Monday, December 23, 2013

ChristMas Shopping Advice



christmas_gift_ideas_2012

Set a spending limit. This is vital unless you like the funny palpitations surprise bank statements or credit card bills tend to induce. No one is going to think any less of you for doing your shopping on a budget. If they do then you might want to question why exactly it is you include them on your list anyway.
Make a list. Like the head honcho of Christmas shopping himself, you should make a list and check it two or three times. Make sure each person you will give to is on the list. Be sure the items you choose are not above your spending limit. When you go out shopping, buy what is on the list and on the list only. One of the easiest ways overspend is through impulse purchases. If the item is not on your list, but happens to truly be perfect, bump another item from the list.
Bargains are your secret friend. One tendency that needs to be rooted out is the feeling that you must spend a certain amount per gift. Where did that idea come from? It is silly. If you find a gorgeous cashmere sweater on sale for 50% off, there is no need to spend the amount you saved on supplemental gifts. All this does is absorb funds and create unnecessary additional shopping. The sweater is enough. Don't feel guilty for not spending a certain amount; instead feel savvy for finding a smashing gift for a price that leaves a little something for a rainy day.
Start early. Christmas, and other gift giving occasions, occur on the same day every year. Why is that so many people are rushing frantically to the 24-hour Christmas Eve last chance sales? Unless you like the challenge and stress of doing your shopping with huge crowds of desperate and rabid shoppers, get it done early. The rationale that the sales are better if you wait just doesn't make any sense. Why take the risk that you may not have the time or selection to find what you really need? If you start early enough you can bargain shop much more effectively than if you wait to zero hour when the need to get something, anything eclipses all other concerns.
Shop online. Avoid the crowds and stores altogether and shop in your bunny slippers in the comfort of your own home. A few things you will avoid by staying home: fighting for parking, lost crying children, sharp elbowed fellow shoppers or less than helpful store clerks. A few of the pros virtual storefronts have to offer: savings in gas, many online stores have free shipping offers, special web only sales and offers, and perhaps the biggest advantage of all shopping and shipping to distant relatives without going to the post office yourself. Don't forget the list.
Speaking of the list...the following pages are Christmas Gift Ideas for everyone on your list

10 Incredible Stories of Animals that Were Arrested

The Cat that was Held Over a Mobile Phone Smuggling Plot at a Russian Prison






In June 2013, a criminal cat was detained by police after it was caught attempting to smuggle mobile phones and chargers into a Russian prison.

With a cat's natural athleticism and the agility needed to scale prison walls, picking an easily-turned feline seemed like an inspired choice to carry out the illegal operation. However, the plot was foiled when prison officials spotted the items taped onto the black and white cat's belly as it sat perched on top of a fence.

The animal was at the prison near the city of Syktyvkar in the Komi province, around 600 miles northeast of Moscow. Despite being caught in the act, it's likely that this particular feline will avoid a lengthy spell behind bars. (Link)


The Goats that were "Arrested" for Allegedly Damaging a Police Car
The Goats that were
In June 2013, three goats were detained by officers after they were accused of damaging a police vehicle.

The animals were grabbed and placed in a cage after Indian authorities became annoyed with their alleged persistent vandalism. The final straw came when the goats were blamed for damaging a brand new police car.

Apparently, 12 goats climbed onto the brand new vehicle, causing it to be dented and "damaging the wipers and glass, and scratching the paint of the bonnet and body." When police arrived they only found a trio of goats, but quickly identified the owner as 37-year-old Mary Arogynathan and filed a complaint against the woman.

The animals were eventually released to the Society for Prevention of Cruelty to Animals (SPCA). In defense of the owner, the police may want to consider not having their car parked next to a place where goats graze. (Link)



The Donkey that was Jailed for Assault and Battery
In 2008, a burro bit and kicked two men near a ranch in Chiapas state in Mexico. It was kept in a cell that normally holds people who are arrested for public drunkenness and other disturbances.

The donkey remained behind bars at the police station until its owner agreed to pay the men's medical bills. The owner, Mauro Gutierrez, reached a friendly arrangement to pay the men's bills, estimated at $420.

The victims said that the donkey bit Genaro Vazquez, 63, in the chest and then kicked 52-year-old Andres Hernandez as he tried to come to the rescue, fracturing his ankle. It took six men to control the enraged burro. (Link)


The Cow that was Arrested in a Murder Case
A carnival goat has somehow become entangled in a messy murder case involving some youths in Sango Ota, Ogun state, southwest Nigeria.

The youths were gathered to prepare for a carnival when an argument broke out between some of them, leading to one of the boys, identified as Dayo, breaking a bottle and using it to stab 24-year-old Azeez Salako, who bled to death.

Everyone scampered from the crime scene and by the time the police arrived, only the cow, which had been bought to be slaughtered during the carnival, was left behind. The police detained the cow and dragged it to the police station. No human arrests were made. (Link)



The Goat that was Arrested for Eating Flowers
Oh, if only the owners of the previous goats that have been arrested had known, maybe they would have hired the lawyer of Gary, the flower-eating goat that became an internet sensation.

Gary has been cleared of vandalism after an Australian judge dismissed the case at a court in Sydney. The police said that they caught Gary snacking on a flower bed outside the city's Museum of Contemporary Art, so they ordered its owner, Jim Dezarnaulds, to pay a 440 Australian dollar (£290) fine.

However, Magistrate Carolyn Barkell dismissed the case against Gary, ruling that neither Gary nor his owner could be held accountable for the crime. She said there was no evidence that Gary, who had his own lawyer, had been brought there to intentionally eat the flowers.

Gary, who was not required to give evidence, did not comment on the verdict upon leaving court. He became an internet star after news of his plight went viral, with his official Facebook page racking up over 16,000 likes. (Link 1 | Link 2)



The Goat that was Detained Over Armed Robbery
In 2009, Police in Nigeria held a goat on suspicion of attempted armed robbery. Vigilantes took the black and white beast to the police, saying that it was an armed robber who had used black magic to transform himself into a goat to escape arrest after trying to steal a Mazda 323.

Belief in witchcraft is widespread in parts of Nigeria, Africa's most populous nation. Residents came to the police station to see the goat, which was photographed in one national newspaper on its knees next to a pile of straw. (Link)



The Pigeon that was Held in India on Suspicion of Spying
In 2010, Indian police held a pigeon under armed guard after it was caught on an alleged spy mission for neighboring Pakistan.

The white-colored bird was found by a local resident in India's Punjab state, which borders Pakistan, and taken to a police station 25 miles from the city of Amritsar. The pigeon had a ring around its foot and a Pakistani phone number and address stamped on its body in red ink.

