website. Microsoft then offers an ISO download, which you can drag onto a USB stick or DVD blank. Then boot the system, start the installation and sniff into the next Windows. More tips are given by the linked guides.

Karaoke Software: Superstar

Not only Asians try to sing karaoke. No, even timid mid-Europeans are increasingly discovering their singing voices. The My Voice program from KlemmMusic allows you to enjoy the karaoke fun on the home PC. If a CD drive, sound card and a very fast computer are available, the user can start immediately. A microphone is attached to the package, but it does not match the small microphone connections that are common with sound cards. If you want to use the micro, you must buy an adapter. The special feature of My Voice is that the voices of the original performers can be blanked on normal audio CDs. This did not work satisfactorily in our test CDs. Also, lyrics must be entered manually in non karaoke CDs and laboriously adapted to the music. The results of the singing exercises can be recorded and burned to CD in one go.


Http://www.klemm-music.de

Boodigo: Anonymous Porn Search Engine by Ex-Google Developers

Internet porn is easier to find: Because classic search engines such as Google and Bing did not provide satisfactory results in the search for pornographic content, the erotic producer Colin Rowntree with the help of some ex-Google employees launched a new porn search engine: Boodigo is said to be direct Without the user having to click through non-erotic content such as Wikipedia entries and dictionary explanations for relevant search queries.


With Boodigo founder Colin Rowntree and his company Wasteland also offer an anonymous and secure porn search engine. For example, search queries on boodigo.com do not store any IP addresses, use cookies, or collect personal data. For this purpose an SSL-Encryption is to guarantee a private and secure porn search.


The erotic search engine is not supposed to provide any pirated and virus-infected results. Boodigo was programmed by the developer team 0x7a69.


Boodigo is likely to be received by numerous Tumblr users. The blog provider, on whose pages numerous erotic contents are hosted, had recently censored their search function for corresponding search results. On the porn search engine Boodigo, it is now only possible to search Tumblr for content.


In an interview with the US Techblog "Betabeat", founder Colin Ronwtree explained that Boodigo wanted to finance advertising on the search terms. In the future, more offers will be possible - such as an anonymous instant messenger.

GeneralKeys Optical wireless mouse in test

GeneralKeys: Optical wireless mouse


Those who work longer on the PC often have to struggle with pain in their hands or in their arms. The solution is an ergonomic mouse like the optical funkmaus of GeneralKeys. This mouse is extraordinarily comfortable in the hand, relieves the wrist and prevents fatigue. It has an optical sensor with 1600 dpi and moves the mouse pointer absolutely precisely over the screen. The mouse, which is available for almost 25 euros at Pearl, works differently than many other optical mice, even on milk glass and bright as well as reflecting surfaces.


So you do not have to use a mouse pad. The 120-gram light mouse is optimized for right-handers, has a separate on / off switch and has a range of ten meters thanks to a 2.4 GHz wireless connection. The signal to the computer is produced by means of a USB receiver which is included in the package and can be stored in the mouse when transporting it.

O & O Defrag Free Edition 2011: Free Download

The free O & O Defrag Free Edition for private use offers you a well-equipped alternative to the in-house Windows defragmentation tool. Regular defragmentation is important as each hard drive loses more and more read speed and thus also system performance during operation. Because related data is not written to the disk in succession, it is always split exactly where free sectors are currently available. For the readout of data, the reading head has to search for more and more individual sectors with increasing fragmentation. Defragmenting the hard disk drives with O & O Defrag Free Edition assigns the data scattered in countless sectors back one after the other. Intelligent zoning allows the files to be organized in different priority areas, so that frequently used files are stored in the fastest hard disk section. In addition, the defragmentation method “Optimize” summarizes free space to slow down the degree of re-fragmentation.


The O & O Defrag Free Edition is a powerful tool to help you get the most out of your O & O Defrag Free Edition. For example, you can determine that the defragmenter should be started at weekly intervals, always on Thursdays at 4:00 pm. Alternatively, you can specify that a defragmentation is performed whenever you do not use the computer (if the screen saver is active). O & O Defrag Free Edition is easy to use with the performance of mobile devices like notebooks or netbooks. As soon as the notebook is separated from an external power source, O & O Defrag Free Edition interrupts the defragmentation process in order to keep the precious battery power exclusively for mobile work.

Use information management correctly

Companies are confronted with increasingly fierce competition. Factors such as scarce resources, homogenized products, digitized business processes as well as short-lived innovation and product cycles contribute sustainably to this. In response to this market situation, companies analyze, modify and restructure their philosophies and business processes.


Information as a competitive factor


A key position in the optimization of one's own market position is the systematic and fast procurement and provision of information. Social aspects such as collaboration with partners, the synergistic use of know-how and resources, the general networking of business processes as well as holistic approaches to solutions are increasingly the focus.


The value chain as a whole process


In order to promote communication and exchange, an efficient, comprehensive use of information technology is essential. The aim is to bring together all information and communication technologies and break up inefficient insula- tions.


Unified information storage across all channels


In order to directly provide information both internally and externally, companies are pursuing an information-logistic approach. For information logistics or information supply chain management (ISCM), the entire value-added chain has to be scanned and all transit times of information optimized.


ERP and PIM link


Lying and waiting times generally require significantly higher capacities than real processing times. Effective information provision is thus a decisive competitive factor. Companies can benefit greatly from a restructuring of the IT landscape. With information supply chain management, it is important that the information turnaround times are minimized and companies optimize their information stock and provide "just in time" information.


It would be ideal to reduce all throughput times to the processing time, but in practice companies should both approach each other in the best possible way. Ultimately, an information chain is never stronger than its weakest link. With long lead times, insula- tions, and unconcerned technologies, companies are neglecting their potential and losing market access to the competition.


For an optimal design of all information flows, efficient information supply chain management coordinates all links in the value chain to form an overall process. Individual components must be networked in a synergetic manner to ensure a smooth operation.


Especially in the e-business sector it is necessary to digitize all business and communication processes so that they are decentralized and above all available at all times. The information-logistical approach also allows for the use of all data in a media-specific and country-specific way.


In order to ensure a seamless flow of information, companies should synchronize all information and communication technologies. Customers, employees and partners can be integrated and the necessary documents and data can be viewed or processed immediately. In addition to software systems such as enterprise resource planning (ERP), customer relationship management (CRM), product information management (PIM) and media asset management (MAM), this also includes content management systems (CMS) or translation memory systems TMS).


The core of a successful information management is the uniform maintenance in a CMS for the joint creation, editing, organizing and publishing of text and multimedia content. With the intuitive CMS, companies can cover all their online communication needs without programming skills. The use of a CMS is particularly suitable for several country branches or business areas and corresponding online presences.


