Posts

Showing posts from October, 2017

Scientists Discover Unlikely Source Of Electricity

"The impact of this discovery in the field of biological piezoelectricity will be huge ..."By  Tracy Mastaler on October 6, 2017 at 8:35am Scientists have  discovered  a way to produce electricity from human tears and saliva, which could — if harvested effectively — become a new fuel for implanted medical devices. The  finding  came when researchers in Ireland from the University of Limerick’s Bernal Institute applied pressure to lysozyme, a protein found in both tears and saliva. The team’s groundbreaking report was published in the October 2, 2017, issue of the scientific journal  Applied Physics Letters . Researchers made the discovery after applying pressure to a film of lysozyme crystals squeezed between two glass slides. The team was able to detect and measure the production of piezoelectricity, a form of energy in which an electric charge accumulates in response to pressure. Although piezoelectricity has been known and understood for years, the process has be

An Introduction to JSX

Image
For a high-quality, in-depth introduction to React, you can’t go past Canadian full-stack developer Wes Bos.  Try his course here , and use the code  SITEPOINT  to get  25% off  and to help support SitePoint. When React was first introduced, one of the features that caught most people’s attention (and drew the most criticism) was JSX. If you’re learning React, or have ever seen any code examples, you probably did a double-take at the syntax. What is this strange amalgamation of HTML and JavaScript? Is this even real code? Let’s take a look at what JSX actually is, how it works, and why the heck we’d want to be mixing HTML and JS in the first place! What is JSX? Defined by the React Docs as an “extension to JavaScript” or “syntax sugar for callingReact.createElement(component, props, ...children))”, JSX is what makes writing your React Components easy. JSX is considered a  domain-specific language (DSL) , which can look very similar to a template language, such as Mustache, Thymele

Blockchain, Artificial Intelligence & Ransomware on Agenda for RSA® Conference 2017 Abu Dhabi

ABU DHABI, United Arab Emirates--( BUSINESS WIRE )--RSA ®  Conference ( http://www.rsaconference.com/ ), the world’s leading information security conference and exposition, has today announced the agenda for this year’s event, which includes a dynamic offering of thought-provoking keynotes and engaging sessions. The conference will be held from November 7-8, 2017 at Emirates Palace Hotel, with the support of the Telecommunications Regulatory Authority (TRA). In its third year, the conference offers a platform that encourages discussion and debate around the industry’s most pressing challenges. Conceptualized with the “Power of Opportunity” in mind, it will feature five tracks and nine keynote sessions that will cover a range of topics, curated to engage attendees. The tracks this year are Cybercrime & Threats and Security, Security Strategy, Infrastructure and Operations with sponsored sessions on trends including Blockchain, AI, Cloud, IoT & Ransomware. H.E. Hamad Obaid A

CenturyLink wins U.S. antitrust approval to buy Level 3 telecoms

Image
WASHINGTON  • Telecommunications provider CenturyLink Inc. has won U.S. antitrust approval for its purchase of Level 3 Communications Inc. on condition that it sell certain assets, according to a court filing dated on Monday. CenturyLink agreed to buy Level 3 last year in a deal valued at about $24 billion. It is seeking to expand its reach in the business communications market and compete with rivals such as AT&T and Verizon. Louisiana-based CenturyLink provides broadband and landline phone services, mainly in rural areas, as well as backhaul, considered the backbone of the internet. The deal was approved on condition that the companies sell Level 3's telecommunications networks in Albuquerque, Boise, and Tucson. It must also offer long-term leases called indefeasible rights of use for unused fiber optic cable, also called dark fiber, along 30 intercity routes. The deal, which the companies expected to close in mid- to late-October, is awaiting approval by the Federal

Researchers Connect Human Brain To Internet For The First Time In History

Image
"Brainternet" was created by two fourth year students at a university in Johannesburg, South Africa. Source: Pixabay For the first time in history, researchers have connected the human brain to the internet. The invention links a small Raspberry Pi computer to a headset with 14 nodes that correspond to different parts of the brain. Each brain wave can be monitored on a screen. In the future, this technology could be used to transfer information back and forth between mind and computer. “ Brainternet ” came about as the fourth year project of biomedical students Jemma-Faye Chait and Danielle Winter from the Wits School of Electrical and Information Engineering in Johannesburg, South Africa. The students were supervised by Wits professor Adam Pantanowitz. According to Pantanowitz , the technology is much less scary than it sounds. “Brainternet is a new frontier in brain-computer interface systems. There is a lack of easily understood data about  how a human brain works

