Welcome to nsane.forums

Welcome to nsane.forums, like most online communities you need to register to view parts of our community or to make contributions, but don't worry: this is a free and simple process that requires minimal information. Be a part of nsane.forums by signing in or creating an account.

  • Access special members only forums
  • Start new topics and reply to others
  • Subscribe to topics and forums to get automatic updates

Search the Community

Showing results for tags 'technology'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Found 84 results

  1. Some people predicted that telephone and internet are the useless things and now they completely changed the world. Throughout history, human beings have been inventing new technologies and making predictions of the future. Many of the predictions are made by thoughtless people but some are made by technology pioneers. All the predictions are made randomly on general facts. With the advancement in technology, all these predictions are taken under consideration and most of them are proved correctly while others failed. The following list features few failed technology predictions. 30. In 1924, Eddie Rickenbacker wrote in magazine that we would have flying cars within next 20 years. 29. In the 1960s, Sears launched a book which contains over 600 images of products and this was considered as the very first idea of online shopping. This business was flopped and many market experts predict that online business will never boom. 28. In 1936, New York Times prints that “A rocket will never be able to leave the Earth’s atmosphere”. 27. The telephone device has too many shortcoming to consider as a means of communication and it has no value to us. 26. X-rays will prove to be a hoax by Lord Kelvin, President of the British Royal Society. 25. On 1st January 2000, all the computer networks failed and everyone named it Y2K problem. No one expected this kind of problem and regarded as one of the failed prediction in the internet world. 24. The Americans don’t need telephone because we have plenty of messenger boys. – Sir William Preece 23. Flight by machines which are heavier than air is unpractical and impossible. After 18 months, Wright Brothers flew at Kittyhawk. 22. An engineer said that there will never be a bigger plane built than a Boeing 247 that holds ten people at one time. 21. In 1932, Albert Einstein said “There is not the slightest indication that nuclear energy will ever be obtainable. It would mean that the atom would have to be shattered at will “. 20. In 1959, IBM said to the founders of Xerox that photocopier had no enough market production. 19. Using alternating current is just a waste of time. Nobody will use it ever. – Thomas Edison in 1889. 18. Television won’t make their place in the market and people will soon get tired of staring at the screen every night. – Darryl Zanuck, movie producer in 1946. 17. Rail travel at high speed is not possible because passengers may be unable to breathe and would die of asphyxiation. 16. The wireless music box (Radio) has no commercial value and who would pay for a message. – Associates of David Sarnoff in 1921. 15. In the early days, a calculator is equipped with 18,000 tubes and weighs 30 tons. Some people predicted that in the future, it will have only 1000 tubes and weighs only half ton. 14. In 1939, The New York Times published that the problem of TV was that people had to glue their eyes onto the screen and Americans wouldn’t have time for it. 13. Robert Metcalfe, inventor of the Ethernet predicts that the internet will soon go spectacularly supernova and catastrophically collapse in 1996. 12. Everyone is always asking me when Apple will come with their phone and my answer is, probably never. – David Pogue, The New York Times in 2006. 11. Bill gates in 2004, Two years from now, spam will be solved. 10. The NeXT purchase is too little too late and Apple is already dead. – Nathan Mythrvold, Microsoft Ex-CTO in 1997. 9. H.G. Wells, a British writer stated that I must confess that my imagination refuses to see submarines because it suffocates its crew. Now submarines are used in sea exploration and military operations. 8. Audion inventor Lee De Forest claimed in 1926 that “for a man to ride a spaceship, travel to the moon and come back to the earth is a wild dream”. 7. In 1977, Ken Olsen, founder of the Digital Entertainment Corporation (DEC) says that there is no reason of having a personal computer in every home. 6. In 1902, the chief of the Michigan Bank advised the Henry Ford’s lawyer that automobiles are just a fad and they can never replace horses. 5. In 1800s, the French Military leader Napoleon Bonaparte said that, it is impossible to come up with a ship that can sail against the wind. 4. Bill Gates in 2002, within five years, I predict that the windows tablet will be the most popular form of PC. 3. There is practically no possible space communication satellite that will be used for better communication, satellite television and radio service. – T. Craven in 1961. 2. Nuclear powered vacuum cleaners will be a reality within next five years. – Alex Lewyt, President of Lewyt Corporation vacuum company. 1. Bill Gates said that “We will never make a 32 bit operating system”. Article source
  2. Horrifying: Facebook Users Are Reporting Getting Friend Requests From The Dead Back from the dead: Facebook users getting friend requests from deceased family members and friends What happens when you get a friend request on Facebook from someone you know; however, this someone in this case is not alive? You will be stunned, petrified, scared, etc. right? That is what is happening to some of the users of Facebook who have reported of getting friend requests from dead friends and family members. While dealing with a closed one’s death and handling their Facebook accounts after their death in itself is horrifying, and with such friend requests coming in, it is only causing more grievances for such people. However, what is more worrying is the fact that cyber-criminals and scammers are using this social media platform to trick people to steal money from them or for running some other frauds. So, how does this whole thing work? Basically, such friend requests are likely the result of cloning or hacking scams. For instance, the first method involves cloning someone’s account (in this case, the profile of the deceased) and stealing all the information in that profile, which is then used to setup a new account that is actually controlled by someone else. Further, the other method involves hacking into a deceased’s Facebook account and taking control of that account. In both the cases, the scammers have a complete hold over the account, which allows them to send messages, while pretending to be someone’s friend. Then, the scammer sends friend requests to the friends of the account they cloned or hacked into, in the hope that a number of them will accept the request under the thinking that it is the friend that has either created a new account of that they were accidentally deleted and being duly re-added. Once an invitation has been accepted, the scammer can now see information on that account. The scammer can then carry various kinds of scams, hoaxes and cons on the person who accepted the friend request. For example, the trick known as “friends in crisis” scam, where a person claims they are stuck somewhere and need money to get out of a problem. Or the fake account may be used to send users links to malicious websites that will attempt to install malware onto their computer when visited. Or they will be sent to a survey scam, which gather personal information by luring them into completing intrusive questionnaires. Or the fake account may be used to check on a person’s statuses and other information to impersonate them or steal from them. The above tricks and scams are applicable for those Facebook users who are alive too. If you too come across such a horrifying friend request on Facebook, please submit a request to either have the account of the dead to be memorialized (so that it will still be visible on Facebook, but no one will be able to log into it) or deactivated. This request can be made by filling the contact form given here. You can also find more information on how to report a deceased person or memorialize an account on Facebook by clicking here. Source
  3. Due to the affordability of entry-level and mid-range notebooks and desktop computer systems, Microsoft’s Windows 10 is the clear winner here, but the statistics of Mac users show that Apple’s macOS operating system is not lagging behind as initially expected, even though it is miles behind Microsoft’s Windows 10 in terms of user base. According to a briefing with TechCrunch, Apple’s Phil Schiller admitted that the company’s Mac platform had been adopted by nearly 100 million users. At the same time, Microsoft announced earlier on that its Windows 10 user base was standing in at 400 million users, showing the dominance of the company’s desktop OS. In order to help increase that user base, Apple is going to be reviving a few products later in the year. The iMac lineup, which is the company’s desktop computer family is going to be refreshed later this year, while the desktop workstation named Mac Pro is going to be reintroduced in 2018. Apple’s MacBook Pro 2016 models are also a good option, but their ‘Thunderbolt 3 only’ interface means that you will have to spend a lot of money on adapters and dongles. These notebooks are also limited to just 16GB of RAM, which will put off a lot of creative professionals and publishers alike. Source
