Custom Search

Sunday, June 19, 2011

YouTube to live-stream Copa America

Argentina\'s forward Lionel Messi attends a training session in Ezeiza, Buenos Aires on June 13

Argentina's forward Lionel Messi attends a training session in Ezeiza, Buenos Aires on June 13, ahead of the Copa America tournement. YouTube, which began live-streaming Indian Premier League cricket matches last year, announced Wednesday that it will show all 26 matches in next month's Copa America.

YouTube, which began live-streaming Indian Premier League cricket matches last year, announced Wednesday that it will show all 26 matches in next month's Copa America.

YouTube said matches from the Copa America, which begins on July 1 and is being held in Argentina, will be live-streamed at youtube.com/copaamerica and available in more than 50 countries around the world.

"Fans will have access to all 26 matches including pool play, semi-finals, quarter-finals and the championship match, live streaming as they happen with exclusive-to-YouTube commentary," YouTube said in a blog post.

YouTube live-streamed Indian Premier League cricket matches last year in the first foray into live sports by the Google-owned video-sharing site and a move that highlighted its Internet broadcasting ambitions.

US computer pioneer IBM turns 100

IBM is currently the world\'s 14th most valuable technology company

A sign marks the entrance to IBM Corporate Headquarters in Armonk, New York. US technology pioneer turns 100 years old on Thursday and while "Big Blue" is no longer the dominant player in the computer industry it remains a force to be reckoned with.

US technology pioneer IBM turns 100 years old on Thursday and while "Big Blue" is no longer the dominant player in the computer industry it remains a force to be reckoned with.

With a market capitalization of $197 billion, IBM is the world's 14th most valuable technology company, well behind California gadget-maker Apple's $304 billion but close to software giant Microsoft's $201 billion.

Thomas Misa, a history of science and technology professor at the University of Minnesota, credits IBM's longevity to its "mastery of getting information processing power into users' hands in a form that they need and want."

"They did this in the 1930s with punch-card tabulation machines and they are doing the same, essentially, with the post-1993 shift to information services," Misa said.

While its ancestry stretches back to the 19th century, IBM dates its birth to the June 16, 1911 merger of three firms: the Tabulating Machine Co., the International Time Recording Co. and the Computing Scale Co. of America.

Samuel Palmisano was appointed to IBM Chief Executive Officer in 2002 and Chairman in 2003

CEO of IBM Samuel Palmisano delivers a speech at the opening ceremony for the CeBIT IT fair, in February, in Hanover, central Germany. US technology pioneer IBM turns 100 years old on Thursday and while "Big Blue" is no longer the dominant player in the computer industry it remains a force to be reckoned with.

Thomas Watson Sr., the man credited with building IBM into a powerhouse, joined the new company, Computing-Tabulating-Recording Co. (CTR) in 1914 and renamed it International Business Machines Corp. in 1924.

Over the years, rivals have mocked IBM's corporate culture of conformity but that has not stopped the Armonk, New York, company from being at the forefront of technological innovation.

IBM claims to hold more US patents than any other company and five of its employees have won Nobel prizes for physics.

Dag Spicer, senior curator of the Computer History Museum in Mountain View, California, said IBM's success can be traced in part to its readiness to take "big gambles."

"During the Depression, Tom Watson kept making machines even though there was no market," Spicer said.

IBM claims to hold more US patents than any other company

Visitors crowd the IBM stand at the CeBIT IT fair, in March, in Hanover, central Germany. More than 4,200 tech firms from 70 countries attended this year's CeBIT, with many of the big names that stayed away during the global financial crisis, returning to Germany.

"In 1935, FDR (president Franklin Delano Roosevelt) passed the Social Security Act. The law passed and IBM was the only company that had the equipment ready to go," he said.

Thomas Watson Jr., who took over the presidency of IBM in 1952 from his father, embarked on a huge gamble of his own in 1964, Spicer said.

