Thursday 14 September 2017

The Great Tech Panic: What You Should Worry About?

Tech Panic – Cause for Worry 

Technology has been making great progress in transforming our lives which has given rise to panic. Experts have been weighing on how much one should be stressed with regards to self-driving cars, malevolent AI etc.

 In cities like San Francisco; Boston, Tempe, Arizona where self-driving cars have been verified on public roads, there have been trained engineers on board to ensure that the emerging tech does not take on the pedestrians. Nidhi Kalra, co-director of the RAND Centre for Decision Making Under Uncertainty, had commented that it is that persons’ task of paying attention to what the vehicle seems to be doing.

As per the most optimistic estimates of experts, fully autonomous cars on the public roads seems to be at least three years away and that technology will never be infallible, people would still die in car crashes.

However, eventually, self-driving vehicles would probably save lives according to Mark Rosekind, chief safety innovation office at Robotaxi start-up Zoox as well as the former head of the National Highway Traffic Safety Administration, and 94% of the crashes are credited to human mistake.

Would hackers leak my emails? 

To gain access of one’s email is not at all tough. We find phishers who seems to get more refined from the increased power of ransomware attack encountered.

Seth Schoen, senior staff technologist at the Electronic Frontier foundation commented that `a cleverly composed email which states `I’m your tech support person and need to know your password’, still tends to function as a shocking percentage of the time.

When it comes to leaking those emails, the threat to the average person is quite insignificant and attacks like the DNC leaks, the Panama Papers together with the Macron campaign hack could encourage your sense of paranoia, unless you are a Kardashian or a Trump, your personal correspondence is likely to be of little interest to cyber thieves’.

Are We Prepared for Cyberwar?

Former US counterterrorism Czar Richard Clarke in his 2010 book had ranked on how well some countries tend to fare in a digital conflict As per his formula, the US had been placed dead last and on top – North Korea.

Clarke had figured that the US and Russia could have the best offensive hacking capabilities in the world. However, North Korea seemed to have a bigger advantage - absence of digital dependence. The solitary kingdom’s hackers tend to indulge in a scorched-earth cyberwar without risking much since its citizen tends to stay disconnected.

The US on the other hand is in need of the internet than its opponents. Hence Clarke found America more susceptible to what he termed `the next threat to national security’. Seven years thereafter we need to quit worrying that the period of cyberwar is approaching and we need to admit the fact that the digital attacks on infrastructure are unavoidable.

On the contrary we need to focus on how we should recover from them. This would mean bringing down our reliance on digital systems and enhance on maintaining our consistent, out-dated, analog systems, in order that we can fall back on them when digital disaster occurs.

Essential to Hold On to Era of Physical Override 

When a team of hackers had blacked dozens of electrical substations in Ukraine, in 2015, the utility companies had the technician equipped to switch the power back manually, within a period of six hours.

They had been alert since the Soviet-era grid of Ukraine seems to be stiff on a normal day. The modern, highly automated grids of America do not tend to break often. US institutions should develop the readiness of Ukrainian-style, in an event of a grid attack. In case of interference, it is essential for voting machines to have auditable paper ballots as a backup.

 Organisations of all types should be kept updated, offline data backups for speedy recovery when cyber-attacks like the global WannaCry ransomware outburst. There is no need to relinquish on hyper-connected infrastructure though it is essential to hold on to the era of physical override – since when hackers tend to hijack the elevator of your high-rise apartment, one can be glad that the stairs was another option to resolve the issue.

Would Hackers Launch Nuclear Weapons?

Senior researcher at RAND, Bruce Bennett who seems to specialize in counter proliferation and risk management had stated that `in spite of the act flicks imagining that very scenario, it seems highly improbable. Nuclear weapon does not seem to be connected to the internet, making it complex for anyone to hack them.

On the contrary such weapons seems to be organized by standalone computers together with code keys that are distributed by human couriers, which is a method developed and maintained precisely with security in mind according to an aerospace engineer and analyst John Schilling, for 38 North a Korea-focused analysis group.