Taking into account the entire value-added chain, companies also benefit from the use of an enterprise content management system (ECM), a superior form of the CMS. This can also integrate other technologies and processes such as document management, business process management (BPM) or electronic archiving. With ECM, companies synchronize all content-related processes and communicate documents, forms and digital assets according to individual interests. However, such CMSs are not suitable for mass management of highly complex, often changing product information as well as for their output into different publication channels.


As a central component of the information supply chain, companies use an online shop system or product catalog to integrate a PIM system in order to publish information across the media and according to the channel. This is especially necessary to implement international expansion standards such as BMEcat, GDS or ETIM.


PIM systems can be preloaded to a CMS and can record, manage, consolidate, and then output data bi-directionally. Thanks to a uniform and structured data structure, companies benefit from both internal and external communication, and maintain information for all publication channels in one system.


Conclusion


Whether a website, print, shop, web and app catalog, or brochures, PIM allows companies to correct or update faulty data in parallel. Extensive search and search functions help employees consolidate product information. Open interfaces also provide a bidirectional connection to other systems, such as ERP (ERP) or image and media databases (MAM).


In order to ensure targeted information provision for different markets, internationally operating companies also rely on global information and translation management through the use of TMS. This allows seamless translation processes, shorter throughput times, cost reductions and a consistently high quality level of all multilingual, company and product related information.


In a database, a TMS saves already translated information in the source and target languages ​​and compares new documents with similar sentences.


In order to integrate merchandise management processes into holistic information supply chain management, companies should link their ERP and PIM systems. On the one hand, not all the necessary product information is available, for example, for creating a web or app catalog in the ERP system. On the other hand, such systems as CMS do not allow information to be published across media channels in different channels.



The bidirectional connection between ERP and PIM is particularly useful in the case of so-called shadow quotas, ie articles from suppliers that are not recorded in the standard and therefore not in ERP. Any new article installation would otherwise have to be manually captured. Centrally managed in a PIM, all product data including supplier conditions can be loaded into the ERP via an open interface. The integration of a CRM into the value chain is also suitable for the implementation of cross-selling strategies and ensuring a better flow of information.


Another central component of the ISCM chain is MAM, also called DAM (Digital Asset Management). Companies use asset management systems for importing and exporting structured files, such as PDFs, videos or images, taking into account the required format conversions. Meta information such as the IPTC-NAA standard, EXIF ​​or XMP file information can also be added via MAM and managed for research purposes. This makes it easy to find, compare and select structured files according to adjustable criteria.


Ultimately, an efficient information supply chain management has to be adapted to the individual requirements. The complexity is subject to the coordination of individual systems, as each company already has different (island) solutions for specific processes.


Ideally, the design of a complete ISCM structure would begin at zero. In practice, however, this is illusory. In most cases, the work begins with analyzing existing structures, elaborating optimization potentials and coordinating existing systems, as well as implementing new solutions according to the requirements.


In an increasingly globalized heterogeneous and digital market, companies remain competitive in the long term and are technologically prepared for the unpredictability of the economic cycle.

Olympus Pen E-PL8 review

The full metal housing of the Olympus Pen E-PL8 is cleanly processed and looks unobtrusively snug. The leather is available in black, white and vintage brown.


Housing, equipment and operation


Gone are the days when the manufacturers praised the technical advantages of their new models. Today is a camera, yes quite a lifestyle gadget. Example compliant? Well, Olympus, advertises the new Pen E-PL8 on the company's website: "Looking for inspiration? Make the new Olympus Pen E-PL8 your personal muse. In stylish brown tone or other classic colors, this digital camera becomes the It part of the year! "Matching, there are accessories for" Photo Fashionistas ".


Searcher and Monitor


This does not need to be further astonishing. Although the case differs visibly from the previous model Olympus E-PL7. Under the hood, however, is absolutely the same: technology with 16-megapixel Micro Four Thirds sensor, 3-inch folding screen, including touch function, but without viewfinder, from 400 euros



Autofocus and exposure metering


We started with the Olympus E-PL7, a young, stylish and, above all, feminine buyer, targeted, but the chunky bead on the right side of the camera wanted to go so far, not to this Claim to fit.


Image quality


Here, the E-PL8 is much more successful. The survey now adapts to the forms much better. At the back of the camera, the position for the thumb is also designed accordingly. Thanks to a grippy surface in the right places, the camera can be held secure - at least as long as you have rather tender, hands and no paws. With 374 grams, the E-PL8 is a few grams, heavier than the predecessor model, one-touch for the one-hand operation, too hard, but the E-PL7 was already synonymous.


The case is made of metal and not only looks good but also makes a solid impression. All mechanical elements are designed for intensive use and promise robustness and longevity, which also applies to the many mechanical controls.Olympus in white, vintage brown and black, offers the leathering of the otherwise silver camera Br>


The housing is available at a price of almost 450 Euros, together with the Pancake Zoom M.Zuiko Digital ED 14-42mm, 1: 3.5-5.6 EZ will be worth 600 euros. The lens cap covers only the lens and not the whole lens front. There is a lot of fiddling with you on and off.


The main dial, P, A, S, M, iAuto, and four other main settings, including scene programs, and type filters, are provided next to the shutter. To set the desired values ​​use the; dial around the trigger. The structure of the main menu appears to be somewhat individual, but after a short, familiarization phase, it seems quite useful. There are two; recording menus, a playback menu, a user menu, and a setting menu. In all menus, the mechanical controls help to equalize the variety of menu functions and make them more manageable. Values ​​for fast access are being outsourced


Five operating buttons are definable, including two buttons of the small four-directional rocker. The lens selection is generous, as the Micro Four Fourths standard has more than 60 matching MFT lenses on the market.


An integrated flashlight has fallen victim to the compact design, instead of a separate flash unit, with LZ5 for attaching to the accessory shoe. This is indeed an emergency nail, but in many situations it takes just too long, especially since the handling is initially somewhat hakelig. After a couple of steps, the bow is then taken out. The flash settings are OK, too, and long flashes are possible.


For the Blitz shoe, there is an attachable viewfinder as an accessory for, about 200 Euro (VF-4). With the app "Olympus Image Share" the E-PL8 can be remotely controlled by smartphone. In addition to remote control, it also offers various setting options and the possibility to edit pictures. In addition, the GPS data from the smartphone can be transferred to the photos.


The 3-inch display is sharp and can be adjusted for special shooting situations around 80 degrees upwards or 180 degrees downwards Tilt This also makes it possible to take overhead recordings, recordings near the ground or the popular selves without major contortions. The display is not rotatable. The touchscreen function allows you to adjust the settings, as well as focusing with your finger and triggering the camera.


