Saturday 5 November 2016

Firefox Disables Loophole That Allows Sites to Track Users via Battery Status


Firefox
We are living in a society, where the science and technology have taken a great leap forward and developed the most outstanding invention of the computer and the internet, which have now become such an issue that a little bit of touch of these can be seen in almost everywhere in our life.

The web surfing in the computer or other devices, with the help of the internet, is a very common issue in our life and people of almost all color, class, nationality are now accustomed with these technological advances, which cannot be avoided, due to its useful characteristics. To cater the web world, the user needs to take the help of a browser that can play the role of perfect vehicle in surfing process.

The Firefox is one such browser, which is considered as one of the most popular ones and being used by millions of internet enthusiasts, across the world. It is popular, not only for the colorful look or name but for the user-friendly features, which are time to time developed by a strong professional team. Recently Firefox disabled one of its features, considered as a loophole because it allows various websites to track the specific user through the status of the battery use.

The Issue at a Glance

The battery status feature of the Firefox is having some loopholes and these are now being fixed or disabled by the organization to provide a sigh of relief for its millions of users from being opened to the users, who want to get the details of the internet user. Some of the features of this fixing of loopholes are as follows: 
  •  The said feature is known as “battery status API’ that allows various websites to request information about what amount of battery life has left of a specific visitor and these are; whether the device is plugged in or not, what time the battery will take to be exhausted and the percentage of remaining charge. 
  •  The browser is having the features that were helpful for websites to offer some of the lesser energy sensitive versions sites for their visitors, who are having less battery power remaining e.g. a mapping site may download a smaller amount of information or a social networking website could put out of action its auto-playing video. 
  •  Only in 2015, the Guardian, renowned newspaper of international repute, reported with various instances that researchers have discovered that someone can easily abuse the specific feature, which may helpful in tracking down the browsing on the internet. 

Now Firefox has disabled this battery status feature in a bid to help their potential users to get rid of the problem of getting tracked by other sites, which is a great threat to their personal security and dignity. Although they have already repaired this loophole, there are others in the market of browsers, who are now considering of repealing some of their features, which may help the internet lovers to get proper immunization from internet threat of being tracked by any websites or personnel of questionable identity.

Researching Industrial Components before Buying


Industrial Components
Your factory relies on a host of equipment and parts for its successful daily operations. When one of your machines breaks down, it is essential that you get the required parts quickly. However, you do not want to sacrifice speed for quality. You can find high-quality industrial components and more for your business by shopping online today.

Resources for More Information

As knowledgeable about machine parts as you may be, you still could benefit by having more information about them available to you during the purchasing process. Some of the parts may be a bit unfamiliar to you; others may be items that you have not used in quite awhile. You also may come across components that are entirely new to you and the machine shop market. You can learn everything you need to know about them by using the resources found on the website.

You can click on the pictures of the parts for sale to get an in-depth description of what each item is used for and with what equipment it is compatible. For example, if you need a hose valve, you may want to know what sizes hoses it can be used with and what hose manufacturers recommend it.

Likewise, you may want to see the part in action before you buy it. The website has videos showing the parts being used and also describing how they should be added to machines already in your shop. This visual information can help you use the parts safely and effectively, saving you money and protecting your shop machinery.

More Help

The website also has a live chat ready to help you get fast answers about parts you want or need to buy. The chat agent can direct you to the right components to buy for your shop and also give you pertinent information like the parts number or recommended compatibility. You can access this help by clicking on the Resource Center link at the top of the page or by clicking on the live chat window at the bottom right side of the website.

Your factory's daily success and profitability depends on the quality of parts you use to repair and upgrade your machinery. You can get the components needed for repairs and more by shopping online. You can also learn more on using this gear properly by using the online resource center options.

Thursday 3 November 2016

Microsoft Attacks Google's Windows Hack Alert



Microsoft

Google leaves Microsoft red faced by revealing a potent security flaw found right in its popular Windows operating system. Google has published a report which gives insight and remarkable details into the security flaw which has yet to be fixed by the Microsoft. It should be noted that Google has already given a deadline of seven days to Microsoft for fixing up the flaw but Microsoft simply failed to play by the rules. Google has stated that it was necessary to reveal the flaw to public as it was being actively abused. Microsoft reiterated by stating that alert which only ends up in causing more harm because it will still need more time come with a suitable security patch.

The flaw revealed by Google

Google has revealed a major flaw in the file named Win32k.sys which is utilized by the Microsoft’s Windows operating system to display graphics. Any kind of alteration or moderation to this file can create havoc for the users which leaves the display system is jeopardy. Deleting or altering this file results in system errors with the notorious blue screen of death. This has been known by all the major security experts and operating system users as well as technicians but the flaw revealed by Google brings showcase a vulnerability which can utilized by the hackers for their own personal gains.

Google has quite frankly laid down the roadmap for any hacker to exploit this vulnerability through using a ‘security sandbox escape. This simply means that if a hackers gets acess of any Windows operating system the he will get the ability to alter other computer function sin order to cause more problems for the end users.

Why Google chose to reveal the vulnerability? 

Google has a policy which has been active since 2013 and it states that Google will offer 60 days to the developers to fix up the flaw identified by it, only in the case if no one making active use of the flaw. But if it’s found that the vulnerability is being utilized by hackers or other then Google will offer just 7 days before making the flaw public.

Similarly Google has given seven days to the Microsoft to come up with a fix for this vulnerability but they failed to do so. Microsoft has stated in its defense that it isn’t feasible to come with right solution and fixing parameter with an imposing aggressive timeline. It has also been stated by Google that users can safeguard themselves from this flaw through limiting the exposure by the using the Chrome which is not effectively exposed to the vulnerability.

Tech community is divided in this debacle

Cyber security experts are left scratching their whether the decision taken by Google is right or wrong given the fact that revealing the flaw will still require a security patch from Microsoft and Microsoft requires time to develop it. A security expert has stated that bringing flaw public without knowing who are the attackers and targets can aggravate the situation further.

Wednesday 2 November 2016

Samsung Electronics to Acquire Artificial Intelligence Firm Viv

Samsung

Samsung Acquiring US AI Platform Developer Viv Labs Inc


Recently the tech giant Samsung Electronics Co Ltd had mentioned that it will be acquiring U.S. artificial intelligence – AI platform developer Viv Labs Inc. which is a firm run by co-creator of Apple Inc’s Siri voice assistant programme. Samsung had specified in a statement that it intends to integrate the AI platform of San Jose based company known as Viv, into the Galaxy smartphones and develop voice-assistant services to home appliances together with wearable technology devices.

The financial terms had not been disclosed. In order to make artificial intelligence adequately good in enabling consumers to interact with their devices much more naturally especially through voice, the technology firms have been locked in an increasingly heated race.

 Alphabet Inc’s Google has been considered to be the leader in AI though there are others such as Amazon.com, Apple and Microsoft who have also launched their own offerings comprising of voice-powered digital assistant.Samsung being the top smartphone maker in the world is also eager to differentiate its devices from phones to fridges by combining AI.

The achievement of Viv could benefit the Korean firm showing its effectiveness when the Google’s new Pixel smartphones equipped with the U.S. firm’s voice powered digital assistant tends to threaten Samsung together with the other smartphone manufacturers who seem to be mainly dependent on the Android operating platform.