"Tom Watson Jr decided to bet essentially the whole company -- $5 billion, probably the equivalent of $100 billion today -- on a new computer system, the System/360," he said. "It made all of IBM's products obsolete.

"The System/360 was the most successful mainframe computer of all time, sealing the blue letters IBM in the public imagination," he said.

IBM sold its PC division to China\'s Lenovo for $1.25 billion

Lenovo Group Chairman Liu Chuanzhi (L) and John Joyce (R), Senior Vice-President & Group Executive of IBM Global Services sign for their respective companies during a ceremony in Beijing, in December 2004. China's largest manufacturer of personal computers Lenovo Group bought IBM's PC business for $1.25 bln.

IBM was unable, however, to emulate its success with mainframe computers with personal computers and the company struggled in the late 1980s and early 1990s.

"Microsoft and Intel were the big winners in the personal computer market, which IBM defined but did not long dominate," Misa said.

IBM sold its PC division to China's Lenovo in 2005 for $1.25 billion.

IBM's comeback came with a strategic shift to software and services and the company posted revenue of $99.9 billion in 2010.

IBM also grabbed headlines earlier this year when an IBM computer called Watson handily defeated two human champions on the popular US television game show "Jeopardy!" in a triumph of artificial intelligence.

Watson's triumph came 14 years after an IBM computer named Deep Blue defeated world chess champion Garry Kasparov in a closely-watched, six-game match.

Hackers attack Malaysian government websites

Hackers have attacked Malaysian government websites, authorities said Thursday

File photo shows Malaysians at a coffee shop providing wireless Internet in downtown Kuala Lumpur. Hackers have attacked Malaysian government websites, authorities said Thursday, following a threat by the "Anonymous" activist group which accused Malaysia of censoring the Internet.

Hackers have attacked Malaysian government websites, authorities said Thursday, following a threat by the "Anonymous" activist group which accused Malaysia of censoring the Internet.

Fifty-one government websites were targeted, causing disruptions to at least 41 of them, the Malaysian Communications and Multimedia Commission (MCMC) said in a statement.

It said the attacks on websites with the .gov.my domain started shortly before midnight Wednesday and lasted several hours, but appeared to have caused little damage.

"The Malaysian Communications and Multimedia Commission confirms that there were indeed attempts to hack several websites," it said.

"However, we do not expect the overall recovery to these websites to take long as most websites have already recovered from the attack," it added.

The commission said it would work with enforcement agencies, security experts and service providers to keep the situation in check.

Malaysian authorities had Wednesday braced themselves for cyber attacks after Internet activists Anonymous warned on a website that they would target the government portal www.Malaysia.gov.my.

The website was still down on Thursday. MCMC did not specify which websites were hacked, only saying its own site was targeted but that the hacking attempt was unsuccessful.

Anonymous sabotaged Turkish sites last week to protest against Internet censorship.

Its Malaysia attack plan threat followed an order by the MCMC to Internet service providers last week to block 10 file and video-sharing websites that it said violate copyright laws.

The hackers explained the rationale for the attack in a YouTube clip, claiming that Malaysia's censorship was an erosion of human rights.

Malaysia's media operate under strict censorship laws but websites have remained relatively free -- despite occasional raids, bans and government criticism -- due to an official pledge not to censor the Internet.

The Internet freedom commitment was made in the mid-90s to attract foreign investment to the high-tech sector.

Anonymous, an international hackers group, rose to fame with a series of attacks on websites linked to the Church of Scientology.

The group gained further prominence after launching retaliatory attacks on companies perceived to be enemies of the whistle-blowing website Wikileaks.

Poll on Facebook users reveals unexpected results

Forty-two percent of the US adult population is using social networking sites, according to a survey
According to a poll published on Thursday by the Pew Research Center's Internet & American Life Project, Facebook users are more trusting, have more close friends and are more politically engaged.

According to a poll published on Thursday by the Pew Research Center's Internet & American Life Project, Facebook users are more trusting, have more close friends and are more politically engaged.