Police suspected that the pigeon landed on Indian soil from Pakistan with a message, although no trace of a note was found.

Officials directed that no one should be allowed to visit the pigeon, which police said was possibly on a “special mission of spying.” The bird was medically examined and kept in an air-conditioned room under police guard.

Local pigeon keepers in the sensitive border area told police that Pakistani pigeons were easily identifiable, since they look different from Indian ones. (Link)



The Monkey that was Arrested in Pakistan for Crossing India's Border
Believe it or not, in 2011 authorities in Pakistan's Punjab province "arrested" a cross-border trespasser which was a monkey found wandering in Cholistan, having traveled all the way from India.

The monkey was captured by wildlife officials in Bahawalpur. Local residents initially tried to capture the monkey after it entered the Cholistan area of Bahawalpur district. After the monkey evaded them, the people informed wildlife officials, who captured the animal after a struggle.

The monkey was taken to the Bahawalpur Zoo, where officials named him Bobby. (Link)







The Elephant that went on Trial for Killing Three People in India
The incident with Ramachandran (the name of the elephant) happened in Kerala in January 2013. During a religious festival, the elephant suddenly went berserk and started a massacre, in which three women were killed. After that, a criminal case was invoked against the animal.

The 45-year-old elephant was arrested kept under the supervision of the environmental department, while its owner had to pay 30 lakh rupees and find two guarantors. In addition, after this incident the elephant was banned for three months from participating in the festivities and processions of such events. (Link)



The Cat that was Arrested for Contraband at a Brazilian Prison
In January 2013, a cat was detained on the grounds of a jail in Brazil with contraband goods for prisoners strapped to its body with tape. The white cat was apprehended while crossing the main prison gate.

The incident took place at a jail in Arapiraca city, 250km (155 miles) southwest of Recife in Alagoas state. The confiscated items included drill bits, files, a mobile phone and charger, and earphones. The cat was taken to a local animal center.

Officials said that the items could be used to effect a means of escape, or for communicating with criminals on the outside. (Link)

10 Cool Places You Are Not Allowed to Visit



10 Cool Places You Are Not Allowed to Visit
12/11/2013 under Cool Places - 76,373 views
Share0 Tweet0 0 Share0

Lascaux Caves: A Complex of Caves Famous for Its Paleolithic Cave Paintings (France)
Lascaux Caves: A Complex of Caves Famous for Its Paleolithic Cave Paintings (France)
Lascaux Caves is a complex of caves in southwestern France that is famous for its Paleolithic cave paintings. They contain 900 of the most perfect surviving examples of Upper Paleolithic art. These paintings are estimated to be 17,300 years old. They primarily consist of images of large animals, most of which are known from fossil evidence to have lived in the area at the time.

The caves, which have been banned to the public since 1963, have been menaced in recent years by a series of unexplained, and only partially controlled, fungal invasions. Any human presence in the caves is regarded as potentially destructive. Normally, they are entered only once a week by one security guard for a few minutes at a time.

In 1979, Lascaux was added to the UNESCO World Heritage Sites list along with other prehistoric sites in the Vézère Valley, France. (Link)


Poveglia: A Very Small Island Near Venice Suspected of Being Haunted (Italy)

Poveglia is a small island located between Venice and Lido in the Venetian Lagoon, northern Italy.

For centuries Poveglia has been a refuge, a stronghold, a place of exile, and a dumping ground for the diseased and deceased.

In 1348, the Bubonic Plague arrived in Venice and Poveglia, like many other small islands, became a quarantine colony. Fearing the unbridled spread of the disease, Venice exiled many of its symptom-bearing citizens there. At the island's center the dead and the dying - who were mistaken for dead bodies - were burned on giant pyres. These fires would burn once more in 1630 when the Black Death again swept through the city.

In the 20th century the island was again used as a quarantine station, but in 1922 the existing buildings were converted into a hospital for the mentally ill. This went on until 1968, when the hospital was closed and the island once again became uninhabited.

Legends surround the island of hauntings by the victims of plague and war, as well as a crazy doctor of the mental institution who supposedly butchered and tortured patients.

Today, the island is closed to locals and tourists. In recent years, Italian construction crews attempted to restore the former hospital building, but unexpectedly stopped without reason. (Link)


The Vatican Secret Archives: The Archives Themselves are Off Limits to Everyone Except a Few People
The Vatican Secret Archives: The Archives Themselves are Off Limits to Everyone Except a Few People
The Vatican Secret Archives, located in Vatican City, is the central repository for all of the acts promulgated by the Holy See. The entrance to the Archives building is adjacent to the Vatican Library off the Piazza of St. Peter's. The archives also contain the state papers, correspondence, papal account books, and many other documents which the church has accumulated over the centuries. In the 17th century, under the orders of Pope Paul V, the Secret Archives were separated from the Vatican Library, where scholars had some very limited access to them, and remained absolutely closed to outsiders until 1881, when Pope Leo XIII opened them to researchers, more than a thousand of whom now examine its documents each year.

The use of the word "secret" in the title "Vatican Secret Archives" does not denote the modern meaning of confidentiality. Its meaning is closer to that of the word "private," indicating that the archives are the Pope's personal property and do not belong to any particular department of the Roman Curia or the Holy See. The word "secret" was generally used in this sense in phrases such as "secret servants," "secret cupbearer," "secret carver," or "secretary," much like an esteemed position of honor and regard comparable to a VIP.

In other words, you can view any document you wish because the archives are not secret, despite their name. However, you cannot enter the archive. You must submit your request for a document and it will be supplied to you.

The Vatican Secret Archives have been estimated to contain 52 miles (84 km) of shelving, and there are 35,000 volumes in the selective catalogue alone. The only documents you can't access are those which are not yet 75 years old (in order to protect governmental and diplomatic information). Indexes are available for people who want to see if a document exists in the archives. (Link)


Church of Our Lady Mary of Zion: Due to the Holiness of a Very Important Biblical Object Which is Preserved There, Only a Qualified Monk Has the Privilege of Entering the Temple (Ethiopia)
Church of Our Lady Mary of Zion: Due to the Holiness of a Very Important Biblical Object Which is Preserved There, Only a Qualified Monk Has the Privilege of Entering the Temple (Ethiopia)
The Church of Our Lady Mary of Zion is found in Ethiopia, and it is impossible to access because it's claimed to contain one of the most important biblical objects, the original Ark of the Covenant, which according to tradition came to Ethiopia with Menelik I after he visited his father King Solomon.