Teach System in Creating New Apps


Samsung’s executive vice president, Rhee In-jong informed Reuters in an interview that Viv brings in a very unique technology enabling them to have an open system where any third party service and content providers could add their services to our devices’ interfaces. Rhee stated that Samsung needs to really revolutionise how its devices operate, moving in utilising voice instead of touch and that they cannot innovate using only in-house technology.

The chief executive of Viv and co-founder Dag Kittlause, a Siri co-creator together with other top managers at the firm would be continuing in managing the business independently after the acquisition. Rhee also informed Reuters that Samsung would continue in looking for acquisitions to strengthen its AI together with the other software capabilities without mentioning any targets. Viv’s AI platform enables developers to teach the system in creating new apps or to utilising the prevailing one and build an open ecosystem of intelligence.

Envisaging Future Beyond Apps


Kittlaus had mentioned in a statement that at Viv they are building the simplest system to talk to devices and services everywhere. They are envisaging a future which is beyond apps where one could get what they need instantly and easily irrespective of where they could be or what device is nearby.

Analyst at Edison Investment Research Richard Windsor told IBTimes UK that Viv is very good at interpreting and understanding natural speech and understands context with regards to earlier asked questions. It can unravel multi-part complex questions. If this tends to work as advertised, it would be better at natural language than Google Assistant.

Viv runs everything in the cloud which means the dislocation of the phones on Android of Samsung and everything else on Tizen could be less of an issue than what is at present. But this has placed Samsung in a position to compete directly against Google whose focus is to have its Google Assistant front and centre of every Samsung Android device according to Windsor.

3D Printing Technology to Create Shock Absorbing Skin

Shock Absorbing Skin

3D Printing Technology – Custom Shock Absorbing Dampers/Skins


Robots have a tendency to break and often it could be due to improper padding to protect them. However scientists of Computer Science and Artificial Intelligence Laboratory at MIT – CSAIL have come up with a new technique for 3D printing soft materials which tends to make robots safer as well as more accurate in their movements.

For instance, after 3-D printing a cube robot that moves on bouncing, the researchers prepared it with shock-absorbing `skins’ which utilises only about 1/250 of the amount of energy it transfers to the ground. The 3-D printing technology had been utilised to create custom shock absorbing dampers or skins in order to safeguard drones and robots.

Known as the `programmable viscoelastic material – PVM technique, the printing method of MIT provides object with the accurate stiffness or elasticity they may need. According to the MIT, the inspiration for the project had come from a predicament. Common damper resources usually tend to have solid as well as liquid assets which are made from compact, cheap and readily found items like rubber or plastic, but these seem difficult to customize. They cannot be created beyond specific sizes and dampening levels which are already in place.

Cube Shaped Robot – TangoBlack


This issue had been resolved by the team by utilising 3D printing technology in creating a bouncing cube shaped robot from a solid, a liquid together with a flexible rubber type material known as TangoBlack+. Besides absorbing shock, the cube robot is said to be capable of landing more accurately in consideration of its skin.Daniela Rus, Director of CSAIL who had supervised the project and co-wrote a related paper, commented that reduction tends to make the difference in preventing a rotor from breaking of a drone or a sensor from cracking when it tends to hit the floor.

 These materials permit 3-D print robots with visco-elastic properties which can be recorded by the user at print-time as part of the process of fabrication. MIT informed that the technology could be utilised in expanding the lifespan of delivery drones such as the ones that have been created by Amazon and Google. It could also be engaged on a more practical level for performing tasks like helping to protect phone or cushioning heads in helmets and the feet in shoes.

Skins Enables Robot to Land Four Times More Accurately


The skins also enable the robot to land almost four times more accurately recommending that related shock absorbers can be utilised in helping in lengthening the lifespan of delivery drones.The new paper was presented at IEEE/RSJ International Conference on Intelligent Robots and Systems in Korea written by Rus together with three postdocs with lead authors Robert MacCurdy together with Jeffrey Lipton as well as third author Shuguang LiThe cube robot comprises of a rigid body, accompanied by two motors, a microcontroller, battery together with inertial measurement unit sensors.

Four layers of looped metal strip seem to serve as springs which tend to propel the cube. Hod Lipson, professor of engineering at Columbia University and co-author of `Fabricated: The New World of 3-D Printing’, states that by combining multiple materials in achieving properties which are beyond the range of the base material, this work drives the envelope of what’s probable to print. On top of that being able to do this in a single print-job, raises the bar for additive manufacturing’.

Tuesday 1 November 2016

If the US Hacks Russia for Revenge, That Could Lead to Cyberwar


CIA
After Russia took claim of a recent upon the US government in the cyber field CIA wishes to send a message back by indulging in similar response. Russian hackers brought massive cyber attacks upon the US and try to bring huge interference during the US election through state sponsorship. CIA has a plan to bring the offensive back to the Russian by launching similar attacks which will only help worsening the relationship between the two countries.

Just last week a report was released by NBC News where it was specifically stated that CIA is actively working on the blueprints to launch one of the most covert cyber operation against Russia in near future. Few experts has suggested that CIA would be working towards leaking the letters and documents related to Vladimir in the similar fashion as Russians has released the documents related to the Clinton campaign and the Democratic National Committee.

Documents collected to be utilized during cyber attack

Retired security personnel has stated that over the years CIA has accumulated a wide number of documents and filed which can create trouble for the Russian and most importantly for Vladimir Putin. These documents basically deal with notorious dealing of the Putin and his associates in the last decade and beyond.

Ex-NSA Chief Michael Hayden has even went ahead to say that hacking foreign governments as well as political happens to be the past time of the CIA. Currently the relationship and atmosphere surrounding these two countries has become quite similar to the Cold War era but instead of a nuclear war threat of an impending cyber war looms in the air. Obama is going out of the office in November but even that has not stopped him from criticizing Putin in this regard.

It might even happen that all these theories about CIA possessing a truckload of information on Putin is simply a story to scare off Russians from causing anymore undue damage in the cyber field. If CIA plans are real then how useful will it be against Russia is yet to be asserted. A number of security experts has stated simply releasing damaging documents against Putin will not have any impact among the Russian government though his image might take a hit globally but nothing worthwhile can come out of it in the long run.

A warning for impending cyber war

US politicians are highly susceptible to the public pressure which can even spoil their future and political career if any documents are found against them. On other Putin isn’t much susceptible to such thing but Russian can utilize its highly robust internet surveillance plan to launch attack upon the US in the cyber field if it ever feel threatened then it will go on full-fledged cyber war against US.

The international paradigms changes just a few years ago the greatest threat to US cyber security was China. China has been accused of hacking into and tens of millions of US citizen’s security review files right from the US government online databases which tend to go decades back.

Monday 31 October 2016

New Security Method Sends Codes through Your BODY

New Security Method Sends Codes through Your BODY

Low Frequency Transmission


Wi-Fi together with Bluetooth are said to be areas for hackers since these techniques enables easy and anonymous stealing of passwords. In order to stall these activities, a group of students have come out with a system which tends to utilise low frequency transmission to send passwords via the human body.

On reversing the same system utilised by fingerprint sensors, they have achieved a method to generate wireless data transmission between the smartphones and the other devices. Senior author Shyam Gollakota, assistant professor of computer science and engineering at the University of Washington (UW) stated that till now, fingerprint sensors had been utilised as input devices.

He further added that for the first time that fingerprint sensors can be re-purposed to send out information that is confined to the body. Fingerprint sensors had been designed for the purpose of receiving data about one’s finger which is utilised to authenticate identity. However, the UW team inverted the procedurealtering the technology into an output which tends to push the data comprising of a password or access code from the smartphone to the other device.