India poised to enter the new 5G era

TELECOM subscribers in India, a hassled lot for decades, are expecting much better services in the future. There was a ray of hope last week of a possible and significant improvement in telephone services over the next three to four years. The Indian government set up ‘a high-level forum’ comprising bureaucrats and telecom experts, to elevate the country into the 5G era in just three years. “We have created a high-level 5G forum that will work on the vision, mission and goals of 5G service in the country,” declared Manoj Sinha, the telecoms minister. “When the world will roll out 5G in 2020, I believe India will be at par with it.” The proposed 5G India 2020 Forum — with access to a Rs5 billion support fund — would be headed by Aruna Sundarajan, the telecom secretary, and also include Ajay Kumar Sawhney, the IT secretary, and Ashutosh Sharma, secretary, department of science and technology, and some experts. Sinha admits that India missed the opportunity in steering itself into 3G

Google's new Gmail security: If you're a high-value target, you'll use physical keys

Image
The Advanced Protection Program will use Google's USB Security key in place of two-step verification. Google will soon be offering an Advanced Protection Program to lock down the Gmail accounts of high-value targets. According to Bloomberg , the new Gmail service will block third-party apps from accessing user data and introduces a replacement for two-factor authentication based on Google's USB Security Key. Google will begin offering the Advanced Protection Program next month, which will be marketed to "corporate executives, politicians and others with heightened security concerns". The service appears to be aimed at raising defenses against sophisticated phishing attacks of the type that led to the Gmail hack of Hillary Clinton's 2016 campaign chairman, John Podesta, and the breach of the Democratic National Convention's (DNC) databases. Bloomberg notes that the service builds on  USB Security Key, for which Google introduced software in 2014 . Secu

Password Manager - LOCAL storage

I've never used one before. I maintain a password protected spreadsheet, with all of my passwords on it, stored on a local drive and have never had a problem. I realize this cuts against the almost universal grain of recommended practices. And I've also come to accept that my method is tedious given the growing number of sites and apps for which I need login credentials. So I'm looking to take the plunge, but under no circumstances do I want all of my passwords stored in a third party's cloud. That just seems insane to me. Nor do I want to use browser extensions to pre-populate webpage fields with login info. I simply want my passwords secure and local...I'll type or paste them into wherever I need to myself. Is there a password manager that that allows for this, without having all of my passwords out there in the cloud? Again...just local protection is all I'm looking for. Thanks.

Phishing

Phishing is an attempt to steal people’s personal information, and it is often done by cybercriminals. They install malicious software on your computer to steal personal information from your computer. Sometimes, they use social engineering to convince you to install malicious software or hand over your personal information under false pretences. They send emails from addresses that appear to come from well-known websites or email addresses and convince you to fill forms with your personal information. These cybercriminals often clone banks’ websites and convince you to fill in your banks’ details to steal from web users. Most times, the e-mails state that your information needs to be updated and then ask that you enter your username and password, after clicking a link in the e-mail. The emails can be in form of a threat that your account will be closed if you don’t respond to an email message? Some may tell you that your security has been compromised. These online crime perpetra

Users want hybrid cloud networking to be simple

Image
As American jazz great Duke Ellington once said, "Simplicity is a most complex form." And IT doesn't get much more complex than hybrid cloud networking. I take pictures -- lots of pictures. To make them frame-worthy, I edit them in Lightroom and Photoshop, two Adobe Systems programs. In the old days, if I wanted to use them, I'd have to cough up more than a thousand dollars to buy and install the software on my desktop. Now the applications live in Adobe Creative Cloud, and my inexpensive monthly subscription makes editing simple and affordable. All the networking Adobe has done to make my interactions with Lightroom and Photoshop seamless is invisible to me, but what goes on behind the scenes is anything but simple. Hybrid cloud networking -- or in Adobe's case, multicloud networking, as described in our  cover story  -- is complex. When it simply works, it's a beautiful thing. Users prefer that complexity remain invisible. We like clicking an icon and

