close

Technology

Technology

Google Advance Protection, for Those Who Need It Most

Google Advance Protection, for Those Who Need It Most

Google has unveiled a protection feature for emails keeping in mind the users in high profile places like journalists, government officials and activists. Any person can avail of this Google Advance Protection, but it is specially catering to those who need special protection from people hacking into their emails. Those who are prone to online attacks and at a higher security risk whereby their information is stolen, can avail of these security features introduced by Google.

The Google Advance Protection that was introduced is mainly focused on providing security against phishing and accounts being fraudulently accessed. The main groups that the new Google Advance Protection targets those who require protection of their sources, specially the journalists, Activists and those running election campaigns. Any of the Google users too can chose to have these security settings to protect their Gmail, Google Drive or YouTube data from being hacked.

Google Advance Protection

The Google Advance Protection program utilizes Security Keys. You need to sign into your account using the Security Keys, which is a USB or a wireless device. With this feature, Google has come out with a greater security for email users in preventing their work from being stolen or hacked into.

For a desktop, the Google Advance Protection requires you to put in a USB device, which is a way of verifying the user’s identity. For a mobile user, a Bluetooth wireless device needs to be used. Those using the Google Advance Protection program will also have the added protection from all non-Google applications like Apple iOS mail client and Outlook.

The Google Advance Protection involves a two-step verification. A public key cryptography and digital signatures are used to confirm the identity of the user. In case a user loses access to his account, the Google Advance Protection will also ensure that he is able to recover his account. The measures taken will be so stringent that the recovery process will consider reviews and requests about the reason why the user has lost access to his account.

Google introduced the Google Advance Protection program  after the high profile elections that took place in the US in 2016. There were hacks into the Gmail accounts of Hillary Clinton’s campaign manager John Podesta. It was believed to be hacked by Russia, who tried to help Donald Trump win the 2016 US elections. It was believed that if  Podesta, the campaign chief, had The Google Advance Protection at that time, the results of the elections could have told a different story.

The Google Advance protection feature helps to protect all those in high profile jobs and high-risk users from their mails being hacked and undue advantage being taken. It would also prevent frauds. There may be a bit of compatibility issues for those who have already installed security tools with their Google products.

Google has provided its users with additional information of how to install the Google Advance Protection by creating a web page for that purpose. They have also helped its users of showing them where to buy USB and Bluetooth wireless keys on Amazon.

 

read more
Technology

BioEngineering the Future

BioEngineering the Future

When the human body receives an implant, physical, chemical and biological processes of integration in the receiving organism are triggered. Sometimes, infections, clots, or local tissue loss can occur, and the implant does not perform properly. One of the challenges of BioEngineering is to increase the organism’s tolerance to implant biomaterials and to get the body to accept them quickly.

“If we implant artificial material inside the body, we want to recognize it as his own. One technique of bioengineering for achieving this is to “modify the surface of the biomaterial, as a prosthesis, by placing organic molecules (proteins, peptides or nucleic acids) to improve compatibility with the recipient organism and to become an active element for tissue regeneration or the organ we want to recover.

This BioEngineering technique is biofunctionalized and is based on an empirically observed process: proteins attach to the surface of implants and then some cells that are nearby migrating and bind to those proteins. It is a question of choosing the most suitable ones to attract the cells that interest, that is to say, those that have the capacity to grow and to create diverse tissues (bone, nervous, adipose). The choice clearly determines the outcome.

Indeed, one of the problems is that the proteins degrade over time. The group of Biomaterials, Biomechanics and Tissue Engineering of CREB, to which this researcher is linked, bioengineering studies how to avoid it using only a sufficient amount of protein fragments for the cells to adhere. In this way degradation slows down. The disadvantage is that, without the complete protein, the growth of the adhered cells decreases. Research is now focused on finding protein sequences that do not affect growth.

Sometimes implants fail because they become contaminated with bacteria during surgery. In this area, the BIBITE group studies how to introduce antibiotics or molecules with antimicrobial properties in biomaterials. The team head makes it feasible for these applications to reach the market in the current decade and stresses that this would mean “a significant leap in the quality of life of many people.”

New Dimension of Diagnosis, Using Bioengineering Technology

Conventional diagnostic techniques in bioengineering are based on the study of fragments of information; we are committed to an intelligent interpretation of physiological signals that allow us to obtain clinical information that was hidden.

The research group focuses on the advanced processing of biosignals to improve the early diagnosis and monitoring of heart disease, respiratory and sleep disorders, which are often linked.