The survey of 2,255 American adults found that Facebook members who use the site multiple times per day are more than three times as likely as non-Internet users to feel that most people can be trusted.

People who use Facebook several times per day average nine percent more close, core ties in their overall social network than other Internet users.

And Facebook users are two and a half times more likely to attend a political rally or a meeting than other Internet users and users of other social networking platforms, according to the poll.

"There has been a great deal of speculation about the impact of social networking site use on people's social lives," said Keith Hampton, the lead author of the Pew Internet report.

"Much of it has centered on the possibility that these sites are hurting users' relationships and pushing them away from participating in the world," said Hampton, an assistant professor at the University of Pennsylvania's Annenberg School for Communication.

"We've found the exact opposite -- that people who use sites like Facebook actually have more close relationships and are more likely to be involved in civic and political activities," he said.

Forty-two percent of the US adult population is using social networking sites, up from 26 percent in 2008, the survey found, and the average age of adult users has shifted from 33 in 2008 to 38 in 2010.

Facebook, which has nearly 700 million users worldwide and nearly 160 million in the United States, was the most popular social network among those surveyed and the one with which they had the most engagement.

Ninety-two percent were on Facebook, 29 percent were on Myspace, 18 percent were on LinkedIn and 13 percent used Twitter.

Fifty-two percent of Facebook users and 33 percent of Twitter users engaged with the platform daily compared with only seven percent of Myspace users and only six percent of LinkedIn users.

The average Facebook user in the sample had 229 Facebook friends with 22 percent being friends from high school, 12 percent extended family, 10 percent co-workers, nine percent college friends, eight percent immediate family, seven percent from voluntary groups and two percent neighbors.

Thirty-one percent of Facebook friends could not be classified. Only three percent of Facebook friends were people users had never met in person.

The average adult Facebook user was 38, the average Myspace user was 32, the average LinkedIn user was 40 and the average Twitter user was 33.

As for their activities on Facebook, on an average day, 15 percent of users update their own status, 22 percent comment on someone else's post or status, 20 percent comment on another user's photos, 26 percent "like" another user's content and 10 percent send a friend a private message.

Most people update their status less than once per week and 16 percent have never updated their status.

The survey was conducted between October 20 and November 28 and has a margin of error of plus or minus three percentage points.

Yahoo helps find smartphone 'apps'

Yahoo! has begun helping people navigate apps for Apple iPhones or mobile gadgets powered by Android software

Yahoo! has begun helping people navigate the sea of applications available for Apple iPhones or mobile gadgets powered by Google-backed Android software. App Search for personal computers and a free AppSpot program for smartphones were crafted to help people find what they seek at Apple's online App Store or the Android Market.

Yahoo! has begun helping people navigate the sea of applications available for Apple iPhones or mobile gadgets powered by Google-backed Android software.

App Search for personal computers and a free AppSpot program for smartphones were crafted to help people find what they seek at Apple's online App Store or the Android Market.

"Together, they take the guesswork out of finding apps that fit your life," Yahoo! said in a blog post.

"App Search and AppSpot allow you to zero in on any app by showing matching app titles with a full comprehensive description, price, overall star rating from users and screenshots in one spot."

The App Store boasts more than 425,000 of the mini-programs for Apple gadgets, while the Android Market was reported to have about 200,000 and growing.

Sony's Music Unlimited comes to Android

Sony has released an app making its Music Unlimited online streaming available on smartphones running the Android system

File photo of the headquarters of Japanese electronics giant Sony in Tokyo. Sony has released an app making its Music Unlimited online streaming available on smartphones running Google's Android system, amid growing competition from Amazon and Apple in cloud-based services.

Sony has released an app making its Music Unlimited online streaming available on smartphones running Google's Android system, amid growing competition from Amazon and Apple in cloud-based services.

Sony's digital cloud-based music service, which launched in December and is available in Europe, the United States, Australia and New Zealand, allows users to stream millions of songs to Sony devices but previously lacked mobile access.

