Monday, January 12, 2015

Revenue from cloud software SAP significantly rise – Telegraaf.nl

WALLDORF (AFN) – SAP, the largest producer of business, in the fourth-quarter revenue from cloud services to rise sharply. That made the German company said Monday, based on preliminary figures

To Exact Holding & gt detail. <- - Google_ad_section_end ()>;

Sales at the cloud services, in which software is delivered over the internet, increased by 72 percent to 360 million euros compared with a year earlier. This cloud sales were higher than analysts had expected. On January 20, SAP comes with final figures and its financial expectations.

The figures of SAP were well received on the stock exchange in Frankfurt. The share was 4.5 percent in afternoon trading in the plus

.

class=”clear”

LikeTweet

Hague investment company takes about Minox Software – Financieele Dagblad (Registration)

It should come as no change in strategy. Investment remains, as always, wide spread. But the Hague investment company Ecart, textile magnate Jan Zeeman known as participant, but will accentuate. Was formerly the million capital to companies in the old economy, now the investor emphatically opened for the information and technology.

The choice is underlined with the acquisition that makes Ecart publicized today the acquisition of Minox Software in Veenendaal. This maker of accounting software Ecart explains some € 2.5 million on the table. It’s in a relatively short time the third participation in the IT sector. Previously took Ecart interests Login Consultants and ShipitSmarter. “Our investments in technology corner are booming,” says Rolf Metz (45), director and shareholder of LPM Trace, the registered owner of Ecart.

Strict requirements

The investor has waited long with it. Earlier latching was not possible because the industry did not meet the requirements of Ecart participations. The pioneers in the IT had no money to invest, and could not boast a great track record. That’s different now. The automation where Ecart money stops, have a positive cash flow and the boards participate fully with it. “The automation industry has become for us a normal business,” says Metz.

That earn serious money falls Ecart shows with BVA Auctions, which is application of IT has become the largest internet auction in the Netherlands. After five years, this interest has been sold to Bencis Capital with a net return of 57.3% per year. It is one of the largest indexes of the more than twenty-year history of Ecart.

When purchasing BVA Ecart paid in 2009, the prevailing multiple of five times the operating profit (EBIT). This factor is now, after a continuous growth of the auction sales, a lot higher. What would not say Metz. It confirms an ancient wisdom: fast growing companies in the IT, prevent higher multiples of the hand

New Internet bubble?

Afraid of a new dotcom bubble Metz is not. The software portfolio companies are fairly insensitive cycle. Minox has for its accounting modules 5,000 customers include administrative offices and entrepreneurs in SMEs. That should provide a stable base. And Login Consultants has developed its own software, which is standard practice raised by major peers in the US, including Microsoft, Citrix and VM Ware. Revenue from software subscriptions shows an annual doubling. Log-founder Eric-Jan van Leeuwen has moved to Silicon Valley to the spot to serve large customers.

Specialized competition

Ecart must include it in the IT sector against other specialized fund managers such as Main Capital and Newion Investments . They also anything but sit still. Main made just last week announced that it has acquired a majority interest in software house OnGuard while Newion in 24iMedia, a developer of TV app’s got. “We are all fishing in the same pond,” admits Metz. But pushed up prices, he says no. “The need for capital is many times greater than the supply. Many a director and major shareholder will, now the crisis ebbs, his company sell or expand. In both cases, money is needed.

Unlike Main and Newion remains Ecart a general participation fund with diversified interests that include posting , packaging and facility services. Differential has € 30 million under management, raised by wealthy thirty (old) entrepreneurs. Since its founding in 1993, the average net yield amounted to 11% per year. In the crisis years was the result back to a lower valuation of the portfolio and two bankruptcies, namely Giralis (treatment of dyslexia) and trading Atlas Magnetics. Ecart also had a loss to say goodbye to the Vrijbuiter, a chain of camping stores.

LikeTweet

Sunday, January 11, 2015

Software Update: 2:16 Calibre – Tweakers

Calibre logo (60 pix) Version 2.16 of Calibre is true. Calibre is an open source and cross-platform e-book management. It can include searching all relevant information and cover images, and convert e-books to make them suitable for different types of e-readers. The program also newspapers, magazines and news articles based on converting RSS feeds in e-book format, and can book be purchased at the famous shops.

In version 2.0 include switched to Qt5 for user interface and improvements with Android devices that are attached to OS X. In this issue further, the following changes and improvements:

New Features
 

  • Edit Book: Add support for snippets – small pieces of text That Are or at re-used.
    You can now create your own snippets and insert them into the text with only a few keystrokes. The snippets include support for placeholders That You can jump between. See here for details.