Works in Various Postures


Co-lead author Mehrdad Hessar, a UW electrical engineering doctoral student explain that if one intends to open a door utilising an electronic smart lock he can touch the doorknob and touch the fingerprint sensor on the phone and transmit secret credentials via the body to open the door without leaking the personal information over the air.

In experiments, the researchers had demonstrated this system utilising the Touch ID sensor of an iPhone 5s and iPhone 6s, together with the trackpad of a Lenovo laptop as well as other fingerprint scanners. During the evaluation, around ten subjects had been utilised and varied in height, weight and body type, which were capable of generating usable on-body transmissions.

The team also envisaged positive results even when the participants were moving, like walking around or moving their arms. Co-lead author, Vikram Iyer, a UW electrical engineering doctoral student commented that they had shown that it works in various postures like sitting, standing and sleeping. Good strong signal is obtained throughout the body. The receivers could be anywhere, either on the chest, hands or legs and still tends to function.

Generate Low Frequency


This ground-breaking project began by analysing smartphone sensors by the team in order to detect which one tends to generate low-frequency less than 30 megahertz and travels well through the body though does not propagate over the air. It was only fingerprint sensors and touchpads which were found to meet up with all these requirements.

These methods tend to generate signals in the 2 to 10 megahertz range and transfers energy in an electric network to sense where in the space your finger would be. Moreover, it also identifies the ridges as well as valley which form the unique fingerprint patterns. The procedure which the UW utilised is a sequence of finger scans to encode and to transmit data.

With a finger scan it tends to correlate to a 1-bit of digital data and without the scan correlates to a 0-bit. The team had also succeeded in bit rates of 50 bits per second on laptop touchpads and 25 bits per second with fingerprint sensors which were adequately fast in sending a simple password or numerical code through the body and to a receiver in seconds.

Friday 28 October 2016

This Year’s Paris Auto Show is Très Électrisant

car

Electric Car Market – Tesla Motors


The electric car market is dominated by Tesla Motors with regards to the attention the small-scale car builder tends to get. In a world of contraction emission criteria as well as city-wide prohibitions of internal combustion engines, it has been jointly decided that the electric cars seems to be the solution. This has been obvious during the recent Paris Auto Show.

The Mondial de l’Automobile seems to have the usual extreme French concepts though is close-to-production EVs like those of Volkswagen, Mercedes and Porsche.Mercedes-Benz and Volkswagen AG have been leading enormous changes in the approach to electric cars in the auto industry with ambitious intentions focused in ending the indifference of consumer for battery powered vehicles.

The automakers from General Motors Co.’s Opel to Renault SA, at the Paris Motor Show had been announcing their contributions on latest electric car. In contrast to the earlier years where the focus was on viability, the exhibition this year had been focused in generating mass appeal addressing concerns regarding range as well as widening the selection of options.

The I.D. concept vehicle had been unveiled by Volkswagen that had been set to create a sensation in the market by 2020. Moreover it could drive almost double as far as the future Model 3 sedan on a charge of Tesla Motors Inc.

Car - a Revolutionary


Though only a model, the VW hatchback would kick off the roll-out of 30 battery powered car in the near future since the German manufacturer intends to alter an image tarnished by the emission-cheating outrage and Volkswagen seems to have high hopes for the vehicle.

Head of the VW brand, Herbert Diess commented in a Bloomberg TV interview with Caroline Hyde, that this car would possibly be revolutionary. It would possibly have the same importance which the Beetle had in its age or the Golf and the next generation will be I.D.Mercedes on the other hand is being likewise aggressive.

Earlier depending on converting the present model to electric, the Daimler AG unit intends to now introduce almost 10 new battery-powered vehicles. The vehicles together with the related technology like the charging boxes and energy storage would be promotedunder the EQ panel, providing more visibility.

Meeting Restricted Emissions Standards


Chief Executive Officer of Daimler, Dieter Zetsche had mentioned in Paris that they are now flipping the switch and are ready for the launch of an electric product offensive which would be covering all vehicle segments from the compact to the luxury class.

In particular, European manufacturers seem to be slow in developing a rational electric car strategy with the exception of BMW AG, having two diverse cars built around a carbon-fibre architecture which seems to be on the road already. The appeal of electric cars has been widened with Tesla’s success with the buyers in the U.S. and Norway, though the U.S. manufacturer has faltered while seeking to lift output which its well-established European opponents could have less trouble in achieving.

Though the cost of batteries seemed to have dropped in making electric cars reasonably priced, the turnabout of the industry also comes from stress in meeting the restricted emissions standards. The European Union is in search of efficiency progress in the next five years which would be almost double the gains since 2010.

Thursday 27 October 2016

What is a DDoS attack? And could my computer be a weapon?


DDoS
Anonymous is a notorious hackers group which has recently caused a massive cyber-attack on a web hosting service provider which offers hosting services to a number of business site in the world. Anonymous has issued a chilling warning about an impending cyber-attack through Distributed Denial of Service through its Twitter handle. DDoS attack are the most favored and common way of launching attack on any website wherein the site is overloaded with service request to such a point wherein it ceases to function.

Its servers buckled down under the pressure and the site goes offline for the users which results in millions of dollars in loss for the business house which operates the site. Furthermore coming from such attack isn’t an easier affair as it requires a lot of time, money and expertise to bring site back to its full functionality coupled with latest security measures.

Quite recently a number of major banks and popular sites & services have taken a hit by Anonymous attack which includes Twitter, Netflix and Spotify. Anonymous has not stated at which establishment or corporate sector or even the site they will be attacking next with their DDoS attack.
Anonymous hackers group has shades of white and black

Over the years Anonymous has been able to get favorable support from the people all round the world through their good work. Anonymous hackers group has launched massive attacks against the Islamic State in the past which has left the notorious terrorist organization in online turmoil.

They launched a DDoS attack against the Australian PM website when Australia was thinking about block the malicious content on the website which was direct attack to user’s online freedom. In similar fashion Anonymous took down as many as eight Tunisian government website with DDoS attacks when they found that it was subduing the freedom of the speech of the people.

Quite recently it launched a massive cyber attack against a little webs hosting service provider which helped in bringing down the Twitter, Netflix, Spotify among others. Anonymous can easily be described as a group of activists which came together in 2003. Since November 2015 when Paris attacks took place Anonymous has declared a cyber war on the ISIS. Most of the time Anonymous takes down the website offline in order to bring focus towards the social justice or censorship present in the nation.

Huge number of popular website goes down

A number of users on global scale ranging from US to European regions are reported that they were inaccessible to the major popular site which includes, AirBnB, Pinterest, PayPal as well as PlayStation’s online service.

This particular DDoS attack was targeted on the Dyn which is a little known hosting service provider for a wide number of popular high traffic websites. Currently US authorities are investing this attack while Dyn has made a statement where it accepted attack on its servers. Dyn is working towards mitigating and monitoring the attack against its Managed DNS infrastructure.

Wednesday 26 October 2016

Hackers Used New Weapons to Disrupt Major Websites Across U.S.


map
Crucial sites were difficult to reach to individuals crosswise over wide swaths of the United States on Friday after an organization that oversees vital parts of the web's framework said it was under assault. Programmers unleashed a mind-boggling operation on the internet through some devices like webcams and computerized recorders and slice access to a portion of the world's best-known sites, a staggering rupture of worldwide web dependability. Clients reported sporadic issues achieving a few sites, including The New York Times, Spotify, Twitter, Reddit, Airbnb,Etsy, SoundCloud, and Netflix. The organization, Dyn, whose servers screen and reroute web activity, said it started encountering what security specialists called a dispersed dissent of-administration assault in the early morning.