Due to the holiness and relevance of the ark, only a specially chosen monk has the privilege of entering the temple, and no one else is allowed to lay eyes on it or even get close. (Link)


The Jiangsu National Security Education Museum: A Spy Museum So Secret that Foreigners are Banned (China)
The Jiangsu National Security Education Museum: A Spy Museum So Secret that Foreigners are Banned (China)
The Jiangsu National Security Education Museum in China is home to top secret documents about the history of Chinese espionage. There are a range of documents and gadgets dating from 1927, when the Communist Party's Central Committee espionage department was founded, to the 1980s. There is also a collection of tiny pistols, guns disguised as lipstick, miniature cameras, concealed wiretaps, hollowed-out coins used to conceal documents, and maps hidden in decks of cards.

People are allowed to enter, but they have to be Chinese nationals due to the fact that they don't want such sensitive spy information to be exposed to foreigners. In other words, you can only access it if you are citizen of the People's Republic. However, no photography is allowed inside the museum, even if you're Chinese. (Link)


Niihau: An Exotic Hawaiian Island Closed to Most Visitors in Order to Preserve Its Indigenous Culture and Wildlife
Niihau: An Exotic Hawaiian Island Closed to Most Visitors in Order to Preserve Its Indigenous Culture and Wildlife
Niihau is the seventh largest of the inhabited Hawaiian Islands. This island has no paved roads. There are no stores, no restaurants, no electricity, and no indoor plumbing. On the other hand, Niihau has the only school in Hawaii—and perhaps the only one in the country—that relies entirely on solar power for its electricity.

Elizabeth Sinclair purchased Niihau in 1864 from the Kingdom of Hawaii and private ownership passed on to her descendants, the Robinson family.

In 1915, Sinclair's grandson, Aubrey Robinson, closed the island to most visitors with the purpose of preserving its indigenous culture and wildlife. Even relatives of the inhabitants could visit only by special permission.

Today, the island is generally off-limits to everyone except relatives of the island's owners, the natives, U.S. Navy personnel, government officials, and invited guests. There are very rare helicopter tours to the isle so you can wander along one of the beaches, but getting anywhere near the locals is strictly forbidden, giving it the nickname "The Forbidden Isle." (Link 1 | Link 2)


Pine Gap: Only Area in Australia Designated as "Prohibited"
Pine Gap: Only Area in Australia Designated as
Pine Gap is the commonly used name for a satellite tracking station approximately 18 kilometres (11 mi) southwest of the town of Alice Springs in the center of Australia which is operated by both Australia and the United States.

The facility consists of a large computer complex with 14 radomes protecting the antennae. It has over 800 employees.

The location is strategically significant because it controls America's spy satellites as they pass over the third of the globe which includes China, parts of Russia, and Middle East oil fields. Central Australia was chosen because it was too remote for spy ships passing in international waters to intercept the signal. (Link)


The Negev Nuclear Research Center: A Nuclear Installation Located in the Desert (Israel)
The Negev Nuclear Research Center: A Nuclear Installation Located in the Desert (Israel)
The Negev Nuclear Research Center is an Israeli nuclear installation located in the Negev desert, about thirteen kilometers southeast of the city of Dimona, Israel.

Its construction commenced in 1958 with French assistance, according to the Protocol of Sèvres agreements.

Information about the facility remains highly classified. But in 1986, Mordechai Vanunu, a former technician at Dimona, fled to the United Kingdom and revealed to the media some evidence of Israel's nuclear program and explained the purpose of each building, also revealing a top-secret underground facility directly below the installation.

In January 2012, media reports indicated that the Israel Atomic Energy Commission had decided to, at least temporarily, shut down the research center's reactor. The site's vulnerability to attack from Iran was cited as the main reason for the decision. In October and November 2012, it was reported that Hamas had fired rockets at Dimona (rather Negev Nuclear Research Center), but the facility was not harmed or damaged in any of the attempted strikes.

Of course the airspace over it is closed to all aircraft. They also implement the necessary measures to prevent unauthorized entry, so the area around it is heavily guarded and fenced off. (Link)


Ise Grand Shrine: The Holiest and Most Important Shrine in Japan
Ise Grand Shrine: The Holiest and Most Important Shrine in Japan
Ise Grand Shrine in Japan is a Shinto shrine dedicated to the goddess Amaterasu-ōmikami. The Ise Jingu Shrine consists of two main shrines and about 125 additional shrines.

The shrine is one of Shinto's holiest and most important sites. Access to the site is strictly limited; the only person who can enter is the priest or priestess, who must be a member of the Japanese imperial family. The general public is allowed to see little more than the thatched roofs of the central structures, which are hidden behind four tall wooden fences.

Every twenty years, the two main buildings inside the Ise Jingu Shrine are rebuilt. The shrines that are rebuilt are Naiku, or the "Inner Shrine," and Geku, or the "Outer Shrine," and they, as well as other parts of the complex that undergo any rebuilding, are rebuilt according to the original design blueprints from over 1,000 years ago. This rebuilding tradition is part of the Shinto belief in the transience of life and the renewal that follows death. It is also an invaluable way to pass on ancient building techniques from one generation to the next. (Link 1 | Link 2)


Metro-2: Purported Secret Underground Metro System in Russia
Metro-2: Purported Secret Underground Metro System in Russia
Metro-2 in Moscow, Russia is the informal name for a purported secret underground metro system which parallels the public Moscow Metro. The system was supposedly built, or at least started, during the time of Joseph Stalin and was codenamed D-6 by the KGB. It is supposedly still operated by the Main Directorate of Special Programs and the Ministry of Defense.

The length of Metro-2 is rumored to exceed that of the public Metro. It is said to have four lines that lie 50 to 200m deep. It is said to connect the Kremlin with the Federal Security Service (FSB) headquarters, the government airport at Vnukovo-2, and an underground town at Ramenki, in addition to other locations of national importance.

In 1994, the leader of an urban exploration group, the Diggers of the Underground Planet, claimed to have found an entrance to this underground system.

Sadly, all available information is speculative and unsupported by documentation such as photographs. Also, there are narratives told by people who say that they helped build Metro-2, and urban spelunkers claim to have "seen" Metro-2, but there are no explicit "firsthand" accounts. (Link)

Read more at http://www.oddee.com/item_98792.aspx#8chKTJTcMhtMUJSw.99

10 Amazing Facebook Facts You Probably Don't Know (or Don't Care)

The average user has 130 friends

The average user has 130 friends
Are you worried about your popularity? The average number of friends on Facebook is 130, and women tend to have somewhat more than men. Yet despite having hundreds of friends, most people only interact regularly with 4 to 7 people.