Thus, for example, symptoms such as snoring, apneas and hypopneas or the respiratory pattern can reveal much about cardiorespiratory functioning. Conventionally, the observation is usually focused only on the intensity of snoring, the number of apneas and hypopneas or the respiratory rate. The team of researchers developed diagnostic improvements based on the analysis of respiratory sounds, the noninvasive classification of obstructive or central hypopneas and the modeling of the respiratory pattern and snoring.

Collecting more information is important in bioengineering, but the key is to make sense by combining it with other signals of different typologies. “So we get a broader view of the patient’s condition, discover causes and effects, and generate new medical knowledge because we study interrelations that have never been identified before,” says Head of the Research team of bioengineering. Advanced information processing techniques are critical in establishing meaningful connections. Simplification is another result: “A few biosignals can tell us more than many classic parameters,” he says.

The group’s bioengineering researchers work closely with hospital centers. According to the head of the bioengineering research team, “we want to respond to the needs of doctors in their daily tavern; this makes us deal with real cases and thus open the door to possible development of new medical equipment. ” These advances lead to an increase in efficiency, with faster and more accurate diagnosis and the consequent improvement of therapies.

Another socially valuable aspect of these bioengineering new methods is that, on the average, they can lead to a paradigm shift in certain medical procedures.

 

read more
Technology

Google is About to Celebrate Its 20th Anniversary

Google is About to Celebrate Its 20th Anniversary

The evolution of the Internet throughout these years is so long that we finished scandalizing everything you can get to know about us simply with the webs registry we visit and the searches we do, Thanks to Google the bigboss. That, on the one part, can facilitate many of our daily tasks, but there is a torpedo to the floating line of our privacy.

Google is a search engine on the internet; suppose the internet is a big city where there are thousands of establishments where you can find everything (products, services etc). What Google does is to help you find the most important and recognized “establishments” so that you find the information, product (s) etc that you are looking for but of “higher” quality. There are other search engines like Yahoo and Bing but none like Google, since Google uses various programs and calculations to make the results more complete and freshest information about what you are looking for.

What Google does is send what is called in English searchbots or spiderbots that are virtual “robots” that are classifying each page related to the words that you put in the search bar. The more important you have that page and the more that word, the more chances that page will appear in the results and in the first positions of a search.

ADVANTAGE

It is possibly the best known and most used search engine on the internet.
It has access to an index of more than 128,168 million web pages.
You can create a personalized homepage with the Google search engine.
It uses several web spiders whose function is to collect and sort the information.
Advanced search option.

It has search engines for specific files, for example (images and news).
A button to go directly to the first web you find.

DISADVANTAGES

It collects cookies and other personal data constantly, violating the privacy of users.
They do not perform the searches “live” but in the copies of the pages that store in their indexes.
Many junk pages, which could come out on the first few pages of the searches.
It is very difficult for your page to appear in the main results

Google maps

Advantages and disadvantages of Google Maps

Advantage

Very easy to use. It offers the ability to zoom in or out to show the map.
It offers a lot of information about most places in the world.
It shows us routes to reach different from our situation.
We can print, send or link maps.

Disadvantages

Requires an Internet connection.
Google Street View is not complete, as it only offers some cities.

1. Google does not distinguish but understands

Neither tildes nor apostrophes, nor the number of spaces we use between words. Google’s spelling checker automatically uses and highlights the most common form of a given word. If you would like to say “I will usually point to the correct form. If we doubt how to write something concrete, we just use the ‘OR’ command. This way Google will correct us and automatically skip the correct form.

2. Care to limit the search

That does not mean we can write anyway. If in our search we have two keywords to highlight with the same relevance, then we must separate our search. Understands the symbol | such as the space bar. Example: [Lenovo | technology]. On the other hand, we can avoid that some words appear in the search by putting a – (minus) sign in front of the word that we want. Example: [- Lenovo notebooks]. This trick is very useful to avoid results that are associated with content.

3. Using quotation marks

If, on the other hand, we want to find an exact match in a sequence of keywords, we should highlight that column in quotation marks. Example: [“Lenovo technology”]. It should be noted that it only works with high or English quotes. Another option is through the command ‘allintitle:’, forcing the browser to display only sites that contain the words we are looking for.