He informed that there could be a possibility of sabotaging a nuclear bomb by hacking its secondary as well as tertiary guidance system, which is a tactic the US could have utilised on the missiles of North Korea, though there seems little chance that the troublemaker agents could launch bombs.

Would AI Turn Against Humans? 

Paul Christiano, a researcher at the non-profit Open Ai had mentioned that AI ultimately would be capable of directing science experiments executing construction projects as well as develop more AI without human involvement. He together with his colleagues does not seem to worry that the evil robots would destroy us someday.

 Engineers at Google’s DeepMind unit and Oxford’s Future of Humanity Institute however are collaborating in understanding which kind of AI systems could take actions in reducing the chance of being turned off. Their concern lies in the fact that as AI tends to progress beyond human understanding, the behaviour of the technology may deviate from our intended goals. Hence it is up to the researchers to construct a foundation which tends to have human values at heart.

Am I Being Spied on Through my Microphone – Equipped Device? 

Third-party developers, cyber-criminals and at times also the companies which tend to develop smart devices could have the means of accessing your audio stream. Mordechai Guri, head of R&D for Cyber Security Research Centre at Ben-Gurion University in Israel had stated that they are always accompanied by high-quality microphones and your smartphone or smart TV can be turned into a spying device for advertising purposes. Python for network engineers books helps to Mastering Python Networking.


It is also the same in the case of smart home devices such as Amazon Echo and Google Home with far-field always-on microphones. Furthermore apps are probing to access smartphone microphone in order to feed on hyper-targeted ads.

Tuesday 12 September 2017

Google ARCore Brings Augmented Reality to Android


Google’s Innovative Software Development Kit

Google has released an innovative software development kit – SDK known as ARCore in order to bring about an experience of augmented reality – AR nearer to Android users. The ARCore system being a software development kit will enable anyone to bring the AR features to the prevailing Android phones with any hardware updates. Google had mentioned in a statement recently that the platform has now been made available for the developers for the purpose of experimenting which would reduce the competences of augmented reality to the prevailing and the forth-coming Android phones.

 The company constructed on important technologies utilised in Tango, another AR platform by Google, though ARCore is said to be scalable all over the ecosystem of Android since it does not need any extra hardware. Google has mentioned that ARCore branches from its work on Tango. When it had been introduced in 2015, Tango enabled users with compatible devices to create detailed 3D maps of the world by directing a camera towards an object. The Lenovo PHAB2 Pro had been the first Tango phone which had been released.
 

Work with Java/Open GL….

 
The innovative AR platform is said to be rolled out to Google Pixel together with Samsung S8 that tends to run on Android 7.0 Nougat and more. Google has been functioning with manufacturers like ASUS, Huawei, LG, and Samsung as well as with the other main smartphone makers for scrutiny on quality and performance. ARCore that tend to work with Java/OpenGL, Unity and Unreal technologies is said to focus on three features namely motion tracking, environmental, understanding and light estimation.

These would permit the camera of a phone to identify feature points in a room, detect horizontal surfaces where AR object could be located and interpret lighting conditions in order that virtual objects could be lit properly. The company has also manufactured `Blocks and Tilt Brush application to create 3D content to be utilised in AR apps. Apple had make public its ARKit platform directed on augmented reality applications during its annual Worldwide Developers Conference enabling developers to design apps which would take virtual content at the top of the scenes of real-life.
 

New Visual Position Service

 
Google had mentioned in a blog post that they have been targeting 100 million devices towards the end of the preview. Moreover the company has also added experiments with AR page portraying what the ARCore technology can perform. This move of Google into augmented reality is not surprising wherein the firm had mentioned at its developer’s conference this year that it had been working on a new visual position service which is said to support phone in understanding where people are indoors.

