Cyborg | Designer-Babies | Futurism | Futurist | Immortality | Longevity | Nanotechnology | Post-Human | Singularity | Transhuman

The Daily Progress: The Daily Progress, Charlottesville News

 Progress  Comments Off on The Daily Progress: The Daily Progress, Charlottesville News
Jul 012016

Is your goal to reach thousands of consumers in the Culpeper market? Look to The Culpeper Star Exponent, the areas number one local daily newspaper. The Culpeper Star Exponent offers both print and web campaigns to meet your needs along with several targeted niche magazines that expand advertisers information with tailored stories written just for your business, packaged in a glossy format and direct mailed to the Culpeper and Warrenton marketplaces. Business owners often think that newspaper advertising is too costly. Were here to dispel that myth and assure you that The Culpeper Star Exponent has programs for every budget level. We refer to our Sales Representatives as Solutions Experts, because they work with all sorts of different businesses to create ways for those businesses to achieve their marketing goals.

We are committed to providing exceptional products and window replacement services to our loyal customers. We offer Double Hung Windows, Horizontal Sliders, Garden Windows, Bows & Bays, Replacement Doors and much more. And in addition to our basic window style, optional upgrades including Low-E Glass and colonial grids can easily be installed. As an additional service, we’ll patch up the area around your window frames, replacing any rotten wood, and offering custom stains, finishes and color for an enhanced look. We guarantee lifetime materials and labor. We have been named Energy Star Partner of the year for each of the past 3 years. We serve all surrounding counties: Augusta, Albemarle, Greene, Nelson, Louisa, Fluvanna, Rockingham, Page, and Madison.Please contact us today to schedul your free in-home replacement window estimate.

Roy Wheeler Realty Co. In 1927, Charlottesville was introduced to a new way of doing real estate. Roy Wheeler founded the ambitious Roy Wheeler Realty Co. with the aim of providing buyers and sellers with unbeatable service. Today, more than 85 years later, when people think about Charlottesville real estate, the name Roy Wheeler is still the first name that comes to mind. Our team of more than 100 Central Virginia real estate agents work hard in order to ensure that real estate buyers and sellers get exactly what they need. Roy Wheeler realty has five offices located throughout Central Virginia, including our main office in the historic Ednam Hall mansion. Our Central Virginia real estate agents are perfectly positioned to serve you better than any other real estate company can. Looking for a vacation home at Wintergreen Resort? A Wintergreen real estate agent can take care of you! Interested in moving to a historic property in Keswick, Virginia? Our nearby offices will help you! View the contact information for our offices here: We specialize in a variety of Central Virginia and Charlottesville real estate properties, including farms and estates, classic homes, residential properties, secondary/vacation homes, and commercial sales and leasing. Find out why we have an almost 99% customer satisfaction rate, and start searching for your next home today! View our Central Virginia homes for sale through our detailed property search tool. Have questions? Give us a call at (434) 951-5155 or email us at We look forward to helping you find the perfect Central Virginia home for sale. Residential Real Estate Company serving Central Virginia. Established in 1927. Tradition of trust and industry leaders. Cutting Edge.

Read more:

The Daily Progress: The Daily Progress, Charlottesville News

 Posted by at 9:43 pm  Tagged with:

Moore Nanotechnology Systems: Ultra-Precision Machining …

 Nanotech  Comments Off on Moore Nanotechnology Systems: Ultra-Precision Machining …
Jun 302016

Moore Nanotechnology Systems, LLC (Nanotech) is dedicated to the development of ultra-precision machining systems and their successful utilization through the formation of lifelong customer partnerships. Total customer satisfaction of our products and services has always been, and will continue to be, our highest priority as we support our customers expansion into new markets through the design and development of new products, complimentary machine accessories, and enhancements to our existing products.

Our ultra-precision machine systems support single point diamond turning, deterministic micro-grinding, precision micro-milling, and glass press molding for the production of advanced optics including diamond turning sphere, asphere, freeform, conformal, lens array, and plano surfaces. We offer a diverse line of options and accessories to customize our machining platforms to suit our customers specific applications. From our state-of-the-art NFTS-6000 Fast Tool Servo systemto the industry’s first touch swipe gesture interactive Windows based HMI, Nanotech builds to a higher standard of quality and reliability.

(click on a photo below to see a larger version)

Established in 1997, our abbreviated name Nanotech was from the beginning not only our registered trademark, but also a symbol of our commitment to developing highly advanced equipment and manufacturing processes capable of achieving nanometer level surface accuracies on advanced optical components. Our ultra-precision machining systems support many industries including consumer electronics, defense, aerospace, lighting, medical, automotive, and ophthalmic. Our world-class team of specialists has dedicated their careers to this technology, and their vision has made Nanotech the fastest growing company in this field.

For additional information visit our Machines Page. You can also E-mail Us or call 603-352-3030 to discuss your specific requirements.

Top 100 Private Companies in New Hampshire

From2010 through 2014, Business NH Magazine has ranked Moore Nanotechnology Systems as one of the top 100 private companies in the State of NH.

In addition, Moore Nanotechnology Systems, LLC was selected as 2008 Company of the Year by the State of New Hampshire Department of Economic Development

Dec. 3, 2008 Moore Nanotechnology Systems was lauded by Department of Resources and Economic Development Commissioner George Bald for its innovative spirit which have made it the fastest growing company in the precision machining field. read more >

Nanotech Reaches 100th 350FG / 650FGv2 Milestone Swanzey, NH May, 2015.

Nanotechhas announced customer acceptance oftheir 100th 350FG / 650FGv2 Y-axis Freeform Generator! The 650FGv2 is the latest version of their 5-axisfreeform system.It hasbecometheirglobal”flagship” machine.This is a significant milestone to surpassand a testament to the system’s worldwide adoption by leading manufacturers. No other vertical axismachine compares toit’s uniquesymmetric Y-axisdesignon any level. Performance, thermal stability, part cutting results,reliability as well as thelifelong technical service/support one receives are unmatched. Visit the 650FG Machine Page for complete details. Spend time with Nanotech anddiscover “Y”premier electro-optics companies choose to team with them.

Read the rest here:

Moore Nanotechnology Systems: Ultra-Precision Machining …

Tor Browser – Anonymity Online, IP Changer – YouTube

 Tor Browser  Comments Off on Tor Browser – Anonymity Online, IP Changer – YouTube
Jun 262016

The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.

The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained (portable).


File Recovery Software – Photo Editing Software – Android games – Proxy, VPN, IP changer – Backup & Recovery – Parental Control Software – Remote Desktop Control – Emulators – PC Optimizer Software – PC Information Software – Network Management Software – Work With PDF Files – Audio Video Converters – Media Players – Other –

View original post here:
Tor Browser – Anonymity Online, IP Changer – YouTube

Download Tor Browser for Windows 6.0.1 –

 Tor Browser  Comments Off on Download Tor Browser for Windows 6.0.1 –
Jun 212016

Tor Browser for Windows has been designed to help you preserve your privacy online. Tor Browser is a tool set that can help you anonymize web browsing and publishing, instant messaging, and other applications that use the TCP protocol. This can be helpful for private use and business use.It means that confidential information can be kept from prying eyes. ISPs, key loggers and other types of malware are not able to track your activities easily.

Tor Browser for Windows works by bouncing traffic around a distributed network of servers which it calls “onion routers”. The interface allows you to toggle it on and off based upon when you need anonymity online. Tor Browser for Windows also lets you choose from various proxy tunnels based on a world map that displays exactly where each one is located.