  4. This Device Works as a Firewall for Your USB Ports USG v1.0 (via Robert Fisk) The USG is an USB attachment that allows users to connect USB flash drives and other USB devices to their computer without any of the risks. Attacks like BadUSB have shown how a rogue device can mimic a benign USB interface, but secretly send malicious low-level commands and take over a computer via its USB port. USG works like a firewall for USB connections USG, created by New Zealander Robert Fisk, works as an intermediary between the computer and the USB device (flash drive, USB keyboard, USB mouse) and behaves similar to a firewall, inspecting the data that passes through it. USG, which runs on custom firmware, only lets data pass, ignoring any kind of low-level interactions between the USB device and computer. Furthermore, USG protection goes both ways, meaning you can use USG to protect USB flash drives when connecting to unknown computers. USG designed to thwart BadUSB attacks BadUSB attacks work because computers inherently trust anything connected via an USB port. If it's a mouse or a device such as PoisonTap, which can alter DNS settings and dump passwords, the computer behaves the same. It doesn't care. Fisk says he developed USG after realizing he also couldn't trust the vendors of USB-based components. "Do you know who developed your flash drive's firmware" Fisk asks, "It's probably not the company name printed on the packaging." "Has the firmware been audited for backdoors and malicious functionality? Can you confirm that the firmware running on your drive hasn't been maliciously modified during or after manufacture?" These questions drove him to create USG using off-the-shelf development boards. He then wrote custom firmware to power these boards and make USG work as USB devices should, only focusing on the data transfer, and nothing else. Fisk open-sourced USG's firmware on GitHub. USG drawbacks Of course, this has its drawbacks. A lot of the noise traffic on USB devices is the firmware negotiating connections and improving data transfer speeds. These things are not included in USG, as they are the attack vectors for BadUSB. As such, the recently released USG v1.0 only supports a data transfer speed of up to 1 MB/s, much inferior to commercial USB devices that work in the range of tens of MB/s. In addition, USG only supports USB mass storage (flash drives), keyboards, and mice, but Fisk promises to add support for other types of USB devices in the future. People can buy or make their own USG Fisk says that anyone can make their own USG devices using off-the-shelf development boards, but if they don't have the skills, he's also selling USG devices for around $60 + shipping. "My reputation hinges on the integrity of this project," Fisk explains. "This includes the integrity of the hardware I am offering for sale. This is why I will never outsource the manufacture of USG hardware to another country." "The USG is assembled in New Zealand under my direct supervision, and the firmware is programmed from a secure device by yours truly," the developer adds. "USG devices delivered by post have tamper-evident seals placed around the case, so any attempt to reprogram the firmware is visible." Fisk recommends USG for companies and people who want to protect crucial workstations, or for people who travel a lot and have an USB flash drive they often connect to many untrusted computers. The only downside to USG (by design) is that it doesn't distinguish between good data and bad data. Malware stored on an USB flash drive can pass through USG without any warnings since the malware is just a random blob of data to USG. For malware attacks, you'll have to rely on an antivirus. Source
  5. Technology Plays Role in Every Aspect of Crime, Europol Says New and emerging technologies are being used by criminal gangs operating in nearly every aspect of crime, a new report from Europol has warned. The 2017 Serious Organised Crime Threat Assessment (Socta) revealed that criminal gangs across Europe are adept at exploiting new technologies to help them arrange and carry out crimes. Cybercrime is now one of Europol’s top priority crime threats. “For almost all types of organized crime, criminals are deploying and adapting technology with ever greater skill and to ever greater effect. This is now, perhaps, the greatest challenge facing law enforcement authorities around the world, including in the EU,” the report said. “Cybercrime is a global phenomenon affecting all Member States and is as borderless as the internet itself. The attack surface continues to grow as society becomes increasingly digitised, with more citizens, businesses, public services and devices connecting to the internet,” the report added. Of particular concern is the rise of Crime-as-a-Service (CaaS), where people can buy goods and services on the dark net to help them carry out crimes, ranging from hacktivism to terrorism. The underground criminal marketplace is enabling crime that would otherwise be out of reach for criminals, the report said. “This allows even entry-level cyber-criminals to carry out attacks of a scale disproportionate to their technical capability,” the report said. “Criminal forums and marketplaces within the deep web or darknet remain a crucial environment for cybercriminals to communicate and are a key component for CaaS.” Europol highlights malware and cyber-criminal services as one of the main elements of CaaS, alongside stolen goods, counterfeit medicines, illicit drugs, child sexual exploitation materials and the trafficking of firearms. Ransomware is becoming the leading threat in terms of malware, the report said, having a greater impact on victims than other types of malware. It’s increasingly targeting individuals as well as public and private organizations. Also growing in frequency and scale are network intrusion attacks, with the purpose of stealing private data or intellectual property. It’s not just highly organized crime that is adopting technology though. The report states that criminals are using social media posts to find out when potential burglary victims are away, and targeting them accordingly. Europol has also recorded the use of free online navigation tools to scout out neighborhoods to target. “Criminals have always been adept at exploiting technology. However, the rate of technological innovation and the ability of organized criminals to adapt these technologies have been increasing steadily over recent years. Developments such as the emergence of the online trade in illicit goods and services are set to result in significant shifts in criminal markets and confront law enforcement authorities with new challenges,” said Rob Wainwright, director of Europol. “Technology is a key component of most, if not all, criminal activities carried out by organised crime groups in the EU and has afforded organised crime with an unprecedented degree of flexibility. This flexibility is particularly apparent in the ease with which criminals adapt to changes in society,” the report concludes. “The internet, the multitude of online platforms and communication channels it hosts have had a huge impact on society, strengthening and transforming the economy, driving innovation and shaping social interaction. However, it is also a key enabler of criminal activity and plays a role in all types of criminality.”
  6. Heard Of This Man Who Invented Email As a 14-Year-Old Boy? Forgotten and abandoned: Where is the 14-year old Indian boy who invented email? Any of you remember Shiva Ayyadurai? Few of you might have heard about him as a person who claimed to have invented email. Now 53 years old, Shiva has almost been forgotten and abandoned despite making the most controversial claim since the advent of Internet. V. A. Shiva Ayyadurai is an Indian-born American scientist and entrepreneur. Shiva is notable for his controversial claim to be the “inventor of email”. His claim is based on the electronic mail software he wrote as a New Jersey high school student in the late 1970s, which he called EMAIL. Shiva has since published a book challenging claims that the American computer programmer Ray Tomlinson invented email and asserting his own claim as its creator. According to Shiva, Tomlinson’s creation in 1971 was a primitive form of text messaging, while he had invented what we know and love as email in 1978 when he was a 14-year-old boy helping out the Newark dental school where his mother worked. While Shiva has steadfastly held on to his claims, no one from the tech world supported him but for Deepak Chopra, the new age spiritual guru, and India’s new prime minister Narendra Modi who has posed for photographs with him. Shiva now a lecturer at the Massachusetts Institute of Technology, copyrighted the term ’email’ in 1982 but did not patent it because, he says, it was not possible to patent software at that time. His creation, however, was an inter-office mail system with an inbox and was called ’email’. While Ray Tomlinson went on to hog the limelight for email, Shiva was fighting a lone battle. Tomlinson’s email was different from Shiva’s email. It enabled users on different computers connected to the primitive ARPANET, a precursor to the internet, to send messages to each other. It used the @ symbol to identify the computer from which it was being sent. If you take Shiva for a troll patent thief you should remember that Shiva holds four degrees from MIT, including a Ph.D. in biological engineering, and is a Fulbright Scholar. Also, he has won a $750,000 settlement from the now defunct ‘Theil sued’ Gawker for publishing wrong information about him and his invention. The settlement came as part of a broader settlement with wrestler Hulk Hogan and journalist Ashley Terrill. While Shiva fight’s his lone battle we are using his invention daily without even batting an eyelid for its creator. We hope that the world acknowledges Shiva’s efforts for making email a daily part of our life along with Tomlinson and he gets appreciated suitably. Source