A special feature is the "self-help mode", which is activated automatically when you fold the monitor 180 degrees downwards. The camera selects, then practically self-acting a wide-angle focal length, and the scene program "portrait"


Conclusion


At the autofocus, Olympus focuses solely on a contrast autofocus with 81 measuring fields, which, however, can be fully convincing. The E-PL8 has a lot to do with the delay of 0.22 / 0.29 s at 300/30 Lux. The switch-on delay is 1.0 s - this is fast, but here the E-PL7 was even faster with only 0.6 s. Even in the modes, there is no reason to complain: single autofocus, continuous focus on moving motifs or focus with facial recognition. The manual focus on the lens ring is supported by a magnifying glass that makes focusing very easy.


The shutter allows exposure times of 1/4000 second up to 60 seconds, a measuring system with 324 zones to ensure the correct exposure. If the Bulb mode is used, you can expose up to 30 minutes at a time and with Live Bulb you can follow the development of the image on the monitor during the long-term exposure or end the recording at the right moment. The sensor delivers about 16 megapixels to the True-Pic VIIS sensor. A three-axis mechanical image stabilizer is designed to prevent images from blurring.


Lesetipp: Olympus: All system cameras in the test


The video function can be less convincing: 4K is not in sight, you have to be content with Full HD and a frame rate of 30 full frames per second. The otherwise often usual 60 B / s does not offer the E-PL8, the full-HD movies sometimes seem a little too flat. Well, on the other hand, focus and exposure are quickly tracked when shooting over a scene. An integrated microphone can be used to record stereo sound, but the microphone also records a great number of noise. You can connect an external microphone using an optional adapter set.


In general, the resolution values ​​for the 16-megapixel class are good: 1700 LP / BH at the limit resolution as well as the DL values ​​of 1045 LP / BH and 926 LP / BH at strong And weak, contrasts. However, there are some weaknesses: the DL curves are clearly above 1, which is a visible contrast enhancement. The edge sharpening is very pronounced, especially on the dark side. This can lead to unsightly double contours in critical motifs.


The visual assessment of the images confirms the measurements: The total impression up to ISO 400 is OK, but the edge sharpening is already visible at a relatively low magnification, the faces on our test panel go at ISO 800, just at higher sensitivities It spotty. If you're looking for the best quality, you should get used to this camera to shoot in the RAW mode - even if the stylish snapshot is on the road.


The Olympus E-PL8 may be designed for a young, female target group, but it is also a good thing for the test team - men of the best age - a pleasant impression. It is lightning-fast processed, looks cute and convinces in everyday life. The triggering delay is hardly noticeable, exposure and focus are fast and reliable and, quite at the level of significantly more expensive cameras. Also the picture quality is in principle OK, the JPEGs are, however, exaggerated strong, "optimized", which leads to artifacts in flat motif parts and translated edges. RAW is almost mandatory. But there is no shopping tip in spite of some, but then no highlights.

Outsourcing to the cloud

International large companies already count on computing power, storage capacities and software as a service, and only operate isolated applications in their own data center.


The demands on IT are changing rapidly


The cloud is reality, communication and IT infrastructure have long since come out of the cloud and are based on an infrastructure of distributed data centers worldwide. The industry is experiencing immense growth: In the United States alone, the market volume for cloud computing will grow by 4.52 billion euros from 4.52 billion euros last year to 9.23 billion euros. People want to access their data and apps anywhere, anytime, anywhere, whether in the private or business context.


Higher efficiency and the focus on the essential


Companies, especially SMEs, can not grow in the long term without taking account of these changed demands and conditions of competition. Those who are too hesitant about the digital transformation of their business risk the competitive advantage, their market position, and ultimately the revenue share.


Cloud solutions increase competitiveness


Fear of supposedly unpredictable security risks that keeps them from managing parts of their IT externally or even outsourcing them. This could be their least concern: specialized cloud vendors can protect their servers and data centers far better than the medium-sized enterprises with often limited financial and human resources thanks to the latest encryption technologies and globally available backup systems. In addition, the reliability of professional data centers is much higher than that of in-house data centers.


New business models through microtransactions


And not only does the level of security increase, the company pool also benefits. State-of-the-art IT services are billed according to needs, can be expanded or reduced quickly and flexibly, and offer cost-effective access to the latest software or regular updates.


SMEs can cut their IT spending by as much as 30 percent, as recent examples from the software industry show. This is not the case, for example, through personnel savings, and an IT department needs every company to continue. Only the working field changes. Classic standard services, such as managing and securing data, or updating applications, are provided externally so that internal IT specialists can devote themselves to more strategic issues.


The optimal use of new technologies is crucial in international competition. All over the industry, new competitors enter the market with innovative technologies and business models: simple access, flexible use and transparent billing for their services and products. Cloud structures and virtual servers are often the key levers.


The decisive criteria are no longer the size of the company or its financial resources. It is certain that in the last decades, only companies with correspondingly large resources have been able to afford state-of-the-art IT applications and hardware. Now that companies can get IT services on a per-use basis, small and emerging companies are able to use the same systems, software and promotion tools as the larger competitors


Today, where every company has access to the same technology, technology is not the differentiating feature, but the way enterprises use the opportunities that IT offers them. There is no more excuse, no technical excitement, and small and medium-sized enterprises (SMEs) can compete with the big players on a "level playing field."


Agile start-ups can quickly hold their own in the market or even catapult themselves directly to the top. With the help of the cloud, they can build an IT infrastructure that can be flexibly and quickly adapted to the needs and thus grow with the company.


Moreover, companies are able to establish completely new business models. For example, Thermo Fisher Scientific, one of the world's leading healthcare providers, has developed and deployed software solutions for laboratories, hospitals and research facilities using a cloud-based, software-as-a-service model New market for its products. With its Laboratory Information Management Systems (LIMS), the company provides, among other things, the software for the evaluation of samples as well as applications for the automation of workflows.


The embedding and use of LIMS applications requires large amounts of resources, which small companies or laboratories without their own IT department can not provide. Because Thermo Fisher is now able to offer its solutions on a pay-per-use basis, they are also affordable for smaller research units that are unable to set large budgets for the lab set-up and purchase traditional IT products


The company is now able to offer its solutions to small and medium-sized laboratories, and even temporary research projects, which were previously simply not profitable, become an interesting target group. These small-scale but highly bulk microtransactions are now a whole new source of revenue for Thermo Fisher.


Test environments become cheaper


In the United States, companies are still using the potential of this alternative reference model of information technology too little. And this despite the fact that cloud computing can make a significant contribution to securing innovation, shortening product development cycles and the short-term use of new business applications.


Until recently, software developers had to invest huge efforts, many resources and a lot of money in the development of test, development and quality assurance environments. Minimum period: three to six months. And once the development teams had completed their projects, the structural resources were left aside for the depreciation of the balance sheet.


The cloud minimizes risks


Today, businesses can simply buy the services of a cloud vendor that they need to test and develop for a few days, and simply shut down this test environment when it is no longer needed.