4. Similar terms

Although it only works with Anglo-Saxon terms, by the symbol ~ we can search for words of synonymous but not identical meaning. Example: [~ smartphone]; will give us results like ‘mobile device’, ‘telephone’ or ‘handheld computer’. Another option to find similar, this time in content, is to use the limit search with the ‘related’ command. If, for example, we look for [Lenovo related technology: laptop], the result will offer us content in webs related to the keyword.

So clear of what they say, in the first line, the terms and conditions of privacy of the most important search engine in the world. That may not surprise you. We all know that Google collects information about us, right? But exactly how much and what kind of information are we talking about?

The new details that can be seen with the update of the Google satellite maps. Your name, your address, your age, your email. Your phone model, your cellular provider, your plan and your telephone and Internet consumption.

The words you use most often within your emails. All emails you’ve written or received, including spam.

The names of your contacts and their addresses and phones.

The photos you take with your Android phone, even if you delete them and even if you never upload them to any social network. The places you go, inside and outside the country; the date you went and the route you took. How fast you came. The credit or debit card you use to pay.

All the websites you visited on Google, how often and what you saw inside each one. What language are you looking for? At what time do you sail? Who you talked via Hangouts. What videos do you like?

These and other categories included in the Google privacy policy document and containing 2,874 words.

In my case, this translates into more than 5gigabytes of data going back at least to the last three years. Where did I get the number? I’ll tell you straight away. “So Google knows a lot about you, does not it?”, Said Henry Porter, a senior writer at Gadgetreviewed.

People trust too much and share without thinking too much about themselves when the reward is a free email account, a couple of extra gigabytes of storage in the cloud or the possibility to belong to a virtual world in which his friends and acquaintances are. ”

It is very important to note that I do not agree with the terms and conditions.

But let’s leave the “philosophical” discussion about what should and should not know, or what we should or should not know or not knowing, for the end.

read more
Technology

China Reveals Plans for High Speed Flying Train

China Reveals Plans for High Speed Flying Train

China wants to build a  flying train that would run in Hyperloop: 4,000 Km / h

China has announced it wants to launch a ‘flying train’, capable of reaching speeds of between 1,000 and 4,000 kilometers per hour.

It is called T-Flight and, in practice, would mean multiplying by ten the speed that currently reaches the fastest bullet train in the world, or quadruples the speed of commercial flights.

Behind this target is the China Aerospace Science and Industry Corporation (CASIC).

The “flying train” would consist of a series of capsules that would use magnetic levitation to reach those supersonic speeds.

We expect it to be something truer and more concrete than the high-powered bus that has been spinning for weeks, this time the Chinese are going to Hyperloop with a kind of flying train that actually flies into a completely isolated tunnel.

They speak of a vehicle capable of moving on the surface at 4,000 kilometers per hour. The protagonists are much more serious in this new episode of Chinese technological histories since we are before the work of the China Aerospace Science and Industry Corporation, better known as CASIC. It is a state-owned company, which makes everything from trucks to rockets, so they are familiar with speed.

As according to the Mono-live.com which is sharing the hot technology news tells us that the prototype that Hyperloop and Elon Musk started to form has ranged the speed of 355 kilometers per hour, and is jutting to exceed 1,000 kilometers per hour. It is an amazing figure that is mechanically stand out by the content of the Chinese company.

The Chinese flying train would boast a speed ten times faster than the current fastest train – in China -, would also leave conventional passenger aircraft badly.

What is this flying train really?

For the so-called “flying train” bases its operation on an idea similar to Hyperloop, that is, pods that go inside a tube, in which the movement is produced by magnetic levitation.

Yes, all very conceptual, many promises and no dates, but also many patents on the table that give value to the matter: more than 200 documents handled CASIC people for the project.

Overcoming the speed of sound in such a device should not be transparent to the user, so the system designer – Mao Kai – ensures that the acceleration will be very well measured to achieve such high speeds.

China wants to have such a fast transport system for the country’s internal movement, but also plans to expand the network between the countries that form the new silk route, which they call ‘One Belt, One Road’.

read more
Technology

How to Tackle Internet Mob Rule

How to Tackle Internet Mob Rule

Mob Rule – Tendency of Turning Bitter

Right from Facebook to the remark segment of a favourite online newspaper, one would come across instances of people ganging up against one another, all across the web. Several of the individuals are aware of the emotion of hateful mob which tends to bear down on them through the social media and very regularly those that are under attack are said to be women and the members of the minority groups.Which is purely a Mob Rule.  However when in August, the white supremacist website the Daily Stormer, neo-Nazi, had been struck from several web services, inclusive of Google, GoDaddy together with Cloudflare,  some of the members of the far-right had protested that another type of `mob rule’ had succeeded.