  •  
Bug Fixes
 
  • Edit Book: When Importing files and the book HAS an orphaned entry in the manifest for that file, but the file itself is not present, rename the file INSTEAD OF erroring out. Closes tickets: 1407860
  •  

  • Book Details panel: Fix author left with URL schemes other than http or file Preventing context menus from working. Closes tickets: 1408174
  •  

  • PDF Output: Make the minimum height for headers and footers scale with the base font size
  • .
     

  • Fix a typo That the Cybook Muse been prevented from being detected on some computers. Closes tickets: 1407435
  •  

  • Fix regression in 2:15 That broke caliber on OS X 10.7 and 10.8. Closes tickets: 1407102
  •  

New news sources
 
  • Ajans Firat Haber and edebiyat by asalet_r
  •  

Improved news sources
 
  • Various updated Turkish news sources
  •  

  • tyzden
  •  

  • Sueddeutsche Zeitung
  •  

Calibre 2.0 screenshot (620 pix)

LikeTweet

Saturday, January 10, 2015

Software Update: Tribler 6.4.1 – Tweakers

The application relies on the BitTorrent network to exchange data. A BitTorrent network, then Connect you with several “peers” who offer the data you want to have: you get pieces of your data from every peer down (and it is your BitTorrent client that those pieces again sticking together) <. p> Each peer on the BitTorrent network to the IP address seen by those who connect with him.

To ensure anonymity, Tribler ensures that you no longer directly connects to the BitTorrent peers. Instead Connect you with an intermediate node that acts as a “proxy” for the communication between you and your BitTorrent peer. You BitTorrent peer sees no longer your IP address, but the IP address of the proxy.

If you are only using one proxy communicates with your BitTorrent peer, then that proxy still figure out what data you with whom exchanges.
With the slider in Tribler you indicate how many proxies must be between you and the BitTorrent peer. This makes it much harder to figure out what data you exactly exchanges: the BitTorrent peer sees only one (or more) proxies and proxy can not know whether you’ve sent the original request or that you yourself as a proxy acting for someone else <. / p>

Encryption is also applied to the exchanged data. Your Tribler client connects with multiple proxies (first layer) and communicate with each proxy a public encryption key with which the proxy must encrypt the data to you (your Tribler client then uses the corresponding private key to decrypt the data). Each of these proxies connects subsequently with another proxy (if you Tribler slider 2 or higher) and varies with each of those proxies again (other) public key. In this way, a proxy can not decrypt your data.

… at least that’s what I’ve understood it. The technique is similar to the Tor anonymizing network (“onion routing”).

As far as performance is IMHO still not great. With one proxy layer I took roughly 300 KB / s for torrents with many seeders where I got about 1.5 MB / s with BitTorrent. With 2 layer I took the 100 KB / s anymore. The performance of the whole network is highly dependent on the available proxies. As Tribler is popular, the performance should hit up.

LikeTweet

Friday, January 9, 2015

Software Sluiskil tunnel available – Duurzaamgebouwd.nl

Croon electronics enables as part of CBT (Combined BAM TBI) – the software for the Traffic and Tunnel Technical Installations (VTTI) of the Sluiskil tunnel in Zeeland Flanders, spacious available for the tunnel completion.

Before this onsite was available, the software is functionally tested in a virtual tunnel, built at the office in Roosendaal. It is remarkable that in the Netherlands the complete control and operation software for five months is available for delivery. The Sluiskil tunnel goes on May 23, 2015 open to traffic, 5 weeks earlier than planned.



Control Software

The software provides monitoring and operation of all VTTI in Sluiskil tunnel. The tests were conducted with a small team of specialists and client BV PPS, where subsystem for system commissioning has been part and is linked to the control and operation software Sluiskil tunnel. The full VTTI will be made in the course of the second week of January, in operation, after which system testing (SAT) are going to be carried out. After completion CBT maintains the installations 2 years. It involves a total of 54 plants in include signaling, control, security, lighting, ventilation, communications, energy supply and evacuation.

Traffic Bottleneck

The bridge at Sluiskil on the Ghent-Terneuzen is a bottleneck for traffic. The bridge is on average 23 times a day. The Sluiskil tunnel provides the solution. The tunnel consists of two tubes each with 2 lanes. The total length of the tunnel including ramps is 1330 meters, the deepest part is more than 33 meters below sea level. The Sluiskil tunnel will be comfortable for road users. When entering the tunnel is not dark; the inside is deviating from the nearby Westerschelde, finished with light panels. The tunnel has a control over the western access road building. On the east side is the technical area.