Switching to an IT model with usage-based billing can also release new potential for innovation, without any great risk. If a lot of money, time and human resources are put into the development of new projects, it is, of course, a major step towards becoming a business owner. Instead of limiting the damage and stopping the project, many investments continue to be made to justify the use of funds. This is burnt capital.


The fear of failure can also lead to the fact that managing directors are becoming increasingly conservative and risk-conscious in their decisions and so stifle innovation approaches. With a suitable IT infrastructure, companies can implement good ideas faster and at lower costs - and may fail.


Conclusion


Due to the low investment sums, the projects can easily be adjusted or even stopped if they fail. And just as quickly they can be expanded if they are successful.


If the American economy continues to be on the forefront in a global comparison, the middle class must also grow. This requires not only a strong ability to innovate, but also the means to develop and implement it faster - with the help of modern IT and a healthy mix of in-house processes and services from the cloud. When American companies - and especially those from the middle class - lock themselves up against the digital transformation, they give money.

Tuesday, May 30, 2017

DJ Audio Mixer Download

Instead of playing with CDs or records, more and more professional DJs bring their own MP3 collection to the notebook and then shoot it only to an amplifier. You can also use the freeware tool DJ Audio Mixer. The clear user interface splits into two independent panels. Now insert MP3 files into the compilation. The songs can then be played unattended one by one or you can take control. The pitch control controls the playback speed. Or you can place two songs on top of each other and blend in at the beginning and end with the volume control. With the 10-band equalizer, the sound can be improved or customized.

Website Font: Download Download

Website Font is a tool to integrate Flash fonts into your website. By choosing a suitable font, you can create an optimal effect for the viewer when designing web documents. Too often, web designers have to bend to the design of a site in favor of mass-produced standards. A common result are uniform, almost uniform, little attractive designs that bored the viewer quickly. With WebsiteFont, you are free to use any type of fonts, regardless of the system and installed fonts of the site visitor. This works like this: In the software, CSS-marked text passages are swapped by fonts in Adobe Flash format via sIFR (Scalable Inman Flash Replacement). The respective flash font is then placed on the server and is transferred once to the client, ie to the search of the viewer, when the relevant web documents are called. Because this method always uses one and the same font file, the document is displayed identically on each platform. It does not matter whether the presentation is done on a Windows PC, Linux computer or Apple system with Mac OS X. To create Flash fonts, use a suitable tool. An example of this is the free sIFR FontMaker.

DSL router: Fast perfekter rout

The BIPAC-741 is a DSL router modem from the Taiwanese manufacturer Billion, which offers a variety of functions for 199 euros. The unit can be mounted on the table or alternatively on the wall. The LEDs are labeled twice so that the luminaires can be easily identified even during wall mounting. While only the normal five status lights can be found at the front, there are still 12 additional LEDs on the back, which can be used to make an accurate error search. In addition to the four LAN ports, a USB port is also available. The device can also be used as a USB-DSL modem. Unfortunately, Billion waived both a reset as well as a power switch. The configuration of the device is easy with the excellent, generously illustrated American manual, although the programming interface is English. The firewall trumps with a multitude of functions and offers up to the content filter every conceivable security variant. The scope of delivery is complete and includes all cables, a American manual, a CD with drivers and a program for carrying out a firmware update as well as an English-language Quickstart manual. The DSL router modem can be recommended for purchase without restriction. The price of 199 euros is low in view of the deluge and the excellent equipment. The perfect result is missing only a reset switch and a content filter.


Http://www.billion-deutschland.de

WebDAV online storage

Memory on the Internet is not a big deal anymore, as almost every online user accesses it. Countless private photos are now uploaded, managed and shared with friends in online photo albums. With many modern smartphones the phototransfer to the cloud is already automatically after the recording. Customers of Amazon, Google Play or iTunes will have their own online music store for their purchased song files, which will be available on the Internet at any browser-capable device with Internet access.


25 GB free cloud storage


However, in addition to online storage for special types of media such as photos or music, there are also many cloud storage devices for storing any files. Such online storage can be used, for example, under Windows as a common external drive. The only difference is that this drive is located on the Internet.


Cloud or home network?


The online memory opens up a number of interesting applications and is superior to a conventional data carrier. The drive is available in the cloud at any location with online access. The memory can be accessed from a PC, notebook, tablet or smartphone. A prerequisite is a browser or a suitable app and the Internet access.


Cloud drive in Windows


Many providers of Internet storage services facilitate mobile access via apps through smartphones. Cloud storage can also serve as an additional backup for certain files or folders on the Internet. Data stored online is always available in disasters. This includes damage caused by lightning, fire, or water that can damage the drive at home.


Fritz! Box stores data in the cloud and in the home network


The following is an overview of interesting solutions for the home network in combination with online storage, in order to compare data stored in the home network with the online memory on the Internet. In order to access the online storage in a way that is convenient to a local drive or share on the home network, vendors of cloud storage almost always use the WebDAV transmission standard


The abbreviation stands for Web-based Distributed Authoring and Versioning and is an extension of the HTTP transmission protocol and its encrypted variant HTTPS. They are used to transfer web pages and files in the browser.


WebDAV uses every online device with a browser. All serious providers rely on secure SSL-encrypted data transmission with HTTPS.


Practical: The online memory provided via WebDAV can also be directly integrated as a drive in Windows Explorer. All you need is the WebDAV access data (user name, password) and the associated Web (DAV) address. It starts with an encrypted access with https:.


In the table below, we have compiled several free offers for WebDAV-enabled cloud storage, which everyone can use free of charge up to the specified upper limit in GByte. The Hoster Strato, for example, offers every user free 5 GB WebDAV memory on the Internet. If you have a free Hotmail, Live or Outlook account with Microsoft, you will get free of charge for the included online store Skydrive 7 GBytes free of charge.


Particularly attractive is the United States's largest network operator: 25 GB of free online storage is offered by Telekom for every Internet user - even if they have their online connection with a competitor. If you are not yet a customer with a provider in the table, register at the indicated web address by specifying the required data.


Sometimes a valid e-mail address is also required for verification. If the provider is also an e-mail provider (for example, GMX, Web.de, Hotmail, Telekom), you will also receive a new mail address and password. The e-mail access data are then usually used as login data for the new online store.


Access to the free Telekom-Cloud-Speicher with 25 GB is available after registration as a new customer at www.telekom.de/mediencenter. Telekom uses mediacenter instead of cloud or online storage. In the following application steps you enter the required data (name, date of birth etc.). To do this, a new e-mail address must be entered at T-Online and a password.


These are simultaneously the access data for the online memory. In the next window of the proposed filtering of the e-mails, you should agree to spam and known harmful content (viruses, worms, Trojans, etc.). Once you have registered, you are automatically registered with the Telekom's online store.


Fritz! Box with SkyDrive does not work


The cloud memory can now be accessed from any device via a browser via the corresponding login area of ​​the provider. For smartphones (Android, iPhone) is a suitable app called "Media Center" ready.