Overall, Tor Browser for Windows is a simple, well organized and effective tool for users who are concerned about security or invasions of privacy whilst they are online. The browser interface is a standard, user friendly affair and the application is relatively lightweight.

Read more:
Download Tor Browser for Windows 6.0.1 –

 Posted by at 11:02 pm  Tagged with:

Warlike Flyboys – Ww3 – Download Plane Simulator …

 Ww3  Comments Off on Warlike Flyboys – Ww3 – Download Plane Simulator …
Jun 192016

Try your skills and join epic battles in the great game Warlike Flyboys – WW3! Aerial wars take place right here and right now! Have you got any ideas about what the third world war may look like? Huge and contemporary weapons and great aviation forces are waiting for their hour of triumph! Take your pilot’s seat without hesitation and raise your iron machine constructed for destruction high into the skies. All the airplanes are extremely powerful and furious, so dont let them stay still not even for a second and get ready for massive attacks! Look through your tasks in the ravishing game Flyboys – WW3 and dont stop while destroying enemies bases. Warlike Flyboys – WW3 like any other serious simulator of its genre includes all well-known standards like non-stop action and explding the enemies bases. That’s why you should be careful and choose your vehicle – some big plane to control, fly and fight. Firstly, you may realize what air forces should be chosen: is your airplane belonging to Sabres or the USA? Have you chosen your destiny? Lets start and have fun!

3D game with easy controls

High-quality graphics, music and effects

Some chances for training

25 planes and 3 levels of difficulty

Download Plane Simulator – Absolutely FREE

Windows 98/ME/2000/2003/XP

DirectX 9

Pentium III processor and higher

256 Mb RAM

50 Mb hard drive space

32 Mb 3D video card

Go here to read the rest:

Warlike Flyboys – Ww3 – Download Plane Simulator …

 Posted by at 2:40 pm  Tagged with:

Download Microsoft Robotics Developer Studio 4 from …

 Robotics  Comments Off on Download Microsoft Robotics Developer Studio 4 from …
Jun 152016

Microsoft Robotics Developer Studio 4 enables hobbyists and professional or non-professional developers to create robotics applications targeting a wide range of scenarios. This release is an update that has the functionality of the previous RDS 2008 R3 Standard Edition with the addition of support for the Kinect sensor and a defined Reference Platform, also referred to as MARK (Mobile Autonomous Robot using Kinect).

Microsoft Robotics Developer Studio can support a broad set of robotics platforms by either running directly on the platform (if it has an embedded PC running Windows) or controlling the robot from a Windows PC through a communication channel such as Wi-Fi or Bluetooth.

In addition to providing support for Microsoft Visual Studio 2010, Microsoft Robotics Developer Studio 4 provides a Visual Programming Language (VPL) which allows developers to create applications simply by dragging and dropping components onto a canvas and wiring them together.

The powerful Visual Simulation Environment (VSE) provides a high-fidelity simulation environment powered by NVIDIA PhysX engine for running game-quality 3D simulations with real-world physics interactions.

To help developers getting started, Robotics Developer Studio contains extensive Documentation and a large set of samples and tutorials that illustrate how to write applications ranging from simple “Hello Robot” to complex applications that simultaneously run on multiple robots.

Read the rest here:

Download Microsoft Robotics Developer Studio 4 from …

 Posted by at 3:26 pm  Tagged with:

Chocolatey Gallery | Jitsi 2.8.5426

 Jitsi  Comments Off on Chocolatey Gallery | Jitsi 2.8.5426
May 282016

Private CDN cached downloads available for licensed customers. Never experience 404 breakages again! Learn more…

This package was approved by moderator ferventcoder on 4/24/2015.

Jitsi (formerly SIP Communicator) is a free and open source multiplatform voice (VoIP), videoconferencing and instant messaging application for Windows, Linux and Mac OS X. It supports several popular instant messaging and telephony protocols, including open recognised encryption protocols for chat (OTR) and voice/video/streaming and voice/video conferencing (SIP/RTP/SRTP/ZRTP), as well as built-in IPv6, NAT traversal and DNSSEC. Jitsi and its source code are released under the terms of the LGPL.

To install Jitsi, run the following command from the command line or from PowerShell:

To upgrade Jitsi, run the following command from the command line or from PowerShell:

In cases where actual malware is found, the packages are subject to removal. Software sometimes has false positives. Moderators do not necessarily validate the safety of the underlying software, only that a package retrieves software from the official distribution point and/or validate embedded software against official distribution point (where distribution rights allow redistribution).

Chocolatey Pro provides runtime protection from possible malware.

This package has no dependencies.

20042012 Emil Ivov

Excerpt from:
Chocolatey Gallery | Jitsi 2.8.5426

Jitsi – OSTN – Guardian Project Open Dev

 Jitsi  Comments Off on Jitsi – OSTN – Guardian Project Open Dev
May 212016

Jitsi Setup

Go to in your browser. Download the program onto your computer. Jitsi is an audio/video and chat application that supports protocols such as SIP, XMPP/Jabber, AIM/ICQ, Windows Live, Yahoo! and many other useful features.

When Jitsi is installed, go to the applications folder and open it.

Select the SIP account type in the Network pull down in the new account window. It should look like this

In the Sip id box, add the username & server detail we sent to you in the email (for example

In the Password box, Add the password we sent to you in the email.

Click the Advanced box

Click the Connection tab. Fill out the form fields to match this screenshot

Click the Next button. Confirm the settings are correct on the next screen. Click Sign In

You should see it read “Registering” for a few seconds until the bar to the right of your account name turns Green and reads SIP ON Online.

Congratulations! You’ve successfully signed in.

You can fetch a package or subscribe to the repository.

For details on the current status with the official Debian packaging, please refer to Debian Bug report logs.

Known issues making a ZRTP initiation between clients.

Current successes for ZRTP: Jitsi OSX -> Groundwire / Ostel -> Jitsi OSX

Current failings for ZRTP: Groundwire -> Jitsi OSX / Jitsi OSX -> Ostel

Secure video calls, conferencing, chat, desktop sharing, file transfer, support for your favorite OS, and IM network. All this, and more, in Jitsi – the most complete and advanced open source communicator.

The ever growing use of Voice over IP (VoIP) and other media applications triggered a more widespread use of the Real-time Transfer Protocol (RTP). Thise protocols is the workhorse for VoIP applications. Many VoIP applications send RTP data over the public Internet in clear, thus the data is not protected from eavesdropping or modification. Therefore most VoIP applications are regarded insecure today. During the last years several activities started to enhance the security of RTP.

The Secure Real-time Transfer Protocol (SRTP) enhances security for RTP and provides integrity and confidentiality for RTP media connections. To use SRTP in an efficient way VoIP applications should be able to negotiate keys and other parameters in an automatic fashion.

ZRTP is a protocol that negotiates the keys and other information required to setup a SRTP audio and video session

While it is important to look at the technology, the protocols and alike, it is also important to look at the implications a specific technology may have on its implementation, deployment, and usability. Usability is of major importance for VoIP peer-to-peer applications: these applications are mainly used by non-IT persons. Therefore the handling must be simple, easy to use, and shall not require special infrastructure or registration.