The Sluiskil Tunnel is a bored tunnel. Compared with despatched rectangle built tunnel there is more room for the technical installations above and below the lanes. These do not need to be placed in a corridor between the lanes. The round shape provides a challenge for the acoustic sound systems, because sound reflects earlier and speech intelligibility is required. Therefore, a special sound system is installed that uses the reflection of sound signals by means of specially shaped speakers.



composition

Combination BAM TBI vof (CBT) has been commissioned by Channel Sluiskil the Sluiskil tunnel for the Province of Zeeland. CBT is a combination of the two companies: Royal BAM Group and TBI Holding. Under the combination works together four companies: BAM Civil, Wayss & amp; Freytag, Croon and Mobilis.

BAM Civil and Mobilis care of the civil engineering work such as concrete work in and around the tunnel, the structures (overpasses, bridges, etc.) and road construction. Wayss & amp; Freytag kept drilling. Croon electronics provides the VTTI.

LikeTweet

Thursday, January 8, 2015

Poll: Away with software subscriptions – Computer Total

Of course, there is something to be said for such subscriptions. Especially for the developer is useful: it’m sure that the next update will be downloaded by a large group of people, even if it is chargeable. And people draw the line, they may stop supporting older versions.



Latest gadgets

But for the client, updates are very convenient. As you do, after all, you do not have to worry whether you have the latest version have on your PC, tablet or smartphone. Also, you are always assured of the latest technology and security.

But it is not always cake and egg. The power is more than ever companies: do you want to continue using the software, you can not avoid one – paid or privacy sensitive – update. Developers can deliberately make an incomplete version available to carry out yet another update shortly thereafter.



Free Letter

Is it a bad thing that developers get a license to do whatever they want because the customer anyway implements an update? Or is it convenient that they user always the very latest for can dish up without that having to do anything?

We are curious what you think. You can vote in the sidebar on the right, you can explain your choice below. An overview of the most beautiful places we reactions in Computer! Total number 3!

LikeTweet

Wednesday, January 7, 2015

Choose (open source) software means handing – Computerworld.nl

Opinion If you choose an OS, you have three flavors: one that you can work with them directly, one that much time is required or one that is completely free . The crux: you can always just two flavors to choose for your personal approach

As I wrote about my move from a MacBook Pro to. a Chromebook, I was of course criticism from some ideologues. I received responses from people who saw it as a switch to a proprietary system like I took Windows

Windows on the side

.

I would be very happy with a full open source solution, but one of my main requirements is that I no new full-time hobby after it have to keep in order to work with it. When I was almost 10 years ago put Windows on the side, it was mostly because I was spending too much time with updates, malware protection and repair of drivers after my children had used the PC for gaming.

I’ve always critically re-examined the use of GNU / Linux for my daily use. At every review I found that it was easy to install (it is becoming even easier) and easy to add applications. I’ve never had problems with malware, but somewhere in the life of the platform you’ll be causing a problem against which at best discomfort (sleep mode cuts) or in the worst case by the system boot problems.



From Ubuntu to Chromebook

I wanted pure open source software, so I took earlier this year Linux on my laptop. I bought a Samsung S5 Ultrabook, deleted Windows (Office as prohibited since 2005 in this house) and installed Ubuntu LTS 14:04. It worked fine, apart from the fact that the system was awakened by itself as I opened it. This laptop was suitable for tasks that are normally easily on a PC.

But mostly I just like the browser used, so I might as well have used a Chromebook. When upgrading to Ubunu 14:10 I brickte the device and I could not boot to an environment that I could restore the OS. After that I never went back.



Freedom of Choice

Free software is important. It gives you the assurance that you can choose technological solutions, rather than a producer or government makes that choice for you. But the fact remains that if you choose free software (which you should do) every technological solution requires you somewhere on hand in.

If you spend a lot of time and energy in learning a system can you almost get everything to work. But on the other hand, a solution that “just works” is a good choice. This often means that you curtail software freedom. Any technological decision comes ultimately amount that is optimized for one of the three points on this triangle. The time you have to spend on it, usability of the system and optimal freedom of software

Experience has taught me that I usually two points of this triangle can choose and the third has to offer. I choose to compromise with the time spent, and software freedom and practicality make important. The more I can towards free software, the better. But what does that mean in practice? There are three factors in optimal free software:

  • How much of the source code available? I can build the system and replaced, but in a way that it remains useful?
  • How often the system is improved? Be bugs and added improvements?
  • Are there alternatives to the ecosystem that are an option for me? If something is wrong and is not resolved, is migrating to an alternative possible?