Reports that numerous locales were blocked off began on the East Coast, however, spread westbound in three waves as the day wore on and into the night. Also, in an upsetting improvement, the assault seems to have depended on a huge number of web associated gadgets without their proprietors' knowledge — with programming that permits programmers to summon them to surge an objective with overpowering activity.

The assaults were not just more regular, they were greater and more advanced. The run of the mill assault dramatically increased in size. Besides, the aggressors were all the while utilizing diverse techniques to assault the organization's servers, making them harder to stop. The most successive targets were organizations that give web foundation administrations like Dyn.

The main cause and working of the gadgets-

Jason Read, the creator of the web execution checking firm CloudHarmony, possessed by Gartner Inc., said his organization followed a half-hour-long interruption early Friday influencing access to numerous destinations from the East Coast. Dyn is a New Hampshire-based supplier of administration for overseeing DNS, which goes about as switchboard associating web activity. Krebs, whose site was focused by a comparative assault in September, said the XiongMai gadgets are basically unfixable and will remain a threat to others unless they are completely expelled from the web.

These gadgets are thusly used to make a botnet, or robot system, to send a large number of messages that thumps the out casualties' PC frameworks. The source code for Mirai was discharged on the purported dull web, locales that work as a kind of online underground for programmers, toward the start of the month.

The assault comes during an era of increased open affectability and worry that the country's establishments and framework could confront huge scale hacking assaults. The latest illustration has been the arrival of messages stolen from the servers of the Democratic National Committee, which the USA knowledge sources say was the work of Russian Federation.

The theme has come up often amid the fall's hard-battled presidential crusade. The US Department of Homeland Security and Federal Bureau of Investigation both were mutually exploring the late blackout. Dyn authorities wouldn't affirm the figure amid a phone call later Friday with correspondents.

It is too soon to figure out who was behind the assaults, however, it is this kind of assault that has US authorities concerned. They are concerned that an assault could keep nationals from submitting votes.

Computer Engineers Boost App Speeds by More than Nine Percent

DRAM

New Method of Boosting Speed of Computer Application – 9%


A new method of boosting the speed of computer application by 9% more has been discovered by researchers from North Carolina State University and Samsung Electronics.The developments are the cause of technologies which permit computer processor to recover data much more efficiently.

To perform operations, the computer processors need to recover the data from memory which is stored in off-chip `main’ memory. The data which is utilised the most is also stored temporarily in a die-stacked dynamic random access memory – DRAM cache that is placed nearer to the process which can be recovered much faster.

The data in the store is organized in large blocks or macro-blocks so that the processor identifies where to locate whichever data is required. But for any specified operation, the processor may not need all the data in a macro-block and recovering the non-essential data tends to be time consuming.

For efficiency of the process, researchers have established a procedure wherein the cache learns over a period of time which data the processor would require from each macro-block. This enables the cache to perform two things. Firstly it can compress the macro-block recovering only the relevant data that permits the cache to send data efficiently to the processor.

Dense Footprint Cache


Secondly, since the macro-block has a tendency to be compressed, it tends to free up space in the cache which can be utilised to store the other data that the processor would probably require. This approach had been investigated by the researchers known as Dense Footprint Cache in a processor and memory simulator.

On running 3 billion instructions for each application that had been tested through the simulator, the researchers observed that the Dense Footprint Cache had raced up application by around 9.5% in comparison to the state-of-the-art challenging systems for managing die-stacked DRAM.

Die-stacked DRAM technology permits a huge Last level Cache – LLC which offers high bandwidth data admission to the processor but needs a large tag array. This could take a major amount of space of the on-chip SRAM budget.

 In order to reduce the SRAM overhead, systems such as Intel Haswell tends to depend on huge block –Mblock size. One disadvantage of large Mblock size is that several bytes of Mblock may not be required by the processor though are drawn in the cache.

Last Level Cache Miss Ratios


Dense Footprint Cache utilised 4.3% less energy. The researcher also observed that the Dense Footprint Cache had a substantial enhancement with regards to `last-level cache miss ratios’. Last-level cache misses takes place when the processors attempts to recover the data from the store though the data is not there thereby compelling the processor to recover the data from off-chip main memory.

 These cache misses tend to make the operation far less competent.The Dense Footprint Cache also tends to reduce last-level cache miss ratios by about 43%. The work had been featured in a paper - `Dense Footprint Cache: Capacity-Efficient Die-Stacked DRAM Last Level Cache’ which was presented at the International Symposium on Memory Systems in Washington, D.C. on October 3 – 6.

The lead author of the paper is said to be Seunghee Shin, a Ph.D. student at NC State and the paper had been co-authored by Yan Solihin. Yan Solihin is a professor of electrical and computer engineering at NC State and Sihong Kim of Samsung Electronics.

Tuesday 25 October 2016

How to Manage Your Security Settings on Facebook


Facebook
Facebook developed in the previous years to wind up the biggest online interpersonal organization in the world. It spread so much that even our neighbors, folks, and inaccessible relatives, even from remote regions of the nation, now continually utilize it. It's the place where everyone is dynamic, from family, companions, work partners, and outsiders who just chose to include us as their friends. That's why Facebook has rolled out a few improvements to its security settings over its lifetime, so it merits looking up to check whether you're still just giving the general population you need your private data and photographs.

Here are some basic approaches to ensure your security.

  1. Restrain access to you and your Facebook stuff To limit access to your past and future Facebook posts, click Privacy in the left sheet of the Account Settings. At that point pick Limit Past Posts under the option of who can see it and in similar segment another option of who can see future posts. A message will pop up when you endeavor to restrain access to all your past posts without a moment's delay as opposed to changing the setting post-by-post. The alternatives under "Who can reach me?" let you confine companion demands and channel the messages you get. You can also limit your audience by restricting email address and telephone number 
  2. Secure browsing A few times ago, Facebook made secure perusing the default for all clients. To guarantee you're utilizing a safe association at whatever point one is accessible, click Security in the left sheet of Facebook's Account Settings and ensure Secure Browsing is enabled. The security settings likewise give you a chance to empower sign in warnings and endorsements and see and alter your perceived gadgets and dynamic sessions. To evacuate a gadget, click Edit to one side and after that Remove beside the gadget's entrance. In like manner, to end one or all dynamic Facebook sessions, click Edit to one side of Active Sessions and pick End Activity or End All Activity, separately. 
  3. Approve tags To trigger the survey of posts you labeled in before they show up on your course of events, you can choose Edit to one side of the section and select Enable in the drop-down menu. There In the timeline and tagging options you can enable or disable your posts' appearance by selection of options like "How can I manage tags people add and tagging suggestions?" , "Who can post to my timeline?" etc. 
  4. Facebook Application A large portion of the most prevalent applications now associates with your Facebook profile, implying that your action on those applications may be posted on your Facebook profile. Be that as it may, to do this, the applications need to get consent, which is the place you can step in. In Settings, go to the Apps area and select "Select All" to see what authorizations applications have. You may need some of these to have the capacity to post for your sake - Instagram for instance - however, you may not need your dating applications to do as such, for instance. Click an application to alter protection settings.
  5. Read and always try to be updated Set aside the time to peruse and comprehend the norms and terms of Facebook. Remain in order to the progressions that are updating regularly try to learn and read more often. The best aspect regarding Facebook is the capacity to custom yours and your companions experience. 

