Saturday 31 May 2014

Gadget uses biology to fully charge a phone in 30 seconds

You probably wouldn't mind how power-hungry your smartphone was if boosting it back up to full juice took under a minute.The device, which can fully charge a phone in 30 seconds, has been developed for the Samsung Galaxy S4 but the company says it can create chargers for other types of phones.

It uses a whole new type of battery that uses 'nanodots' which are biological semiconductors involving amino acids (yeah, science!).
Although they significantly speed up charging times, the battery/charger combo is currently bigger than the phone itself and the charge is said not to last as long as the slower charging batteries currently in phones.
Still, that's not putting StoreDot off - it hopes to have the devices on shelves in late 2016 priced at around $30 (£20 / AU $35).

 

Your next smartwatch could be charged by your own body.......

Battery life is one of the biggest concern but that might have just found the solution.

Researchers at the Korea Advanced Institute of Science and Technology have created a small flexible patch that converts body heat into electricity which could be used to power a wearable device.
The ability to generate power in this way is handy anyway, but the added flexibility here means it would be perfect for smartwatches and fitness bands.
It's unclear whether this could make charging redundant completely or just help extent the battery life a bit - but we'll take anything right now.

 


Five Technology Giants logos before they became Iconic...

 Apple

The first Apple logo, unveiled in 1976, looks like......Ronald Wayne is the designer of this Logo.


Microsoft

Microsoft’s logo at least looked like it belonged to the 20th century.


IBM

IBM was a company known for its employee time-keeping systems, weight scales, meat slicers and punched-card tabulators. Established as International Time Recording Company in 1888, it changed its name in 1924 to International Business Machines, and the new era spawned a brave new logo.

Canon 

A decade later, in 1934, two Japanese inventors created a camera under the banner of the Precision Optical Instruments Laboratory. The camera was called the Kwanon, named after the Buddhist Bodhisattva of Mercy.

The logo included Kwanon encircled by flames and sporting a thousand arms. The inventors opted for the simplified name Canon when it came time to trademark the name.

 Nokia

Knut Fredrik Idestam founded a wood-pulp mill in Finland and took the name of a nearby town. Nokia is also the Finnish word for a dark, furry weasel-like animal.


 



The Best Way to Manage All Your Passwords

Using a different password for every online website is critical to your cyber security. There is a tug of war between hackers and companies and you are caught in the crossfire.Every time a company gets hacked, you have to change your password. And don't you dare reuse it somewhere else  

Keeping up a different password for every website and service is the only way to keep your stuff safe in online but it is also a huge nuisance.There is one thing you can do a password program manager.1Password, Dashlane, LastPass and PasswordBox provide enough security for us.

For most of the people Dashlane is best because it is simple to use.

LastPass is a good choice for people who use newer technology like fingerprint scanners. For the really paranoid, 1Password offers the most control over where your encrypted vault of passwords gets stored.

Nothing is 100% guaranteed, but all four of these managers take the additional security step of never sending your master password over the Internet. They're like a safe-deposit box that a professional keeps without knowing what's inside, or even holding a key to open it.
In an age where more of our personal information lives, password protected, up in the cloud, we need defenses beyond antivirus software. Using a password manager is the next step.

 

Friday 30 May 2014

New Smartphone App detects mood swings via voice analysis

A new smartphone app monitors subtle qualities of a person's voice during everyday phone conversations to detect early signs of mood changes in people with bipolar disorder, scientists, including one of Indian-origin, say.

The researchers hope the app will eventually give people with bipolar disorder and their health care teams an early warning of the changing moods that give the condition its name.

The app runs in the background on an ordinary smartphone, and automatically monitors the patients' voice patterns during any calls made as well as during weekly conversations with a member of the patient's care team.

The computer programme analyses many characteristics of the sounds - and silences - of each conversation.

Only the patient's side of everyday phone calls is recorded - and the recordings themselves are encrypted and kept off-limits to the research team.

They can see only the results of computer analysis of the recordings, which are stored in secure servers that comply with patient privacy laws. 

Because other mental health conditions also cause changes in a person's voice, the same technology framework developed for bipolar disorder could prove useful in everything from schizophrenia and post-traumatic stress disorder to Parkinson's disease, the researchers said.