So, what's YOUR number?
(Link)


Over 25% of users have already been dumped via Facebook

Over 25% of users have already been dumped via Facebook
A June 2010 survey of 1,000 Facebook users -- 70% of whom were male -- found that 25% had been "dumped" via Facebook (via their significant other updating his or her relationship status).

Twenty-one percent of those surveyed said they would end a relationship by changing their Facebook relationship statuses to "single." While worrisome, the survey does show the majority of people do not split up via Facebook.

PD: This photo is from a genuine FB status. (Link)


Facebook doesn't allow breastfeeding photos

Facebook doesn't allow breastfeeding photos
Facebook, the popular social networking website, provoked a squall of maternal wrath when it yanked photos of breastfeeding babies that women had posted on their personal profiles because it deemed them a little too revealing. This, by the way, from a website that allows photos of women in thongs and bikinis and of couples making out; it has even accepted paid advertising for a dating website that featured a topless model. (The topless ad was taken down after angry women noted the hypocrisy.)

In response to the terse notices alerting mothers that they were violating Facebook's decency policy, "lactivists" responded with a virtual nurse-in; 11,000 women posted photos of themselves breastfeeding and/or updated their profiles to read: "Hey, Facebook. Breastfeeding Is Not Obscene!"

The pro-breastfeeding group has attracted over 250,000 members. (Link 1 | Link 2)


Facebook causes 1 in 5 Divorces

Facebook causes 1 in 5 Divorces
It used to be the tell-tale lipstick on the collar. Then there were the give-away texts that spelled the death knell for many marriages. But now one in five divorces involve the social networking site Facebook, according to a new survey by the American Academy of Matrimonial Lawyers.

A staggering 80 per cent of divorce lawyers have also reported a spike in the number of cases that use social media for evidence of cheating. (Link)


Al Pacino was the first ‘face' on Facebook

Al Pacino was the first ‘face' on Facebook
Remember that sad-looking blue guy on Facebook's homepage who used to stare you down every time you went to log in? They did away with him in 2007, so if you were late to the social networking party, then you probably have absolutely no idea what we're talking about. Anyway according to David Kirkpatrick's The Facebook Effect , it turns out that that guy in the logo, created by Zuckerberg's friend and classmate Andrew McCollum, was none other than a young Al Pacino “covered with a fog of ones and zeros — the elementary components of digital media.” Crazy, right? (Link)


36% of users check Facebook, Twitter or texts after sex

36% of users check Facebook, Twitter or texts after sex
Lighting a cigarette after sex? That's soooo last season.

An October 2009 study by Retrevo suggested that social networks are becoming an increasingly important part of young people's lives. Among under-35s, 36% admitted to "tweeting, texting and checking Facebook after sex." Forty percent of respondents admitted to doing so while driving, 64% said they do so at work, and 65% use these communication channels while on vacation. (Link)


Over 350million people suffer from Facebook Addiction Disorder

Over 350million people suffer from Facebook Addiction Disorder
Facebook Addiction Disorder (FAD) is a term introduced by US phychologists for those who are addicted to Facebook and their life is really affected by their uncontrolled activities on Facebook. The most common effects are the loss of productivity, the inability to concentrate, the superficiality of friendships as well as isolation in the extreme cases.

It has been said that approximately 350 million people are suffering from the disorder. (Link)


Facebook users have lower grades than non-users

Facebook users have lower grades than non-users
According to a new study by doctoral candidate Aryn Karpinski of Ohio State University and her co-author Adam Duberstein of Ohio Dominican University, college students who use the 800 million–member social network have significantly lower grade-point averages (GPAs) than those who do not.

The study, made in 2009, surveyed 219 undergraduate and graduate students and found that GPAs of Facebook users typically ranged a full grade point lower than those of nonusers — 3.0 to 3.5 for users versus 3.5 to 4.0 for their non-networking peers. It also found that 79% of Facebook members did not believe there was any link between their GPA and their networking habits. (Link)


Burger King gave away free burgers to users who unfriended people on Facebook

Burger King gave away free burgers to users who unfriended people on Facebook
In January 2009, an advertising campaign from Burger King titled “WHOPPER Sacrifice” rewarded Facebook users a free “Angry Whopper” for publicly deleting 10 friends, who would then receive a blunt message informing they were deleted for a free hamburger. The campaign, conceived by Burger King agency Crispin Porter + Bogusky and executed by Refresh Partners, used the tag line “Friendship Is Strong, but The Whopper Is Stronger.”

At press time the application had been downloaded more than 55,000 times and over 250,000 ‘friends' were sacrificed. (Link)


A man was arrested for openly asking his 13-year-old daughter for sex over Facebook

A man was arrested for openly asking his 13-year-old daughter for sex over Facebook
On perhaps one of the worst crimes perpetrated in Facebook, a Pennsylvania father was arrested for allegedly asking his teen daughter for sex over Facebook. John Forehand, 39, referred to himself as "Bad Daddy" in the online correspondence with his 13 year-old daughter, in which he openly propositioned her and made explicit sexual suggestions. Forehand told his daughter he had been having "inappropriate" dreams about her, and wrote to her, "I'll take very good care of my little girl."

The girl told her mother about the inappropriate Facebook messages, and she then alerted the police. The police captured Forehand by tricking him into coming to what he believed would be a meeting with his daughter. How sick is that? (Link)

50 Fascinating Facebook Facts And Figures

The rise and rise of Facebook is producing a scramble by marketers and companies to leverage its huge global database and traffic. 50 Fascinating Facebook Facts And Figures

Google is looking over its shoulder as Facebook grows at over 10 million users a month and sits currently at number two on web traffic rankings according to Alexa.com.

Last year Facebook surpassed Google for the top ranking for total time spent online.

Google is even being forced to continually adjust its search engine algorithms to cater for the a social web that provides more prominence for social channels in its search results. Facebook has also become the 3rd largest video website with 46.6 million viewers sitting behind number one ranked video content property provider Google with its YouTube site and Yahoo at second ranking.