  7. Rust Programming Language Takes More Central Role in Firefox Development Starting with the release of Firefox 54, the Rust programming language will take a bigger role in the Firefox browser, as more and more components will work on top of this new technology developed in the past years by the Mozilla Research team. For people unfamiliar with Rust, this is a new programming language developed by a Mozilla employee, which the Foundation officially started to sponsor beginning with 2009. In simple terms, Rust is a safer version of programming languages like C and C++, the languages at the base of Firefox and most of today's desktop software. Applications written in Rust have fewer memory-related errors and are safer to use thanks to the way the language was designed. Mozilla shipped first Rust component in Firefox 48 After seven years of working on Rust, Mozilla shipped the first Rust component with Firefox in August 2016, when the language was used to rewrite the browser's multimedia stack, the module that deals with rendering audio and video files. At the time, Mozilla reported they had zero issues during tests. Since then, Mozilla engineers have been slowly replacing more and more Firefox core components with Rust-based alternatives. According to an entry in the Mozilla bug tracker, there's so much Rust code in the Firefox core that starting with Firefox 54, Mozilla developers will need to have the Rust compiler installed on their devices in order to compile a binary version of Firefox. Mozilla might lose some Firefox users According to Firefox developer Ted Mielczarek and others, this will lead to some problems, and the bigger one is that Mozilla employees won't be able to compile binaries for platforms with smaller userbases, such as IBM's PPC64el and S390X, deployed at various companies around the world. The reason is that there's no Rust compiler for those platforms, which means that Firefox devs will fail when trying to compile a binary. The only way to fix this is if a compiler will be developed for those platforms. Most Firefox users won't be affected by this change, but Mozilla hopes they'll see a boost in performance in the future. In the upcoming year, Mozilla plans to replace most of Firefox's core engine, called Gecko, with Rust components. This operation will be done through small changes across different versions. Developer Jen Simmons perfectly described this very complex process in a blog post called "Replacing the Jet Engine While Still Flying." Source
  8. Canonical: 2017 Will See a Mir 1.0 Release, Plans to Implement Vulkan Support 2016 was a good year for Mir, says the company behind Ubuntu As most of you are aware, Canonical develops its own display server for Ubuntu, called Mir, which, in some ways, is similar to the X.Org Server and Wayland technologies. While Ubuntu on the desktop still uses X.Org Server's components, Mir is currently heavily tested for the Unity 8 user interface that Canonical plans on implementing by default for future releases of Ubuntu Linux, for desktops. However, until now, Mir has only been successfully deployed on mobile devices, powering the Ubuntu Touch mobile operating system used in various official and unofficial Ubuntu Phone and Tablets. According to Alan Griffiths, Software Engineer at Canonical, 2016 was a great year for Mir, and in 2017 the company plans on releasing the 1.0 milestone of the display server, which should implement the long-anticipated Vulkan support. "2017 will see a cleanup of our "toolkit" API and better support for "platform" plugin modules," said Griffiths. "We will then be working on upstreaming our Mesa patch. That will allow us to release our (currently experimental) Vulkan support." Canonical is working on reducing latency for Mir Canonical worked very hard in 2016 to improve its Mir display server by enabling a client-side toolkit, application, or library to work on Mir, as well as to upstream Mir support into GTK+ 3, Qt, SDL2, and Kodi. They also managed to create Mir Abstraction Layer and released MirAL 1.0, but for 2017 the company plans on enabling Mir on new platforms, upstream their Mesa patch, and enable Mir on a new graphics API, such as Vulkan. Canonical is now working on reducing latency for Mir, and hops that 2017 will be the year when Mir becomes mature enough to be used on desktops, powering the next-generation Unity 8 display server. At the moment, the company did not reveal the exact date when Mir 1.0 will see the light of day, so we can only guess that it could launch sometime around the release of Ubuntu 17.04 (Zesty Zapus), in mid-April, when they'll prepare for Ubuntu 17.10. Source
  9. Nokia Could Launch a Foldable Smartphone of Its Own The Finnish company could join the innovation race While Samsung is expected to launch its own foldable handsets, Apple is likely to order them from those companies who own the technology required. LG on the other hand will use its foldable panel technology inside products ordered by other companies, like Apple for example. If Nokia wants to remain in tow, it needs to come up with similar devices that will compete with Samsung, Apple and LG products, as well as other companies that might introduce foldable smartphones. In this regard, it appears that the Finnish company has already filed for a patent that describes a foldable device, which could very well be a smartphone. The patent granted by the US Patent & Trademark Office (USPTO) is not the first of its kind. Nokia has been filing similar patents for this type of technology since 2005, so we might not really see a Nokia-branded foldable smartphone anytime soon. The main idea behind the foldable technology is to try to provide customers with larger displays in a pocket-sized form factor. The patent reads: “In this way it is possible to provide a pocket size device with a relatively large display (for example, a 6, 7 or 8 inch display or larger)." Until the time comes for Nokia to compete other handset maker in innovation, the Finnish company is expected to have its second Android smartphone revealed next month at Mobile World Congress. A flagship smartphone, known as Nokia 8, will be introduced in late February, but it will probably not arrive on the market until March or April, just like other flagships from rival companies. Source
  10. Meet The GPD Pocket, A 7-inch Ubuntu Laptop The GPD Pocket Do you have small hands? Are you a Borrower? Do you consider 10-inch netbooks to be monstrous? If so, the GPD Pocket may be right up your (very miniature) street. GPD Pocket, 7″ Laptop The GPD Pocket is a 7-inch laptop that’s small enough to slip in to a pocket — and it will apparently be available in two versions: with Windows 10, and Ubuntu 16.04 LTS. As reported on Liliputing, GPD (the company who makes the device) is currently only showing the device off a few fancy renders and photos with a prototype unit. But GPD has form for releasing other (similar) devices, like the GPD Win, and Android gaming portables, so although a novelty this latest device is unlikely to be outright vapourware. The GPD Pocket touts some impressive specifications for the size, including a quad-core Intel Atom x7-Z8700 processor (the same one used in the Microsoft Surface 3), 4GB RAM and a high-res IPS touch display: 7-inch IPS touch display Intel Atom x7-Z8700 (quad-core @ 1.6GHz) 4GB of RAM 128GB of storage 1x USB Type-C 1x USB 3.0 Mini HDMI Out MicroSD Card slot Courage jack (“headphone port”) 7000 mAh battery The overall dimensions of the device mean you won’t be able to hammer away on a full-sized keyboard, but the chiclet style QWERTY one included (plus a ThinkPad-like mouse nub as there’s no room for a touchpad) looks perfectly serviceable for tweets, forum posts and some basic web browsing. Since I doubt anyone would be using this device as their primary device issues to do with the keyboard size, or lack of palm rest, etc, are unlikely to be primary considerations. No, the GPD Pocket is, as the name suggests, intended as the sort of device you literally slide into your pocket as you head out the door. The “bad” news is that, like everything these days, GPD plan to crowdfund the GPD Pocket over on Indiegogo sometime in February. Currently there’s no indication of pricing or release date, but providing it’s not too weighted at the high-end it could make a nice midrange alternative to Linux hobbyists. Source
  11. Watch This Terrifying 13ft Robot Walk, Thanks To Ubuntu The world’s first manned robot took its first formative (and no doubt very loud) steps in South Korea last week — but you may be surprised to hear that Ubuntu was there to assist it. Standing an impressive 13 feet high, the bipedal Method-2 robot is referred to “robot-powered suit” that responds and mimics the actions of the person sat inside the cockpit, Ripley Power Loader style! The machine, which is able to walk like a human, has to haul a huge 130kg arms in each lunge forward, and weighs 1.5 ton in total. From a short video posted by Ruptly TV, Ubuntu is involved in helping engineers monitor, debug, and process the robot as it stomps forward. While there’s no suggestion that the robot itself runs on Ubuntu or Linux (something that is not improbable) it’s nonetheless great to see open-source software (especially of the flavor we write about) being used in advancements in robotics and engineering. Around 30 engineers are said to have on the mechanical marvel, the design of which is, in part, inspired by films like Terminator says its (famous) designer Vitaly Bulgarov. R&D spending on the creation has thus far hit $200 million, and news reports say the Method-2 could go on sale by the end of 2017 — with an equally giant price tag of $8.3 million! For more details on the robot, including a glimpse at some truly epic sci-fi-esque photos of the machine in action, see this blog post over on Design Boom. And if you’re lucky enough to get to try one, please don’t run sudo snap install skynet on it! Source