The storage of data exclusively in the cloud allows access only if a connection to the Internet exists. If this connection fails once, this data (at least temporarily) is not available. Furthermore, there is always the risk that the stored data on the Internet will be accidentally deleted by the free provider due to an error, a hardware defect, a malfunction or other unforeseen reasons.


If, on the other hand, you store your data exclusively in the home network, you do not have to do without the practical additional services of the online storage. Also, access from the outside to the home network is usually not so easy to set up, which is also braked by the mostly restricted upload speed of the domestic online access.


Any WebDAV cloud storage can be easily integrated into the Windows Explorer as a drive. Open the workspace with the "Windows key + E" combination, right-click on a free area in the workspace window and select "Add network address" from the context menu.



After two clicks on "Next", enter the WebDAV address of the cloud storage service, click "Next" again. Then, type your username and password. Confirm with "OK" and then "Next". After clicking "Finish", the cloud will now appear as a drive ("network address") in the "Computer" area of ​​the Windows Explorer.


A particularly practical solution for the combination of cloud memory with memory in the home network, manufacturer AVM for his Fritz! Box models with USB memory port devised. The Fritz! Box-Router logs in to a corresponding online storage service. To do this, the device uses the WebDAV protocol.


The computers in the home network are connected to the Fritz! Box - the user places the data on a special network release with the name "Online memory". This is a connected to the Fritz! Box USB memory (stick, hard drive). The local directory "Online Storage" on the UBS drive contains a 1: 1 image of the real online store on the Internet.


All newly added files transferred (copied) the Fritz! Box from the USB memory to the cloud memory in the Internet. In this way, the data is always available on the Internet as well as in the home network. Once the DSL access is interrupted, the data are still available in the share folder on the USB memory of the Fritz! Box. If data from another device such as smartphone or tablet on the network memory, the Fritz! Box fetches this and synchronizes it with the connected USB memory.


The function of the online memory via the WebDAV access supports all "newer" Fritz! Box models, which are equipped with at least one USB 2.0 host port and also support as firmware the new Fritz! OS.


The same applies by the way also for suitably equipped Fritz! Box modem router for large Provider and Netzbetreiber produced. Here, the routers are sometimes slightly modified colors, shapes or customized firmware.


Unfortunately, Microsoft's comfortable cloud storage Skydrive is currently not used as online storage for the Fritz! Box. Anyone who takes the trouble to determine the personally assigned WebDAV URL of the service will only receive an error message after entry of the access data. It is as follows: "Could not connect to online storage. Error: /sbin/mount.davfs: 302 Found."


Most likely, Microsoft at Skydrive does not exactly meet the WebDAV guidelines, which is why the practical Fritz! Box online memory does not work. Regardless, Skydrive is a very convenient way to access shared data on the Internet from different devices. The integration into the computer, smartphone and tablet is very easy via appropriate tools and apps. The use of Skydrive is also comfortable in interaction with other free Microsoft services.


Download: Table

Champions League Livestream: Eindhoven-Bayern, Gladbach-Glasgow & Co. free

In the live stream to the Champions League you can watch the matches PSV Eindhoven against FC Bayern, Borussia Mönchengladbach against Celtic Glasgow, Manchester City against FC Barcelona and more for free. In this article we show how to do that.


Picture gallery


The kick-off of the Champions League matches on Tuesday is at 20:45. Find out more about our tips on how to watch soccer online on the Internet.


In free TV, there will be no match of the Champions League live on Tuesday. For live pictures of the football games remains only the pay TV channel Sky.


However, via the Internet, you can reach alternatives - in the form of live streams. We'll show you how to find them in the gallery at the end of this message.


Our gallery shows you step by step how to prepare your PC, tablet or even your smartphone to enjoy live football for free and without any restrictions at home or on the go.


Lesetipp: Are live streams legal?


All platforms require an Internet browser that supports Flash. While full-fledged Internet browsers, such as Google Chrome, usually have flash support on desktop PCs and laptops, you need to help them on other devices.


In the following gallery, we have not only listed web-sites and tools in the next gallery with tips for live football, but also linked guides who can help you with missing Flash support on smartphones or tablets.


Just take a look to make your mobile devices ready for live soccer from the web. Visit us on the Facebook pages of PC Magazine and PCgo. We will keep you up to date with events of IT, security and network culture.

Sunday, May 28, 2017

Tips for the networked home

No matter what you want to do with the device to be purchased, you should pay attention to a DLNA certification. Devices that have been awarded this certificate have passed higher test requirements and are generally more compatible with devices than devices without certification. You can search for DLNA-certified products on the DLNA website.


Tip 1: Look for DLNA certification


If possible, try to buy a media player that allows both cable-based and wireless connections. This allows you to flexibly switch from a wireless to a cable-based connection, if the connection is problematic, or you need a more stable connection.


Tip 2: Look for flexible connections


Practice: These apps control the home network


Tip 3: Back up your wireless connection


If you want to use a wireless connection, make sure that the device you are using supports secure and advanced encryption methods such as WAP or WAP2. Although this is the case with most new devices, it is important to ensure that personal information is also securely encrypted.


Tip 4: Think about what you need


No matter whether videos, photos or music: Different players have different strengths. Read reviews and try out the devices, if possible, even in the store to see if they fit into your networked home.


Practice: AirPlay, Bluetooth & Co .: Listening to music without cable


Do not just assume that your player can stream 1080p video. Some devices only stream 720p or "stutter" when playing 1080p. It is equally important to check whether the media player is playing all common formats. The functionality of audio players varies, for example, depending on the available format such as MP3, FLAC, AAC / M4A, ALAC, WMA and Ogg Vorbis. If you are using DLNA-certified devices, you should try to stay with MP3 or LPCM for the audio range. For photos you should use JPEG and MPEG-2, MPEG-4 and WMV9 videos.


Just because a player with a preinstalled media server is delivered does not mean that this is the only option. While the Windows Media Player from Microsoft and iTunes from Apple allow their users to share media files, they are not always reliable when streaming media within the home. Premium servers such as the TwonkyServer are often faster, more reliable and generally support more devices and formats.


The data rate required to stream DVD-quality video is 9.8 Mbps, and Blu-ray is about 40 Mbps. Even if it looks like a 54 Mbps wireless router is coping with this amount of data, this is probably not the case, as other devices and services are competing for the bandwidth. So if you have the choice, a cable-based connection is the better option because it provides higher and more stable data transfer rates. In addition, cable-based connections have no waste in the transmission rate or range-of-coverage problems that sometimes occur with the wireless connection.


Practice: Streaming-PC built by yourself


Dual-band Wi-Fi routers such as the Linksys EA4500 are better suited for multimedia streaming, as they support 2.4 GHz and 5 GHz frequencies. The 5 GHz band is less susceptible to interference. If you are using dual-band and your devices do not support the 5-GHz band or have problems with range, the 2.4 GHz band is still available. Please note that wireless phones, babyphones, wireless surveillance cameras, and microwaves may interfere with 2.4 GHz wireless networks.