50 Facebook Facts and Figures

  1.     1 in every 13 people on Earth is on Facebook
  2.     35+ demographic represents more than 30% of the entire user base
  3.     71.2 % of all USA internet users are on Facebook
  4.     In 20 minutes 1,000,000 links are shared on Facebook
  5.     In 20 minutes 1,484,000 event invites are posted
  6.     In 20 minutes 1,323,000 photos are tagged
  7.     In 20 minutes 1,851,000 status updates are entered
  8.     In 20 minutes 1.972 million friend requests are accepted
  9.     In 20 minutes 2,716,000 photos are uploaded
  10.     In 20 minutes 2,716,000 messages are sent
  11.     In 20 minutes 10.2 million comments are posted
  12.     In 20 minutes 1,587,000 wall posts are written
  13.     750 million photos were uploaded to Facebook over New Year’s weekend
  14.     48% of young Americans said they found out about news through Facebook
  15.     48% of 18 to 34 year olds check Facebook right when they wake up
  16.     50% of active users log on to Facebook in any given day
  17.     Average user has 130 friends
  18.     People spend over 700 billion minutes per month on Facebook
  19.     There are over 900 million objects that people interact with (pages, groups, events and community pages)
  20.     Average user is connected to 80 community pages, groups and events
  21.     Average user creates 90 pieces of content each month
  22.     More than 30 billion pieces of content (web links, news stories, blog posts, notes, photo albums, etc.) shared each month.
  23.     More than 70 translations available on the site
  24.     About 70% of Facebook users are outside the United States
  25.     Over 300,000 users helped translate the site through the translations application
  26.     Entrepreneurs and developers from more than 190 countries build with Facebook Platform
  27.     People on Facebook install 20 million applications every day
  28.     Every month, more than 250 million people engage with Facebook on external websites
  29.     Since social plugins launched in April 2010, an average of 10,000 new websites integrate with Facebook every day
  30.     More than 2.5 million websites have integrated with Facebook, including over 80 of comScore’s U.S. Top 100 websites and over half of comScore’s Global Top 100 websites
  31.     There are more than 250 million active users currently accessing Facebook through their mobile devices
  32.     People that use Facebook on their mobile devices are twice as active on Facebook than non-mobile users.
  33.     There are more than 200 mobile operators in 60 countries working to deploy and promote Facebook mobile products
  34.     Al Pacino’s face was on the original Facebook homepage
  35.     One early Facebook function was a file sharing service
  36.     The first “Work Networks” as well as the original educational networks  included Apple and Microsoft
  37.     The meaning of the term poke has never been defined
  38.     There is an ‘App’ to see what’s on the Facebook cafe menu
  39.     Mark Zuckerburg (CEO of Facebook) calls himself a “Harvard Graduate” when in fact he didn’t graduate (apparently his reply is that “there isn’t a setting for dropout”)
  40.     Australian’s spend more time per month on Facebook than any other country at over 7 hours on average
  41.     A Facebook employee hoodie sold for $4,000 on eBay
  42.     Facebook was initially bank-rolled by Peter Thiel the co-founder of PayPal for $500,000
  43.     It is the second biggest website by traffic behind Google (at the moment)
  44.     Facebook is now valued at approximately $80 billion
  45.     Facebook makes money through advertising  and virtual products
  46.     Facebook was almost shut down by a lawsuit by ConnectU who claimed that Zuckerburg stole the idea and Technology for Facebook (the issue was settled out of court)
  47.     The USA has the largest Facebook user base with 155 million people which represents 23.6% of Facebook’s total users
  48.     There is over 16,000,000 Facebook fan pages
  49.     Texas Hold’em Poker is the most popular Facebook page with over 41 million fans
  50.     More than 650 million active users

The rise and rise of Facebook is producing a scramble by marketers and companies to leverage its huge global database and traffic.
Read more at http://www.jeffbullas.com/2011/04/28/50-fascinating-facebook-facts-and-figures/#KyDTBUrETiIeDkCp.99

The Top 7 Technology Trends That Will Dominate 2014


google glassStrap yourself in, it’s going to be a wild ride. In considering the changes we’ve seen in technology over the past year, I’m bracing myself for unprecedented growth when it comes to anytime, anywhere, on-demand information and entertainment.
Based on the trends we’ve seen so far in 2013, I predict 2014 will see many fledgling technologies mature and grow beyond what we could have imagined just a few years ago.
So without further ado, here are my top 7 predictions for technology trends that will dominate 2014.
1. Consumers will come to expect Smart TV capabilities
With Smart TV shipments expected to reach 123 million in 2014 – up from about 84 million in 2012 – we are poised to see explosive growth in this industry.
In the midst of this growth, we will continue to see fierce competition between major players like Samsung, Panasonic, and LG. Prices will need to continue to drop, as more consumers crave, and even expect, the ability to use Netflix, Hulu, Amazon Instant Video and their web browser via their TV.
Of course, the development we’re all waiting for in 2014 is the release of Apple’s much anticipated iTV. It appears the iTV is now in the early development stage, and that Apple may be in the process of making a deal with Time Warner to facilitate programming on Apple devices.
The device is rumoured to include iCloud sync, the ability to control your iPhone, and ultra HD LCD panels. Keep an eye out for this release as early as summer 2014.
2. Smart watches will become ‘smarter’

Rather than having to pull out your smartphone or tablet for frequent email, text and social media updates, you’ll glance at your watch.
2014 is the year to keep an eye out for the Google watch. Rumor has it the device will integrate with Google Now, which aims to seamlessly provide relevant information when and where you want it (and before you’d asked for it).
We’ll see smart watches become even smarter, learning what news and updates are important to us, when we want to receive them, and responding more accurately to voice controls.
For smart watches to succeed, they’ll need to offer us something that our smart phone can’t; whether this means more intuitive notifications, or the ability to learn from our daily activities and behaviours (for instance, heart rate monitoring), it will be interesting to see.
3. Google Glass will still be in “wait and see” mode
While Google Glass hasn’t yet been released to the general public, we’ve heard enough about it to know it’s still very early days for this technology. With an estimated 60,000 units expected to sell in 2013, and a predicted several million in 2014, it’s still a long way from becoming a common household technology.
These augmented reality glasses allow you to access information like email and texts, take hands-free pictures and videos, effortlessly translate your voice, and even receive overlaid walking, cycling or driving directions, right within your field of vision.
It’s predicted that both Google Glass 2.0, and its companion, the Glass App Store, should be released to the general public sometime in 2014.