The query that comes up is `has the internet risen into an angry mess of tribes combating with one another?    Chief scientist at Google’s Jigsaw project, Lucas Dixon records that the founding dream which had signalled the advent of the World Wide Web had been very different.

He commented that they `used to fantasise that the internet would be a kind of utopia’.  Though it did assist in bringing about people together thousands of miles apart, the significances was that it was sometimes particularly unfriendly.  He further agreed that unfortunately discussion seemed to have a tendency of turning very bitter.

Developing Machine Learning Algorithms to Tackle Mob Rule

From Dixon’s experience he has informed that after hosting a Reddit thread for victims of online pestering, he together with his team had been harassed wherein some of the individuals had sent malevolent messages to their bosses at Google.  He recalls that people were attempting to get them fired.

With this depressing situation, several of them have been asking what could be done to enhance online dealings and how much should the society bring about changes in achieving this.  Could technology assist in cracking down on the worst offenders? Jigsaw tends to seek in developing machine learning algorithms which seem improved at flagging foul exchanges between web users.

It is far from being reliable though presently in use at several outlets inclusive of the New York Times. Dixon had pointed out that after utilising Jigsaw to support human moderators, Times had been capable of activating comments on 25% of its news article to about 10%.

Mob Rule: Distributed Denial of Service – DDoS

We tend to enjoy the privilege of expressing ourselves freely online, but there is a possibility of that privilege to be taken away by force. Colliding offline into someone’s website through a distributed denial of service – DDoS attack tends to be a powerful mode of protest though it seems to be quite easy to do so.

John Graham-Cumming, chief technology officer at Cloudflare stated that it is a bit like smashing a shop window at this point and you can make that protest fairly cheaply and it can make a lot of noise’. It is said that Cloudflare has clocked a DDoS attack against one of the clients every 40 minutes, in the last six months.

These types of outbreaks have been utilised by factions against one another inclusive the recent one of targeting the Daily Stormer.  Anonymous had targets at the KKK, last year and in 2015, US sexual health body Planned Parenthood had mentioned that its website was DDoS’s by anti-abortion extremists’.

Graham- Cunning records that the DDoS techniques seems to be quite sophisticated and used to be that an attacker would flood an IP address with unplanned packets of date though these could be filtered with easy to defend against an attack.

Limiting Propagation of Material to Curb Mob Rule

He stated that it is common to see requests at HTTP level in order that the traffic looks just like an unpretentious web browsing and has to be administered by the objective’s web server efficiently eluding some defences of DDoS. Charlie Winter at the International Centre for the Study of Radicalisation and Political Violence at King’s college, London had stated that social media sites tend to do a lot in limiting the propagation of material spread by Isis for instance.

That material still tends to be out there as an example for Mob Rule. He further explained that presently there are more than 300 channels on Telegram dedicated solely in increasing the activities of the official Islamic State mouthpiece, Nashir.  Every channel is said to be easy in identifying yet it seems to remain active nonetheless’. He debates that stamping out Isis’s messaging totally seems to be difficult.

Jamie Bartlett, author of Radicals: Outsiders Changing the World does not seem to be surprised by the nature of the present web dominated by mob rule.  He points that for instance, the extremist groups seem to have taken to new technology with enthusiasm as they navigate for means of expanding their audience with out any aggression of Mob rule.

Democracy Needs to Change Radically to Check Mob Rule

He debates that the internet smashes down the centre-left, centre-right consensuses. The best way according to Dixon is to confront the resentment and contempt which tends to usually accompany online `debates’, to develop spaces where abuse, or Mob Rule is carefully tested and where people irrespective of their opinions tend to feel at ease engaging with each other.

This is not always easy, particularly when certain opinions seem to be objectionable to some though the alternative could simply be endless strife. For instance, Bartlett pointed out that mainstream political parties probably tend to adopt some of the notions and techniques of their colleagues on the fringe if they tend to remain applicable.   He stated that it is essential how one would prevent powerful rebellions.

A democratic consensus recommended that we need to be capable to co-exist, irrespective of how diverse the views tend to be in society.  Possibly the decline confidence of the people in those quarters is what is playing out online.  Do we wait for whichever tribe or mob tends to be dominant in deciding our fate? He further added that democracy needs to change very radically and it has not changed much in the last 150 years while everything around it seems to have changed to some degrees.

read more
1 2 3 10
Page 1 of 10