Original post:
Jitsi – OSTN – Guardian Project Open Dev

The NSA – The Super Secret National Security Agency

 NSA  Comments Off on The NSA – The Super Secret National Security Agency
May 072016

– A Tale of Two Countries – New Zealand Apologizes for Illegal Domestic Spying, While U.S. Still Refuses to Acknowledge NSAs…

– Attacking Tor – How the NSA Targets Users’ Online Anonymity

– Citizens Against Unidentified Flying Objects Secrecy v. National Security Agency

– Clapper Reveals Bush-Era Docs Showing NSA Spying Dragnet Started 2001

– Covert Operations of the U.S. National Security Agency

– Creation of The NSA – from ‘The Secret Government – Origin, Identity and Purpose of MJ-12’

– DARPA – Defense Advanced Research Projects Agency – Main File

– Did the NSA Kill Hugo Chavez?

– Exposed The Covert, Real-Time Spying on Youtube, Facebook and Blogs

– Foiling Computer Hackers Top Priority With FBI, CIA, Pentagon, NSA

– ‘Follow the Money’ – NSA Spies on International Payments

– Foreign Officials in the Dark About their Own Spy Agencies’ Cooperation with NSA

– Google and The NSA Connection

– Google and The NSA – Whos Holding The ‘Shit-Bag’ Now?

– Google Asks NSA to Help Secure Its Network

– Google, CIA and the NSA – Inside the Secret Network behind Mass Surveillance, Endless War and Skynet

– Google to Enlist NSA to Help It Ward Off Cyber-Attacks

– Hidden Government Scanners Will Instantly Know Everything About You from 164 Feet Away

– High-Level U.S. Government Officials Have Warned for 40 Years that Mass Surveillance Would Lead to Tyranny…

– How Google, Facebook, Skype, Yahoo and AOL are All Blatantly Lying to Their Own Users in Denying NSA Spy Grid…

– How International Treaties Gave NSA Back-Door Access for Surveillance

– How NSA Access Was Built into Windows

– How the NSA Plans to Infect ‘Millions’ of Computers with Malware

– How the NSA Spies on Your Google and Yahoo Accounts

– Inside TAO – Documents Reveal Top NSA Hacking Unit

– Inside The NSAs Largest and Most Expansive Secret Domestic Spy Center in Bluffdale, Utah – Exposed

– It’s Not Just Spying – How the NSA Has Turned Into a Giant Profit Center for Corrupt Insiders

– Key to The Extraterrestrial Messages – NSA Technical Journal Vol XIV No 1

– La NSA Particip en El Desarrollo de Windows 7

– La Red Echelon – Main File

– Lawless NSA Global Spying

-Mat la NSA a Hugo Chvez?

– NSA Able to Target Offline Computers Using Radio-Waves for Surveillance, Cyber-Attacks

– NSA Boss Wants More Control Over The Internet

– NSA Built Back Door in All Windows Software by 1999

– NSA Claims Massive New Surveillance Powers

– NSA Director Defends Plan to Maintain ‘Backdoors’ Into Technology Companies

– NSA Gathers Data on Social Connections of U.S. Citizens

– NSA, GCHQ Using Data from ‘Leaky’ Smartphone Apps to Spy

– NSA has Built its Own, Secret, Warrantless, Shadow Social Network, and You’ve Already Joined It

– NSA Helped With Windows 7 Development – Privacy Expert Voices ‘Backdoor’ Concerns – Security Researchers Dismiss Idea

– NSA ‘Helping’ Microsoft With Windows 7 ‘Security’

– NSA Infiltrates Links to Yahoo and Google Data Centers Worldwide – Snowden Documents Say

– NSA – National Security Agency – Extrapolate Postmodum Prosum – Updated

– NSA Offering ‘Billions’ for Skype Eavesdrop Solution – Business Model for P2P Firm at Last?

– NSA Recent UFO Document Release More Interesting for What It “Could” Not Find

– NSA Refuses to Declassify Obamas Cybersecurity Directive – Exceptionally Grave Damage

– NSAs Computer and Mobile Spying – An Interview with Professor Tung Yin

– NSA’s Domestic Surveillance is Motivated by Fears that Environmental Disasters Could Fuel Anti-Government Activism

– NSA Secretly Exploited Devastating Heartbleed Bug for Years – Report

– NSA Security Running Amok to Plug Leaks About 9/11

– NSA Spying Did Not Result in a SINGLE Foiled Terrorist Plot

– NSA’s Top Hacking Unit

– NSA Top-Secret Document from 2012 – FOXACID – SECONDDATE – WILLOWVIXEN

– NSA Surveillance Goes Beyond Orwell’s Imagination – Says Alan Rusbridger

– NSA Took Part in The Development of Windows 7

– NSA Wants EZ Pass Control for Internet

-“Obese Intelligence” – The NSA Search Engine

– Quantum Insert

– Radio Mensajes Provenientes del Espacio Exterior – Documento Desclasificado de La NSA

– Russian Researchers Expose Breakthrough U.S. Spying Program

– Secret Archives – National Security & Privacy

View post:
The NSA – The Super Secret National Security Agency

 Posted by at 3:47 am  Tagged with:

Jitsi –

 Jitsi  Comments Off on Jitsi –
Apr 112016

Jitsi Original author(s) Emil Ivov Developer(s) Jitsi Team and Contributors Initial release 2003(2003) Stable release 2.8 (build.5426) (March19, 2015; 11 months ago(2015-03-19)) [] Preview release 2.9 (nightly) [] Development status Active Written in Java Operating system Linux, Mac OS X, Windows (all Java supported) Size 52.4 MB Windows (bundles its own private JRE)[1] 78.8MB Mac OS X (includes private JRE)[2] 22MB Linux 65MB source code[3] Available in Asturian, English, French, German, Bulgarian, Japanese, Spanish, Italian, Romanian, Greek and 25 more Type Voice over Internet Protocol / instant messaging / videoconferencing License Apache Website

Jitsi (formerly SIP Communicator) is a free and open source multiplatform[4]voice (VoIP), videoconferencing and instant messaging application for Windows, Linux, Mac OS X and Android. It supports several popular instant-messaging and telephony protocols, including open recognised encryption protocols for chat (OTR) and voice/video/streaming and voice/video conferencing (SIP/RTP/SRTP/ZRTP), as well as built-in IPv6, NAT traversal and DNSSEC. Jitsi and its source code are released under the terms of the Apache Software Licence.[5]

Work on Jitsi (then SIP Communicator) started in 2003 in the context of a student project by Emil Ivov at the University of Strasbourg.[6] It was originally released as an example video phone in the JAIN-SIP stack and later spun off as a standalone project.[7]

Originally the project was mostly used as an experimentation tool because of its support for IPv6.[8][9] Through the years, as the project gathered members, it also added support for protocols other than SIP.

Jitsi has received support from various institutions such as the NLnet Foundation,[10][11] the University of Strasbourg and the Region of Alsace[12] and it has also had multiple participations in the Google Summer of Code program.[13][14]

In 2009, Emil Ivov founded the BlueJimp company which has employed some of Jitsi’s main contributors[15][16] in order to offer professional support and development services[17] related to the project.