Google Cloud IoT Core Focuses On Simplicity And Scale

Image
Google announced the availability of the beta of Cloud IoT Core, its enterprise IoT platform offering. The service has been in the private preview for select customers and partners. Let’s take a closer look at Google’s IoT platform as a service in its current form. Google Cloud Platform Technically speaking, Google had all the essential building blocks for developing and deploying scalable IoT solutions in its cloud platform. However, it lacked the glue that connects the dots among existing services to deliver an end-to-end device management and data processing pipeline. With Cloud IoT Core, Google exposes an industry-standard MQTT broker and a device registry to onboard connected devices and sensors. An enterprise IoT PaaS must have a scalable device management layer complemented by a robust data processing pipeline. The below diagram represents the reference architecture of an enterprise IoT platform. IoT Platform Device Registry The device registry acts as a central reposito

How secure is a browser storing a password?

Whenever I enter a login into a new site, Chrome asks me if it should store the login details. I used to believe this was fairly secure. If someone found my computer unlocked, they could get past the login screen for some website using the stored details, but if asked for the password again like during checkout, or if they wanted to login to the service from another device, they would be sol. At least, that's what I used to think when I believed the browser did not store the password itself, but a hash or encryption of the password. I have noticed that the browser fills the username and password fields, and the password field indicates the number of characters in the password. I'm one of those people who when asked to change their password just keeps the same password, but changes a number at the end. I know this is bad, but with how often I am asked to change passwords, I really could not remember the number of passwords expected of me. This results in a lot of passwords

H]ardOCP: Google Is Hurting Themselves with Their Poor Support of Windows

Image
Google’s lack of support for Windows  is likely a strategic move, but some say they should just give in and start building native apps for it: by not offering good support on the most productive platform in the world, Google is having reduced engagement from many potential users. Windows users are less engaged with Google services than mobile users, and a large part of that is due to Google not making any effort. Despite their efforts the desktop is not going away anytime soon, and with Chromebooks still comprising less than 1% of web usage, Google is hurting not just users but themselves by not supporting Windows better. It also leaves the door open for Microsoft to get it right and steal users away from Google services, as it is making every effort to be cross-platform.

Here’s what quantum computing is and why it matters

Image
Researchers for  IBM ,  Google ,  Intel , and others are in a fantastic scientific arms race to build a commercially viable quantum computer. They already exist in laboratories, and we’re only a few years away from the beginning of what may turn out to be an entire shift in how we think about computing. A typical computer, like the one inside the phone or laptop you’re reading this on, is a binary system, basically a yes/no device. The most amazing thing about computer programmers is how they can take something as basic and simple as a computer chip and spit out something like Microsoft Office by creating a series of “if this, then that” scenarios. This showcases how useful the computer is as a tool for humans to accomplish tasks. The quantum computer The quantum computer, however, is an entirely difference concept – the reason it’s quantum is that it doesn’t use binary logic. By its nature a quantum computer is a yes/no/both device. When a developer makes a logic choice they ar

What is coin hive virus?

This is neither a virus nor a trojan, and it does not make the site unsafe to visit in any way whatsoever. Your antivirus package is crying wolf. Coinhive  is a cryptocurrency miner written in Javascript, which sends any coins mined by the browser to the owner of the web site. Some users find this script annoying and inappropriate, as it will increase CPU usage (and, hence, power consumption) on your web browser while you have the web site open. However, this will end as soon as you leave the site.

How to locate a malware on an end point?

I have a question from one of the interviews I had, I have no knowledge in system security and so I didn't know how to approach each. The question was: A customer suspects that one of his endpoints got infected by malware (OS is Windows 10 x64), and you were asked you to analyze it. Build an analysis plan from the simplest techniques to more advanced methods. Try to focus on the most efficient and effective methods for detecting the malware. Avoid mentioning other trivial stuff like checking Firewall Settings or Security Updates, but rather concentrate on finding the malware. I tried to look on the internet but couldn't find anything useful except for the same solutions of using Malwarebytes or similar programs. I guess it's not what's done in real situation when there is limited time to locate and isolate the malware. Can someone tell me what are the key points to start with, or how to approach this?