Be on the lookout for competition in this market, particularly from major players like Samsung. I predict we’ll see much of this competition aimed at niche markets like sports and healthcare.
4. Other applications and uses for Apple’s TouchID will emerge
The release of the iPhone 5S has, for the first time, made on-the-go fingerprint security a reality. The potential for Touch ID technology to really take off is, I believe, an inevitable reality. Touch ID, which uses a high-resolution camera to scan your fingerprint, allows convenient ultra-security for your iPhone.
Currently, the technology is limited; the only real uses are unlocking your iPhone, and making purchases in the App store. I predict that we’ll see this technology incorporated into other Apple products soon. I think we’ll even see TouchId integrated into MacBook products later this year or next.
I also predict TouchID, though not quite bug-free, will be used for other purposes, such as to securely integrate with home security systems, access password software, and even pay for groceries (more on that in an upcoming article).
5. Xbox One and PS4 will blur the lines between entertainment and video gaming
The new gaming consoles (Xbox One and PS4) will increasingly integrate social media-like connectivity between players. Players could have followers, work together to achieve in-game goals, and new technology will allow for equally-skilled players to compete.
The PS4, slated to be released November 15th, will track both the controller and the player’s face and movements for more intuitive play.
Apart from great gaming, these systems will allow for a far more integrative entertainment experience. For instance, rather than switching between TV, gaming, music and sports, you’ll be able to do two or even three activities side-by-side, or by easily switching back and forth.
6. 3D Printing will begin to revolutionize production
We’ve seen a huge rise in the popularity of 3D printing this year, coupled with a dramatic fall in pricing. The ability to easily create multi-layered products that are actually usable – well, that’s pretty amazing.
I’ll be watching for a movement towards simple products being produced close to home, and to greater customization given the ease of manufacturing. I think it’s inevitable that manufacturing in countries such as China will become less appealing and lucrative for businesses given the high costs of shipping and managing overseas contracts.
I don’t expect these changes to reach their full effect in 2014, however I believe businesses will be starting to consider how this will affect their production plans for 2015 and beyond.

7. The movement towards natural language search will make search more accurate and intuitive

There was a time when we used terms like “personal digital assistant” to describe a hand-held calendar. Oh, how times have changed.
With the emergence of intelligent personal assistants like Google Now and Apple’s Siri, the goal is to have information intuitively delivered to you, often before you even ask for it. The shift seems to be away from having to actively request data, and instead to have it passively delivered to your device.
Natural language search will continue to overtake keyword-based search, as seen by Google’s move towards longer, more natural searches in its recent release of Hummingbird, Google’s largest algorithm update thus far.

Saturday, December 21, 2013

Ten Human Beings with real super Powers.


2014 new inventions: Shower slide






For a lot of restrooms, there may be solely in essence enough room to fit the shower slide place, dropping shower slide entrance doors can be actually very helpful.
They will tend to sort out better in these kind of disorders, given that they eliminate the will need to make a supply in the rest room pertaining to where the shower slide door is meant to help swing available. However, if the shower slide door is usually rather fitted such so it merely glides from side to side. Therefore for anyone small restrooms, although they could not absolutely become ideal, you will need to at least look at the concept of frameless shower slide dropping entrance doors.





MindBlowing Inventions.!

We are living in an era of science and technology,where inventions and innovations are inspiring us each day. Technology is making our life more easier and luxurious. Things which we only imagine today comes in to reality in other day. Science and technology is progressing day by day.
Here is a list of top 10 Mindblowing Upcoming Technologies that will take your breath away.

Google Glasses

Google Glasses are a part of Project Glass, a research and development program by Google to develop an augmented reality head-mounted display (HMD). These products would display information in smartphone-like format hands-free and could interact with the Internet via natural language voice commands. The prototype’s functionality and minimalist appearance has been compared to Steve Mann’s EyeTap. The operating system software used in the glasses will be Google’s Android.
Leap Motion

Leap Motion presents an entirely new way to interact with your computers. Put simply, Leap Motion is more accurate than a mouse, as reliable as a keyboard and more sensitive than a touchscreen. For the first time, you can control a computer in three dimensions with your natural hand and finger movements.
Google’s Self-Driving Cars
The Google driverless car is a project by Google that involves developing technology for driverless cars. The project is currently being led by Google engineer Sebastian Thrun, director of the Stanford Artificial Intelligence Laboratory and co-inventor of Google Street View.
Glasses-Free 3D TV

The MIT Media Lab system uses several layers of liquid-crystal displays (LCDs), the technology currently found in most flat-panel TVs. To produce a convincing 3-D illusion, the displays would need to refresh at a rate of about 360 times a second, or 360 hertz. Such displays may not be far off: LCD TVs that boast 240-hertz refresh rates have already appeared on the market, just a few years after 120-hertz TVs made their debut.
Air to Fuel
A British firm based on Teesside says it’s designed revolutionary new technology that can produce petrol using air and water. Air Fuel Synthesis in Stockton-on-Tees has produced five litres of petrol since August, but hopes to be in production by 2015 making synthetic fuel targeted at the motor sports sector. The company believes the technique could help solve energy supply problems and curb global warming.
Face Cloning
Disney Research has proposed a complete process for designing, simulating, and fabricating synthetic skin for an animatronics character that mimics the face of a given subject and its expressions. This process starts with measuring the elastic properties of a material used to manufacture synthetic soft tissue.
Form 1 3D Printer
The Form 1 combines great design and solid engineering to simplify the entire printing process. It utilizes Stereolithography (SL) technology to achieve the highest resolution available in 3D printing, blowing away plastic extrusion (FDM) performance.
Bio Technology
Bionic Hand controlled by brain signals. It does allow people without fingers to have fully functional hands that can pick up and handle delicate objects. It is completely controlled by the brain and requires no surgery. Touch Bionics, the company the produces the Pro Digits hand, is able to install the hand complete with “living skin,” a plastic covering resembling human skin, for under $50,000. A small price to pay for a new hand I think.
Invisible Bike Helmets
The device is a mobile airbag which will supposedly replace all those unstylish bicycle helmets. It’s contained in a scarf which is worn around your neck, and at the moment of impact it inflates and forms a protective cushion around your head.mThe Invisible Bike Helmet was created by Hovding, a Swedish technology company.
Face Scanners
The technology was developed by FaceFirst, and even in a crowd you can’t escape their watchful eye: FaceFirst can track each individual face on a camera feed and run matches at the same time – and all of this happens live. Here’s a quote from the CEO of FaceFirst, Joseph Rosenkrantz:
“Within just a couple of seconds whoever needs to know receives an email containing all the evidence and stats about the person identified along with the video clip of them passing the camera so they may be approached then and there.

Waht should you know for Network Pentesting.?