Again, you can choose a rule two. Every software user must conclude that a compromise somewhere for him or her is acceptable. The important thing is that you know where you have handed on and why, so that you can continue to improve.



How to trolls

When it comes to ideology, you can if you quarrel the compromises where another has come to criticize. That is always possible. You’ll almost always find that the compromise of the other party is worse than yours – even if you’re not aware that you have dropped off, as many of my critics. It is better to accept the compromises of the other and to learn the motives of others. Sometimes they even right!

LikeTweet

Board Gun JSF does not shoot: software not ready – Automation Guide

: Correctly size the image ?? ->

The first Joint Strike Fighters will be operational this year. Well, operational … The board is now working gun yet, because Lockheed Martin is still not gotten the software for firing them to develop

.

This was reported by the US website The Daily Beast, which are message based on information from unnamed soldiers in the service of the US Air Force. A spokesman for the US Air Force and Lockheed Martin would not confirm the report.

According to specialists The Daily Beast has consulted, it is a problem of limited scope. JSF – which incidentally, officially called F35 Lightning II – due to its weight, relatively slow acceleration and lack of maneuverability in any case not suitable for air combat. For the Russian Sukhoi Su-30 is the ultra-modern device is not a party, they ask. Moreover – and perhaps why – the F35 enough ammunition for effective use of the board canon. The gun can fire 3,300 times per minute, but can take only ammunition for 180 times.

On the other hand it does mean that the F35 the first few years is not suitable for tactical air support to ground troops, when it is too risky to do that with his other weapons from a distance – such as own and enemy forces close opposing stand, ask the specialists.

Al written 24 million lines of code

The lack of software for a relatively simple function as the firing of the cannon board seems at first sight strange. But if you look at the size of the project, it is somewhat understandable. For the F35 have been written 24 million lines of code. Any addition or change is thus an enormous task. Last year, problems with the software already led to delays in the testing of the device. One of the zegsmannen The Daily Beast does not expect the code to control the onboard cannon, is ready for 2019 – if that date is already feasible.

LikeTweet

Monday, January 5, 2015

Main Capital assists in Management Buy-out OnGuard credit management software – Dutch IT channel

Main Capital III has a majority stake in credit management software company OnGuard International Holding BV (OnGuard). OnGuard offers credit management software solutions and has over the years built up an international clientele of more than 850 customers in over 42 countries. This transaction is a mezzanine loan attracted at Main Mezzanine Capital.

OnGuard was founded in 1993 and has offices in the Netherlands (Headquarters), London and Sydney. The flagship product is OnGuard Connext. OnGuard’s advanced software and services helps companies to optimize their Accounts Receivables Management; including credit, collections and complaints management and cash allocation.

Every day more than 12,000 users use the software that is available in multiple languages ​​and currencies. Among the major clients include Wolters Kluwer, BMW Financial Services, Sun Chemical, Avis Budget Group and Sodexo.

Credit Management Software

It’s OnGuard’s mission to serve their customers with a low risk, high value solution and continuously focusing on innovation and improving the quality of software and services. This transaction enables OnGuard be able to further internationalize its business in both direct sales and through partners. In recent years, OnGuard has built an international partner network with local partners in Italy, France, Denmark, Spain and Brazil. “Since we started in 1993 with the creation of software, OnGuard is focused on providing the best credit management software to our customers worldwide. The support of Main Capital offers new opportunities in terms of growth for the company and innovation for our customers . It underlines our ongoing commitment to optimize the working capital of our customers through integration of their Accounts Receivables says “David Taylor, CEO of OnGuard.

” If specialized software investor, we have gained much experience in the strategic development of companies in the Fintech sector. The objective is to OnGuard terms of business model, market position and degree of internationalization to bring a higher level, “said Charly Zwemstra, Managing Partner Main Capital Partners.

World

LikeTweet

Nvidia is focusing on smart cars with software and super chip – Apparata

Nvidia Super Chip
Nvidia with Tegra X1 unveiled its first super chip, especially the car industry must do this advantage in the future. The company also showed special software that can use carmakers.

The big CES is launched this week, but Nvidia could not wait to present their latest chip. Tegra X1 is based on the Maxwell design that we frequently encountered so far in desktops. Last year, the Tegra 1K was still presented, but Nvidia says that the X1 but twice as powerful as this model.