Sony last week said it would restore all Qriocity online music and video distribution services everywhere except Japan after shutting it and the PlayStation Network down in April after hackers compromised personal data from 100 million accounts.

The launch of the new app will make the service available on smartphones running Android as well as devices such as the PlayStation3, Internet-connected Sony televisions and Blu-ray players.

The app will be available to users in the United States, France, Germany, Ireland, Italy, Spain, Britain, Australia and New Zealand.

The service allows users to stream music content from a catalogue of more than seven milllion songs licensed from labels such as Universal Music Group, Sony Music Entertainment, Warner Music Group, EMI Music and independent labels.

Monthly subscription fees start at $3.99.

Earlier this month Apple unveiled its iCloud service that stores music, photos and other content on the Web and shares it across multiple devices.

Online retailer Amazon unveiled its own Cloud Drive and Cloud Player services in March, which allows users to store their digital music online and play it on a computer or an Android device.

New Harry Potter project spellbinds cyberspace

A fortune teller sits with Harry Potter fans dressed up as witches during a Harry Potter party in 2007

A fortune teller sits with Harry Potter fans dressed up as witches during a Harry Potter party in 2007. Harry Potter fans were abuzz with excitement on Thursday after creator JK Rowling launched a mysterious web site counting down to the announcement of a new project.


Harry Potter fans were abuzz with excitement on Thursday after creator JK Rowling launched a mysterious web site counting down to the announcement of a new project.

A spokesman for the multi-million selling writer said the new enterprise was not a new book and was not related to the upcoming release of "Harry Potter And The Deathly Hallows: Part 2", the final film in the epic saga.

Surfers visiting pottermore.com are welcomed by a screen containing two owls and the scrawled message "Coming Soon".

A click on an owl then redirects the user to a Youtube page with a clock marking down time until June 23, and the message "The owls are gathering - find out why", fuelling fevered speculation about the form of the new venture.

Rowling's spokeswoman, Rebecca Salt, said: "There is a holding page up at the moment. It is a new project and not a new book and it's not directly related to the film.

"We are not saying anything more at the moment."

The "Pottermore" trademark is owned by Warner Bros, the films' distributor.

Fans were led to the site late Wednesday by a "Secret Street View" hunt.

In the challenge, ten Potter fan sites were each given a coordinate relating to a letter of the web page address.

A Twitter account set up for the project has already attracted almost 40,000 followers.

Initial predictions for the project included a long-awaited Potter encyclopedia, an online role-playing game and a "giant theme park".

A member of the fan site "www.the-leaky-cauldron.org" claimed to have seen a preview of the product and said it was "in a word, breathtaking".

Japan to fine or jail computer virus creators

Those who deliberately store a computer virus in Japan, face up to two years in prison or fines up to 300,000 yen

This file photo shows people using Internet at a public kiosk. Japan will punish people who create or wilfully spread computer viruses with fines and prison terms of up to three years under a new law enacted by parliament.

Japan will punish people who create or wilfully spread computer viruses with fines and prison terms of up to three years under a new law enacted by parliament.

Under the law, police can seize email communication logs of suspects from Internet service providers, among other information.

The action, which has met with opposition from privacy and free speech advocates, brings Japan a step closer to concluding the Convention on Cybercrime, a Europe-led effort.

The convention is the first international treaty to combat crimes committed via the Internet and other computer networks. Japan has signed the treaty but must pass relevant domestic laws to conclude it.

Under Japan's new law, people who create or distribute a computer virus with no justifiable reason face prison terms up to three years or fines up to 500,000 yen (6,200 dollars).

Those who deliberately store a computer virus face up to two years in prison or fines up to 300,000 yen.

Japanese police agencies had long pushed for such a law, but past bills failed amid strong criticism from privacy and freedom-of-speech advocates who have warned of excessive police powers.