  12. I posted this as a joke, but the sad truth is it has become fact.
  13. bluetooth

    Bluetooth 5 Is Here While Bluetooth technology is not perfect, it has greatly impacted the technology industry. Look no further than headphones and speakers to see that it has made wireless music possible. It is also the technology that links smartphones to smartwatches. Those are just two such examples -- there are countless more. Today, the Bluetooth Special Interest Group announces the official adoption of the previously-announced Bluetooth 5. In other words, it is officially the next major version of the technology, which will eventually be found in many consumer devices. "Key feature updates include four times range, two times speed, and eight times broadcast message capacity. Longer range powers whole home and building coverage, for more robust and reliable connections. Higher speed enables more responsive, high-performance devices. Increased broadcast message size increases the data sent for improved and more context relevant solutions. Bluetooth 5 also includes updates that help reduce potential interference with other wireless technologies to ensure Bluetooth devices can coexist within the increasingly complex global IoT environment. Bluetooth 5 delivers all of this while maintaining its low-energy functionality and flexibility for developers to meet the needs of their device or application", says the Bluetooth Special Interest Group. Mark Powell, executive director of the Bluetooth SIG explains, "Bluetooth is revolutionizing how people experience the IoT. Bluetooth 5 continues to drive this revolution by delivering reliable IoT connections and mobilizing the adoption of beacons, which in turn will decrease connection barriers and enable a seamless IoT experience. This means whole-home and building coverage, as well as new use cases for outdoor, industrial, and commercial applications will be a reality. With the launch of Bluetooth 5, we continue to evolve to meet the needs of IoT developers and consumers while staying true to what Bluetooth is at its core: the global wireless standard for simple, secure, connectivity". So, will you start to see Bluetooth 5 devices and dongles with faster speeds and longer range in stores tomorrow? Nope -- sorry, folks. Consumers will have to wait until 2017. The Bluetooth SIG says devices should become available between February and June next year. Source Alternate Source - Bluetooth 5.0 Officially Introduced with Longer Range, Faster Speed
  14. Researchers Turn Nuclear Waste Into Diamond Batteries That Could Last More Than 5,000 Years Scientists find diamond batteries that could harness energy from nuclear waste Physicists and chemists from the University of Bristol’s Cabot Institute have found a way to convert thousands of tons of seemingly worthless nuclear waste into man-made diamond batteries that can last for 5,000 years. The team also claimed the “diamond batteries” – which are enclosed inside of other diamonds for safety are not dangerous and release less nuclear radiation than a banana. Such long-lived diamond batteries could be used in implants such as pacemakers, drones, satellites, spacecraft, and in other areas where long battery life is crucial. They could help resolve the problems of nuclear waste, clean electricity generation and battery life, say the researchers. Professor Stephen Lincoln, Visiting Research Fellow at the University of Adelaide Honorary, told that the breakthrough of this magnitude, if confirmed, would be revolutionary. “Nuclear waste is a huge issue, there would be something like 150,000 tonnes of high-level nuclear waste stored in various places around the world. It is stored temporarily and the only permanent storage facility is in Finland but there is nothing there yet. “If you could use nuclear waste for generating power, the significant thing, on top of the fact that you don’t need to find somewhere to store it, is it doesn’t generate carbon dioxide so it would be great for the environment.” Scientists found that by heating graphite blocks used to house uranium rods in nuclear reactors – much of the radioactive carbon is given off as a gas. This can then be collected and turned into radioactive diamonds using a high-temperature chemical reaction, in which carbon atoms are left on the surface in small, dark-colored diamond crystals. When placed near a radioactive source, these man-made diamonds produce a small electrical charge. The radioactive diamonds are then encased safely within a layer of non-radioactive diamond. This requires no moving parts or maintenance, and can last for thousands of years without needing to be replaced. The team has already demonstrated a prototype diamond battery using Nickel-63, but researchers said carbon-14 will make a more effective radiation source. “Carbon-14 was chosen as a source material because it emits a short-range radiation, which is quickly absorbed by any solid material,” said Dr Neil Fox from Bristol. “This would make it dangerous to ingest or touch with your naked skin, but safely held within diamond, no short-range radiation can escape. “In fact, diamond is the hardest substance known to man, there is literally nothing we could use that could offer more protection.” Watch the video below for more scientific details: Source
  15. SKEYE Nano 2 Is World’s Smallest Flying Camera At Just 1.6 Inches Wide SKEYE Nano 2 Drone : The worlds smallest flying camera drone which fits on your fingertips, Priced $99 (Rs.6600.00) for Techworm readers Drones and Internet of Things are two sectors of technology which are just taking off with many new advances coming to us every day. Drones are nowadays used in pretty much everything from delivering pizzas to taking selfies, these small unmanned aerial vehicles are slowly taking over the world by storm. They vary in shape, sizes, and features. While there are many drones which covet for the title of world’s smallest drone, have you come across a drone which is smallest, has a camera and packs a punch? SKEYE, the manufacturer of quality drones and the current holder of the title of making the world’s smallest drone (SKEYE NANO) now has added another feather in its cap. SKEYE Nano 2 is arguably the world’s smallest flying camera drone at 1.6 inches wide. Measuring just 1.6 inches on each side, and 0.9 inches in height, the 0.59-ounce this awesome drone is capable of flying in six directions and ‘performing aerobatic stunts. The SKEYE NANO 2 is priced at $129 but is available to Techworm readers at $99. If you are interested, visit our Techworm Deals page and get the SKEYE Nano 2 for $99 for a limited period. The Nano 2 is so simple to fly that even a non-technical person can handle it. Just push the button for takeoff and you can take it from there with the included controller or sync it up to your smartphone via Wi-Fi. The SKEYE Nano 2 drone comes with its own App which gives you real time camera streaming with various controls. Its compact and lightweight design enable precision flying, thanks to its 6-axis flight control system with adjustable gyro sensitivity. Despite its size, the Skeye Nano 2 houses an HD-capable, Wi-Fi-controlled camera able to feed back amazing first-person-view video in real time. The drone also has the ability to hover in one spot, allowing the user to adjust its pitch, yaw, and roll without worrying about it shooting off in the wrong direction. The Nano 2 also comes with built-in LED lights for night-flying, and clips inside the controller when not in use. The SKEYE Nano 2 FPV Drone ships anywhere for free and is a can’t-miss holiday gift idea. Pick one up for $30 off from Techworm Deals for a limited Black Friday promotion period. Source
  16. 10 Best Remote Desktop Software Alternatives For TeamViewer Here Are Top 10 Remote Desktop Software Alternatives For TeamViewer Ever since TeamViewer got hacked, security experts are warning users to ditch it or face problems. The reason is that TeamViewer is being used as a vector of attack. This has happened on other sites where they had no critical information and within 48 hours everyone’s logged in sessions were logged out, an email went around saying you had to click the link in the email (to verify ownership) and set up two factor auth as they knew they were being targeted. TeamViewer must know they are being targeted, and the stakes are high as the software allows complete access to a trusted machine – it’s basically a master key – and there hasn’t been a single response with teeth from TeamViewer. However TeamViewer developers say that the fault lies with the users. Therefore it would be wise to search for alternatives to TeamViewer which we give here. Remote Desktop Access is a great way to manage the files on your desktop as well as any other possible location, and also to help your associates with troubleshooting their problems remotely. In other words, remote desktop is a program or an operating system feature that allows the user to connect to a computer in another location, see that computer’s desktop and interact with it as if it were local. Also, remote desktops are an excellent way to expedite the deployments for developers. Remote desktop applications are used to remotely configure data centers and are the standard in industrial applications. While the advantages to remote desktop are too good to be overlooked, the right tools are needed to connect with your friends and family safe and secured. One of the most common and widely used Remote Desktop software is ‘TeamViewer’ and we will be looking at a few alternatives that better this tool. Why the need for TeamViewer Alternative? While TeamViewer is a useful tool for getting started on remote desktop, it doesn’t provide the simplicity and dependability expected from such a tool. Security is one primary concern that causes many users to flock away from TeamViewer, if not properly configured. If the average user doesn’t configure the settings on this tool correctly, your system is directly put at risk. Although the personal license version is for free, TeamViewer charges a heavy fee for the business version. Even though TeamViewer features many useful functionality like file transfers, collaborations and mobile access, there are better TeamViewer alternatives should you decide to do away with it. Here are the 10 best alternatives to TeamViewer that you can look for your remote desktop activities. Windows Remote Desktop Connection: Windows Remote Desktop Connection is a free feature built into the Microsoft Windows Operating System, Ultimate and Business versions that gives fast and complete access control over a remote PC. Supported by Windows and Mac OS X, the tool is simple, easy-to-use