Laptops, Desktops and cars That
also allowed with eight 64-bit cores and more than 1 teraflops of computing speed. In comparison, the Tegra 1k only a computing speed of 365 gigaflops. In the future we will encounter the X1 in laptops and desktops, but also in smart cars, if it is to Nvidia.

 Nvidia Drive CX

The chip would namely powerful enough to control a variety of cameras and sensors simultaneously, which are arranged to drive a smart car from himself and his surroundings to keep an eye on. Due to the high computing power is even possible to recognize objects and fast to respond.

Drive Drive CX and PX
To make the smart car completely revealed Nvidia a digital dashboard (Drive CX) and an autopilot (Nvidia Drive PX). Car manufacturers may choose to use this computer to send their smart cars participated. Nvidia hopes Drive Drive PX and X to be published in the second quarter of 2015.

LikeTweet

Sunday, January 4, 2015

Software Update: 3:13 SUMo – Tweakers

The program is indeed often next. Sometimes the version numbers are just not quite right and it seems like there’s an update. A version 5.30.0 indicated as 5.3.0 has over soon tackle an update.
Sometimes also the version number totally not picked up properly. I would have installed a version 6 of a program while 11 is already out (and already installed in me).
Difficult it is when I of a program may not have purchased the latest version (newer is me not worth the money). Updates apply then only for those recent version while some programs still come out updates to older versions.

Despite these strange anomalies I use it anyway to help keep up-to-date because many updates are correct . However, it remains vigilant or said update is actually an upd ate. Programs that go into every error you can actually exclude.
 
 

LikeTweet

Software Update: NTLite 1.0.0 build 2362 beta – Tweakers

NTLite logo (75 pix) Dino Nuhagic is engaged in the development of NTLite, a program that allows users to create a custom built Windows 7-, 8- or 8.1 installation CD. Dino is not unknown in this area, because he is also the creator of nLite and vLite, who do the same, but for Windows XP and Vista.

NTLite may include removing unused components and hotfixes, updates and Adding drivers. It is also possible to already make many settings, apply tweaks and questions that arise when installing to answer, such as the registration key, user accounts and network settings. In this way, the program reduces installation time.

What is new is that NTLite also can customize an already installed Windows. Also new is that there are different versions. The basic version is free but has limited functionality. For example, there can be only a limited number of components to be removed and it is not possible to adapt an existing installation. The full version costs just under 45 euros and can be purchased a commercial license. The changelog for this release can be found below.



New
 
  • Unattended: Join Network (Workgroup / Domain, Auto fill supported)
  •  

  • Removals: System Preparation Tool (Sysprep)
  •  

  • Removals: Keyboard Filter AppShim
  •  

  • Removals: MPEG-2 Splitter
  •  

  • Tweaks: Taskbar settings in ‘All Users’
  •  

Fix
 
  • Removals: Sysprep Generalize issues
  •  

  • Removals: Share Server disabling Control Panel Users
  •  

  • Removals: CardSpace leftovers
  •  

  • Live Editing: registry loading issues
  •  

Change
 
  • Removals: TV tuner moved to Multimedia
  •  

  • Removals: WinSAT moved to Multimedia, detached from dependency Diagnostics
  •  

LikeTweet

Friday, January 2, 2015

Hacker develops software to bypass security iCloud – Nieuws.nl

It seems that no one iCloud account is more secure. A hacker has designed a tool that lets you bypass the security of Apple’s cloud service. That Metro reports.

The security hole iCloud where the hacker (called Prox13) use it, according to him “painfully obvious” writes Business Insider. The software he calls’ IDICT. “

Apple strengthened during September, security after leaked nude photos of celebrities. The new method Apple has not yet responded.

LikeTweet

Thursday, January 1, 2015

Gun JSF does not work because of missing software – Macworld

jsf

News but the ongoing failure around the notorious fighter JSF (or F-35) has a new chapter. The on-board gun will not work earlier than 2019, despite the fact that the plane next year is taken into use. Cause: The software is missing

Some of the software that needs the fighter JSF to perform operations, is not yet. ready. It involves Block 3F, it serves 25mm board canon. The software is not earlier than 2019, but the JSF is next year already in use by the US Marines. Writes The Daily Beast

.

Furthermore, the aircraft anyway little to the mounted gun, as there is only room for a limited ammunition. The gun can fire up to 3,300 bullets a minute, but only has room for 180 bullets.