 And this can be done be being proficient in detecting what objects are place before the camera of a device. The iOS 11 of Apple that would be made available to the consumer later in the year will comprise of the ARKit which, as per the announcement at the conference would enable iPhone and iPad developers to experience the combination of digital overlays on the real world.


Five Ways Fitness Centers are Using Digital Signage

 Digital Signage
A large fitness center may have hundreds, even thousands of members who visit every year. These members need to be aware of the rules of the center as well as receive the latest news about changes going on within the facility. The process of delivering information can be done efficiently with the help of digital signage. Colorful, easy to read digital signage captures the attention of most people giving them the information they need to fully enjoy the fitness facility. Checkout five ways fitness centers use digital signage to communicate with members.  

To Make Announcements

A growing fitness center may be undertaking new construction. Perhaps a modernized exercise room is being built or a new swimming pool is being installed. Members need to know about these construction projects and how this activity will affect the exercise classes. Digital signage can inform members of time changes for various classes and where they will be held if the location changes due to construction. Digital signage is helpful to members and is easy for the owners of a fitness center to change as necessary.  

To Introduce Products

 Some fitness centers advise members to take certain products in order to improve their health. For instance, maybe the owners of a fitness center want their members to try a particular vitamin proven to increase a person’s energy level. The owners could use digital signage to advertise the vitamin and explain its benefits. Or, perhaps there is a new piece of equipment coming soon to the fitness center. Owners may want to use digital signage to stir curiosity about this new piece of equipment by displaying an image of it as well as a description. By the time the piece of equipment arrives at the center, there are sure to be many members anxious to give it a try.

 To Introduce New Staff Members

 A fitness center with aerobics, yoga, spinning, weight-lifting and other types of classes probably has a large group of employees. When a new staff member arrives at the center, owners can introduce the person via digital signage. This gives members a chance to get to know the person’s background, level of experience and what sorts of classes the person will be teaching. It may even persuade some members to try a class they’ve never tried before! One example of a resource for fitness centers and other businesses interested in digital signage is www.navori.com.  

To Instruct Members Regarding the Exercise Equipment

Some pieces of exercise equipment in a fitness center are easy to figure out. Others require a little instruction before a member can use them. Digital signage is useful for taking members through the steps of using unfamiliar pieces of fitness equipment. Once a member understands the instructions, he or she will become more confident with every use.  

To Advertise Rules Related to Safety

Most fitness centers have certain rules and guidelines to promote the safety of the people who belong to the facility. For instance, one common rule is to avoid wearing loose clothing when walking on a treadmill. Loose clothing could get caught in the conveyer belt and cause injury. These types of safety rules could be displayed by digital signage around the facility.

Also, digital signage could be used to make members aware of guidelines regarding conduct in the locker rooms. Picking up clothing items, wearing sandals in the showers and making sure valuables are stored in lockers are just a few examples of guidelines to put on digital signage. Lastly, digital signage is useful to the members of a fitness center because it allows them to get accurate, up-to-date information right away.

So, if there is a last-minute time change or instructor change for a class, members can read about it as they come in. Digital signage can help the owners of a fitness center provide their members with first-rate customer service.

Monday 11 September 2017

You Can Start a Coding Career Without a Degree — Here’s how

Forge a coding career without a degree with this effective strategy.

Most of the people spend their whole life stuck to a job which they don’t like at all. However the modern age offers respite and opportunity from the monotonous job schedules with tech based courses. Coding is the next level 0r newest gig for most of the individuals and once you get hang of it then you can take a real job with it which pays well and always challenges you. It is fascinating to note that more than 7 million jobs are available in varied occupations which require coding skills and it ranges from the software engineering, IT administration to the web development.

There are a number of industries and business which requires technical experts for building products, solving problems and marinating system across its ecosystem. Opting for a career in coding is the right choice for the individuals and there are two great ways of doing it which ultimately leads to becoming a full time programmer or developer.
 

Learn to Code Bundle with major programming languages.