Monday 24 October 2016

13 Hidden Features in Google Pixel Phone You Won’t Find in Any Manual

Pixel Phone

The unique features and overall look of the Google’s maiden smartphone is a real blend of glass and metal, which may be considered as one of the most sophisticated assets of any potential user and the envy of others. There are lots of shortcuts, useful features and above all, some exciting extras, which made the phone a pride-catch for any individual. Some of the most exhilarating and useful features of this Google’s first phone, the Pixel, are as follows:

  1. Fastness: This phone is considered as one of the fastest phones and the performance is so electrifying that it can operate in a record time, without touching the screen. Just by tapping and swiping down the fingerprint sensor at the rear, the phone can be unlocked and reveal the notifications. 
  2. Taking Trivia: The Google Assistant knowing it better and having the ability to perform the test of the user’s knowledge, such as; if you ask the phone to play the interesting “Lucky Trivia”, it will ask five trivia question, to be answered by you. 
  3. Instant Photo: The impressive inbuilt camera can be opened up, just by double clicking of the button for instant opening and click. 
  4. Hidden Shortcuts: Not only is the phone itself but the apps also having some of the most interesting hidden shortcuts, which help in the easy operation. 
  5. Less Hidden Shortcuts: If the user wants to make any shortcut easier, he can do so just by dragging the same to the Home screen permanently. 
  6. GIFs of Real-Life: The Pixel camera has the unique ability to save the individual photo and also having the capability of turning these photos as animated GIF separately. 
  7. Too Many GIFs: In addition to the real life GIFs, this phone has the unique and hidden feature, which helps in categorizing of animated photo to a great extent. 
  8. Photo Tweaks: The Pixel is one of the most advantageous features of the phone, which helps the user to have the control of focus, just by holding the finger on the screen, to make the photos brighter and sharper. 
  9. Selfie Smart: The stealthy and swift switching mode is the cameras, is the basic characteristic of the Google’s phone and it’s the handiest for the user in getting intended pictures. 
  10. Smart Storage: The uniqueness of this phone is; the unlimited storing capacity of all photos and captured videos. This is possible by automatic deletion of older backup photos, as when required. 
  11. Reminder: The reminding option is a very important feature of this phone, which reminds the user with go-to-bed and other notifications, with proper synchronization. 
  12. Just Be Quiet: If any user doesn’t want to get notified about any call or messages; he can simply use the feature “Do Not Disturb”, which will block all sorts of beeps and rings for an hour. 
  13. Not The Only Guide: One can access an expert, in case it is needed, just by tapping the Support tab in the prominent setting menu for a phone conversation or text chatting.  

Saturday 22 October 2016

Researchers Show Air Bag Bike Helmets Have Promise

airbag_helmet

Foam Bike Helmets – Reduce Possibility of Skull Fracture/Brain Damages


An assistant professor of bioengineering at Stanford, David Camarillo is well aware that bicycling had been the main cause of sports and activity connected concussion together with brain injury in the United States.

With bicycling accidents, he had received two concussions and though he is not doubtful that wearing a helmet would be better than no helmet at all, he is of the belief that the traditional helmets do not seem to be protective for the rider as much as they should.

Camarillo had stated that foam bike helmets have proved to reduce the possibility of skull fracture together with other severe brain damages. However he thinks that many misleadingly are of the belief that bike helmets tend to protect against concussion, which is not true.

Being aware of what he does regarding the traditional bike helmets, Camarillo whose lab tends to work on understanding and preventing concussions decided to experiment a new kind of helmet, which is available in some of the European countries. The outcomes have been included in the September 27 edition of Annals of Biomedical Engineering.

Designed to Address Situations


The helmet which Camarillo had tested has a soft pocket worn around the neck which tends to pop up like an air bag around the head of the person when it gets alerted of a possible collision.

 Initially he had been designed to address the situations that people did not desire to wear helmets for visual reasons This air bag helmet had been compared to the traditional foam bike helmets by the researchers where the results seemed to be quite remarkable.

Mehmet Kurt, a postdoctoral scholar in the Camarillo Lab commented that they conducted drop test which seemed like typical federal test to assess bicycle helmet and observed that air bag helmets with the precise initial pressure could reduce head accelerations five to six times in comparison to traditional bicycle helmet.

The drop test comprises of placing the helmets on dummy head with accelerometers and dropping it, from neck-side up from different height on a metal platform. At two different angles, the head form had been tilted, faking hits of the crown as well as the side of the head.

More Cushioned Fall


Researchers had dropped the helmets from 0.8 meters to a height of two meters and had measured the direct speeding up of the helmet when it had hit the ground. Camarillo had informed that the huge size of the air bag helmet in comparison to foam bike helmets seems to be a possible source of its achievement.

Besides being large, it can also be soft enabling a more cushioned fall. But this cushioning seems to have a possible shortcoming. The air bag helmet, during the experiment was pre-inflated and the researchers had exploited the pressure of the air in the helmet before each drop to obtain the results.

 Deprived of the maximum amount of the air, the air bag helmet could bottom out resulting in the head to hit the ground with more force than it would be in the case of a traditional foam helmet. In the present form of the air bag helmet, a chemical process tends to activate expansion that does not guarantee maximum air pressure.

Friday 21 October 2016

Getting Robots to Teach Each Other New Skills


Robot
Google – Robots Utilising Shared Experiences

Robots have not got hold of human intelligence still but the researchers of Google have shown how they have been progressing in utilising downloadable intelligence. Just envisage if you could be better at some skill by not just learning and practising but by accessing the brains of another to tap directly in their experiences.

That would be science fiction for human, but in the case of AI powered robotics, it could be a possibility to shortcut training times by having robots to share their experiences. Recently, Google had demonstrated this with its grasping robotic arms.

James Kuffner, former head of robotics of Google had created a term for this kind of skills acquisition, six years back, naming it `cloud robotics’. It recognises the effect of distributed sensors and processing supported by data centres and quicker networks.

 Presently Knuffer, the CTO of the Toyota Research Institute where his focus lies on cloud robotics in bringing about reality domestic helper robots. UK artificial intelligence lab, Google Research, Deep Mind together with Google X continues to discover cloud robotics in quickening general purpose skills acquisition in robots. In many demonstration video that were recently published, Google has portrayed robots utilising shared experiences to learn quickly how to move objects and open doors.

Robots – Own Copy of Neural Network

Out of the three multi-robot approaches which the researchers have been utilising is reinforcement learning, or trial and error together with deep neural networks which is the same approach that DeepMind is using in training its AI, is being skilled at Atari video games and Chinese board game Go.

Every robot tends to have its own copy of neural network which assists it to decide the ideal action in opening the door. Google has constructed data quite quickly with the addition of interference. Recording the robots actions, behaviours and concluding outcome is done by a central serve, which utilises those experiences in order to build an improved neural network which assists the robots enhancing the task.

As portrayed in two videos by Google, after a training of 20 minutes the robotics arms fumbled around for the handle though ultimately managed to open the door. But in the span of three hours, the robots could reach for the handle with ease, twist it and then pull to open the door.

Google Training Robots to Construct Mental Models 

Another system which they have been exploring could be helpful for robots to follow commands in moving objects around the home and it is here that Google has been training its robots to construct mental models on how things tend to move in response to definite actions by building experience of where pixels turn out on a screen after a certain action is done.