In 2011, after successfully adding support for audio/video communication over XMPPs Jingle extensions, the project was renamed to Jitsi since it was no longer “a SIP only Communicator”.[18][19] This name originates from the Bulgarian “” (wires).[20]

On November 4, 2014, “Jitsi + Ostel” scored 6 out of 7 points on the Electronic Frontier Foundation’s secure messaging scorecard. They lost a point because there has not been a recent independent code audit.[21]

On February 1, 2015, Hristo Terezov, Ingo Bauersachs and the rest of the team released [22] version 2.6 from their stand at the Free and Open Source Software Developers’ European Meeting 2015 event in Brussels. This release includes security fixes, removes support of the deprecated MSN protocol, along with SSLv3 in XMPP. Among other notable improvements, the OS X version bundles a Java 8 runtime, enables echo cancelling by default, and uses the CoreAudio subsystem. The Linux build addresses font issues with the GTK+ native LookAndFeel, and fixes some long standing issues about microphone level on call setup when using the PulseAudio sound system. This release also adds the embedded Java database Hyper SQL Database to improve performance for users with huge configuration files, a feature which is disabled by default. A full list of changes is [23] available on the project web site.

Jitsi supports multiple operating systems, including Windows as well as Unix-like systems such as Linux, Mac OS X and BSD. “Beta” packages built for Android are available[24] but the project’s roadmap describes the porting to Android as “on hold”.[25] It also includes:[26]

The following protocols are currently supported by Jitsi:[4]

Jitsi is mostly written in Java[31] which helps reuse most of the same code over the various operating systems it works on. Its GUI is based upon Swing. The project also uses native code for the implementation of platform specific tasks such as audio/video capture and rendering, IP address selection, and access to native popup notification systems such as Growl.

The project uses the Apache Felix OSGi implementation[32] for modularity.

Among others Jitsi uses the JAIN-SIP protocol stack for SIP support and the Jive Software Smack library [33] for XMPP.[34]

As Jitsi can handle IPv6 it is especially interesting for direct PC-to-PC (peer-to-peer) communication, for instance, if both sides were ‘trapped’ behind NAT routers, but could obtain a reachable IPv6 address via a tunnel-broker.[citation needed]

The Jitsi community has also completed an ICE implementation called, which it uses to provide NAT traversal capabilities, and assist IPv4 to IPv6 transition.[35]

Audio systems supported are PortAudio, PulseAudio and WASAPI (Windows Audio Session API).

Read more:
Jitsi –

 Posted by at 4:48 am  Tagged with:

Test automation – Wikipedia, the free encyclopedia

 Automation  Comments Off on Test automation – Wikipedia, the free encyclopedia
Mar 272016

In software testing, test automation is the use of special software (separate from the software being tested) to control the execution of tests and the comparison of actual outcomes with predicted outcomes.[1] Test automation can automate some repetitive but necessary tasks in a formalized testing process already in place, or add additional testing that would be difficult to perform manually. Test automation is critical for continuous delivery and continuous testing.

Some software testing tasks, such as extensive low-level interface regression testing, can be laborious and time consuming to do manually. In addition, a manual approach might not always be effective in finding certain classes of defects. Test automation offers a possibility to perform these types of testing effectively. Once automated tests have been developed, they can be run quickly and repeatedly. Many times, this can be a cost-effective method for regression testing of software products that have a long maintenance life. Even minor patches over the lifetime of the application can cause existing features to break which were working at an earlier point in time.

There are many approaches to test automation, however below are the general approaches used widely:

Test automation tools can be expensive, and are usually employed in combination with manual testing. Test automation can be made cost-effective in the long term, especially when used repeatedly in regression testing.[citation needed]

In automated testing the Test Engineer or Software quality assurance person must have software coding ability, since the test cases are written in the form of source code which, when run, produce output according to the assertions that are a part of it.

One way to generate test cases automatically is model-based testing through use of a model of the system for test case generation, but research continues into a variety of alternative methodologies for doing so.[citation needed] In some cases, the model-based approach enables non-technical users to create automated business test cases in plain English so that no programming of any kind is needed in order to configure them for multiple operating systems, browsers, and smart devices.[2]

What to automate, when to automate, or even whether one really needs automation are crucial decisions which the testing (or development) team must make. Selecting the correct features of the product for automation largely determines the success of the automation. Automating unstable features or features that are undergoing changes should be avoided.[3]

A growing trend in software development is the use of testing frameworks such as the xUnit frameworks (for example, JUnit and NUnit) that allow the execution of unit tests to determine whether various sections of the code are acting as expected under various circumstances. Test cases describe tests that need to be run on the program to verify that the program runs as expected.

Test automation mostly using unit testing is a key feature of agile software development, where it is known as test-driven development (TDD). Unit tests are written to define the functionality before the code is written. However, these unit tests evolve and are extended as coding progresses, issues are discovered and the code is subjected to refactoring .[4] Only when all the tests for all the demanded features pass is the code considered complete. Proponents argue that it produces software that is both more reliable and less costly than code that is tested by manual exploration.[citation needed] It is considered more reliable because the code coverage is better, and because it is run constantly during development rather than once at the end of a waterfall development cycle. The developer discovers defects immediately upon making a change, when it is least expensive to fix. Finally, code refactoring is safer; transforming the code into a simpler form with less code duplication, but equivalent behavior, is much less likely to introduce new defects.

Many test automation tools provide record and playback features that allow users to interactively record user actions and replay them back any number of times, comparing actual results to those expected. The advantage of this approach is that it requires little or no software development. This approach can be applied to any application that has a graphical user interface. However, reliance on these features poses major reliability and maintainability problems. Relabelling a button or moving it to another part of the window may require the test to be re-recorded. Record and playback also often adds irrelevant activities or incorrectly records some activities.[citation needed]

A variation on this type of tool is for testing of web sites. Here, the “interface” is the web page. However, such a framework utilizes entirely different techniques because it is rendering HTML and listening to DOM Events instead of Windows API events. Headless browsers or solutions based on Selenium Web Driver are normally used for this purpose.[5][6][7]

Another variation of this type of test automation tool is for testing mobile applications. This is very useful given the number of different sizes, resolutions, and operating systems used on mobile phones. For this variation, a framework (e.g. Calabash) is used in order to instantiate actions on the mobile device and to gather results of the actions.[8][bettersourceneeded]

Another variation is script-less test automation that does not use record and playback, but instead builds a model of the Application Under Test (AUT) and then enables the tester to create test cases by simply editing in test parameters and conditions. This requires no scripting skills, but has all the power and flexibility of a scripted approach.[citation needed] Test-case maintenance seems to be easy, as there is no code to maintain and as the AUT changes the software objects can simply be re-learned or added. It can be applied to any GUI-based software application.[citation needed] The problem is the model of the AUT is actually implemented using test scripts, which have to be constantly maintained whenever there’s change to the AUT.[citation needed]

API testing is also being widely used by software testers due to the difficulty of creating and maintaining GUI-based automation testing. It involves directly testing APIs as part of integration testing, to determine if they meet expectations for functionality, reliability, performance, and security.[9] Since APIs lack a GUI, API testing is performed at the message layer.[10] API testing is considered critical when an API serves as the primary interface to application logic since GUI tests can be difficult to maintain with the short release cycles and frequent changes commonly used with agile software development and DevOps.[11][12]

Continuous testing is the process of executing automated tests as part of the software delivery pipeline to obtain immediate feedback on the business risks associated with a software release candidate.[13][14] For Continuous Testing, the scope of testing extends from validating bottom-up requirements or user stories to assessing the system requirements associated with overarching business goals.[15]

Testing tools can help automate tasks such as product installation, test data creation, GUI interaction, problem detection (consider parsing or polling agents equipped with oracles[further explanation needed]), defect logging, etc., without necessarily automating tests in an end-to-end fashion.