 
Leaning to code or writing programs isn’t a simple task rather it requires careful understanding of various syntax, rules, logic and other attributes depending on the programming language in question. Coding makes use of a wide range of programming languages, technologies and tools which helps in giving shape to desired functions or features. A simple 10 course bundle comprising of the major programming languages will help you in finding the right idea of complex yet fascinating world of coding.

About 105 hours of training is enough to equip any individual with the knowledge of the major web development languages like HTML5, CSS3, JavaScript etc. along with the database management tools like AngularJS and MySQL. Having the knowledge of these major programming languages will lend a hands-on experience in creating a wide range of application and website right from the scratch which can include a whole new social network or a ticket booking websites.
 

Learn to Code Bundle with niche programming languages.

 
Opting for Bonus Bundles for any coding course will help in getting acquainted with niche programming languages. Learning some of the niche development streamlining apps such as Flux and React JS will help in getting a more sophisticated and concentrated knowledge of coding. Just spending 16-20 hours more on such technologies or programming languages will help in increasing the employability of the individuals.

Another widely used and supported distributed version control system is none other than Git which comprises of everything which a coder can dream of. Both of these courses are not designed to make a hole in the individual pocket by being too much expensive rather the first course costs nothing more than $100 and second one is $150. There are a number of websites and books available in the market which can help individuals in shaping and brushing their coding skills to the next level by familiarizing them with the latest tools used by the professionals on everyday basis.

Saturday 9 September 2017

Catching the Hackers While They Act

Catching the Hackers
How investigators trying to catch hackers work

The role of the computer expert becomes increasingly relevant to the proliferation. Nowadays, the attacks such as phishing or data hacking for ransomware purposes are the main issues. Hence, these specialists perform a thorough analysis on the affected devices to solve the issues. And also they obtain the digital evidence to get it right.
While hackers try not to leave traces, their footprints are not so easy to erase. That is why their job is to shed light on the hacking. This can be done by the reconstruction of the activity of the electronic device that has been used by the hackers. This is explained by Telam Maximiliano Bendinelli, the computer forensic expert.
A specialist works with Pablo Rodríguez Romeo in the CySI, said that last year they received a large number of queries from companies about the attack.

Virtual Hijacking of Data

Bendinelli cited virtual hacking of data for extortionate purposes known as ransomware. The hacking of data stored in a technological device to be later released in exchange for a ransom.

With their experience in the cases, the experts dealt with in the study. They found that the cost for the release of the data usually ranges from the US $ 300 to the US $ 1,500, always in Bitcoins.

These experts found sometimes interesting turns in the case of ransomware. They could even solve the situation without paying the hackers.

The hackers trick the users with some fraudulent methods that intend to direct them to some other page. If the user gets into to the page, paves the way to download some malicious codes into their computer for hacking their data.

Some reputed banks are also victims of these attacks, but they don't want to expose it. Rather, they get the experts' consultation to solve the issues.

The intervention of the computer expert becomes crucial in the field. They carry out the corresponding analysis, obtain and safeguard the digital evidence of the users. And also to implement the necessary methods to avoid invalidating the test.

The investigation of the issues arises from an audit, working with those who might be involved. And also identifying the correlation of facts and equipment.

The victims or the users never work with the original evidence. Because the users run the risk of damaging it. Hence, they proceed to preserve the evidence from a forensic copy.

The Forensic copy helps to identify the hacker


The forensic copy allows recovering all the information on the disk. Even the deleted, and also rebuilding the hacker's steps on the computer.
Currently, it is very common to use the forensic investigation software. It allows the analysis and processing of a lot of information with unmatched speed. This kind of software showed very good results. It makes technology a top-quality alternative to the old forensic computer applications.

The specialists summarized the work of the computer expert as a researcher and consultant. This is to carry out the processes, using the benefits offered by the research software and the management of various analytical tools to find hackers. This allows the identification of relevant data and cross-referencing of fundamental information.