The text of the law says that "in view of the realities of cyber crime associated with the advancement of information processing ... it is necessary to develop the necessary regulations".

Because of concerns the law could violate the privacy of communications guaranteed under the Japanese constitution, it includes a resolution that urges authorities to apply the law appropriately.

Malaysians main culprits in web attack: minister

Most of the hackers who attacked dozens of government and private websites in Malaysia are locals, a minister said Friday.

The attacks on at least 91 websites Thursday followed online threats by Internet activists known as the "Anonymous" group that they would disrupt a Malaysian government portal to protest against Internet censorship.

Ninety percent of those who attacked some 200 websites over the past four days were locals, and authorities were in the process of identifying them, said science, technology and innovation minister Maximus Ongkili.

"We have come to know that most of the hackers were locals, not from abroad," he was quoted by national news agency Bernama as saying.

A customer browses the internet at an electronic market in Kuala Lumpur

A customer browses the internet at an electronic market in Kuala Lumpur in 2010. Most of the hackers who attacked dozens of government and private websites in Malaysia are locals, a minister said.


According to the Malaysian Communications and Multimedia Commission (MCMC), 91 websites, including 51 government sites, were disrupted Thursday alone.

In an update Friday, the commission, Malaysia's Internet watchdog, said the attacks were abating, and most websites had recovered.

"MCMC is still monitoring the situation and continuing to work with other agencies to enhance security measures," it said.

MCMC decided last week to block 10 popular file-sharing websites in an effort to combat piracy. Government officials have denied the move amounts to Internet censorship.

The "Anonymous" group sabotaged Turkish sites last week to protest against Internet censorship. On Tuesday, Turkish police arrested 32 people suspected of belonging to "Anonymous" over the attacks.

New Internet era beckons with company domain names

Firms may be able to move beyond standard web address suffixes such as \

A man surfs the internet at an internet cafe in Beijing. The Internet is poised for potentially one of its biggest shakeups in years as an industry body prepares to vote on Monday on a proposal to open up new domain suffixes for private companies.


The Internet is poised for potentially one of its biggest shakeups in years as an industry body prepares to vote on Monday on a proposal to open up new domain suffixes for private companies.

Under the changes to be decided at a meeting in Singapore, businesses would no longer be restricted to the list of generic top level domains (gTLDs) that include .com, .net and .org when they apply to register a website address.

Industry observers say global giants such as Apple, Toyota and BMW could be in the vanguard of launching websites with their own domain names.

"New gTLDs represent one of the biggest changes to the Internet since its inception," said Michele Jourdan, communications manager for the Internet Corporation for Assigned Names and Numbers (ICANN).

"While they won't have a technical impact on the way the Internet operates, they could potentially change the way people find information and how businesses plan and structure their online presence," she told AFP.

ICANN, a non-profit body managing the Domain Name System and Internet Protocol addresses that form the technical backbone of the Web, is holding a six-day global meeting in Singapore to discuss a range of matters.

Its board will vote on Monday on whether to proceed with the new gTLD programme, and an ICANN source said approval was expected.

"Corporations may choose to apply for their own domain, offering them new possibilities for structuring their online and offline presence," said Jourdan.

"They may also offer corporations better brand control.

"Additionally, entirely new domains may come into existence that bring about new commercial opportunities."

But it won't come cheap.

It will cost a company $185,000 just to apply and there are a number of criteria that must be met before ICANN will give the nod for a firm to own the domain name of its choice.

The fee is needed to recoup the costs associated with the new gTLD programme and to ensure that it is fully funded, ICANN said.

It would also weed out opportunistic applicants seeking to resell domain names for a profit after buying them cheaply, a problem in the earlier days of the Internet.

According to the draft new gTLD applicant guidebook dated May 30, only "established corporations, organisations, or institutions in good standing may apply for a new gTLD".

ICANN will not consider applications from individuals or sole proprietorships.