  • Information Gathering - OSINT, DNS, SNMP etc.
  • Pentesting Network Components - Router, Switch, Firewall, IDS/IPS
  • Pentesting Windows Environments - domain controllers, pass-the-hash, active directory etc.
  • Pentesting Linux Environments
  • Pentesting Mobile Application Backends
  • Attacking via the DMZ - Web, Email etc.
  • Post Exploitation on Windows, Linux and Mobile OSs
  • Data Exfiltration - tools and techniques
  • Privilege Escalation on Windows and Linux
  • Keeping Access - Backdoors and Rootkits
  • Web Application vulnerability to Shell
  • Scenario based Pentesting
  • Social Engineering Attacks - JAVA Applets, HID devices etc.
  • AV Evasion Techniques
  • Firewall and IDS Evasion

Cross-Site Scripting Vulnerabilities

Have you ever mistyped the address of a web site and received a message like “Error - page name could not be found” or “The page you requested: page name does not exist”? Certainly you have, and odds are you never gave it a second thought; you simply corrected the address or went to a different site altogether. It happens all the time. There are plenty of dead links, or links with typos to stumble upon. However, when you encounter an error message like the two listed above, you are actually witnessing a potential security breach—not necessarily against the site, but rather against you directly.
Suppose you entered the following valid URL:
http://www.example.com/FILENAME.html
If the document "FILENAME.html" did not exist, the web site could return an error message such as
<HTML> 404 page does not exist: FILENAME.html
.... </HTML>
Notice that "FILENAME.html" is a string that you entered. The web site has included it in the page returned straight through to your browser.
This may seem harmless, but now imagine that you are browsing through auctions on a popular site; let’s call it auctions.example.com. You come across several auctions that someone has posted and would like to see more items that the same person has for sale; let’s assume this person is a “bad guy” (though you don’t know it) and call him BG12345. You click on BG12345’s website and see a listing of his auctions. You click on a link on his page that interests you and are taken to auction.example.com’s site displaying that item. You scroll down to place a bid, and the auction site prompts you for your name and password to sign in. You enter all the information and hit the submit button. Everything looks fine, but in reality, the information that you submit is getting sent back to BG12345. How can this be? The answer is that auction.example.com has what is known as a cross-site scripting (CSS) vulnerability.
A CSS vulnerability is caused by the failure of a site to validate user input before returning it to the client’s web-browser. The essence of cross-site scripting is that an intruder causes a legitimate web server to send a page to a victim's browser that contains malicious script or HTML of the intruder's choosing. The malicious script runs with the privileges of a legitimate script originating from the legitimate web server. The two error messages mentioned earlier could be examples of such a situation. If instead of entering a page name, you entered an HTML or
1
script tag, the server would have returned that command to your browser, as well. Your browser would assume the HTML or script tag was from auction.example.com. It would run the script with the privileges that are set up for that site, and when you looked at the website, everything would appear to be normal.
BG12345 used the same method to deceive you. When you clicked on the link to BG12345’s auction, the link was actually to an invalid page. The link may have looked something like the example below, it used HTML and scripting to mimic the auction site’s page exactly. However, when you clicked submit, it used a form that passed your information back to BG12345. Now BG12345 can access your account, place bids, and change your information. BG12345 can also change your password and lock you out of your own account. Even worse, BG12345 can see the credit card number that you registered with.
So what did BG12345 do? BG12345’s web site offered a link to auction.example.com that looked something like this:
<A HREF=http://auction.example.com/<script>alert(‘hello’)</script>">Click Here</a>
The "FILENAME.html" submitted to auction.example.com was,
<script>alert(‘hello’)</script>
auction.example.com then used its ordinary routines to generate an error page to you that read,
<HTML> 404 page not found: <script>alert(‘hello’)</script>
.... </HTML>
In effect, BG12345 managed to "inject" a JavaScript program into the page returned to you by auction.example.com. The JavaScript ran as though it originated at auction.example.com, and could therefore process events in that document. It also maintained communication with BG12345 by virtue of scripting that BG12345 put in the link; this is the way a CSS vulnerability can be exploited to "sniff" sensitive data from within a web page, including passwords, credit card numbers, and any other arbitrary information you input. There are a number of variants to this problem. Odds are that bank.example.com also has the same vulnerability somewhere on its site. BG12345 could potentially access your bank account and transfer funds using the same process.
So what can be done?
2
• The best protection is to disable scripting when it isn’t required. However, even this does not prevent the injection of malicious HTML. You should also protect yourself by accessing security sensitive pages directly instead of following links from unknown sources, or untrusted sites. For example, don’t trust a link to your banking site that is in an email message. If you need to access your banking site, go there directly. And, as always, exercise caution when supplying personal information.
• Webmasters can also help. They can ensure that none of their pages return user input that has not been validated. They can also encourage users to disable scripting.
• Another solution is to have “signed scripting” such that any script with an invalid or untrusted signature would not be run automatically. Suggestions of this nature, however, would require changes to the current Internet standards and specifications. Such changes would have to be submitted for consideration to the World Wide Web Consortium (www.w3c.org) or the Internet Engineering Task Force (www.ietf.org).
• If you notice an instance of cross-site Scripting notify the webmaster of that site, and cc the CERT Coordination Center.
Unfortunately, security is often sacrificed in favor of functionality. But, if you browse the Internet with scripting enabled, there is very little you can do to protect your personal information. Cross-site scripting is easy to overlook, and simple to correct. However, it can cause significant damage–your passwords and credit card numbers can be unknowingly divulged to untrusted sources.

Did you miss the magic? It's right there in your data storage.

Let's consider how we’ve become numb to the breadth with which technology has advanced. It's moving so fast that we barely have time to appreciate one advancement before the next one comes along.
 
It wasn't always like that. The black and white television was first demonstrated at the World's Fair in 1939. It was almost three decades later before most homes had a color television in 1967.
 
In the early 1990s, I carried a lunch-box size bag with a tetherd mobile phone that got lousy service and cost an arm and a leg. Today, I carry a $199 iPhone with more processing power than the $150,000 Apollo Guidance Computer.
 
Great comparison, right? Of course, most of us have probably heard that analogy. 
 
A few months ago, data storage vendor SanDisk sent me one of their latest backup devices, a wireless thumb drive. It blew my mind.
 
At first, I marveled at the hidden antenna technology that had become so miniaturized and high-speed that it could transmit millions of bits of data per second through the air from my computer or smart phone to a thumb drive in my pocket. Conversely, I could stream a movie from that thumb drive to my phone or tablet, never burdening my mobile device with the enormous capacity that a movie consumes.
 
Then, I noticed the thumb drive had a tiny slot for a removable microSD card – a storage device smaller than my thumbnail and slightly thinner than a credit card. I popped the microSD card out, and the number printed on it gave me pause.
 
The number was 32 followed by "GB".
 