The JSF has already incurred substantial delays, partly due to software errors. Earlier this year it was announced that there are no less than 8 million additional lines can be programmed in a part of the software. That went to Block 2B

LikeTweet

14 times the best free software for January – Computer Total

Tip 01: Small jpg or png

Swimming : Windows 7, 8 (.1)

There are several ways to reduce image files but in almost all cases, the quality deteriorates. This is not the case at Antelope! The program works on the lossless principle and that means that the quality is maintained. In contrast, files are much smaller than the original

.

Antelope supports PNG and JPG files. Drag the image files you want to optimize the Antelope window. Antelope shows the current size of your files in the Original size . Click on the optimization button and wait until Antelope your files have been processed. The new file size can be found in the New Size . Files will never be larger, smaller, or only the volume remaining in the worst case, unadjusted. It is always advisable to first try out optimization programs for photos on copies. It would be a shame if something goes wrong with your original photos.

Tip 01 Antelope reduces image files without quality loss.

Tip 02: Usb lock

Swimming : Windows Vista, 7, 8 (.1)

With the USB port, you can easily copy files to and from your computer. This is useful, but there is also a risk. For example you can get inside viruses accidentally. Also, anyone who copy quickly behind your computer you sit files to external storage. Removable Access Tool is a handy program to counteract this. You can have anything to do with USB storage block is set (using the Block USB storage devices ) or a read-only protection (using the Allow readonly ).

Installation is not required. Download the zip file, extract the contents and restart Removable Access tool through Windows Explorer by double-clicking on Ratool.exe. Adjust using Settings / Change password a password to operate Removable Access Tool, otherwise anyone can start the program and remove protection

Tip 02 Removable Access Tool gives you control over USB storage: completely block and or read-only access

Tip 03: Process Control

Swimming : Windows Vista, 7, 8 (.1)

Advanced computer users are familiar with the key combination Ctrl + Shift + Esc. This Windows Task Manager is started and you get control over all programs that are running. You see, among others, the processor load and how much memory is used. For the real experts, the program Process Lasso a step further. This program gives very detailed information about the background programs. Process Lasso is also useful in detecting faults or remove viruses. For example, right click and choose Terminate always to a program always terminate automatically. With Keep running you reach the opposite. In addition to the free version of Process Lasso is a Pro version with more features.

Tip 03 Process Lasso knows everything about programs running in the background

Tip 04:. Terminating Alarm

Swimming Windows 7, 8 (.1)

It’s a waste of energy to leave your computer for hours to no avail. Sometimes it is convenient that your computer is still equally remains active, for example, to get a download within. Shutdown8 give your taskbar a red on / off button. Allows you to turn off your computer immediately or reboot, but the most interesting options you can find behind the Timer . Allows you to show off your system with delay. For example, choose Timer / Exit 2 hours or Timer / Exit 30 minutes . A countdown box is displayed and after the timer your system is automatically disabled. You can also choose to sleep or into hibernation.

Tip 04 Shutdown8 turns your computer automatically, such as after ten minutes or after one hour.

LikeTweet

Samsung smart TVs comes equip with own Tizen software – NU.nl

That leaves the South Korean manufacturer know ahead of techbeurs CES starts to 6 January. Since Samsung will make the new Tizen TVs finally revealed.

Samsung has been working on Tizen and rest include some wearables with the software. In January, in India also the first Tizen phone.

The system is intended as a software for a variety of devices and now Samsung adds so that the smart TV stand. What change is going exactly remains equally unclear.

Samsung let alone know that there is a home screen recently viewed channels and programs and program recommendations. Screenshots of the system are not shared.



Sync

In addition, Tizen will for TVs easily sync with other devices via wifi and bluetooth. How this is different from current TVs is also not known. Samsung says that Tizen TVs automatically search for Samsung devices that are nearby and so additional images and information can give a smartphone or tablet.

The company sees Tizen TV primarily as a stepping stone to a broader vision in which the television is the central point for all smart devices in the home. Samsung also promises “simple collaboration with various partners for ultimate flexibility and unparalleled access”.



Cooperating

Concrete collaborations for Tizen still missing. It is also not clear whether Samsung itself will equip many household appliances with Tizen or that there are other companies that are going to make Tizen products. Tizen is an open source system.

does NU.nl from Sunday, January 5th report of CES gadget via a special file, and the tech section. To follow all the news surrounding the Consumer Electronics Show? Click in our mobile apps under this article on ‘Follow’ for the tag “Gadget Fair CES ‘

Tizen:. Samsung’s new trump card or just backup

See all expectations around CES gadget

By: NU.nl

LikeTweet