Adrian Kinderis, a Melbourne-based domain name expert, said big companies will have a golden opportunity to protect their trademarks in cyberspace if ICANN votes in favour of opening up the domain gates.

"One of the biggest issues we have right now is anybody can go register anything," Kinderis, the chief executive of domain name registry services provider AusRegistry International, told AFP.

"The new programme gives trademark holders an opportunity to go in first and secure their brand.

"If they don't have a legitimate trademark for it, then they don't get it. That's why it is better."

The proposed new gTLD programme also offers companies the opportunity to beef up their digital marketing campaigns, said Kinderis, who sits on one of ICANN's advisory boards.

"This is not just about going out to get a domain name," he said.

"You are actually getting an important part of the Internet real estate, it's the digital opportunity to build your message."

A Singapore-based branding expert, Graham Hitchmough, said companies will have a lot more leeway to reach out to their target audience if the new domain names are approved.

"It allows them an opportunity to articulate their brand and range of products in a more clear and consistent way," said Hitchmough, managing director at global agency Brand Union.

Hackers steal customer data from Sega

The Sega Pass website did not contain credit card information, the firm said

Hackers have stolen the personal data of some 1.29 million customers of the Japanese game maker Sega, the company said Sunday, in a theft via a website of its European unit

Hackers have stolen the personal data of some 1.29 million customers of the Japanese game maker Sega, the company said Sunday, in a theft via a website of its European unit.

The Sega Pass website, operated by London-based Sega Europe, did not contain credit card information, the Japanese firm said.

But names, dates of birth, e-mail addresses and encrypted passwords were stolen by intruders to the site, Sega said in a Japanese-language statement, adding the theft had been confirmed on Friday.

Saturday, May 28, 2011

How To Create Ad Hoc Networks

Ad Hoc Networks


Creating

To create a new ad hoc network open Control Panel then Network Connections, or double click on the wireless icon in the system tray (by the clock).



Click on the Wireless Network tab then the add button.



A new window will appear. Give your network a name, and check the two boxes near the bottom.



Click OK to close that window and OK again. If you try to View Wireless Networks, your changes may not be saved, so make sure to click OK first.

Your ad hoc network is all set up now!

Connecting

Open Network Connections (via Control Panel or the wireless icon) and select View Wireless Networks. The following window will appear.



You should see the ad hoc network as a computer-to-computer network. You may have to refresh the list.
Click on the network then the Connect button near the bottom. It may take a minute or two to aquire a network address.

If you don't see your network, you may have to change settings to only connect to ad hoc networks.
Click on Change advanced settings. On the new window, click on the Wireless Networks tab, then advanced.



Select the third radio button and click Close, then OK.
Open Network Connections again, and follow the steps above to connect to the network.

Friday, May 20, 2011

How To Make Any Pair of Headphones Smart Phone Capable

How To Make Any Pair of Headphones Smart Phone Capable

You know what's handy? Devices that perform more than one useful function. Take smart phone headsets, for example: They have headphones which give you the ability to listen to music without annoying your fellow public transit passengers, and the in-line remote and microphone allows you take calls without needing to put your phone to your ear. Unfortunately, the ear buds included on most bundled headsets are almost uniformly low quality. If you've ever wished you could use a pair of headphones you already own with your phone without sacrificing the features of your headset, you're in luck.

This guide will show you how to mount a female headphone socket to your headset, giving you an in-line microphone compatible with any headphones you'd care to connect.

Tools You'll Need

Soldering Iron, solder, good quality wire strippers (or very sharp knife), shrink tube (4mm), needle-nose pliers (preferably with wire-cutters, female jack socket.

Most of these supplies should be available at your local electronics and/or hardware store. I emphasize the quality and sharpness of your wire strippers or knife because I will be focusing on an Apple headset which uses a non-standard wiring technique, and incredibly fine wires. Anything less will cause you to waste the precious little wire available to you for this hack.