and easy to set up that makes this tool a great fit for beginners and amateurs, beginning out on Remote desktop application. This setting can be accessed from the computer’s System settings, found in the control panel. The router of the remote PC needs to be routed on the port 3389 to direct it to your PC. However, this tool is not capable of controlling multiple PC control at a time. Visit website Join.me: Developed by LogMeIn, Join.me is a premium online conferencing and meeting tool that allows multiple people from multiple locations connect with each other at the same time, which is supported by Windows and Mac OS X. Join.me offers unlimited audio, which means that anyone can join a call from any device, whether that is internet calling (VoIP) or phone lines. It also offers recording, one-click meeting scheduling, and phone numbers in 40 different countries to facilitate worldwide conferencing. The paid versions offers up to 250 participants to join the meeting and a presenter swap lets people share their views across the attendees. While the service is free for basic VoIP, it is $15/mo for Pro plan and $19/mo for Enterprise plans with premium meetings and advanced management. Visit Website Splashtop: Splashtop offers free and paid remote desktop solutions for individuals and businesses alike. Splashtop is easy to use once you get past the difficulties with installation. Supported by Windows, OS X, Linux, Android and iOS, Splashtop remote PC access software offers fast connections and multiple levels of security. You can use the tool for Free if you are using it for personal purposes on up to 5 computers. Setting up the tool on your Windows or Mac and accessing remotely over your Android or iOS based mobile phone is what Splashtop achieves pretty enormously. There is minimum latency on audio and video streaming, so that makes it easier for you to even enjoy your media remotely. It is free for 6 months, after that $1.99/month (Individual use) and $60/year per user for businesses. Visit Website Real VNC: RealVNC provides both free and paid versions of the Remote Desktop Client. The software consists of a server and client application for the Virtual Network Computing (VNC) protocol to control another computer’s screen remotely. Somewhat more complicated that setting up TeamViewer, RealVNC offers the dependability and features like cross-platform remote control, VNC authentication, encryption, file transfer, collaboration tools and chat, to ensure that your remote connection bodes well for the person on the other end of it. The cross-platform utility allows you to connect individually to a remote computer or also connect multiple PC’s behind a public IP Address. The supported platforms for this software are Windows, Mac OS X, Linux, UNIX, Ubuntu, and Raspberry Pi. The software is free for private use, while it is $30 per desktop for Personal Commercial Use and $44 per desktop for Enterprise Use. Visit website Ammyy Adminn: Ammyy Admin is free of charge, fast and easy way to gain remote sharing and remote desktop control solution for both individuals and businesses alike. Unlike heavy remote desktop software, the tool comes in as a tiny application under 1MB. In addition to remotely connecting to the other system, you can also perform actions like file transfers and live chat. Supported by Windows, secure connection and easy to manage software makes Ammyy Adminn one of the most preferred free remote desktop clients. While it is free for non-commercial uses, the Starter, Premium and Corporate licensed tools are priced at $33.90, $66.90 and $99.90 respectively. Visit Website Ultra VNC: UltraVNC is a free tool based on the VNC technology that is developed for systems based on Windows to remotely access other systems. It offers a simple setup process that gets you connected in a matter of minutes. Once the connection is established, you can completely work on another remote system. This tool also allows file transfer that makes it a useful little free tool for quickly establishing a remote connection and getting your work done. Visit Website LogMeIn Pro: LogMeIn offers one of the best remote desktop solutions for Windows and Mac OS X for individuals and businesses. Even though the free version of LogMeIn was discontinued recently, that doesn’t keep it from being listed as one of the best alternatives to TeamViewer. In spite of this, LogMeIn still serves as one of the best premium alternatives to TeamViewer with many key features like file transfer, audio and video streaming, full-remote access to transfer files, print documents to a local printer and share documents with collaborators. Although priced somewhat less than the TeamViewer app, LogMeIn offers features that are non-existent in many remote desktop applications of its kind. It is $99/year for individuals (Access up to 2 computers), $249/year for small businesses with 5 computers and $449/year for Businesses with 10 computers. Visit Website WebEx Free: Cisco’s WebEx free and premium tool allows you to remotely connect with people based on different systems through the free mobile or desktop applications. These remote desktop setups although have to be an attended one on the other side. The one hosting the meeting could share his desktop and choose to pass over the control of mouse and keyboard to other presenters. Sharing files, chat and face-to-face live interaction, scheduling in Outlook, Password protected messages are also capable with this tool. Supported by Windows, Mac OS X, Linux and Mobile Apps, Cisco’s WebEx would be a great fit for your needs if you are looking for a premium business solution or just for remotely accessing a desktop with added bit of interaction to it. While it is free for 3 People, paid plans include Premium 8 ($24 per month for up to eight attendees), Premium 25 ($49 per month for up to 25 attendees) and Premium 100 ($89 per month for up to 100 attendees.) Visit Website Chrome Remote Desktop: This free tool is available as an extension for Google Chrome browser, accessible on any operating system running it and is fully secured. Setting up is simple and the add-on costs nothing in addition to providing an easy-to-use setup for getting your remote desktop connected. The add-on lets users remotely access any desktop and its contents right from their browser. Visit Website Mikogo: Mikogo is a great premium tool for businesses and individuals with commercial purposes, even though priced a bit heavily for business users. The tool is completely browser based and does not need software or plugin installations. Mikogo provides its software as native downloads for Windows, Mac OS X, Linux, iOS and Android. The software is cross-platform which allows a presenter to host the online meeting on a Windows computer and meeting attendees could join from a Windows, Mac, or Linux computer, as well as from smartphones or tablets. The software interface is multi-lingual and can be switched between one of 35 languages. It also has other features such as share documents, swap presenter, remotely control a desktop, free mobile apps, video conferencing, multi-user whiteboard, file transfer, chat and more. It is $13 per month for 3 participants, $19 per month for 25 participants, $39 per month for 25 participants and unlimited hosts and $78 per month for 25 participants with 3 session channels. Visit Website Source
  17. Why Real Hackers Prefer Linux Over Windows And Mac Why do hackers prefer Linux over Mac, Windows, and other operating systems? We have published many tutorials for hackers and security researchers. You may have noticed that most tutorials are based on Linux operating systems. Even the hacking tools out there are based on Linux barring a few which are written for Windows and Mac. The moot question here is that why do hackers prefer Linux over Mac or Windows? Today we look at the reason why hackers always prefer Linux over Mac, Windows, and other operating systems. You may have your own reasons for choosing Linux but what do hackers really look forward to while working with Linux. Reason #1: Command line interface vs graphical user interface Linux was designed around a strong and highly integrated command line interface. Windows and Mac don’t have that. This grants hackers and Linux far greater access and control over their system and awesome customization. This is the reason that most hacking and pentesting tools are built into Linux have greater functionality above and beyond their windows counterparts. In contrast, Windows was built around the graphic user interface (GUI). This restrict user interaction to point-and-click navigation (slower) and application/system menu options for configuration. Windows has a command line structure, such as command prompt and Power Shell, however, these don’t give hackers/developers the complete functionality and integration compared with Linux. This hampers their work as hacking is usually going beyond the well-defined command lines. This is the reason that though hacking tools like Metasploit or nmap are ported for Windows, they don’t have capabilities like Linux. Compared to Windows, Linux is more granular. That means Linux gives users infinite amount of control over the system. In Windows, you only can control what Microsoft allows you to control. In Linux, everything can be controlled by the terminal in the most miniscule to the most macro level. In addition, Linux makes scripting in any of the scripting languages simple and effective. Reason #2: Linux is lighter and more portable This is arguably the best reason for choosing Linux over Mac and Windows. Hackers can easily create customized live boot disks and drives from any Linux distribution that they want. The installation is quick and its light on resources. To memory, I can only think of one program that lets you create Windows live disks and it wasn’t nearly as light or as quick to install. Linux is made even lighter as many distros are specifically customised as light-weight distros. You can read about the top lightweight Linux distros here. Reason #3: Linux is typically more secure Ask a pro hacker or security researcher which operating system is the most secure of them all, and perhaps 101 out 100 will unflinchingly swear by Linux. Windows is popular because of its reach among average users and popularity amongst programmers because it is more profitable to write a program for Windows. In more recent years, popularity has grown for UNIX based operating systems such as Mac OS, Android, and Linux. As a result, these platforms have become more profitable targets for attackers. Still, Linux is a great deal more secure than Windows and Mac out of the box. Reason #4: Linux is pretty much