One must keep satisfying popular requirements when thinking of test automation:

A test automation framework is an integrated system that sets the rules of automation of a specific product. This system integrates the function libraries, test data sources, object details and various reusable modules. These components act as small building blocks which need to be assembled to represent a business process. The framework provides the basis of test automation and simplifies the automation effort.

The main advantage of a framework of assumptions, concepts and tools that provide support for automated software testing is the low cost for maintenance. If there is change to any test case then only the test case file needs to be updated and the driver Script and startup script will remain the same. Ideally, there is no need to update the scripts in case of changes to the application.

Choosing the right framework/scripting technique helps in maintaining lower costs. The costs associated with test scripting are due to development and maintenance efforts. The approach of scripting used during test automation has effect on costs.

Various framework/scripting techniques are generally used:

The Testing framework is responsible for:[16]

Test automation interface are platforms that provide a single workspace for incorporating multiple testing tools and frameworks for System/Integration testing of application under test. The goal of Test Automation Interface is to simplify the process of mapping tests to business criteria without coding coming in the way of the process. Test automation interface are expected to improve the efficiency and flexibility of maintaining test scripts.[17]

Test Automation Interface consists of the following core modules:

Interface engines are built on top of Interface Environment. Interface engine consists of a parser and a test runner. The parser is present to parse the object files coming from the object repository into the test specific scripting language. The test runner executes the test scripts using a test harness.[17]

Object repositories are a collection of UI/Application object data recorded by the testing tool while exploring the application under test.[17]

Tools are specifically designed to target some particular test environment, such as Windows and web automation tools, etc. Tools serve as a driving agent for an automation process. However, an automation framework is not a tool to perform a specific task, but rather an infrastructure that provides the solution where different tools can do their job in a unified manner. This provides a common platform for the automation engineer.

There are various types of frameworks. They are categorized on the basis of the automation component they leverage. These are:

Read the rest here:

Test automation – Wikipedia, the free encyclopedia

 Posted by at 1:47 am  Tagged with:

Technology | Define Technology at

 Technology  Comments Off on Technology | Define Technology at
Mar 262016

Contemporary Examples

And it finishes second, behind New York, for technology Innovation.

But Shawn and Craig, 47, are accused of being interested in technology as well.

Her reveals the sometimes blind, unsettling way love and technology merge.

Yet equal access to education and technology still remains a challenge.

The second feature is how to translate the technology efficiently: how to harness the power of this device for practical use.

British Dictionary definitions for technology Expand

the application of practical sciences to industry or commerce

the methods, theory, and practices governing such application: a highly developed technology

the total knowledge and skills available to any human society for industry, art, science, etc

Derived Forms

technological (tknldkl) adjectivetechnologically, adverbtechnologist, noun

Word Origin

C17: from Greek tekhnologia systematic treatment, from tekhn art, skill

Word Origin and History for technology Expand

1610s, “discourse or treatise on an art or the arts,” from Greek tekhnologia “systematic treatment of an art, craft, or technique,” originally referring to grammar, from tekhno- (see techno-) + -logy. The meaning “science of the mechanical and industrial arts” is first recorded 1859. High technology attested from 1964; short form high-tech is from 1972.

technology in Science Expand

The use of scientific knowledge to solve practical problems, especially in industry and commerce.

The specific methods, materials, and devices used to solve practical problems.

technology in Technology Expand

jargon Marketroid jargon for “software”, “hardware”, “protocol” or something else too technical to name. The most flagrant abuse of this word has to be “Windows NT” (New Technology) – Microsoft’s attempt to make the incorporation of some ancient concepts into their OS sound like real progress. The irony, and even the meaning, of this seems to be utterly lost on Microsoft whose Windows 2000 start-up screen proclaims “Based on NT Technology”, (meaning yet another version of NT, including some Windows 95 features at last). See also: solution. (2001-06-28)

See the original post here:

Technology | Define Technology at

OpenFire Jitsi as Skype(desktop sharing) and Temviewer …

 Jitsi  Comments Off on OpenFire Jitsi as Skype(desktop sharing) and Temviewer …
Mar 182016

Openfire Jabber/XMPP is a server written in JAVA. This is free software and is also official support. Management has a WEB panel and it works on 9090 (http) and 9091 (https) ports.It supports Plugins(extensions), SSL/TLS, can connect to the database(Oracle, MSSQL, PostgreSQL, DB2, Sybase ASE, MySQL or internal database HSQLDB) via JDBC, can connect LDAP groups and filter by groups, has the ability of users registration based on to different sources and supporting different languages. Most of the management is done via the web interface. The official website is


Supported client programs:

Add SRV records in your DNS server as follows: openfire IN A IN SRV 0 0 5269 IN SRV 0 0 5222 IN SRV 0 0 5269

Before all configuration we will create MySQL database, user and password because we will use this in next configurations: mysql -uroot -p mysql> CREATE DATABASE openfire; mysql> GRANT ALL PRIVILEGES ON openfire.* TO [emailprotected] IDENTIFIED BY 0penfire0bepassword; mysql> FLUSH PRIVILEGES;

Before the installation absolutely update the ports. cd /usr/ports/net-im/openfire Go to the port folder make config choose the modules make install install

echo openfire_enable=YES >> /etc/rc.conf Add to the startup /usr/local/etc/rc.d/openfire start Start the daemon

sockstat -l | grep openfire Check for listen openfire java 56187 26 tcp4 *:9090 *:* openfire java 56187 29 stream (not connected)

Then go to the page. You will get the following page (select English and click the continue button):

Write domain name and click the Continue button:

To select different type of database select the Standart Database Connection and click the Continue button:

The selection MySQL database. Write username, password and database URL as the following syntax and click the Continue button: jdbc:mysql://localhost:3306/openfire?rewriteBatchedStatements=true:

Select Default and click Continue button:

In the opened page add the email for administrator account, type password twice and click the continue button. Administrator login name will be admin:

Last configuration page will be as below. Go to the Login to the admin console for login:

Write admin user name and password for this user:

At the end the opened page will be as below:

Create some users as the following template:

Add group:

Then go to this group and add created users to this group:

Now configuration for client program. Download Spark client program from link and install.

As the following screen configuring user faxri.iskandarov:

Check monitoring service plugin (Must be installed):

Then go to the Server -> Archiving -> Archiving Settings section and select logging between our XMPP clients (as the following screen):

Even you are able to get meetings through web. For this go to the link. This channel will not be crypted. For crypted channel go to the link.

Note: If you are using Jitsi client program you dont need any plugin for call and any SIP number. Because Jitsi client can call with audio/video over XMPP like as Microsoft Lync and you can share your desktop like as Skype. You can download jitsi client program via official page. We will configure jitsi program at next sections.

In general plugin configurations under the Server tab. Also go to the Server -> Jitsi Videobridge section. Add the SIP username, password and SIP registration server and click save button:

In the Sessions -> Tools -> Send Message section you can send broadcast message to all users. As the following screen:

If we want to set SIP number for each user, before this we must add XMPP users to our system and then go to the Server -> Phone -> Add new Phone Mapping section and create SIP users(SIP and XMMP on the same server). For example we will add SIP number for existing namaz.bayramli XMPP user.