Cutting and Preparing the Cable

Using your wire cutters or sharp knife, cut the wire as close to the earbuds as possible. The rubber guides can be removed from the buds to gain an extra 5mm of wire which is worth the effort, considering how short a piece of cable we're working with here.

Strip the outer shielding from the wires. Now we see the non-standard wiring technique that Apple employ. Each wire is independently acrylic shielded meaning that there is no traditional wire shielding to simply remove with your wire cutters. These are also the thinnest wires I've ever needed to work with so be aware that mistakes are likely, keep your wits about you.

The red and green braid you can see in the photo is actually the wire for the microphone and buttons. I'm not sure why it continues up to the right earbud as it terminates in the shield without being connected to anything. You're safe to cut it off and get it out of the way. The red wire is the positive, the copper is the earth.

If you're working with a more standard headset, now would be the point in the guide in which I would take you through stripping and twisting the wires in preparation for soldering. For tips and photos to help you with that process, refer to our recent How To Repair a Headphone Cable and Replace a Jack Plug article.

Removing Acrylic Wire Coating

Now we need to prepare these minuscule, acrylic coated wires for soldering. Unfortunately, the acrylic makes this more difficult than it needs to be. You could use some very fine sandpaper to rub the coating away but you run the risk of tearing what little wire you have available. I suggest using a naked flame from a pencil torch, lighter or match to burn it away. When the flame hits the coating, it will flare up and go out very quickly - too quickly to cause the wire or the shielding to heat up enough to melt. You may need to apply the flame more than once to remove all of the coating from the length of wire you've exposed. Make sure to blow on the wire between applications to cool it.

You will be left with two blackened, soot covered wires. Use a piece of paper towel to gently remove as much of the soot as you can. Don't worry too much about it, solder should stick to it with a little coaxing. Tin the wires by laying each wire on the tip of your soldering iron and melting solder onto it. This will waste some solder, but it should give you a neat result.

Attaching the Jack Socket

Slide your shrink tube and jack socket housing onto the wire now. Once those are in place, you're free to begin soldering your newly tinned wires to the probes on the socket. Using your sandpaper, roughen the probes to make it easier for solder to stick to them. Using as little solder as you can, attach the red wire to the ring probe, the green wire to the tip probe and the earth wires to the sleeve probe.

If you're unsure which probe is which, use a multimeter to confirm. The socket in the above photo is a prime example of why you should always check: The tip and ring probes were on opposite sides to the standard. Rest assured, however; should you not have a multimeter at hand, the worst outcome will be that your left and right speaker will be swapped. Not the end of the world.

Move your shrink wrap up over the joins and gently apply heat with your soldering iron. This should fit firmly around the join and any extra length will work to strengthen the wire around the socket, an area prone to failure. Screw on your socket housing and you're finished! Your versatile smart phone headset attachment is ready for use with any pair of headphones you wish.

Fresh from your victory over tiny wires and acrylic coating, you may notice a slight flaw in the plan: your microphone is now hanging at the end of quite a long headphone cable, rather than sitting snugly beneath your chin. Unless you happen to have a talking belly button, it's time to shorten your headphone cable. It's ok, put away your wire cutters. The whole point of this hack is to make your microphone compatible with any headphones without requiring further modification.

There are any number of methods for doing this such as using electrical tape to shorten your cable, creating a loop which can be tucked into your clothing to keep it out of the way.

I prefer the method that I use for tying up my headphone cable when they are not in use. Wrap the cable around four fingers, keeping the loops nice and tight, leave roughly two loop-lengths of wire hanging over. Remove the resulting loops from your fingers and pinch them together in the middle. Tightly loop the remaining length around the pinch and pull through on one side of the pinch. This keeps your cable in place, while never bending it enough to stress the wire within. The bundle of cable can then too be tucked into clothing.

Now your microphone should be sitting high enough to be useful, attached to your favorite pair of headphones. No more will you have to put up with earbuds falling out, low-quality audio or carrying two pairs of headphones with you everywhere you go.