universal Just about everything runs some form of UNIX (Internet of Things, routers, web-servers, etc.). Doesn’t it make sense that you would target those systems from a device running the same platform? After all, the goal is to make things easier on yourself. You don’t want to worry about compatibility problems. Reson #5: Linux Is Open Source Unlike Windows or Mac, Linux is open source. What that means for us is that the source code of the operating system is available to us. As such, we can change and manipulate it as we please. If you are trying to make a system operate in ways it was not intended, being able to manipulate the source code is essential. Think of it this way. Could you imagine Microsoft giving us a plug-in/MMC or whatever to manipulate or change the kernel of Windows for hacking? Of course NOT! Reason #6: Linux Is Transparent To hack effectively, you must know and understand your operating system and to a large extent, the operating system you are attacking. Linux is totally transparent, meaning we can see and manipulate all its working parts. Not so with Windows. Actually, the opposite is true. Microsoft engineers work hard to make it impossible for users or hackers to find the inner workings of their operating system. On Windows, you are actually working with what Microsoft has given you rather that what you want. Here Linux differs philosophically from Microsoft. Linux was developed as an operating system to give users more control over it rather than make them do what the developers want. Summary : Linux vs Windows and Mac You have to understand that hackers and security researcher are here to make money. Hackers hack platforms that are profitable. Windows has been the preferred choice within enterprise environments and with the average consumer. It’s the preferred choice for developers (apple licensing costs and restrictions), which is why Windows is so compatible. Apple has been too expensive for consumers and Linux is frankly not that user-friendly (buggy, lack of GUI, etc.). You don’t have an average Joe just switching on a Linux PC/laptop and doing what he wants. However, this is changing. With the arrival of Android smartphones, there has been a paradigm shift in user’s preferences. As more users switch to Mac/iOS and Android/Linux, attackers will shift to targeting these platforms. With Internet of Things predicted to the next game-changer in tech, Linux will emerge as a formidable challenger to Microsoft’s Windows or Apple’s Mac. As of today, most Internet of Things connected devices are powered by Linux and given the transparency and control available in Linux, it will remain so. Hacking isn’t for the uninitiated. Hacking is an elite profession among the IT field. As such, it requires an extensive and detailed understanding of IT concepts and technologies. At the most fundamental level, Linux is a requirement for hackers and security researchers. Source
  18. Hey guys, I just came across this ad blocking service on twitter and it has some crazy witty tweets on its wall, which made me take it here Here's their site seems like a Product of Purevpn (referring it as pops on twitter). What are your thoughts about it? https://www.purevpn.com/badadjohnny
  19. AMD Thinks Beyond Zen Chips As It Prepares For The Future A rendering of AMD's new Zen chip, which will only be supported by Microsoft's Windows 10. It looks like AMD will jump from 14-nanometer process to the 7-nanometer node to manufacture chips AMD has set high hopes for its upcoming Zen PC chips, but the company has now offered some clarity on how it will manufacture successor chips. Current Zen chips will be made using the 14-nanometer process, but the next important process for AMD is 7-nm, the company said. AMD has renewed an accord with spin-off GlobalFoundries that may include manufacturing those chips using that process. The 14-nm and 7-nm processes "are the important nodes" for AMD, said a company spokesman in an email. AMD is planning CPUs, GPUs, and custom chip manufacturing advances on those nodes. That's different from Intel, which is jumping to the 10-nm process next year before taking on 7-nm. GlobalFoundries' roadmap is unclear, though it has been internally developing 10-nm and 7-nm technologies. The 7-nm process is still considered many years out, and AMD didn't say if it was planning for chips on the 10-nm process. It's likely the immediate successor to Zen will be on the 14-nm process. Chip planning is heavily dependent on the manufacturing process. Chip makers have to plan processor features based on what a manufacturing process is able to achieve. For example, Intel planned its first 22-nm chips with 3D transistors, because the manufacturing process had the capability to etch related features on chips. AMD planned its latest GPUs, code-named Polaris, and many of its features like the HBM (high-bandwidth memory) for the 14-nm process. The 7-nm process is considered a big advance in chip making. Intel plans to introduce EUV (extreme ultraviolet) lithography on 7-nm, which helps etch finer features on chips. EUV alleviates some of the issues involved in etching smaller and smaller features on chips. AMD modified an ongoing chip-manufacturing contract with GlobalFoundries to account for the advance to 7-nanometer technologies. AMD's has modified the terms of the contract with GlobalFoundries through 2020, and will take a one-time charge of $335 million in the third quarter of 2016. The contract actually expires in 2024, but AMD has continuously modified the contract to align with its chip supply needs. Some poor planning has cost AMD millions of dollars in losses on this contract, but the company's chip shipment are on the upswing after years of losing market share to Intel in server and PCs. Source
  20. Woman Shoots Drone: “It Hovered For A Second And I Blasted It To Smithereens.” Jennifer Youngman, 65, used a .410 gauge shotgun like this to take out a drone. Woman used a .410 shotgun against trespassing aircraft thought to be paparazzi. With a single shotgun blast, a 65-year-old woman in rural northern Virginia recently shot down a drone flying over her property. The woman, Jennifer Youngman, has lived in The Plains, Virginia, since 1990. The Fauquier Times first reported the June 2016 incident late last week. It marks the third such shooting that Ars has reported on in the last 15 months—last year, similar drone shootings took place in Kentucky and California. Youngman told Ars that she had just returned from church one Sunday morning and was cleaning her two shotguns—a .410 and a .20 gauge—on her porch. She had a clear view of the Blue Ridge Mountains and neighbor Robert Duvall’s property (yes, the same Robert Duvall from The Godfather). Youngman had seen two men set up a card table on what she described as a “turnaround place” on a country road adjacent to her house. “I go on minding my business, working on my .410 shotgun and the next thing I know I hear ‘bzzzzz,’" she said. "This thing is going down through the field, and they’re buzzing like you would scaring the cows." Youngman explained that she grew up hunting and fishing in Virginia, and she was well-practiced at skeet and deer shooting. “This drone disappeared over the trees and I was cleaning away, there must have been a five- or six-minute lapse, and I heard the ‘bzzzzz,’" she said, noting that she specifically used 7.5 birdshot. “I loaded my shotgun and took the safety off, and this thing came flying over my trees. I don’t know if they lost command or if they didn’t have good command, but the wind had picked up. It came over my airspace, 25 or 30 feet above my trees, and hovered for a second. I blasted it to smithereens.” When the men began to walk towards her, she told them squarely: “The police are up here in The Plains and they are on their way and you need to leave.” The men complied. “They got in their fancy ostentatious car—I don’t know if it was a Range Rover or a Hummer—and left,” she said. The Times said many locals believe the drone pilots may have been paparazzi or other celebrity spotters flying near Duvall's property. Youngman said that she recycled the drone but managed to still be irritated by the debris left behind. "I’ve had two punctures in my lawn tractor," she said. The Fauquier County Sheriff’s Office said it had no record of anyone formally complaining about this incident. When Ars asked if the office had heard of any other similar incidents in the region, Sgt. James Hartman replied: "It's happened around the country but not in this region to my knowledge." A gray zone For now, American law does not recognize the concept of aerial trespass. But as the consumer drone age has taken flight, legal scholars have increasingly wondered about this situation. The best case-law on the issue dates back to 1946, long before inexpensive consumer drones were technically feasible. That year, the Supreme Court ruled in a case known as United States v. Causby that a farmer in North Carolina could assert property rights up to 83 feet in the air. In that case, American military aircraft were flying above his farm, disturbing his sleep and upsetting his chickens. As such, the court found he was owed compensation. However, the same decision also specifically mentioned a "minimum safe altitude of flight" at 500 feet—leaving the zone between 83 and 500 feet as a legal gray area. "The landowner owns at least as much of the space above the ground as he can occupy or use in connection with the land," the court concluded. Last year, a pilot in Stanislaus County, California, filed a small claims lawsuit against a neighbor who shot down his drone and won. However, it is not clear whether the pilot managed to collect. Similarly, a case ensued in Kentucky after a man shot down a drone that he believed was flying above his property. The shooter in that case, William Merideth, was cleared of local charges, including wanton endangerment. But earlier this year, the Kentucky drone's pilot, David Boggs, filed a lawsuit asking a federal court in Louisville to make a legal determination as to whether his drone’s flight constituted trespassing. Boggs asked the court to rule that there was no trespass and that he is therefore entitled to damages of $1,500 for his destroyed drone. The case is still pending. Youngman said she believed in 2nd Amendment rights and also was irritated that people would try to disturb Duvall. “The man is a national treasure and they should leave him the fuck alone,” she said. Source My Comments: What a shot! I like it. Drones must only follow the roads and they have no rights on property. The reason is drones fly lower and it causes disturbance to all. Also, it creates fear among the residents.