Then download Jitsi XMPP/SIP client program to your Windows machine and configure as follows (The official page: : File -> Add new account > XMPP -> XMPP Username Password -> Add

As you see XMPP user namaz.bayramli is ready:

Then click File -> Add contact and add the credentials as the screen, click Add button (Of course, user exists in our system):

The previous configuration we did for [emailprotected] and added to his user list [emailprotected]. At the end call from one client to another with audio/video and share your desktop:

This is desktop sharing:

And if you want to control other point from jitsi client, just select Enable desktop remote control checkbox. After that you can control other point as teamviewer.

For example if you want to use SIP configuration together XMPP, choose again Tools -> Options -> Add -> SIP and write SIP username and password (As the follows page). Just change domain name to yours:

As you see XMPP and SIP accounts is together:

OpenFire Jitsi as Skype(desktop sharing) and Temviewer …

 Posted by at 12:43 pm  Tagged with:

HobbySpace – Astronomy

 Astronomy  Comments Off on HobbySpace – Astronomy
Mar 152016

Astronomy is obviously the oldest and most popular of space hobbies. Even the occasional backyard skywatching by unaided eye or a small telescope can be a marvelous experience.

There are innumerable web sites already devoted to general astronomy and so we start below with just a guide to some introductory sites and a few of the major astronomy link lists.

We will focus here more on sites related to astronomy projects where amateurs can make significant contributions.

One of the most wonderful aspects of astronomy is that amateurs still make significant contributions. Comets, for example, are often discovered by non-professional astronomers.

We put many topics involving near-earth and solar system based phenomena, e.g. meteor show observation, aurora investigation, etc., into the Space Science section. (This is an arbitrary division but is consistent with the HobbySpace emphasis on our solar system.)

Note that the Satellite Watching section also includes astronomy related information and links such as tracking programs, utilities and references. In addition, the offline and online software sections include some star chart program links.

Astronomy related sections at HobbySpace

ASTRONET Carl Koppeschaar’s ASTRONET provides links to astronomy and space sites. Also, daily news reports available. Sections include

Astronomy Cafe Sten Odenwald’s cafe offers you some exploration with your coffee:

“Have you ever wondered what it might be like to be an astronomer? Do you have any questions that you would like an astronomer to answer? Would you like to hear the latest about hyperspace, black holes, time travel and quantum cosmology? Well, at the Astronomy Cafe you’ve come to the right place! Sit down, grab a cup of coffee, and have a far-out adventure at the outer frontier of space and time.” – web site.

Astronomical Society of the Pacific A very large and active organization with members worldwide. Their Mercury Magazine is a bi-monthly with articles accessible by a wide audience. A selection of the articles are online. There is also an online shop for posters, software, globes, etc.

Cloudy Nights Telescope Reviews Great site with lots of resources such as:

An astronomy addition to Google Earth.

Griffith Observatory This observatory & planetarium is dedicated to public education in astronomy and space exploration. Sky Information

Guide to the Universe Annemie Maertens takes you on trips through our galaxy and on out into the universe. Beautiful images and descriptions of the sights along the way. (In both Dutch and English)

Inconstant Moon Beautifully designed site that offers multimedia tours of the lunar surface. Includes “maps, photos, explanations, animations, selected links and even music”.

Que tal in the Current Skies An entertaining and readable monthly newsletter for the casual backyard astronomer. Gives the highlights of night skys for the coming month.

Rose Center for Earth & Space New York’s famous Hayden Planetarium at the American Museum of Natural History has been replaced with the $210 million Rose Center. The center includes a new Planetarium and much more. The web site describes the new facility and also offers many online activities and resources.

SEDS Galaxy The website for the Students for Exploration and Development of Space (SEDS) provides a broad array of astronomical related links. Also, see the astronomy images in their archive.

Stig’s Sky Calendar Stig Ottosen’s site is dedicated to his Java astronomy and space events calendar program that provides info on happenings both celestial and on the ground (e.g. upcoming conferences.)

“Use the Sky Calendar to keep yourself up to date on local and global sky events. It will display sunrise/sunset, twilight and lunar phase and visibility at a glance, and also includes a Planisphere, Planet Finder and Planet Round-up display. You can even customize your sky calendar setup with My Sky Calendar.”

There is both an online and offline version.

SkyLights Professor Jim Kaler provides this site for amateur astronomers. Includes weekly updates and astronomy news.

StarDate The University of Texas McDonald Observatory presents the popular StarDate radio show about skywatching. This web site provides lots of astronomy links and useful tips, especially for the backyard astronomer.

The Starpages An enormous searchable database for space and astronomy web resources. Called the “astronomy yellow pages”. Sections nclude:

The Telson Spur — The Snark Hunter’s Page Link list site with an enormous number of astronomy and space & astronautics links, arranged in an innovative classification scheme. See, for example, sections on Amateur Astronomy, Sky&Weather.

John Walker’s Fourmilab Programs John Walker offers several online and offline (freeware) astronomy programs, as well as interesting information. See, for example,

Microsoft will release this tool in the spring of 2008. It sounds like it will be a powerful competitor to Google Sky

Astronomy Magazines The websites for astronomy magazines typically provide lots of information and resources for astronomers ranging from the beginner to the pro.

Astronomy Day (April 16th) + Globe at Night April 16th each year is the time to celebrate our cosmos and the hobby of astronomy and to participate in astronomical observations.

They developed a very elaborate website with many resources that are still available.

to go outside, look skywards after dark, count the stars they see in certain constellations, and report what they see online. This Windows to the Universe Citizen Science Event is designed to encourage learning in astronomy!

It is part of the Citizen Science program at Windows to the Universe.

Dark Sky Preservation Light pollution has caused most of the cosmos to fade from view for people who live in urban/suburban areas. Extraneous night time illumination, e.g. streetlights that send wasted light upward rather than reflecting it downward, reduces the sensitivity of not only scientific telescopes but of our own eyes to see the dimmer stars and Milky Way from your back yard.

Here are resources that discuss the problem and efforts to combat it.

Organizations for amateurs and students

Astronomy Tourism – Eclipses, Northern Lights, Meteor Showers, etc. It is becoming more and more popular to travel to some exotic location to observe an astronomy related event. The most common such trips are to areas where eclipses will be visible, but now these also include expeditions to view aurora and meteor showers.

Orrery (Solar System Simulator) An Orrery shows the planets and their orbit around the sun. Mechanical Orreries have been around for centuries, typically as beautiful, clockwork-like devices in brass and wood.

Here’s a big orrey project meant to run for a long, long time: Long Now > Projects > Clock > Orrery

Now one can find them simulated in software but there are still mechanical versions around. The software versions offer a lot more options but a mechanical Orrery offer a more tangible, intuitive and esthetic experience.

Miscellaneous lunar info and resources:

Science Topics Here are some miscellaneous astronomy related science topics of interest

Read this article:
HobbySpace – Astronomy

The Tor Browser: Tor Browser –

 Tor Browser  Comments Off on The Tor Browser: Tor Browser –
Jan 282016

The Tor Browser makes the tricky work of surfing the Web anonymously as easy as using any other browser, but with a significant performance hit.

Jan. 26, 2016

Need to hire an assassin, buy some contraband, view illegal porn, or just bypass government, corporate, or identity thief snooping? Tor is your answer. Tor, which stands for “The Onion Router” is not a product, but a protocol that lets you hide your Web browsing as though it were obscured by the many layers of an onion. The most common way to view the so-called Dark Web that comprises Tor sites is by using the Tor Browser, a modded version of Mozilla Firefox. Using this Web browser also hides your location, IP address, and other identifying data from regular websites. Accessing Tor has long been beyond the ability of the average user. Tor Browser manages to simplify the process of protecting your identity onlinebut at the price of performance.