 

Technology Trends that will dominate upcoming years.....


1.Business Intelligence (BI) and Analytics-The BI, analytics and performance management segment is the hottest software market in India, fueled by IT prioritization and expanding business buying centers

2. Mobility Solutions-Mobility in enterprise has created a huge opportunity for IT leaders to reduce costs, increase productivity and enable smooth business transactions. Swift growth in the prevalence of mobile devices, a decline in their price, and falling data plan costs have the potential to completely transform some business models

3.Cloud Computing- Although still in its infancy in India and other emerging markets, cloud adoption is increasing.

4. Social Media and Computing- Social media in India has seen exponential growth in the recent past with enterprises using it for customer support and customers using it to offer opinions

5. Machine to Machine (M2M)-The M2M market in India is in a nascent stage but growing rapidly. Indian enterprises driven by demands to improve agility and productivity are evaluating the use of M2M-enabled solutions.

6.Hosted Virtual Desktop (HVD)-In India, server-based computing, which is also referred as "hosted shared desktop" or "terminal services," is seeing more adoption. More than 80 percent of desktop virtualization implementations are based on HVD.

7. Personal Cloud-Adoption of cloud computing in India is currently limited to the private cloud. Organizations are focused on protecting their applications located in enterprise app stores, as well as the content on employees' personal devices used at work.

8.  3D Printing-3D printing is expected to take off rapidly and revolutionize industries as diverse as aerospace, consumer goods, healthcare, retail, manufacturing and the military. 3D printing has the potential to radically transform design, manufacturing and the supply chain model in India.

Top Five Smartphones

1.HTC one(M8)

Specification-

      Processor-Qualcomm Snapdragon 801 quad-core@ 2.3 ghz
      RAM-2 GB
      Screen-5in LCD,1920x1080 resolution (441ppi)
      Storage - 16/32GB (microSD expandable by up to 128GB)
      Battery - 2600mAh
      Camera-4.1UP and dedicated depth sensor rear, 5MP front
      Connectivity-802.11a/b/g/n/ac, NFC, Bluetooth 4.0 with aptX
      Operating system - Android 4.4

2. LG G2    

Specification-

    Processor-Qualcomm Snapdragon 800 quad-core@ 2.2 ghz

      RAM-2 GB
      Screen-5.2in LCD,1920x1080 resolution
      Storage - 16/32GB (microSD expandable by up to 128GB)
      Battery - 3000mAh
      Cameta-13 MP
      Data-4G LTE
      Operating system - Android 4.2 

3. Samsung Galaxy S5

 Specification- 

    Processor-Qualcomm Snapdragon 801 quad-core@ 2.5 ghz

      RAM-2 GB
      Screen-5.1 Super Amoled,1920x1080 resolution (441ppi)
      Storage - 16/32GB (microSD expandable by up to 128GB)
      Battery - 2800mAh
      Camera-16 MP
      Connectivity-Wi-Fi, 3G/4G, USB 3.0, NFC, Bluetooth 4.0
      Operating system - Android 4.4.2

  

4. Sony Xperia Z2

 Specification-

    Processor-Qualcomm Snapdragon 801 quad-core@ 2.3 ghz

      RAM-3 GB
      Screen-5.2in 1920x1080 resolution Triluminious display(424ppi)
      Storage - 16 (microSD expandable by up to 64GB)
      Battery - 3200mAh
      Camera-20.7 MP
      Connectivity-Wi-Fi, 3G/4G, NFC, Bluetooth 4.0, USB 2.0 
      Operating system - Android 4.4(KitKat)

5.Google Nexus 5

Specification-

      Processor-Qualcomm Snapdragon 800 quad-core@ 2.2.6 ghz
      RAM-2 GB

      Screen-4.95in IPS 1920x1080 display (445ppi)
      Storage - 16/32GB Non-expandable
      Battery - 2300mAh
      Camera-8 MP 1.3 MP front
      Connectivity- Dual-band WiFi (2.4G/5G), 802.11 a/b/g/n/ac; NFC (Android Beam); Bluetooth 4.0; wireless charging
       Sensors: GPS; gyroscope; accelerometer; compass; proximity/ambient light 
      Operating system - Android 4.4(KitKat)


Speed up your USB transfer speeds in Windows 7

Sometimes it may happens that when transfer data on storage devices over USB the transfer speed is very slow in Windows 7.