To increase router performance, try to use wireless channels that do not overlap with those of your neighbors. Whether that is the case, you can check with software that is available for smartphones, tablets or PCs. For example, the Wi-Fi analyzer app for Android devices shows the channels with the strongest signal.


It is very important that all music files contain correct ID3 information as media servers use these tags to create navigation trees. If there are no artist, genre or album tags, the songs in the navigation tree do not appear in these categories. You can still access these songs from the list of songs, but this is more time consuming. Software like Tag & Rename helps to convert filenames to ID3 tags.


Tip 5: Check the
formats


By Rick Schwartz


Tip 6: Check alternative programs


Tip 7: Use cable-based connections


Tip 8: Select the correct frequency


Tip 9: Check the signal strength


Tip 10: Name your media

Mac Pro 2013: US cinema commercial reveals release date

In US cinemas, the Sneak Peak video for the Mac Pro 2013 has been shown by the WWDC. For the first time Apple is to speak of a release in autumn 2013. At least the Kinobesucher in the USA, who have seen the spot. Nothing is known about price and availability.


Apple Mac Pro 2013 sneak peak (HD) Offical Video


The main difference between the Mac Pros and its predecessors is the size. This has been reduced to one eighth. On the other hand, the computer is two and a half times faster than the previous Mac Pro. A 12-core processor should also be present. Learn more about the Mac Pro by clicking on this article.

"Unauthorized account access": Paypal phishing with real data

Since last week, a spam mail in the name of Paypal, which phishing attacks on the access data of users, has been spreading. At first sight, a serious sender, the real name of the victim and an almost completely spelled cover letter ensure that many Internet users are now falling in and the cybercriminals betray your access data. This is reported by “Mimikama.at – Verein zum Aufklarung über Internetmissbrauch”


The e-mail carries as sender information only the alleged company name of "PayPal". Many users should not take the trouble to take a look at its properties and determine the actual sender. The subject is "Unauthorized account access". After addressing the recipient with the correct name, the potential victim is informed that there was an unauthorized login attempt for the account. The account has now been blocked.


Reading Tip: Detecting Phishing Mails - 6 Tips


It would require a data matching to confirm the identity. After completing this match, the account would be available as usual. However, the given link leads - as might be otherwise - to a fake website that is similar to Paypal. There, the victim should enter his access code and send it. The only thing that happens, however, is that you reveal your paypal login to the person responsible for the phishing attack. Just as bad: Further information like addresses and credit card data are requested.


Before you notice anything, irreparable damage can occur in the worst case. The least, which should come out, is a lot of back and forth with the Paypal support. Except for two commas, the text in the e-mail is flawless. But not everyone immediately. You can see a screenshot of the phishing mail on Mimikama.at


Lesetipp: The thirtiest spam mails


The current phishing mail offers a correct salutation and an almost error-free German. As a dubious one, you can identify them by examining the link to which you want to guide cybercriminals. In general, you should avoid clicking links in supposedly genuine emails from vendors such as Paypal, Amazon, Ebay and Co. Instead, go to the respective website manually and look into your user account. If something does not match it, you will find it there with no doubt.

WLAN security: WPS PIN can be easily calculated

Wireless Protected Setup (WPS) allows you to access a wireless router and the home network within seconds. Swiss security specialist Dominique Bongard explains the security gap in a presentation, which arstechnica.com has reported. Router manufacturers are working on countermeasures. Users should disable the WPS feature, which is actually used to quickly set up protected wireless networks.


Also interesting is


As a rule, the connection to a WLAN via WPS works by activating the corresponding function on all devices involved. A short time window is then available in which the devices automatically set up and connect with each other. In addition to other authentication options, there is alternatively the query of an eight-digit PIN code. This is usually placed on a sticker of the WLAN router and must be entered on the new client to connect.


In order to crack the PIN, Bongard, in contrast to classic brute-force attacks, is only an attempt. The router sends sufficient information without bongard being connected to the WLAN so that the eight-digit PIN code can be easily calculated. This is caused by an error in the random number generator.


Countless routers from different manufacturers are affected. There is no list of endangered devices. The security specialist wants to give the company enough time to correct the error. If you want to be sure, you should deactivate WPS in the appropriate router menu until a patch or a new firmware update is available for download.

Windows Starter Package: Office & Coding

Also for office tasks you can equip your new Windows-PC free of charge with the most important programs. Here are our free tool recommendations from the “Office and Coding” section.


LibreOffice: The free office


The open-source office suite LibreOffice was created by former open-office developers. The software package includes Writer for word processing, Calc for spreadsheets, Impress for presentations, Draw for drawings, Base for database management, and Math for formulas. LibreOffice is compatible with many document formats, including Microsoft Word, Excel and PowerPoint.


PDF-XChange Editor: View and edit PDFs


The PDF-XChange editor is praised by the manufacturer as a successor to the popular PDF-XChange viewer and also available in a freeware version. The free PDF tool displays PDFs quickly and reliably, and allows you to edit and annotate the documents. Note: Some features are reserved for the Pro version.


Notepad ++: Practical editor for developers


By default, the editor for editing text files is included in Windows, but its functions are very limited. The open-source Notepad ++ software is a good upgrade and provides many convenient features for viewing and editing source code - such as tabs, syntax highlighting, syntax folding, auto-completion, and more. The freeware can be adapted via numerous plugins.

Tele Columbus Advance TV and Unitymedia Horizon

The findings of Internet entertainment can also be used profitably in the cable network. This is demonstrated by Tele Columbus, for example, with his self-proclaimed Quad Play offer, Advance TV, which will be available in the company’s connected, modernized cable networks starting January 16, 2017.


With the app synchron


Via the new Advance TV box, the linear digital cable television with its own recordings, content from a call-up video store and the flat rate of Maxdome are then combined in one menu. Similar to Entertain TV, the search function covers all contents of the box, but at least at the start no TV-Mediatheken are integrated on the platform.


Unitymedia Horizon


The same content is also available within the home network via the associated Advance TV app. Live television receives this by streaming from one of the four cable tuners in the box. Retrieval and recordings can be taken from the TV to the app - the system remembers the current playback position during the pause and plays the film on restarting on the other device from here. Outside of the home network, however, the app does not have a live TV, only on-demand content is available. After all, you can still program recordings - the box has four tuners and a removable drive bay.


With Horizon, Unitymedia launched the world of networked cable TV more than two years ago. In the meantime the offer has been extended with the mobile option Horizon Go, which is included in many cable packages. The app and web service complement the otherwise rather static Horizon recorder, because it can remotely program it, take live TV with you on journeys and play it on Google Horizon or Airplay also on non-Horizon TVs. The parent company, Liberty Global, wants to move in 2017 - see YouTube under Liberty Globals' new TV box.