I've covered data storage for 13 years, and over that time, co-workers would periodically needle me over being saddled with a boring news beat. I'd always retort that it was one of the most intersting beats I could imagine. I also cover 3D printing, and I don't consider that any more amazing than data storage.



(On the left is a 16MB SD card sold by Samsung in the early 2000s. On the right, a 32GB microSD card sold today by SanDisk)
 
This is how I see it. On that microSD card that is half the size of a postage stamp, there are thirty-two gigabytes of capacity. “So what,” you say? A gigabyte is roughly one billion bytes of data.
 
I have an advertisement pinned to the outside of my office cubicle from the mid-1980s. It’s a 10MB hard disk drive offered for the bargain price of $3,398. Today, you can buy that 32GB microSD card for $23.
 
Again, you may say, “well, that’s just the storage cousin of Moore’s Law and economy of scale. Technology advances, and the more you produce of something, the cheaper you can sell it."
 
You see? You just missed the magic -- the science that has created something so simple, and yet, has had such a profound effect on your life. Each bit-storing transistor inside that solid-state storage in your smartphone, in that microSD card, is about the size of an few atoms. The process for laying out the circuitry in a solid-state drive (SSD) is lithography, and today it's measure in nanometers. A nanometer is one-billionth of a meter.
 
Because of that microscopic circuitry, you can carry around tiny devices that store billions, even trillions of bytes of data -- that's a volume of information that just a couple of decades ago would have required the buildings of the Library of Congress to store.
 
Today, we carry smartphones with tens of gigabytes of capacity and hard drives smaller than a deck of playing cards that have three, even four terabytes of capacity and never stop to think: A terabyte. That's about a trillion bytes of data.
 
To illustrate the difference between a million and a billion, consider this: one million seconds is 11 days, one billion seconds is about 31.7 years. And a trillion seconds? Well, that’s 31,700 years.
 
Think about that the next you pull your smartphone out of your pocket.


(On the left is an RA81 disk drive beside a current 2.5-in, 2TB laptop hard drive. The R81, which was manufactured by Digital Equipment Corp. in 1982, was a marvel in its day. It offered up to 456MB of capacity, four times that of the R80, its predecessor. On the right, the 32GB microSD card)

 

What should you know for Web Application Pentesting...!

  • HTTP/HTTPS protocol basics
  • Understanding Web Application Architectures
  • Lab setup and tools of the trade
  • Converting your browser into an attack platform
  • Traffic Interception and Modification using Proxies
  • Cross Site Scripting
    • Types
      • Reflected
      • Persistent
      • DOM based
    • Filtering XSS
    • Evading XSS filters
    • Cookie stealing and session hijacking
    • Self-XSS
    • BeeF
  • SQL Injection
    • Error based
    • Blind
    • Second order injections
  • Broken authentication and session management
    • session id analysis
    • custom authentication
  • Security misconfigurations
    • Web and database server
    • Application framework
  • Insecure direct object reference
  • Cross-site Request Forgery
    • GET and POST based
    • JSON based in RESTful Service
    • Token Hijacking via XSS
    • Multi-Step CSRF
  • Insecure cryptographic storage
  • Clickjacking
  • File upload vulnerabilities
    • Bypassing extension, content-type etc. checks
  • RFI and LFI
  • Web to Shell
    • Web Shells
    • PHP meterpreter
  • Analyzing Web 2.0 applications
    • AJAX
    • RIAs using Flash, Flex
  • Attacking Caching servers
    • Memcached
    • Redis
  • Non Relational Database Attacks
    • Appengine Datastore
    • MongoDB, CouchDB etc.
  • HTML5 Attack Vectors
    • Tag abuse and use in XSS
    • Websockets
    • Client side injection
    • Clickjacking
  • Web Application firewalls
    • Fingerprinting
    • Detection Techniques
    • Evading WAFs
  • … more additions will be made as course evolves

Do you know how much google earns?


Do you know how much Google earns?
Google generates $691.27 per second! Isn't it
crazy?
And the annual revenue is
$21,800,000,000 . If you have taken 5
seconds to
read this post then Google would have
already
made around $3456.34 in between.

Thursday, December 19, 2013

Apple iPhone 6 Rumors: Analyst Says 2014 iPhone Model Could Feature 4.8-Inch Screen


As the popularity of bigger smartphones, dubbed phablets, is on the rise, Apple (NASDAQ:AAPL) too is rumored to be working on a bigger iPhone, and if the latest claims of an analyst are to be believed, the 2014 model of the flagship smartphone, unofficially called the iPhone 6, will sport a larger screen.
Peter Misek, an analyst at Jefferies, has predicted, after meeting Apple’s Asian suppliers last week, that next year’s iPhone 6 will be redesigned to incorporate a bigger 4.8-inch screen, compared to the 4-inch screen featured in the existing iPhone 5s.
According to a report from CNET, Misek did not reveal any reasons behind his prediction about the next iPhone iteration's screen size except to say that a bigger screen would attract more customers to upgrade to the new model.
"We think the 85M iPhones eligible for an upgrade when the iPhone 6 launches (we think Apple is targeting Sep 2014) could be boosted by another 5-10M from people who skipped the 5S/5C cycle," Misek wrote in a note to investors.

In the last quarter, around 50 percent of smartphones shipped worldwide had a screen size bigger than 4 inches. During the same period last year, only 20 percent of the smartphones shipped had bigger screens, CNET reported.
Reports about a bigger iPhone 6 have been around for quite some time now even though predictions about the actual size of the phone's screen seem to fluctuate a bit.
Korea’s ETNews also reported last week that the iPhone 6 in 2014 could sport a bigger screen of up to five inches. The report also said that the iPad also would come with a bigger screen of 12.9 inches in 2014.
A Wall Street Journal report recently said that Apple was testing iPhones with screen sizes ranging from 4.8 inches to 6 inches, while KGI Securities analyst Ming-Chi-Kuo predicted that the iPhone 6 in 2014 would feature a screen size between 4.4 inches and 5 inches.
Reuters reported, in June, that the iPhone iteration in 2014 may come with at least two bigger screen sizes -- 4.7-inches and 5.7-inches -- as Apple is considering expanding its flagship smartphone range.
Analysts also believe that Apple needs to diversify its iPhone line-up as the company’s handset is at risk of losing more market share to its competitors, especially to main rival, Samsung (KRX:005935).
“Apple’s first priority should be a premium-tier phablet with a 5-inch screen because that is where the largest new revenue pool is located,” Neil Mawston, executive director at Strategy Analytics, recently told TechCrunch.