Tuesday 16 August 2016

Seven Amazing Facebook 'Secrets' You Probably Didn't Know About

Facebook

We all tend to use Facebook in order to get connected and be in contact with our friends, acquaintances and relatives who could be at any location of the world. Some of the features may tend to impose on us. Most of us may not be aware of some of the awesome features which have not drawn much of our attention. There are a few hints, tricks and tips which several users are unaware of Facebook though it has been around for over a decade. Facebook which is a social media behemoth, tends to have more than 1.44 billion active users per month where American seem to spend about 40 minutes daily on it which accounts for almost 20% of overall time online. However in spite of all the usage, there seems to be several features which the user may not realize Facebook tends to have. Here one can get some insight from the Facebook inbox right to getting a preview into the lives of strangers across the world:

1. See all who have rejected your request

If the user wants to know who have rejected their friend requests on Facebook there is a method in doing so. Devoted users of the social network for several years would have come across one or two rejections in creating a friend list which could comprise of ex-primary school mates, work colleagues as well as distant relatives. The process tends to take less than 60 seconds which can be done by opening Facebook, in the browser and not the app. Then you could click on the friend request tab and select `view all’ in the drop down menu and finally click on `view sent requests’.

2. Connect with strangers around the world 

You may have come across excess of Facebook Live videos coming into your New Feed during the past months though there is another lesser-known live streaming feature on the site. On clicking the icon on Live Video below the App section on the left-hand navigation bar the user has the capability of accessing people’s feed that tend to record clips all over the world.
3. Access your `other’ box

When Facebook considers that something could be possibly a spam, it tends to diverts it to your Message Request inbox where it could remain endlessly. You could view these messages by opening up Facebook Messenger on your phone and click the `Me’ section towards the bottom right of the screen and go to the `People’ section. Select `Message Requests’ and hit the link `See filtered messages’.

4. Play the secret football game 

Facebook had launched an addictive football game, at the beginning of June in order to celebrate the summer of Soccer as Euro 2016 had started. To play the football game, you could update your Messenger version and send a football emoji to any of your friends. On tapping the emoji once it is sent, you could start playing
football.

5. View all photos your friends have liked on Facebook 

A Simple way of viewing every photo you have liked on Facebook and the photos your friends, family and many other have liked is by heading to the tool bar towards the top the Facebook profile and explore `Photos liked by me’. If you wish to view all the photos your friends have liked then you could type in `Photos liked by, followed by the name of the person. You could also filter the images according to the year, place and who they had been posted by. Besides these you could also look out for posts which could have been hashtagged in Facebook by just adding the tagged word towards the end of the web address for instance https://www.facebook.com/hashtag/. You would get various results on typing post with hashtag `clarkson’ in the search box of Facebook. It could be worth attempting it.

6. Play Chess 

You could also play chess by utilising Facebook Messenger. On opening a conversation with an individual you intend to play with, just type `@fbchess play’. Then a board tends to appear and your opponent is invited to make the first move. You could select a piece by using K for king, Q for queen, B for bishop, N for knight, R for rook and P for pawn.

7. Remotely log out of Facebook

If the user tends to remain logged on to Facebook on a public computer, through oversight, you could log out from another location by going to Setting-Security to where you’re Logged In and hit `end activity ‘in order to log out.

Conclusion 

Facebook had been created in order to help viewers to get connected with their colleagues, friends, family and relatives and many others. The fact is that it is even better when one tends to get connected with them on their own terms.

Friday 12 August 2016

Hackers Breach the Ultra-Secure Messaging App Telegram in Iran

Telegram

Telegram Accounts Hacked – Susceptibility of SMS Text Message


According to Reuters, over a dozen Iranian Telegram accounts, like the messaging app having a focus on security have been compromised in the last year due to the susceptibility of an SMS text message.They have recognized around 15 million Iranian users’ phone numbers, which seems to be the biggest known breach of the encrypted communication systems as informed by cyber researchers to Reuters.

 According to independent cyber researcher Collin Anderson and Amnesty International technologist Claudio Guarnieri, studying Iranian hacking groups for three years has informed that the attack which had occurred this year, had not been reported earlier, has endangered the communication of activists, journalist together with several others in sensitive positions in Iran, where Telegram is said to be utilised by around 20 million users.

Telegram tends to endorses itself as an ultra-secure instant messaging system since all the data is encrypted from beginning to end which is known as end-to-end encryption. Various other messaging services comprising of Facebook Inc., WhatsApp state that they have the same proficiencies. Telegram, which is headquartered inBerlin, states that it has 100 million active subscribers and is extensively usedin Middle East, inclusive ofthe Islamic State militant group and in Central and Southeast Asia as well as Latin America.

Authorization Code –Diverted by Phone Company/Shared with Hackers


According to Anderson and Guarnieri, the susceptibility of Telegram is in its use of SMS text messages in activating new devices. When a user tends to log on to Telegram from a new phone, the company directs them with an authorization code through SMS which can be diverted by the phone company and shared with the hackers, according to the researchers.