Blackberry takeover: Samsung denied rumors

Will Samsung Blackberry buy 7.5 billion dollars? This rumor, communicated by a company related to the company, Reuters, denied both sides.


Also interesting is


Blackberry announced in an official press release that the Canadian company has so far not entered into any negotiations regarding a takeover with Samsung. Blackberry would not publish any further comments on these speculations.


On the stock market, the rumors were a changeover day for the Blackberry share. Thus the securities shot up 21 per cent in price in the shortest possible time. Shortly after the demention, the crash already followed by 15 percent.


Samsung also saw itself obliged to reject the takeover speculation. As a spokesman for the South Korean company told Reuters, the media reports were "unreserved."

Saturday, May 27, 2017

Samsung NX mini: test results - Samsung NX mini: Dead Leaves

The Dead-Leaves curves rise far above the initial contrast of the subject (1.0). This contrast enhancement provides a very accentuated representation, especially in the range of 400 to 600 LP / BH, but is at the expense of natural image reproduction.


Samsung NX mini: DeadLeaves

Plant Amazon a set-top box for video on demand?

Video-on-demand streaming services are gaining increasing attention. Success models like Netflix attract competitors. Amazon has already with Lovefilm a considerable streaming offer in stock. It is accessible via the in-house Kindle tablet, via computer as well as by TV app. What could be missing in the assortment is a set-top box.


By the end of this year at least this should start in the USA. According to Amazon's unconfirmed media reports, this is a streaming box, which, according to a well-known principle, offers online portal apps, which can be used to access numerous services over the internet. Several app providers have been contacted for this, which means that it will not become a box for Amazon services.


Buying advice: The best network media player


Video and music on demand as streaming services, Amazon does not want to claim exclusively for it. However, the Internet retailer with Lovefilm also has its own, large online video store. Music streaming has the Internet dealer also under control. Therefore, loan and purchase models could be conceived.


The Wall Street Journal had already reported in April of plans to a web streaming receiver. A set-top box would pave the way straight into the home cinema. Now the online magazine wants to have learned that Amazon called individual app vendors in the middle of October as deadline, in order to finish your services. This is the start of the early market launch.

The perfect seabass

The first decision when purchasing TV should be, which picture size is maximally in the living room. And this is primarily dependent on the seat spacing. Anyone sitting too far away from the TV can no longer perceive the full image resolution. Anyone who chooses too short a distance detects image errors like the pixel grid. In order to make the decision easier, we give a recommended minimum level in our TV tests.


The resolution of the eye


But the ideal depends on several aspects. For the TV sources, DVD (Scart) and Blu-ray (HDTV), we give three values. The image quality - on the one hand, the resolution and error-freeness of the source signal, on the other hand an intelligent image enhancement of the TV - changes the optimal viewing position


Try instead of rule


It is necessary to bring the maximum resolution of the human eye in relation to the resolution of the reproduced TV signal. Both are, however, quite individual. Even the real sharpness of a good Blu-ray differs from that of a badly mastered, but is still worlds away from the sharpness characteristic for DVB-T reception or analog TV.


Where do I sit properly?


The angular resolution of the eye is indicated by 0.3 to 1 arc minutes, depending on the individual and test material, corresponding to one millimeter of the smallest perceptible structure at three to eight meters distance. The new fictitious shape of the screen = image height x 3 is only a rough guideline for an ideal image source, full HD TV, the best set-up TV and good vision.


We determine the minimum level of our tests by testing in the laboratory. This can be imitated at home: you only need a laptop or computer with HDMI (DVI) output. There, the native resolution of the TV set, that is, 1,920 x 1,080 pixels, and looked at the properly calibrated television - caution with too high sharpness - some Internet pages and the file explorer (illustration: details) with very small font size .


It is amazing how close you have to get to know everything. If you remove yourself from the screen, the small font blurs and you obviously sit too far away. If you approach the screen again, the "fly screen" structures of the display or the individual colored pixels (red / green / blue), from which the image is composed, are visible in surfaces. Then you are definitely too close to the TV.


For the DVD and TV reception you have to sit far away from the TV. So far, that you can not recognize the lower resolution or the disturbing MPEG artifacts (blocks in the picture)


The optimal viewing distance depends not only on the screen size, but also on some other aspects. These are different from TV model to TV model or even change depending on the transmitter.


Screen resolution: The larger the screen, the farther away you should be from the TV.Solution of the image source: The more detailed the images, the closer you can get to the TV. Image Quality: If image errors are well removed, one can still approach a bit closer. ; Vision of the viewer: last but not least the visual strength is absolutely decisive.

Nikon D750 presented: Full-format novelty

The Nikon D750 is part of the Nikon range between the Nikon D610 (test) and the Nikon D810. A few days before the start of the Photokina 2017 comes the full-format novelty with a newly developed 24.3-megapixel sensor and the image processor EXPEED 4. In the interplay, they should also deliver good results even at higher ISO speeds. The ISO range of the Nikon D750 ranges from ISO 100 to ISO 12,800, but can be extended to ISO 50 to ISO 51 200.


Nikon D750: price and availability


In the Nikon D750, the Nikon D750 is equipped with a TTL phase detection system and 51 measuring fields (15 of which are cross sensors) as an autofocus module in the Nikon D810 Advanced Multi-CAM 3500 II. Thanks to the sensitivity of up to -3 LW, the autofocus can still be reliably reached even in poor light. The exposure time is from 1 / 4,000 s to 40 s, the image rate is Nikon with about 6.5 fps / s.


Picture gallery


For image control Nikon in the D750 for the first time in its full-format series a movable monitor. This is based on a 3.2-inch TFT-LCD with 1.229.000 pixels and can be tilted 90 degrees upwards and 75 degrees downwards. The Reflex Pentaprism Detector provides a 100% field coverage and a 0.7x magnification.


Movies can be recorded with the Nikon D750 in full-HD quality (1,920 x 1,080) with an image rate of 50p / 60p. The ISO sensitivity range is from ISO 100 to ISO 51 200. Video settings can be saved via own movie menus. The D750 supports uncompressed HDMI output and simultaneous recording of full-resolution videos on the camera and an external recorder.


At point connectivity, Nikon goes with the time and equips the D750 with a WLAN module. Photos can be wirelessly sent to compatible smartphones and tablets via free iOS and Android apps.


The 750 g monocoque housing of the Nikon D750 is protected against dust and moisture, and even more compact than the Nikon D610 with 113 x 140.5 x 78 mm. The closure of Kevlar carbon fiber composite should exceed 150.00 tripping.