First thing you have to do is to run Windows Update and fully update your OS.
Next you should also install the latest driver software for your motherboard.
Next try to do the following steps-
Right Click on Computer->Click Manage->select Device Manager from left pane->right click on  the USB drive->select Properties from the menu.A window will pop-up.Click on Policies tab->select the option "Better Performance".
Please keep in mind,always use "Safely remove hardware" option when disconnecting USB to prevent data loss since "better performance" feature enable write caching.

Thursday 29 May 2014

Five way to keep your Android phone Secure

Here is some five steps to take control over your smartphone and keep your data secure and private.

1>Managing Apps-

Apps are the weakest links between your private data and the world.Not every apps clearly states how they use these data.When you install apps you are notifies what kind of permissions you want to give to the apps.There are multiple ways to visualising apps permissions.Bitdefenders' clueful lies in those categories.There is also anti-malware mobile apps.

2>Protect yourself online-

You should minimise to put on data on those apps

3>Control your communication-

There is a open source apps like TextSecure which encrypt your text sms.There is app like RedPhone which encrypt calls over internet.

4>Secure your device-

There is a ScreenLocker to lock the screen of phone.Applock can also randomly rearrange its numeric keyboard to prevent others from figuring out your password by following your fingers.There is a apps which will block access to apps.

5>Encrypt your data-

The key to securing your phone against any sort of surveillance is end-to-end encryption. Encryption safeguards data against any kind of snooping by making it unintelligible to anyone without the correct decryption keys.Instead of encrypting the whole device, you can also choose to encrypt selected files. One of the best apps for this purpose is SSE Universal Encryption.

                           "Smart Shirt" in Summer!!!!

Joint collaboration of Intel and AIQ makes our clothes more smarter than before.In a code conference displayed a shirt with conductive fibres for tracking our heart rate.The Shirt uses Intel's Edision development board to stream EKG information over bluetooth and Wi-Fi.The box of electronics plugs into the shirts when we using it and unplug it when we need to wash.This shirt continuously monitoring our heart rate without our intervention-AMAZING.

Wednesday 28 May 2014

Google Made the Smallest change in its Logo  and users stills noticed it...

The Most valuable and important company in the web-Google, has changed their Logo slightly  and people have noticed this very small change even.

How Slight is the change-

Google moved the second 'g' slightly to the right and the 'l' slightly to the right and left.


SIM Card Cloning


You get a missed call from a number start with +92,#09 or #90 and for courtesy or curiosity you callback to that number.Then you are in the high risk of your SIM card cloning.More than one lakh of people have already fallen this "telecom terror attack".


There is a hardware tool which can extract the authentication key from the SIM and copy it to another but from remote location to retrieve information from SIM requires very expensive hardware and well trained personal.It may even require hacking into the telecom operator's network


So before storing very secret and valuable information one should keep in mind that anyone can clone their SIM and those information can be extracted quite easily from its memory and even calls be made from SIM.

tech-word: Ethical Hacking(To catch a thief think like a thie...

tech-word: Ethical Hacking(To catch a thief think like a thie...: Ethical Hacking(To catch a thief think like a thief)......   Ethical Hacking is also known as white-hat hacking performed by the ski...

Ethical Hacking(To catch a thief think like a thief)......

 

Ethical Hacking is also known as white-hat hacking performed by the skilled computer experts to determine the loopholes in computer network system.It is performed by the companies to perform penetration tests of their network system.It is ethical and legal because it is performed to increase the safety of computer network.

With the increasing use of internet,companies are concerned about their security especially when it comes to things like customer personal information or valuable data there is considerable need for computer experts to work in ethical hacking.The logic behind ethical hacking is to protect our computer system from black-hat hackers.

Traditionally a hacker intrudes in a computer system for personal fun but recently hacker has taken a new meaning called cracker who breaks the computer system for personal gain.The ethical hacker possesses the skills,mindset and tools of a hacker but is also trustworthy.
Type of attack by a hacker or cracker- 

Non-technical attacks
Network infrastructure attack
Operating system attack          
Ethical Hackers formulates plan in the following way
1>System to be tested
2>Risk involved
3>When the tests are performed
4>How the tests are performed
5>How much knowledge about the system he has.