What Is Tor? Ifyou’re thinking that Tor comes from a sketchy group of hackers, know that its core technology was developed by the U.S. Naval Research Lab and D.A.R.P.A.. The Tor Project non-profit receives sizeable donations from various federal entities such as The National Science Foundation. The Tor Project has a page listing many examples of legitimate types of Tor users, such as political dissidents in countries with tight control over the Internet and individuals concerned about personal privacy.

Tor won’t encrypt your datafor that, you’ll need a Virtual Private Network (VPN). Instead, Tor routes your Internet traffic through a series of intermediary nodes. This makes it very difficult for government snoops or aggressive advertisers to track you online. Using Tor affords far more privacy than other browsers’ private (or Incognito) modes, since it obscures your IP address so that you can’t be trackedwith it. Standard browsers’ private browsing modes discard your cached pages and browsing history afteryour browsing session.Even Firefox’s new, enhanced private browsing mode doesn’t hide your identifiable IP address from the sites you visit, though it does prevent them tracking you based on cookies.

We tested a standard Windows installer, with choices to create desktop icons and run the browser immediately. The browser itself is a heavily modified version of Firefox 38.5 (as of this writing), and includes several security plug-ins as well as security tweaks such as not caching any website data. For a full rundown of the PCMag Editors’ Choice browser’s many features, read our full review of Firefox.

Before merrily browsing along anonymously, you need to inform Tor about your Webconnection. If your Internet connection is censored, you configure one way, if not, you can connect directly to the network. Since we live in a free societyand work for benevolent corporate overlords, we connected directly for testing. After connecting to the Tor relay system (a dialog with a progress bar appears at this stage), the browser launches, and you see theTor project’s page.

The browser interface is identical with Firefox, except with some necessary add-ons installed. NoScript, a commonly used Firefox add-on, is preinstalled and can be used to block most non-HTML content on the Web. The green onion button to the left of the address bar is the Torbutton add-on. It lets you see your Tor network settings, but also the circuit you’re using: Ourcircuit started in Germany and passed through two different addresses in the Netherlands before reaching the good old Internet. If that doesn’t suit you, you can request a new circuit, either for the current session or for the current site. This was one of our favorite features.

One thing we really like about the Tor Browser is how it makes existing security and privacy tools easier to use. NoScript, for example, can be a harsh mistress, who can bedifficult to configure, and can break websites. But a security panel in the Torbutton presents you with a simple security slide. At the lowest, default setting, all browser features are enabled. At the highest setting, all JavaScript and even some image types are blocked, among other settings. This makes it easy to raise or lower the level of protection you need, without having to muck around in multiple settings windows.

Everything you do in the browser is tested for anonymity: When we tried full-screening the browser window, a message told us that that could provide sites a way to track us, and recommended leaving the window at the default size. And the project’s site specifically states that using Tor alone doesn’t guarantee anonymity, but rather that you have to abide by safe browsing guidelines: don’t use BitTorrent, don’t install additionalbrowser add-ons, don’t open documents or media while online. The recommendation to only visit secure HTTPS sites is optionally enforced by a plug-in called HTTPS Everywhere.

Even if you follow these recommendations, though, someone could detect the simple fact that you’re using Tor, unless you set it up to use a Tor bridge relay. Those are not listed in the Tor directory, so hackers (and governments) would have more trouble finding them.

One thing we noticed while browsing the standard Web through Tor was the need to enter a CAPTCHA to access many sites. This is because your cloaked URL looks suspicious to website security services such as CloudFlare, used by millions of sites to protect themselves. It’s just one more price you pay for anonymity.

We also had trouble finding the correct version of websites we wished to visit. Directing the Tor Browser to, for example, took us to the Netherlands localization of our website. We could not find any way to direct us back to the main URL, which lets you access the U.S. site.

Tor hidden sites have URLs that end in .onion, preceded by 16 alphanumeric characters. You can find directories of these hidden sites with categories resembling the good old days of Yahoo. There’s even a Tor Links Directory page (on the regular Web) that’s a directory of these directories. There are many chat and message boards, but you even find directories of things like lossless audio files, video game hacks, and financial services such as anonymous bitcoin, and even a Tor version of Facebook. Many onion sites are very slow or completely downkeep in mind that they’re not run by deep-pocketed Web companies. Very often we clicked an onion link only to be greeted with an “Unable to Connect” error. Sinbad helpfully displays a red “Offline on last crawl” bullet to let you know that a site is probably nonfunctional.

As for browser benchmarks, the results hew to Firefox’s own performance, with near-leading performance on all the major JavaScript tests, JetStream and Octane, for example. Onourtest laptop, the Tor Browser scored 20,195 on Octane, compared with 22,297 for standard Firefoxnot a huge difference. The Tor network routing is a far more significant factor in browsing performance than browser JavaScript speed. That is, unless you’ve blocked all JavaScript.

Keep in mind, though, that the Tor Browser is based on the Firefox Extended Support Release versions, which updates less frequently so that large organizations have time to maintain their custom code. That means you don’t get quite the latest in Firefox performance and features, but security updates are delivered at the same time as new main versions.

There’s a similar story when it comes to standards compatibility: On the site, which quantifies the number of new Web standards supported by a browser, the Tor Browser gets a score of 412, compared with 468 for the latest Firefox version. You may run into incompatible sites, though. For example, none of the Internet speed connection test sites performed correctly in the Tor Browser.

Of course, you pay a price of extra setup and slower performance with the Tor Browser, but it’s less onerous than you may think. And the included support for fine-grain privacy and security protection is excellent. If you take your online privacy seriously, you owe it to yourself to check out the Tor Browser. For standard, full-speed Web browsing, however, check out PCMag Editors’ Choice Web browser, Firefox.

Go here to read the rest:
The Tor Browser: Tor Browser –

A Skype alternative worth its salt: Jitsi | usability …

 Jitsi  Comments Off on A Skype alternative worth its salt: Jitsi | usability …
Sep 052015

Ive been using Skype, Google Talk and Facebook chat for years to communicate with friends and family. Theyre all convenient, reliable and easy to use. But there is a big problem: They are all very easy to record and monitor by 3rd parties. We now know that:

So if you happen to live in a surveillance state (think countries of the Arab Spring, think UK with their repeated attempts to introduce surveillance of their citizens, think USA with their record-breaking demands for your personal data from all of the above service providers (Microsoft, Google and Facebook)) then you can expect that all your online communications with your loved ones (voice calls, video calls, text chats) are recorded and stored, or at least eavesdropped upon. Theyre all great free services that allow you to keep in touch with people, with one caveat: the government is listening in.

If you have no problem with that, perhaps because you subscribe to the flawed I have nothing to hide school of thought, read no further.

If you feel that being spied upon constantly, and having no reasonable expectation of privacy for your online life is not cool, read on.

The work of thousands of visionaries (starting with people like Richard Stallman in the 70s) has today given us the free tools to protect our online communications to a reasonable degree. These are not tools to stop a police investigation against you from succeeding these are tools that empower you to opt-out from the surveillance-by-default communications channels most of us use, and instead keep your private thoughts and words only between yourself and your loved ones.

The easiest one to get us started is Jitsi.