Equipped with the codes, the hackers can now add new devices to the Telegram account of the user enabling them to read chat histories together with the new messages. Anderson had informed during an interview that they had over a dozen cases where Telegram accounts have been negotiated through ways that sound like fundamentally coordinated with the cellphone company.

According to the researchers, Telegram’s dependence on SMS verification tends to make it defenceless in any country where the cellphone companies are possessed or profoundly influenced by the government.

Iranian Hacking Group – Rocket Kitten


Telegram spokesman stated that customers could defend against these attacks by not relying on the verification of SMS. Telegram enables though it is not essential that customers create passwords which could be reset with the so-called recovery emails.

The spokesman, Markus Ra has informed that if one has a strong Telegram password and the recovery email is secure, the attackers can do nothing about it. The researchers believe that the Iranian hacking group Rocket Kitten is responsible for the Telegram breaches based on resemblances to the setup of past phishing attacks credited to the group.

There is a prevalent rumour that Rocket Kitten tends to have ties to the Iranian government. John Hultquist, managing the cyber espionage intelligence team at the security firm FireEye, of Rocket Kitten has informed that `their focus generally revolves around those with an interest in Iran and defense issues however their action is completely global. With regards to Telegram attacks, it has also been suggested by the researchers that SMS messages could have been conceded by Iranian cell phone companies, which is an industry that has prospective links with the government

Thursday 11 August 2016

Google Partners with Glaxosmithkline on $700 Million BioElectronic Venture

Glaxosmithkline

Google to Partner with GlaxoSmithKline – Bioelectronics Medicines


As per a recent joint announcement, the parent company of Google will be partnering with GlaxoSmithKline – GLAXF, which is the leading pharmaceutical firm of British and would be launching new company developing bioelectronics medicines. The two companies intend to put in as much as $700 million for the next seven years in the new venture which would be named Galvani Bioelectronics.

The life science division of Alphabet, Verily would own 45% of the venture and Glaxo with 55%. Bioelectronic medicine is said to be a new field of research aimed on implanting minute devices which could change electrical signal in the nerves in treating chronic conditions. Several biological processes tend to be controlled through electrical signals which are transmitted from the nervous system to the organs of the body.

Glaxo had stated that the early-stage research in its laboratories recommend that distortions of those signalling pathways were involved in many long-term ailments comprising of diabetes asthma and arthritis. The assurance is that these devices are much more effective as well as economical for the patient than the prevailing treatments. In August 2015, Google had officially launched a standalone business devoted to life science a few days after the company had announced the corporate restructuring which had developed Alphabet and rebranded it as Verily in December.

New Technologies from Early Stage R&D to Clinical Testing


Google’s co-founder, Sergey Brin had mentioned in a post announcing the new division last year that they would continue to work with the other life sciences companies in order to move new technologies from early stage R&D to clinical testing and hope to transform the way they detect, prevent and manage disease. Earlier, Alphabet had partnered with Johnson & Johnson – JNJ, in the development of enhanced robotic tools for surgeries.

 The efforts tend to be ambitious for a company which has been building its name assisting people search the Internet instead of helping doctors explore for cures. Initial attempts of improving smart contact lenses and a Star Trek-style diagnostic device had been disapproved as more of hype than reality, by some in the scientific group. However, for Google, there is real money at stake here. Verily together with Nest and Google Fiber seems to be the three businesses in Alphabet’s risky `Other Bets’ division which is said to be really generating some revenue.

Possibility for New Beneficial Modality/Old-Style Medicines/Vaccines


A net loss of around $859 million on that division had been reported by Alphabet which had also comprised of expensive activities such as self-driving cars for the quarter ending in June. Glaxo has stated that Galvani Bioelectronics would be bringing together the knowledge of drug discovery of Glaxo and development with the expertise of Verily in reducing low-power electronics, building software for clinical applications and data analytics. Initial process would be concentrated on developing miniature electronic devices in testing out the concept in humans for the first time, according to Glaxo.

Glaxo’s head of vaccines and chairman of Galvani Bioelectronics, Moncef Slaoui, stated that the treatment would work on attaching tiny electronic devices to individual nerves and if successful the approach would provide the possibility for a new beneficial modality together with old-style medicines and vaccines. Kris Famm who tends to head up Bioelectronics research at Glaxo would be the president of the new company with Andrew Conrad as the chief executive of Verily who would be on Galvani’s board.

Wednesday 10 August 2016

These Robots Are Chains of Tiny Magnetic Beads

robo

Healing with Magnets – Microscopic Surgical Robots


Healing with magnets could someday be considered as a genuine solution if the magnets tend be microscopic surgical robots. Operating the same magnetic fields which had been portrayed in controlling the swimming motion of microscopic robots, a team of engineers at Drexel University had proven the capability of assembling and disassembling chains of minute magnetic beads.

According to a study co-author, presently an associate professor of mechanical engineering at the University of Utah, Henry Fu informed Live Science that if they tend to have these simple geometries as building blocks it can be put together to make more complicated shapes which could do more things.