The robots tends to share their experiences of nudging different object surrounding a table, assisting them forecast what could happen should they tend to take a specific course of action. The researchers are ultimately exploring methods for the robots to study from humans. Google’s researchers directed robots to the doors and exhibited how to open them. These actions had been encoded in deep neural network which tends to transform camera images to robot actions.

Thursday 20 October 2016

Email addiction: How to Break Your Inbox Dependence


Email
Email - Top Blockers of Productivity 

Email seems to be a kind of productive stalling which we desire to depend on. Though we do not seem to work on our real mission we contemplate on just answering the emails for some few minutes. This thought process seems to give rise to bad habits and some few minutes of checking the emails could prolong for a longer period than intended. The outcome is that several individuals acknowledge that checking the emails frequently seems to be an issue for productivity.

In the Work Management Survey by Wrike in 2015, around 40% of the respondents identified email as one of their top blockers of productivity. Replying to email had been considered as unfavourable to productivity, than unclear significances, putting off as well as also short deadlines. A latest book, Unsubscribe – How To Kill Email Anxiety, Avoid Distraction and Get Real Work Done, states that email addiction is a time-wasting epidemic in the modern workplace and is focused in helping those who tend to feel overcome by their inbox.Individuals tend to be disrupting their own work on a regular basis without even realizing it. In order to resolve this issue, it is essential to comprehend what seems to be going on in the brain and why does one seem to be obsessed with the inbox.

Increase Stress

Some recent studies confirm this theory and one has found that an average worker tends to check their email 77 times each day, sends as well as receives more than 100 and checks their first one immediately on waking up. Another study has observed that 90% tend to check work emails regularly outside office hours. Researchers have found that we tend to make up for it by spending 3.1 hours a day dealing with personal email when at work. The author of Unsubscribe, Jocelyn K Glei states that while checking emails all through the day could make one feel production, the disagreement seems to be true. Jocelyn also mentioned that besides being a big waste of time, staying on top of the emails continually seems to increase stress also. She informed that `scientists have established a clear link between spending time on email and stress. It means that the more frequently one would check their email, the more exhausted they may feel. In order to have a healthier relationship with your box you could keep in mind the following:

Avoid checking it every five minutes

Study from Loughborough University has found that it takes around 64 seconds for recovering your train of thought after reading an email. Jocelyn adds that `the human brain seems to have a tendency to want to complete task and when it recognises a task is completed, it then release the feel-good hormone dopamine. This is why we tend to feel happy on clearing our inbox or ticking things off a to-do list. But scientists have also found out that the brains mainly likes completing small easy tasks and the impeccable example of the same is the email. Thus dealing with the emails at first tends to feel relaxing and productive, though it also seems to be a never-ending job and after some time the unread emails seems like incomplete task which makes one feel apprehensive. One could check the emails every half hour instead of every three minutes and strive to check it a few times in the day at fixed times.

Close an email conversation

Due to the `Reply to all’ button, with the to and fro conversations, one tends to waste time and focus, according to Jocelyn. She adds that email is not a forum for discussion or debate. Hence reply and politely close down the conversation. The workplace chat apps like Slack are big in the US where they permit colleagues with on-going chats which are divided by subjects and teams and thus one ends up loaded with emails with the fear of missing something of importance. Work emails should be short, simple and if it cannot be solved quickly through email, a meeting could be recommended. This could resolve getting involved with email threads which seems to be time consuming.

Hide your Inbox

Each time the user tends to stop and glance at the inbox, they seem to be incurring something which according to researchers is known as a `switching cost’. But research has shown that having your email program open in the background while working tends to reduce the performance and even if it is minimised, one can see new emails coming in, your brain is aware that they are there, devoting some amount of energy monitoring them. She recommends avoiding this by closing down the email outside your set `checking’ time or placing the screen so one cannot see it.

Create an email hierarchy 

Jocelyn states that the independent nature of email means that everyone can have access to you and your time. Your inbox seems to be a total mix of relevant as well as random individuals, though usually only 5 to 10% of the emails seem to be helpful or important. She suggests categorising the people who tend to email you.

Tackle tricky emails promptly

Willpower tends to decline during the workday and hence morning checking session should be utilised in dealing with emails which need creativity or concentration while the afternoon to deal with the lesser ones which need a quick reply or a delete button.

Not everything seems to be urgent 

Merely5 to 10% of the emails seem to be urgent or important and hence it is not essential to check them during dinner with friends or in bed.

It is OK to ignore some of the emails

While replying to every email one may be considered polite, but time is a limited factor and hence one should not feel obliged in replying to cold-call emails from strangers.

Publicise your email habits

You could inform your colleagues that you only check your emails a few times a day so they can discern what to expect from you.

Let go of the zero inbox notion 

Jocelyn informs that an empty inbox is not a measure of productivity and hence one should let go of the notion that you would ever have one.

Wednesday 19 October 2016

The Water Taxi of the Future



Water Taxi
A lot of stress has been given towards decreasing the number of cars present on the road by actively promoting carpooling, improvising the transit system and creating bike paths. These attempts will help in freeing the roads in mega cities which possess vast road system but no one has given the thought towards making transit easier in those cities where waterways are abundant.

There is a great scope in bringing such vehicles which revolutionize the use of rivers and canals among the commuters. Thankfully one company thinks about them, SeaBubbles, has come up with an elegant solution to popularize the river ways and canals by unveiling its futuristic four-passenger water taxis.

Features of futuristic water taxis

SeaBubbles futuristic water taxis will help in building city wide transportation network on waterways. These water taxis can easily be summoned by an Uber-like app and these happen to be self-driving in nature which passengers will just have to feed in the destination and get ready for a memorable ride at 30 mph.

The story of SeaBubbles

It was started literally started by water navigators namely Alain Thebault, a sailor and Anders Bringdal, a windsurfer about seven months ago. They have raised $500,000 with SeaBubbles and they have set a goal of making it up to $1million by next year.

What makes SeaBubble great? 

SeaBubble expertise comes from the experience of the team behind it. Thebault has successfully built a win-powered trimaran yatch called Hydroptere in the past. The best thing about this yatch is that it barely touches the water surface instead swiftly glides few feet in the air.

It has made a number of modification and revision to the concept art. At first it shows no room for the wings but later on brings wings for added agility. It should be understood that SeaBubble is actively working towards improving concept art and to attract funding from the prospective investors. As per the estimates of the SeaBubble its water taxi will be ready for testing in August 2016 and it will get into production phase in January 2017. It has set the target of May 2017 fo deliveries of the water taxis.

It has a number of hurdles in front of it which includes proving that boat actually works; making perfect designs for the docking stations and it abides by the local municipal laws. Furthermore drivers will be trained to make use of the self driving software and a unique sensor system will be developed to navigate the tricky water of the rivers.

Limitation for SeaBubbles water taxis

It ambitious water taxis suffer from the geographical limitation which means it can only help in connecting between the two points which borders water. Furthermore these points have to be near transit hubs or luxury or popular destination in order to appear as a prime alternative or lucrative option for the commuters. A number of cities round the globe has navigable river which means SeaBubbles ambitious water taxi will certainly find the fancy of the commuters on global scale.

Tuesday 18 October 2016

Google DayDream

DayDream

Google Daydream View handset


Daydream View handset has been revealed by Google together with various apps and games which can be utilised on your Daydream-ready phone. Google had also announced that the new Pixel as well as Pixel XL smartphone would be the first handsets to be Google Daydream ready.