Jitsi gives you voice calls, video calls, instant text messages and group chats. It therefore covers 100% of the communication capabilities of Microsofts Skype, Google Talk, Facebook Chat, IRC channels and the like. Use Jitsi, and you dont need to use any of these again.

Why switch to Jitsi?

Because it protects your privacy as much as possible. If you and your loved ones use Jitsi, you can:

As an additional benefit, its great to have all of your instant messaging contacts in one window, and Jitsi gives you that. It also runs on Windows, MacOSX and GNU/Linux.

Start using Jitsi instead of Skype, Google Talk and Facebook Chat and stop corporations and governments collecting, storing and analyzing the thoughts you share with your loved ones.

PS: You can only have private communications if both ends of the chat/voice/video call support this. If both you and your loved ones use Jitsi, voice & video calls are private by default. For text chats, you will have to click the lock icon in your chat window (as shown below) until it displays a closed lock state.

PPS: No lock icon? That probably means that the person you are chatting with is not using Jitsi or a similar program that can protect your chats with OTR. You can only have a private conversation if both ends support OTR.

PPPS: Looking for something like Jitsi for your smartphone? For private text messaging (using the Off The Record protocol) look at ChatSecure for iPhones or GibberBot for Android phones. For private voice calls on the Android, look into csipsimple and Moxie Marlinspikes RedPhone. Remember, both ends of the conversation need the same technology to create a private channel.

Like Loading…


Go here to read the rest:
A Skype alternative worth its salt: Jitsi | usability …

 Posted by at 7:43 pm  Tagged with:

Jitsi Configuration and Review – Callcentric

 Jitsi  Comments Off on Jitsi Configuration and Review – Callcentric
Aug 302015

This setup guide is based on the Jitsi stable version on the Windows platform. Other platforms should have a similar infterface. This setup guide assumes you have properly installed the application on your operating system of choice and have gotten any audio issues resolved before attempting to configure Jitsi for use with Callcentric.

Help / Support: Jitsi documentation

***If this is not the first time running Jiitsi then on the main interface, please click on Tools > Options (on Mac OSX, please click on Jitsi > Preferences):

Then choose Add to add a new account. Select SIP from the dropdown list and continue to Step 2.

Username: This is either the default extension 1777MYCCID OR 1777MYCCIDEXT, where 1777MYCCID is the 1777 number assigned to you by Callcentric and EXT is the three digit extension you are trying to register this UA to.

For example: 17770001234101 would register to extension 101 on account 17770001234.

You cannot register to your account using only the extension number.

Password: Enter your extension SIP Password here. Your extension SIP password is the password you created for the extension you are trying to use. You may edit the SIP password you wish to use in by logging into your My Callcentric account and clicking on the Extension menu link and then modifying the appropriate extension.

After specifying your username/ password, click on the Sign in button on the bottom of the Sign in screen.

On the main interface, please click on Tools > Options (on Mac OSX, please click on Jitsi > Preferences). From there, please select your Callcentric profile and click on the EDIT button on the bottom of the Options page:

Keep alive method: REGISTER Keep alive interval: 60 Disable/uncheck: Enable support to encrypt calls

Click on the Next button, which should bring you to the Summary window.

Click on the Sign in button to finish.

PCMU/8000 telephone-event/8000

Once you have made these changes, please click on the Video tab and disable all video codecs.

After making the above changes, please close out the Options window, and go back to the main interface.

Go here to read the rest:
Jitsi Configuration and Review – Callcentric

Jitsi SIP Softphone Review – Tech

 Jitsi  Comments Off on Jitsi SIP Softphone Review – Tech
Aug 302015 Commons Rating

Visit Their Website

Jitsi is a Java-based communication tool that offers a lot of features and allows SIP-based calls. Jitsi supports voice and video calls and gives all the functionalities of an Instant Messaging software. It offers a nice interface and runs on many platforms. It also offers conference calls over SIP and allows you to connect to many other networks including Facebook, Google Talk, Windows Live, Yahoo!, AIM and ICQ.

Jitsi is a nice tool for integrating all your communication needs into one application. Jitsi is open source and is therefore free.



Jitsi offers a very simple but nice-looking interface, with basic features and easy controls for configuring the tool and communication. Download and installation are straightforward and easy, and it is also easy to configure your SIP settings. You can use Jitsi with any SIP account.

Jitsi supports many IM protocols and works with many other networks, including Facebook, Google Talk, Windows Live, Yahoo!, AIM and ICQ. This makes it possible to call and contact your friends without having to change tool.

Jitsi is free and open source. Having a look the source code of tools like this is an interesting adventure for programmers who want to work on VoIP applications. Being Java-based, the application works on most operating systems.

Jitsi offers privacy and encryption for calls. It uses the ZRTP encryption, and is one of the rare SIP clients to offer something for security.

With Jitsi, you can use your computer and Internet connection to make free voice and video calls through SIP. Just get a SIP address and register with Jitsi. You can then communicate with your other friends using SIP or with people on the other networks mentioned above. You can also use Jitsi with Google Voice to call regular landline and mobile numbers.

Jitsi supports voice communication, video conferencing, chat, IM network, file transfer and desktop sharing.

The application is a little bit slow compared to others of the kind, due to it being Java-based and therefore interpreted. But if you have a powerful computer, you wont notice it. Also, you dont get to more detailed options where you can select codecs and other technical things. But you will be happy if you are not geeky enough for that.

Visit Their Website

Go here to see the original:
Jitsi SIP Softphone Review – Tech

Jitsi | Tiki Suite

 Jitsi  Comments Off on Jitsi | Tiki Suite
Aug 302015

See also Jitsi provisioning via Tiki

Jitsi (previously SIP Communicator) is a cross-platform VOIP, videoconference, desktop sharing and chat client.

Jitsi is a core part of the Tiki Suite.

Protocols supported include SIP, XMPP/Jabber/Google Talk/Facebook chat, AIM/ICQ, Windows Live, Yahoo! Messenger and Bonjour.

Other features include: Call recording, Call & chat encryption, Noise suppression, Echo cancellation, File transfer, multi-user chat, Desktop streaming, Presence, Conference calls, Integration with Microsoft Outlook and Apple Address Book, Support for LDAP directories, Support for Google Contacts, On-line provisioning, Systray notifications, IPv6 support, Spell checker and many more.

License: LGPL


To try out Jitsi via XMPP (with VOIP, videoconference, desktop sharing, etc.) you can use a Gmail account (which is also a XMPP account) or the service. Juts create an account and use that username at as jabber account in the Jitsi application.

If you are using Gmail, or Google for domains, use the Google Talk option in Jitsi. If you are using or a generic XMPP server, use the Jabber option in Jitsi.

A port for Android is in alpha

Jitsi is focused on a rich feature set, standards compliance and security.

There is the base package and 2 options. Many organizations will only need the base package, and they can add one or both options as they need them.

Advanced features (such as ZRTP encryption) require the client to support, but basic communication can be achieved by any XMPP client, including via a web interface.

This adds a web interface for Audio-Video-Chat collaboration with folks outside the team, by sending them a URL and using WebRTC

Alternatively, you can use BigBlueButton for this use case. BigBlueButton is more mature, very well integrated in Tiki and more focused towards online Learning. It is very easy to install, but it requires another server.

See the original post:
Jitsi | Tiki Suite

 Posted by at 7:46 pm  Tagged with:

Pierre Teilhard De Chardin | Designer Children | Prometheism | Euvolution