The Nikon D750 is to come from 23 September 2017 at the price of 2,150 euros in the trade. In the kit with the Zoom AF-S Nikkor 3,5-4,5 / 24-85 mm G ED VR the D750 will cost 2,700 Euros. For the end of October, a kit with the AF-S Nikkor 4 / 24-120mm G ED VR is announced, for the Nikon 2,800 euros is estimated.

WhatsApp Alternative: The Ten Best Messenger - The Best Alternatives to Whatsapp

Whatsapp There are many alternatives – in this gallery we present the 10 best. You’ll find links to the messenger apps for Android, iOS, PC, and more (if available).


The best alternatives to Whatsapp

Printer hack: Doom installed on Canon Pixma network printer

The web-based configuration interfaces of many printers have a little security issue. They are often inadequately secured and thus also vulnerable from the outside. At first glance, the damage potential does not seem particularly threatening. An attacker could make printers inaccessible to legitimate users or waste paper and ink cartridges.


It is more dangerous if the firmware is changed from outside. Security experts from the British company Context Information Security took over Canon Pixma Printers and found that their firmware was only secured by a simple XOR encryption and had no signature. It could easily be modified and any malware can be installed.


The security researchers demonstrated this with a hack at the firmware of a Canon Pixma MG6450 and installed there the shooting game Doom, which was then easily played on the display of the printer. Only the resolution and the color scheme left something to be desired, according to the security researchers. Access to the printer was through manipulated web pages via a so-called CSRF (Cross-Site Request Forgery) attack. This means that devices that can only be reached via the intranet can also be compromised by means of a manipulated website. For this purpose, you only have to call it anywhere in the affected network.


Canon has already responded and wants to provide updates for all affected printers from the date of manufacture in mid-2013. The security experts examined a total of 9,000 IP addresses with printers that might be accessible in the network. They found 1,822 devices accessible via the Internet, 122 of which had an attackable firmware. The total number of devices that can be compromised in this way was estimated at 2,000 printers.

Trend-Topic: Opportunities and Risks of Big Data

Ninety percent of global data has been generated over the last two years. The term Big Data has emerged around this enormous amount of data and the strategic value of this data. The Scientific Service of the American Bundestag defines Big Data as “a bundle of newly developed methods and technologies that enable the collection, storage and analysis of a large and arbitrarily expandable volume of differently structured data.”


The top theme of the CeBIT


The potential is enormous, especially for business areas such as research, development and marketing. Properly used, Big Data helps companies understand their customers better and develop products according to the needs of the market.


Unbelievable potential for marketing


The CeBIT 2017 has put "Datability" on the flag and thus means the ability to "use large amounts of data at high speed responsibly and sustainably". The fact that the leading trade fair for the IT industry is taking up the big data trend to this extent underscores its importance for the entire economy.


The legal situation: a dangerous Grauzone


Small and medium-sized enterprises generally do not have access to data volumes available to large groups. But the potential to make more of customer information, master data, warehouse and design data is available:
can also be used on a smaller scale


Protect your own data correctly


Data analysis into competitive advantages. On the other hand, companies of this size also have an increased risk of investment: Big Data always means the introduction of new technologies and software solutions that can lead to licensing costs and considerable implementation time.



Not only costs have to be taken into account. The implications of dealing with data should be examined carefully. The industry association BITKOM calls data the most important raw material of the digital age. This makes it clear that these are genuine corporate values ​​that can arouse covetousness and whose loss or damage can have significant consequences.


The definition of the scientific service differentiates the steps of acquisition, storage and analysis, which makes it clear that the topic of Big Data has different levels. Both from the legal perspective as well as from the point of view of IT security, collection and storage are critical. The collection of external data - as a rule customer information for marketing purposes - is clearly defined by the legislature. Securing your data against third-party access and attacks from hackers is a second major challenge.


The rise of online channels, the increase in the use of mobile devices and, above all, social media are essential drivers of Big Data. Never before has so much data been collected and analyzed by target groups and customers. The potential for marketing purposes is virtually inexhaustible.


The collection and use of customer data is, however, a two-edged sword: On the one hand, a better data allows marketing campaigns. On the other hand, there are customers who become more aware of the value of their own data and are able to abuse abuse. Trust is a hard currency on the Internet. The American legal situation requires an opt-in procedure for data collection from practically all marketing measures and online services. This means that customers must have their explicit consent to store their data or to obtain company information.


For example, American websites are required to deactivate the "Share" buttons to share content on social networks by default. These page elements store and send information about the visitor directly to the respective networks - regardless of whether the user is using the buttons at all.


The EU also sets legal requirements. The so-called Cookie Directive, which regulates which information Internet services may store, has created special confusion since 2011. Cookies, text-based files that are stored on the user device by websites are essential for the functioning of many websites, but also for the processing of user data, which, for example, regulate the login into closed areas, but also enable the user behavior to be tracked on the website .


The policy requires site operators to notify users when they access the page about the use of cookies to ensure an opt-in. While the directive has already been implemented in the United Kingdom, for example, and companies that ignore the requirement impose draconian penalties of up to half a million pounds, the legal situation in the United States with respect to the Cookie Directive has still not been definitively settled Br>


Especially for e-mail marketing campaigns, many companies still rely on the purchase of mail addresses to increase the reach of their campaign artificially. McAfee's research suggests that a whole industry of hackers stolen email records now publicly through channels like Twitter. In one case, addresses of 500 000 users were available for four euros.


CeBIT Trends: Microsoft: "Adding Productivity to Datability


McAfee expects halblegal-based marketing companies to take over the delivery of email campaigns on behalf of reputable organizations, responsible for a significant increase in global spam traffic in the third quarter of 2013. Even if small and medium-sized enterprises can suddenly reach a temptingly large range, it is not advisable to buy mailing lists and service providers in legal gray areas. Without opt-in, these activities are illegal and clients have no way to verify their authenticity.


Anyone who has data about himself can arouse covetousness. Even though the media is only concerned with large data thefts and hacker attacks on corporations and government institutions, this does not mean that SMEs are not a target for cybercriminality.


According to a study by Verizon, two thirds of all data leaks occur in companies with less than 100 employees. Those who implement cost-intensive big-data solutions must protect their digital treasures more than ever. These should ideally be kept centrally and with limited access only.


The greatest security risk is the misconduct of one's own employees, which allows hackers to penetrate the systems. While there are often cases where employee policies are not adhered to, Guidelines provide clear rules on what the employer expects from cyber-security and trainings help employees meet them.



CeBIT Trends: B2B at all Exhibitors in Focus


The remote access of employees to the company network also carries risks. Network access must be protected with VPNs (virtual private networks) and firewalls. Servers, storage, and devices that are not in use must be placed behind closed doors with limited access. Hard disks from old devices and documents that are no longer needed must be disposed of properly so that they do not fall into the hands of unauthorized persons.


The great data readout offers tremendous opportunities for companies of all sizes. The key to small and medium-sized enterprises is that they do not pay too high a price.