These are said to be the best phones to purchase if one would prefer to use Daydream when the headset is launched. Google Daydream is said to be the latest effort of bringing VR to mobile devices by Google and is very much different than Google Cardboard.

 Unlike the earlier somewhat disposable VR headset of Google that had been focused in getting people in the VR door with low cost and low smartphone proficiency requirements, Daydream tends to have more tough vision which seems to have its sight set on offering higher-quality experiences to Android Nougat users.

Daydream would be bringing more exciting as well as absorbing VR experiences to users who seem unable to afford a HTC Vive or Oculus Rift. It is likely to be on sale in November in the US priced at $79 though there is no information on when it would be released in the UK or Australia.

Google DayDream

ZTE VR – Android Nougat/VR Maintenance Software Update


Google has also claimed that Samsung, Asus, Alcatel, LG, HTC, Xiaomi and ZTE will be manufacturing phones which would be `Daydream ready’. Besides these, Huawei has also confirmed that it would be making Daydream-ready phone together with headsets and controllers.

The first smartphone, the ZTE Axon 7, has been announced to be Google Daydream compatible together with its own VR headset – the ZTE VR which requires Android Nougat as well as necessary VR maintenance software update of Google to pull it off. This would be coming in the Android Nougat 7.1 update.

Google Daydream will be running apps as well games download from Play Store thus making it simple in locating experiences in utilising the headset. Towards the end of 2016, as per Google, there would more than 50 apps and games made available to the users on the platform.

In the forthcoming months, HBO, Netflix and Hulu would be having Daydream ready apps. The New York Times would be launching an app for its VR videos also.

Clickable Touch Pad


When the platform is launched, Google would be making its own apps compatible with the Daydream platform comprising of Play Movies, Photos, YouTube and Maps. Announcement had also been done by Unity and Epic on the development support for Daydream from the gaming point of things.

The Daydream View headset portrayed by Google is said to be one choice for Google Daydream VR which enables the companies to take a hold on the tech that would probably result in various looking headsets. Limited information regarding its controller resembling a Wii remote have been provided by Google.

It shares some common physical qualities for the modern TV touch remote of Apple. It will be featuring a clickable touch pad, towards its top which will bring native touchscreen like gestures to the virtual world. Then there is an app button which tends to put your apps in view and finally the home button takes you back to the home screen of Google Daydream.

Monday 17 October 2016

Periscope Extends beyond Phones as Twitter Tries to Take on Facebook Live


Periscope

Twitter is second most popular social media platform after Facebook and it has been getting stiff competition from it when it comes to keep users engaged and entertained on the platform. Recently Facebook has launched the Facebook Live feature which allows users to create live videos and proclaim the happening in their lives to the followers in an instant. Twitter has brought a similar feature on its platform in the name of Periscope which essentially is a live-video service. Periscope services has been launched to broaden the audience reach and to keep audience engaged on the Twitter platform.

Periscope will be a delight for the individuals and media outlets alike

Twitter’s Periscope Producer will allow the media outlets and individuals to create live video feeds which will be uploaded directly on the Twitter. Periscope made its debut last year but it has strictly confined to the smartphone. Now users wouldn’t even require smartphone to record and broadcast live videos using the Periscope feature. In order to test the capability of the advanced Periscope Florida television station broadcasted a live video on its official website later it was redistributed to the same feeds on the television. In beginning Twitter will only allow major producers such as Disney and ANC News along with a number of major media outlets to make use of the Periscope.

Privacy is a huge concern for Twitter

Since the launch of Periscope service people have started using it for broadcasting the live video of TV shows and movies from their smartphone. This has resulted in the unwanted rise in the piracy issue which doesn’t go well with the video content producers such as much labels and movie production houses.

Twitter has high hopes from Periscope Service

Twitter’s CEO Jack Dorsey has stated that the launch of Periscope will help in increasing the popularity as well as reach of its messaging service. Twitter has already indulged in steaming the news, sports events as well as the entertainment segment based content. Twitter is aiming towards offering more to the users than just offering a great way to set out their thoughts in tweets and to keep tab on the happening in and around them. Dorsey further elaborates that inclusion of the Periscope will offer a great way to upload, share and view live videos on global scales.

Everyone wants to jump on live video wagon

A number of internet companies ranging from SnapChat to Facebook have jumped upon the wagon of bringing live-video functionality on their platform in order to generate huge advertising money later on. Some of the companies have even started to experiment with live streaming functionality for the marketing purpose. This includes General Motors which has launched its upcoming electric car named Chevy Bolt EV through using the Facebook Live at the beginning of this year. On other hand media outlets are utilizing the live video feed to broadcast the presidential debates in US.

With the launch of Periscope Twitter also jumps up in the live streaming train and joins other popular live-streaming services such as Twitch and YouTube.

The Best Project Management Software for Syncing Team Efforts


Wrike

Online Project Management Software – Visibility & Control

Users looking to make their daily routines much easier to manage, should visit Wrike, an online software for project management that is utilised by high-performance teams and productivity experts around the globe. Wrike’s project management tools and features make it easier to manage tasks and projects so that teamwork and collaboration become efficient. Additionally, Wrike gives you more visibility around who does what, when tasks are due, and how each task fits into the larger picture.

The company was established in 2007 with headquarters in Mountain View California. Wrike has been acknowledged by San Francisco Business Times/Silicon Valley Business Journal as one of the Best Places to Work as well as one of the Top 100 Workplaces in 2015, by the Bay Area News Group.

Translated into 10 languages, Wrike is used in 120 countries and in 2014 was also awarded Cool Vendor status by Gartner. Being an online project management software, it provides complete visibility together with control over all tasks that must be performed. With the support of the software, project management gets easier. Wrike becomes the control point in coordinating efforts with the rest of the business. Their project management tools include being able to organize tasks into folders, time tracking, an interactive timeline, communication and feedback on the tasks themselves, and online collaboration features for teams of any size.

Heightened User Experience

 

The main purpose of the software is to assist in optimizing your workflow and enabling your company to focus on fundamental tasks. There are useful features for marketing and creative teams in the form of proofing and approval, resource and workload management, document versioning, project templates, time tracking and budgeting, together with visual dashboards and reporting. You can organize your project any which way you please and complete it all in one place.

Wrike also has mobile apps for both Android and iOS devices. With the native Android app, you can work on your tasks with ease, no matter where you are. The Wrike Android app tends to provide much more convenience and efficient project management functions. The new app has a heightened user experience that makes creating, editing, scheduling, and discussing tasks while on-the-go so much easier. The recently released mobile dashboard also provides an overview of your important tasks within seconds.

With the mobile app for iOS, one can log ideas, update tasks, or leave feedback while on the go. It almost takes away the need to open a laptop since your mobile device can easily accomplish most of the work that needs doing. More importantly, your mobile is always at handm, making important details readily available at your fingertips.
 

Sync Team Efforts & Keep Projects on Track


With Wrike, one can synchronize a team’s efforts, keep the project on the track and get additional tasks performed together in the cloud. It is an ideal real-time workspace where one can find the team collaborating in order to get tasks done with precision and efficiency. With Wrike, productive performance of every team member can be amplified, regardless of where they may be located in the world. No matter what your workflow looks like, Wrike can help improve communication and clarity as well as accountability in accomplishing the the parts of any project.