  21. Is it suitable to charge Nokia phones with Samsung chargers? Like this, there are many unclear questions and myths related to the technology world. Many myths and common technology misconception that people need to know. Some of them are worldwide known and every age group believes them. Below we will try to increase your computing knowledge. Stick with us… Through this article, we are trying to reveal some of the biggest misconceptions. The popular technology myths (Basic level) are going to be discussed in the following list. Feel free to share your knowledge via comments. 15. Smartphone Battery Saver Apps Are Efficient Never listen to your friends who give you some tripe advice to save your Smartphone battery. If you are using a phone with lots of features then it will automatically use battery power (in background processing) to run. It will be strange if you are not going to use any features such as GPS, Bluetooth to save battery because these things make your phone smart. However, there are some apps that help you to save battery by putting all unnecessary apps in sleep mode and most of them are preinstalled like stamina mode in Sony mobile. So you don’t need to download any additional powersaver application. Also, the developers have included the push notification feature in all apps. So, never felt distraught about battery and use your phone with all features. 14. Web Cookies Are Dangerous Many people think that web cookies are dangerous and should be avoided to keep your computer safe. They are just plain text files that web store on your computer for the browsing history. Cookies never get access to your computer or execute any application. They are generally used to track the information about the website that you opened in the past. Cookies are not dangerous and if you are still worried about your privacy then install personal firewall software. 13. Expensive Cables Means High Quality Picture When you go to any electronics store, you will find thousands of different types of cables. A salesperson always tried to convince you to buy a more expensive thing, but this doesn’t mean that cheap things are bad. Most of the people believe that expensive HDMI cables for audio and video playback are always better, but this is not true. Many popular gadgets communities stated that there is not much difference between cheap and expensive HDMI cables. You don’t need a special cable for 4K television. A standard HDMI cable can also be used in 4K for high quality. 12. Renovated Products Aren’t Good As New Ones Most of us think that renovated or old products that company fix and resell in the market are usually defective. They can be used as a dummy product or sell to new customers after fixing. After renovating them, they can be sold as refurbished products with a low price tag. This is a great opportunity to save money. Many renovated products are also good as new products but you need to do a small research to find the best offer. 11. Is it bad to Use Different Phone Charger? Few official sources claimed that a standard charger can also charge other devices of the same rating. Some other experts claimed that this could stress out the battery but this will only happen when you do it regularly over a year. Now almost every gadget has same charging port and most of the people charge them using other gadget’s charger. Overall, I recommend you to use default charger for longer machine life. 10. Bigger Smartphone Screen is Better If there are two phones with same features but different screen size then most of the people will choose the bigger one. What are the benefits of the larger screen? Most of the Smartphone companies focus on ultra-dense display and high pixel density. Few companies like Apple focus on brightness and clarity of the screen. So it totally depends on nature of usage, if you want to watch movies, then go for bigger ones. Otherwise select according to the CPU and GPU performance. 9. Leaving Phone Plugged Destroys the Battery Most of the people leave their phones plugged in overnight and forget about it. This might affect your battery. Now all Smartphones run on lithium-ion batteries and they are smart enough to stop charging when they are fully charged. That means, charging is off when the phone hits 100%, but leaving it plugged would destroy your Smartphone battery if there is a defect in the hardware. In case, you are not using default charger, you must unplug it because they are not compatible with the phone’s shutdown mechanism. Few local lithium-ion batteries may damage your battery because they continue to increase the charging value even after reaching the maximum limit. 8. Computer Capabilities Depend on Processor’s Clock Speed Do you also think that 3.1 GHz Pentium 4 is more powerful than 2.9 GHz Core 2 Duo processor? This myth is also known as Gigahertz Myth which refers to the misconception of using only clock speed to compare two processors. A computer’s processing speed depends on many factors including processor architecture, operating system, high level design and efficiency to execute more instruction per second. There are many other side factors such as high bandwidth, heat dissipation facility and on-board cache memory. That’s the reason people prefer 2.5 GHz Intel i5 over 3.1 GHz core 2 Duo. 7. Deleting Something Is Gone Forever From Recycle Bin If you think that deleting some stuff from recycle bin can delete your data permanently from the computer then you might be wrong. Every file which you have deleted from is not gone completely. Those deleted files can be recovered using some recovery utilities but all files might not be recovered. These utilities go to the root of the file and recover it from the hard disk. Moreover, system restore point is a good option to recover accidently deleted files. 6. Macs Are Always Safe From Viruses Apple computers are also receptive to Trojan viruses. Millions of people think that the only Windows PC can be affected by virus because they are widely used by most of the internet users. Recently in 2012, thousands of Apple computers were affected by some deadliest Mac virus. Below I have mentioned some Mac viruses with their effects. Flashback (2012): It gets access to the computer through a malicious link. It creates username and password for authorized banking transactions. Scareware (2011): It enters the user’s computer through fake Mac Defender utilities and then push adult popups to fix it. 5. Install Software to Run Your Computer Faster A few years ago, everyone has PC with 256 MB RAM and Pentium processor and all of us wanted to speed up the computer without upgrading them. Most the ways are useless and some can even degrade the PC’s performance. Now everyone has RAM in Gigabyte and hard disk in Terabyte but I think people never leave this myth. That’s the reason they end up with installing fancy looking malicious programs from the Internet. 4. WiFi Networks Are Never hacked If you have a security password on WiFi network then don’t think that it is fully protected by WiFi hackers. Hackers have many ways to hack your WiFi network but I will recommend you to put a WEP key on your network. Wired Equivalent Privacy (WEP) key is a security code for a WiFi network, which allows exchange of encoded messages with other devices. However, no program is completely secure, avoid sharing crucial data over WiFi networks. 3. Jailbreaking of iPhone is Legal or Not? Jailbraking of an iPhone or any other iOS devices are legal all over the world. It is just used to remove the restriction to the iOS device in a country and now it is officially confirmed by the copyright office. I want to add one more important thing that unlocking an iPhone is illegal. Unlocking an iPhone means, make it free to work on any carrier i.e. different GSM carrier. 2. Which Runs Faster – 32 bit or 64 bit? Do you also think that 64 bit processor is faster than a 32 bit processor? Then you are totally wrong because there is no advantage of having a 64 bit processor over a 32 bit processor. The 32 bit version can use up to maximum 4 GB of RAM. Theoretically, a 64 bit processor can hold up to 16 Exabyte of RAM but this is impractical. This would require a 6500 km wide motherboard. Currently, 8 TB is the maximum limit to use in a 64 bit processor. The 64 bit version is only used to handle applications that use more than 4 GB of RAM and to address additional RAM. So if you are using less than 4 GB of RAM, you are actually not getting any benefit of 64 bit system. 1. More Megapixels = Better Camera I put this myth on the number one because most of the people buy a camera or Smartphone based on megapixels. This is one of the biggest and popular myths as most of us would like to buy a 16 MP camera over a 10 MP camera. Other than megapixel there are many factors for a good picture including the quality of the sensor, lens and sharpness of the image. The megapixel term is only used to describe the size of the image. So don’t think 41 MP Nokia phone will click better picture than 13 MP Sony device. Source