The expectation is to ultimately utilise these remotely controlled chains named modular microrobots, in the human body for the purpose of medical use like delivering directed medicines or performing surgeries on a small, non-invasive scale according to the researchers.

Various combinations as well as shapes of the spherical beads could mean better adaptability. Fu stated that the beads, for instance could be transported to an area in the body with ease in one configuration, though it could then be deployed into various shapes to move through various tissues or perform precise tasks.

Chains Viewed under Microscope/Remotely Operated


A researcher in the Nanorobotics Laboratory at Polytechnique Montreal, Charles Tremblay, who is not involved in the study, had informed Live Science in an email that the project seems to be a good idea. However he also commented that some of the challenges comprise of the need for visual feedback and transparent medium, to exercise the robots.

Researchers view the chains under microscope and remotely operatethe micro-swimmers by modifying an array of three solenoids, electromagnets which tend to produce controlled magnetic field and when it is rotated, the chains tend to swim through liquid. A chain of three beads just about 10 microns long, for perception, the width of an normal hair of human around 100 microns, is said to be the simplest of the micro-swimmers which the team seemed to work with. It makes them a bit bigger than bacteria which Fu had researched earlier. He comments that he had looked at the fluid mechanics of how bacteria tend to swim. The principles seem to be the same irrespective if you are a robot or a living thing.

Scratched the Surface with Proof of Principle


The researchers worked out methods of building the chains without the magnets resisting each other and disassembling the chains seems to be comparatively easy. The scientists observed that more drawn out chains seemed to swim speedier when turned at the same recurrence as the shorter one, displaying at a fundamental level that typical progresses could have various services.

 There could be various possible procedure of the globule but according to Fu they are not at the phase where they know exactly what shape is needed to get to, towards the end.Fu has stated that `you spin them around fast enough and they will fall apart’. He further added that they had just scratched the surface with a proof of principle and that is what makes it exciting. There seems to be plenty of possibilities.

Tuesday 9 August 2016

How the World’s Thinnest Laptop Measures Up to the MacBook Air

HP

HP Spectre – Thinnest Laptop – Impressive Machine


The HP’s Spectre laptop the thinnest laptop in the world is said to be only 0.3cm thinner than the MacBook Air and is considered to be one impressive machine. The HP Spectre is 1.4cm thick weighing around 1.1 kg while the 13” MacBook Air is said to be 1.7cm thick and weighs 1.8 kg. Overlooking the minor variances with regards to dimensions and weight, HP Spectre has taken the technology and the design to an incomparable level.

The MacBook tends to have simple design with all the laptops of the tech company, in silver, pink, grey or gold casing with the Apple logo towards the centre of the lid. But the HP Spectre has utilised artisan materials together with outstanding skill in the creations of an expensive looking device.

Carbon fibre and aluminium skill has been used in the device with a two-tone finish on the gold-coloured spine which is the first thing appealing to the eye. The HP logo in gold towards the centre of the lid is also attractive against the black background. The piston hinges cleverly crafted that have been used to life and lower the display, have been hidden within the laptop when the lid is closed.

Vulnerable to Fingerprints


The golden spine is said to be vulnerable to fingerprints and those with OCD could find their finish to be troublesome in keeping it spotless. While the Apple’s MacBook is driven by a 1.6GHz dual-core Intel Core i5 processor, the HP Spectre is said to have a 2,5GHz 6th Gen Intel Core i5 as well as i7 processors which means that the Spectre is somewhat faster with regards to the daily task and is also equipped better to handle additional complex things like editing images or video.

The manufacturer has utilised breakthrough hyperbaric cooling technology to ensure that the HP Spectre is capable of handling the performance provided by the i7 processor without overheating, which tends to actively draw in cool air, instead of just venting out heat.

Both the laptops are said to come with full size, backlit keyboards together with all-glass trackpad that seem to have little to no variance in its functions. Besides this both the laptops tend to have 8GB of memory and also have standard 256GB of storage that can be organized to 512GB flash storage.

Operating System Differs


The MacBook Air tends to have a slightly improved battery life of up to 12 hours while the HP Spectre seems to have only nine hours. With regards to audio, the MacBook Air has the standard stereo speakers that have been utilised by Apple.

The HP Spectre on the contrary tends to have stereo speaker custom-tuned in partnership with specialists at Bang & Olufsen. The speakers is stated to have an audio boost giving outstanding clarity as well as more dynamic sound and on using both the devices, the HP is said to be much more remarkable.

Apparently the operating system tends to differ with MacBook utilising OS X and the HP Spectre utilising Windows 10 and the connectivity provided by the devices also tend to differ. The MacBook Air has two USB 3 ports, a thunderbolt 2 port and a MagSafe 2 power port together with a headphone jack.

 The HP Spectre, on the flip side has opted for three USB Type-C ports, which is a next generation industry standard providing ultra-fast data transfer speed along with device charging and video output.