3 ways employees can risk your firm’s cybersecurity (and what to do about it)

Leveraging The program convenes world-class thought leaders from Brown’s top-ranked Department of Computer Science and Watson Institute for International and Public Affairs, as well as accomplished practitioners driving advances in cybersecurity. EMCS graduates earn a Master’s degree from Brown University and join Brown’s powerful global alumni network. EMCS forges visionary leaders ready to deploy successful strategies for cybersecurity that address: Technologies such as big data, cloud, mobile, Internet of ThingsSocial trends including social networks, globalized workforceHuman factorsEconomic tradeoffs and risk managementPolicy and privacyEffective leadership

What is meant by Secure File Sharing

Image
Easy to Store, Secure to Share — Online Storage & Secure File Sharing in One SmartVault makes  secure file sharing  easy and affordable for your business. Whether you’re sharing tax returns, legal documents, or even your secret family recipe, SmartVault gives you a single solution for storing and securely sharing your files in the cloud. Uploading files is easy — you can scan with one click, or drag and drop your files in and share them from any web browser or smartphone. In just minutes, you can build a custom  client portal  for  secure file sharing , branded with your company logo, color scheme, and URL. You decide who has access to what file, and each user only sees the files they’re granted access to. Automated email alerts notify your clients when new files are available, and secure links are a secure and convenient alternative to emailing documents. More than just a cloud drive… Enjoy all the ease and convenience of a cloud drive, but with the best-in-class  secur

Cloud Networks Made Simple with Riverbed on AWS

AWS makes it simple to set up cloud-based resources. But do you have secure, high-capacity, high-performance connectivity to and between AWS cloud instances? That's where Riverbed comes in. Riverbed's SD-WAN solution enables cloud migration and performance, all managed via quick and simple workflows. Watch the on-demand replay of the webinar to experience a fundamentally new approach to networking, with real users sharing their experience in addition to a joint customer, OpenEye, that has saved time and money by utilizing this approach to cloud networking. OpenEye Scientific Software leveraged Riverbed SteelConnect to very quickly and easily establish secure connections to and between AWS VPCs, saving hours of network administration time. AWS Speaker: Nick Matthews, Partner Solutions Architect Riverbed Technology Speaker: Angelo Comazzetto, Technical Director of Cloud  Customer Speaker: Craig Bruce, Scientific Software Development Manager, OpenEye Scientific Sponsor

How to use iCloud for backups on your iPhone, iPad, or Mac

Image
Anyone immersed in the Apple ecosystem can readily access iCloud for no extra charge, but many don't know how to make the most of it. iCloud is not an application, but rather an application suite, one that's directly baked into the framework of nearly all Apple products. It's designed to be a repository of your digital life, a place to store and backup your photos, personal files, and application data so you never lose anything. Despite its slick design and simple execution however, setting it up for the first time can be a pain. So here it is, our guide on how to use iCloud. Setting up & signing into iCloud Signing up with iCloud is completely free and simple to do with an Apple ID. Each free account automatically grants you access to 5GB of remote storage — available for backups, mail, app data, documents, and other components stored in the cloud — with 50GB, 200GB, and 2TB storage offerings available at an  additional cost . If your devices are recent, you sh

Special Review on Zendesk

Zendesk is a web-based help desk management solution offering customizable tools to build customer service portal, knowledge base and online communities. The solution offers a customizable front-end portal, live chat features and seamless integration with applications like Salesforce and Google Analytics. Zendesk is used across a wide range of vertical markets including technology, government, media and retail, and is scalable for businesses, from small to large. Zendesk’s online customer portal helps support agents to keep track of tickets raised and their status. Customers can go through existing tickets to find answers from queries similar to their question and if not satisfied, customers can raise their own tickets in the portal. Zendesk also offers branding of support pages with business logos, themes and brand images. Zendesk allows businesses to build a knowledge base to address some of the most prominent and repetitive questions, so that customers can go through the bas

Microsoft is working on ‘Windows Core OS’ to transform Windows 10 into a modular platform

Image
Microsoft is working on an internal project to develop ‘Windows Core OS’ (WCOS). This will help the company transform the operating system into a modular platform. The main reason for this project is that Windows is currently more than 30 years old. Several core components of the operating system are still quite old making it difficult for the operating system to adapt to newer devices. Representational Image. Reuters This will turn adopting newer devices like smartwatches and other connected devices, a herculean task for Windows. According  to a report  by  Windows Central , the company is aware of the outdated parts of the operating system that make it heavy for newer lean devices. The report points out that WCOS will be the future fundamental backbone of the operating system and all the devices powered by Windows. This is likely to be the next step for Microsoft in its ‘One Windows’ philosophy. The interesting thing to note here is that the company can use WCOS in ad