  22. New GDDR6 Memory Could Hit GPUs In 2018 Samsung believes the days of good, old GDDR5 are numbered as VR and games demand better graphics Virtual reality and gaming are changing the way PCs are built and driving the development of new types of memory for GPUs. A successor to the GDDR5 memory used in most GPUs -- called GDDR6 -- will be on its way by 2018, according to a presentation by Samsung executive Jin Kim at the Hot Chips conference this week. GDDR6 will be a faster and more power-efficient form of graphics memory. GDDR6 will provide throughput of around 14Gbps (bits per second), an improvement of 10Gbps with GDDR5. Although Samsung has targeted 2018 for GDDR6, new graphics memory usually takes a long time to reach the market, so the estimate may be aggressive. GPUs will need to be designed for the new memory, and components will need to be validated and tested, all of which takes time. Applications like VR and gaming are putting a heavy load on GPUs, under stress to deliver the best graphics. VR headsets like Oculus Rift and HTC's Vive only work with premium GPUs. GDDR6 will help GPUs deliver faster performance while drawing less power. The need for more GPU performance is already changing GPUs. New types of memory like HBM (High-Bandwidth Memory) and GDDR5X, which offer faster bandwidth, are already being used in new GPUs from AMD and Nvidia. GPUs with HBM and other new memory are still priced at a premium. But GDDR6 -- like GDDR5 -- could be used in low-priced GPUs. It'll also be easier for GPUs to transition from GDDR5 to GDDR6 or GDDR5X than to HBM, which redefines the memory subsystem. It's clear that Samsung is putting its weight behind GDDR6, while rival Micron is backing GDDR5X. Nvidia's GeForce GTX1080 GPU has GDDR5X memory. Samsung also backs HBM. GPUs are also getting faster throughput, driving a need for faster memory. Faster memory helps GPUs process graphics faster, and the graphics can then be sent to memory, CPU, and storage via quicker interconnects like Nvidia's NVLink or the upcoming PCI-Express 4.0. Advances in manufacturing have also created the need for new GPU memory. Some of the latest GPUs based on Nvidia's Pascal and AMD's Polaris architectures are manufactured with new techniques including FinFET, a 3D structure in which chips are stacked. New memory like HBM and GDDR6 are designed for such new chip structures, while GDDR5 memory has been designed for older GPUs made using older manufacturing technologies that don't use stacked chips. Source
  23. MIT Creates Mobile Phones Which Assemble Themselves The devices can pull themselves together in less than a minute. Researchers from MIT have created a mobile device which can assemble itself in a matter of moments. The prototype, developed by scientists from the Massachusetts Institute of Technology (MIT)'s Self-Assembly Lab, is composed of six separate parts which assemble into two different mobile devices. Even in unstable environments -- such as being tossed around a tumbler -- the device is able to assemble itself within a few minutes. As reported by Fast Co.Design, the principle behind the self-assembly device is simplicity. To begin with, the tumbler has to be going fast enough that the components meet but do not break. The device's components all have lock-and-key mechanisms which, like puzzle pieces, only allow the proper connections to take place and rejects the wrong ones. Finally, the parts need to "stick," and so the team used magnets to make sure the right parts were attracted to each other. Skylar Tibbits, one of the researchers working on the project, told the publication: If such technology was adopted mainstream, it could have serious implications for the manufacturing industry. MIT says the cost of automaton could be reduced at scale, removing the need to shift labor overseas -- or have workers altogether. Either way, jobs could eventually be replaced with automaton and assembly-line staff at electronics factories could one day be a thing of the past. However, the researchers say the possibilities for these kinds of designs are limitless and could give vendors more freedom to design and create better, more innovative products. "Right now the phone is predetermined, and we're using this process to assemble that phone," Tibbits said. "But imagine you take a circuit board and you have different logical building blocks and those logical building blocks can be tumbled around -- you can have different functionalities." MIT is not the only institution exploring the possibilities of modular consumer products. This year, Google revealed that Project Ara, the tech giant's modular smartphone, will be released in 2017. Source Alternate Source - A Cellphone That Can Self-assemble Itself
  24. ARM Has A New Weapon In Race To Build World's Fastest Computers ARM's new supercomputer chip design with vector extensions will be in Japan's Post-K computer, which will be deployed in 2020 ARM conquered the mobile market starting with Apple's iPhone, and now wants to be in the world's fastest computers. A new ARM chip design being announced on Monday is targeted at supercomputers, a lucrative market in which the company has no presence. ARM's new chip design, which has mobile origins, has extensions and tweaks to boost computing power. The announcement comes a few weeks after Japanese company Softbank said it would buy ARM for a mammoth $32 billion. With the cash, ARM is expected to sharpen its focus on servers and the internet of things. ARM's new chip design will help the company on two fronts. ARM is sending a warning to Intel, IBM, and other chip makers that it too can develop fast supercomputing chips. The company will also join a race among countries and chip makers to build the world's fastest computers. The chip design is being detailed at the Hot Chips conference in Cupertino, Calif., on Monday. Countries like the U.S., Japan, and China want to be the first to reach the exascale computing threshold, in which a supercomputer delivers 1 exaflop of performance (a million trillion calculations per second). Intel, IBM, and Nvidia have also been pushing the limits of chip performance to reach that goal. Following Softbank's agreement to buy ARM, it should come as no surprise that the first supercomputer based on the new chip design will be installed in Japan. The Post-K supercomputer will be developed by Fujitsu, which dropped a bombshell in June when it dropped its trusty Sparc architecture in favor of ARM for high-performance computers. Fujitsu aided ARM in the development of the new chip. Post-K will be 50 to 100 times speedier than its predecessor, the K Computer, which is currently the fifth fastest computer in the world. The K Computer delivers 10.5 petaflops of peak performance with the Fujitsu-designed SPARC64 VIIIfx processor. The new ARM processor design will be based on the 64-bit ARM-v8A architecture and have vector processing extensions called Scalable Vector Extension. Vector processors drove early supercomputers, which then shifted over to less expensive IBM RISC chips in the early 1990s, and on to general-purpose x86 processors, which are in most high-performance servers today. In 2013, researchers said less expensive smartphone chips, like the ones from ARM, would ultimately replace x86 processors in supercomputers. But history has turned, and the growing reliance on vector processing is seeing a resurgence with ARM's new chip design and Intel's Xeon Phi supercomputing chip. The power-efficient chip design from ARM could crank up performance while reducing power consumption. Supercomputing speed is growing at a phenomenal rate, but the power consumption isn't coming down as quickly. ARM's chip design will also be part of an influx of alternative chip architectures outside x86 and IBM's Power entering supercomputing. The world's fastest supercomputer called the Sunway TaihuLight has a homegrown ShenWei processor developed by China. It offers peak performance of 125.4 petaflops. ARM has struggled in servers for half a decade now, and the new chip design could give it a better chance of competing against Intel, which dominates data centers. Large server clusters are being built for machine learning, which could use the low-precision calculations provided by a large congregation of ARM chips with vector extensions. ARM servers are already available, but aren't being widely adopted. Dell and Lenovo are testing ARM servers, and said they would ship products when demand grows, which hasn't happened yet. ARM server chip makers are also struggling and hanging on with the hope the market will take off someday. AMD, which once placed its server future on ARM chips, has reverted back to x86 chips as it re-enters servers. Qualcomm is testing its ARM server chip with cloud developers, and won't release a chip until the market is viable. AppliedMicro scored a big win with Hewlett Packard Enterprise, which is using the ARM server chips in storage systems. Other ARM server chip makers include Broadcom and Cavium. Source
  25. China’s ‘Elevated Bus’: The Future Of Public Transport Is Here China’s elevated bus demoed that glides above traffic Back in May, we had reported how Transport Explore Bus, a Beijing-based company was working on a scale model of a road-straddling bus that looks like an overgrown monorail and would allow the traffic to pass underneath it. We had also informed that the trial of a full-size version is expected to be deployed on urban Chinese around August this year. True to their words, the Transit Elevated Bus (TEB) took its first test ride Tuesday in Qinhuangdao, a port city in northeast China, according to China’s Xinhua News. The electricity-powered vehicle’s brake and power systems were tested on 300m-long controlled track. The TEB concept is designed to help alleviate China’s massive traffic problems and reduce congestion and vehicle emissions – a growing problem in China. The TEB has a roomy interior that is over 72-feet long and 25-feet wide. It’s roughly 16-feet tall, and offers about 7 feet of space underneath for cars to travel through it. The bus can carry up to 300 passengers, and rides along tracks embedded in the street. It’s supposed to reach 40 to 50 km/h (about 25 to 31 mph). The TEB runs on sixteen tired wheels and is guided by eight pairs of rail wheels. The bus was first shown in 2010, and then again re-proposed at this year’s 19th International High-tech Expo in Beijing. Song You Zhou, the designer and chief engineer of the TEB, says prototypes are being constructed, and that five cities — Qinhuangdao, Nanyang, Tianjin, Shenyang, and Zhoukou — have signed contracts with his TEB Technology Development Company for pilot projects. Back in May, Song You Zhou had told WCC Daily that if all goes well, it will only be a year to a year and a half before the vehicle enters the market. With the prototype arriving as promised, it would be interesting to see if the company’s real-size TEB is able to hit the market on time. Source