   

Microsoft New Reality Hololens Comes to UK

Hololens

Microsoft has wasted no time in launching its own VR headset after the anticipation filled launch of the Sony’s PlayStation VR just a few days back. Sony’s launch of VR headset was due for a long time which helped in creating a buzz around it and Sony has carefully launched a number of game titles to with it. So far Microsoft has stayed clear of doing anything with VR as other rivals has been actively developing and launching products in this segment. Microsoft isn’t bringing a pure VR experience to the users with its VR headset rather it is bringing a ‘mixed reality’. Microsoft has also averted the use of term ‘augmented reality’ for promoting its HoloLens for popularizing its own ‘mixed reality’ concept.

Microsoft HoloLens was first launched in US 

Microsoft HoloLens will be making its way to six new countries which includes UK and preorder are opening from today while delivered will likely to be made in late-November. Microsoft has launched HoloLens in its home country ‘US’ way back in March but it has not yet emerged as a dominant player in the VR segment. It is worth noting that Microsoft HoloLens is only available for the developers and enterprises in US for a massive price of $2,700. In order to increase the popularity and to offer greater functionality and feature on its HoloLens Microsoft has partnered with a wide range of commercial partners which includes Audi, Nasa and Lowe for application creation.

Make most of the HoloLens 

Microsoft HoloLens brings vast opportunities for the users to utilize ot for variety of purposes. Users can make Skype call on the headset using the Microsoft’s Skype application especially optimized for this device. Herein users will be able to experience the true extent of the virtual reality when person face appears on the space in front of the user.

A lift making company called Thyssnkrup is already making use of the HoloLens to give direct advice to engineers in field regarding the repairs and work with Skype. Simply tapping or pinching on the holographic objects can help in moving them from one position to another or users can even indulge in core painting exercises using HoloLens.

The might of HoloLens

During the launch event Microsoft showcased the potential of the HoloLens by bringing in a live project from the Case Western which is being utilized as teaching aid for the medical students. During this a human body appeared right in the middle of the room wherein first skeletons emerged then whole set of internal organs were made visible to the people. Users can easily walk past it or interact with the image by moving away different layers with different motion centric gestures.

Headset is light weight and doesn’t cause a strain on the neck but it will take some time before you become habituated to it. Microsoft mixed reality is an unproven technology at the moment but it has shown its mettle in this short demonstration where it brought a swift mixing of the real and virtual world.

Meet Luigi MIT's Sewer Scouring Robot

Luigi

Luigi – Sewer Trawling Robot


A sewer-trawling robot has been created by Underworlds, a project from Senseable City Lab of MIT which has been designed in connecting the gold mine of information prowling in the sewer.The robot in question is known as Luigi and up to now, has been deployed underground in Cambridge, Massachusetts; Boston and Kuwait as a part of an experimental program which could be spun out in various cities worldwide.

Scientists are of the belief that on researching fecal matter they would be capable of envisaging the spread of infectious diseases, provide an image of the collective health of the community together with influence policy. The Underground project, launched in 2015, has been bringing experts together from engineering, public health and biology sectors.

Carol Ratti, MIT professor, co-principal investigator and founder of Senseable City Lab had commented that `the name (Underworlds) tends to highlight the rich amount of insights hidden in our cities and in this case in sewage’. Scientists can monitor urban health patterns and diabetes, analyse drug usage as well as identify antibiotic-resistant bacteria, by sampling and interpreting human waste.

Biomarkers in Human Waste – Insight in Infectious Diseases


Co-principal investigator of Underworlds and director of the Alm Lab, Eric Alm had explained that ` we all tend to flush valuable health data in the toilet. Sewers tend to signify an exceptional opportunity where health data from everyone in a community is assembled together.

With the provision of biomarkers in human waste, they are in a position of obtaining some insight regarding infectious diseases like flu strains, which has ultimately made it possible for the scientists to expect and alleviate epidemics. Collection of fecal samples is not really a desirable task.

 Ratti recalls that initially the sampling method had been very `low-tech’ and the same was lowered to a 20-foot pole with a bottle taped to the end of it in a manhole and the sample had been scooped out. Sampling waste by hand was not enjoyable and hence they started developing the robots.

To quicken things up, the team had installed a large pump at street level. He commented that all these methods seemed to be quite messy. It was then that the first automated sewage-scouring robot, Mario had come to the rescue.

Nintendo – First Generation Model


Named after the famous plumber, Nintendo, the first generation model updated the process though was not adequately fast. Then came in Luigi, which has been much more compact and economical wherein the new model has enabled the team to streamline the collection process.

Luigi measuring around 3feet long and 3 inches in diameter comes with a motor, pump together with a filter. In order to get the task done, the remote-controlled robot tends to descend from street level to the waste water and seizes the bacteria by pumping the water through a filtration system.

 On obtaining the samples Luigi tends to return to street level for refining and dispensation. Ratti has stated that usually the examination of sewage is carried out in the treatment plants beyond the cities which tend to lose the precise data owing to the time in transport.

However they are capable of beginning the filtration process of fecal and urinary matter in situ. Moreover accumulating fresh sample seems to be critical since gut bacteria tend to die off as soon as they enter the sewer system.

Saturday 15 October 2016

Are Killer Bots About to Do Away with Smartphone Apps?


Bots

Bots - Little Digital Assistants


Smartphone app has been around and Apple tends to have two million on them in its App Store while Google Play seems to have some few hundred thousand more than that. The Aggregate downloads of app have crossed over 150 billion mark. However some have been speculating whether the apps would be replaced by something lesser, smarter and quicker.

Due to artificial intelligence software, bots have been programmed to chat to humans through text, remove the meaning and then perform on it. They seem to be little digital assistants. One would be talking to a bot at any point of time when you see a live chat box opened up on the website of a retailer or while ordering a taxi or flowers via chat platforms like WeChat and Facebook Messenger.

According to the research by Nielsen, irrespective of the various options on apps, the average number used is 27.The issue with apps and their apparently unending updates is that they tend to consume the storage volume of the smartphone alarmingly rapidly. Developers tend to often get a raw deal. One estimate recommended that 94% of the cash created by the apps in the App Store of Apple to only 1% of publishers and those firm also received 70% of all the downloads.

Bots Natural Successors of Apps


Ted Nash of Tapdaq, a veteran app developer while still a teenager, had commented that one of the worst things regarding the App Store was the App Store since it is a walled garden. He stated that oversights of Apple on all the slows down development and forces programmers of app would comprise of specific chunks of code which tends to look after adverts, usage statistic together with the other metrics.

Further to this, he added that the issue of making apps to function across various devices as well as keeping up with the changes to Apple’s software, it is no wonder some people seemed to be disillusioned. Head of mobile development at accounting software firm Sage, Kriti Sharma, stated that apps use to be the big thing but several more people seem to be messaging that posting on social media.

 This could be the reason why she is of the belief that bots are the natural successors to apps, the interface is promptlyacquainted to consumers.

Pegg – Assisting Small Business Makers


Ms Sharma had begun her career in coding at Barclays where she had co-created its Pingit banking app and supervised its mobile portfolio. She is of the belief that for companies or brands which preferred meaningful interactions with the customers, a chat intervened by a bot would work well.

A bot known as Pegg is being developed by Sage which tends to act as a smart business assistant and would be assisting small business makers in keeping track of outgoings as well as expenses, which would be making the tracking of cash flow much easier.

Ms Sharma had commented that bots do not have to be super-complicated though over a period of time they could add a lot more value for a customer. She states that bots seems to be more reliable since good progress has been made in writing artificially intelligent software.

Moreover since several companies now tend to have massive data they could utilise in fine-tuning the responses of bot. She also claims that bots also tend to have speed with which they can be developed, organized as well as updated