Tools for Ethical Hacker
1>Password cracking tools like LC4,John the Reaper or pwdump
2>Web applicationassesment tools or network scanner

Ethical hackers should be persistent and calm and self-evaluation is must.
                                                                                                                           

Tuesday 27 May 2014

Future Gadgets

Razer Nabu


Are U bored with your smartphone?

Here is more smarter and more tiny device which integrates all the facilities in a wrist band!

Think about it as a combination of Nike fuelband,samsung galaxy gear and many others minus the big clock face!

It has dual OLED displays the nature of notification and more details as per the needs of the user.

It has built-in accelerometer which can track our vitals,pairing it with an iphone or Android and it also supports unique gestures.we can program nebu  to recognize our gestures such as to dismiss calls or enabling sleep mode just snapping our fingers.

We can even exchange information with other nebu users with band-to-band communication technology.

So stay tunes....

Monday 26 May 2014

Choose Your Smartphone

Now a days everybody running behind smartphone when they think of buying mobile phone before knowing very litlle about the "Smartness"of mobile.
So we should think about the following must-have features of mobile which makes it smart.



1>Screen Size-4.0" to 5.0 "

2>Screen Resolution-Resolution means number of pixels or dots in the screen.More pixel more resolution more clear picture.The ideal resolution should be 1280/720 or higher.

3>Memory and processing power-

Ram-1Gb-3Gb

CPU-Dual core or Quad Core with Android jellybean or icecream operating system and ios7 for apple pcs.

4>Storage-More applications so more storage.

Minimum of 8 Gb and maximum 32 Gb.

5>Battery Life-Minimum of 2000 mAH battery and 15 hours of talktime.

6>Camera-Should be more than 8 megapixel.

7>Aceeptability-Can we use this phone with any operator

8>Accessories-should come with usb charger,earphones,food variety of covers,stylus pen and other accessories.


                                           Web 3.0

Web is changing rapidly in the last few years.Web technology is also changing with time.Everybody talking about  2G and 3G.In these phase of evolution somebody calls it web 2.0 and somebody calls it web 3.0.
John Markoff coined the term web 3.0 but those who are attached with web 2.0 strongly opposed the idea of web 3.0.Web 2.0 mainly focuses  on the themes like social networking,AJAX,lightweight collaboration,social bookmarking and media sharing.
After 2007 the technocrats shifted their idea from front-end improvements to back-end infrastructure and it requires the web more connected,more open and more intelligent.In these way web 3.0 takes the place of web 2.0.With web 3.0 we can think more intelligent web like semantic web,microformats,data mining,natural language search,artificial technologies-which ensures more productive and and intuitive user experince. 

Saturday 24 May 2014

Bitcoin

Bitcoin is one of the most amazing innovation in the modern digital arena.we know the term "MONEY" for purchasing or acquiring any goods and services.money has found many types of forms in our society and economies.Currency is another term which can be use interchangeably with money.Currency is more rigid terms used in a particular society.
Bitcoin is now a most popular used  peer-to-peer digital currency.It works on a bitcoin protocol.Bitcoin is  like a digital cash which can be transfered between people with high security and quickly.It can be used for online payments,for money transfers between peoples.The decentralise nature of bitcoin makes it popular since  it  is not managed by a single person or authority.So the fear of currency manipulation is gone.Another advantage of bitcoin is its cryptographic nature.Cryptographic nature removes the possibility of hacking and frauds.
Bitcoin is abbreviated as BTC.1 BTC is like 1 Euro.It do not exists in physical form rather as a number with a bitcoin address.few terms weshould know for bitcoin transaction.
Wallet :The wallet is a place where we can send or recieve bitcoins.With the help of some software or website we can make wallet.There are three types of wallet:Software based,mobile wallet and web services.
How it works: Suppose we want to purchase some goods with bitcoin.?There is a QR code to scan which gives details about the particulars and cost of the product into the wallet.Then we click on "send" in our client,the details are send to the nearest node of the bitcoin netwrok.In these way the address is found in which we want to send money is found.