Thursday, 3 April 2014
Google to Launch Improved Android Camera App
Google is currently working on a revised camera app for Android according to the sources. The new camera app is to get more photo and video capabilities, and this will even appear for all Kitkat devices in future. Now Google is currently running internal tests of a new camera app for Android, Sources reports with reference to confidential sources, which were not disclosed.
Thus, the entire user interface of the Android camera app is redesigned and will be re launched; in order to control the camera functions of an Android device should be easier. The camera app gets directly to function with which can be put out of focus by blur the background. This is intended primarily for portraits, so that the subject's better accentuate. In addition, the panoramic shot function has been revised and optimized the photo -sphere mode.
Both the results will be better accordingly. As part of this new app, lot of enhancements to the view of shooting photos has been optimized. Thus, the new camera app will show 100 percent quality and with easy handling, which shows the quality in photos.
So far, it could happen that unwanted objects protrude into the picture because they were not visible on the viewfinder image because of the camera app showed only a part of the future picture. But these will be the thing of recent past once the apps are working. The new camera app is going to be extensible.
Third parties can develop filters for the app to include such effects in the camera app and can apply to photos. This is to the creative possibilities of the app to be expanded. At present it is still unclear how interesting it is for developers to offer matching filters.
The new camera app will not only be part of a new Android firmware. Owner of an existing Android device so do not wait until the Android system has been updated accordingly. Google plans to offer the camera app as a separate update.
The app will then be available for all Smartphones and tablets running Android 4.4 aka Kitkat at least with. Therefore the new camera app requires the latest version of Android currently. And the exact release date of the camera app is not known.
Nokia Lumia 930 is on the way
Nokia brings the small version of the Lumia 1520 on the international market - under the name Lumia 930. The Lumia 930 could resemble the American Lumia Icon. The Lumia 930 comes with 5- inch display, Snapdragon 800 and Pure View camera; these are the details available so far.
Nokia has presented at Microsoft's Build developer conference in 2014, a new Top Smartphone with Windows Phone. The Lumia 930 is the international version recently introduced in the U.S. as Lumia icon and a smaller version of the 6- inch model Lumia 1520.
The hardware specifications and other specifications are almost identical. The display of the Lumia 930 is 5 inches tall and has a resolution of 1,920 x 1,080 pixels. Inside, a Snapdragon -800 quad -core processor operates at a clock rate of 2.2 GHz. The RAM is 2 GB of size, the built-in flash memory of 32 GB. Slot for memory cards are not exist.
In addition to quad-band GSM and UMTS, the Lumia 930 supports LTE on the frequency bands 1, 3, 7, 8, and 20 Wireless dominates the Smartphone after 802.11a/b/g/n and ac, Bluetooth runs in version 4.0. A GPS module and a NFC chip are in built.
The Lumia 930 can be charged wirelessly without tools, the necessary Qi technology is inside the housing. On the back a 20- megapixel camera with PureView technology is installed as in the Lumia 1520. This allows a clearer zooming than traditional Smartphones.
The six-element optics from Carl Zeiss, an image stabilizer is installed. The Lumia 930 has two flash lights for optimum illumination of the subject. It should come on the market with the new Windows Phone 8.1 and will be available in the second quarter of 2014 in other parts of Europe. The price will be 580 Euros.
Wednesday, 2 April 2014
How to find and Block who is stealing your Wi-Fi
Slow down in Internet Connect - Reason?
There are always some instances when wireless Internet suddenly tends to slow down due to some unauthorized user stealing your bandwidth which could be the cause. In such a case, the intruder can access your WiFi network if the basic WiFi security has not been implemented. There are also many casual or even innocent bandwidth intruders who on seeing an available network and presuming it to be OK tend to borrow it.
This should cause suspicion if the intruder might be using your WiFi network without your permission and setting up a password could help in preventing them who could be infiltrating private connection. When they attempt to log in and if they are challenged with a password, they then are at a loss and finally give up and move out. There are also other set of people who with determination and skills tend to hack a secured network and probably end up in some serious criminal activity.
WiFi Security Measures
A real cyber criminal is all out to steal something of value from anyone and may use the computer on the network for identity and financial information which could be beneficial to him. He could also use the internet connection to download files illegally or even hack other networks setting any innocent person as the culprit when the crime is traced back to the router since they have the tools and skills needed to tamper WiFi security measures especially if the password is weak.
Android with Solutions
With Android, it is now possible to resolve this issue and find out who has been sneaking some of the WiFi with an application which is a free network tool that can be downloaded from Google Play Store known as Fing. To get started is to connect the Smartphone or tablet to the WiFi connection to be tested and download the application by pressing the download button.
Once the download is completed, the tool is able to detect the trespasser. AT the top of the main page of the app is the name of your network as well as a refresh and the settings menu button. You could tap on the refresh button update and the application shows which devices are connected to your WiFi network indicating whether the router is a Smartphone or a computer.
Apple and Windows Built-in Utilities
Besides this, there are other options in Fing like checking open TCP port, sending reports and much more. One of the advantages is to change the viewed IP name enabling the user to know who they could be on the app and who the infiltrators could be. Once this is done the intruder, simply click on the intruder and on the option to enter a name, provide a name for the IP address.
Apple and Windows computer have been equipped with built-in utilities which show the devices that are connected to the network and these tools could be used to check for unknown computers which should not be connected to your network. It is essential to know which device is authorized with each authorized computer to be assigned a computer name which can be recognized easily while printers have built in names which the user should be familiar with.
There are always some instances when wireless Internet suddenly tends to slow down due to some unauthorized user stealing your bandwidth which could be the cause. In such a case, the intruder can access your WiFi network if the basic WiFi security has not been implemented. There are also many casual or even innocent bandwidth intruders who on seeing an available network and presuming it to be OK tend to borrow it.
This should cause suspicion if the intruder might be using your WiFi network without your permission and setting up a password could help in preventing them who could be infiltrating private connection. When they attempt to log in and if they are challenged with a password, they then are at a loss and finally give up and move out. There are also other set of people who with determination and skills tend to hack a secured network and probably end up in some serious criminal activity.
WiFi Security Measures
A real cyber criminal is all out to steal something of value from anyone and may use the computer on the network for identity and financial information which could be beneficial to him. He could also use the internet connection to download files illegally or even hack other networks setting any innocent person as the culprit when the crime is traced back to the router since they have the tools and skills needed to tamper WiFi security measures especially if the password is weak.
Android with Solutions
With Android, it is now possible to resolve this issue and find out who has been sneaking some of the WiFi with an application which is a free network tool that can be downloaded from Google Play Store known as Fing. To get started is to connect the Smartphone or tablet to the WiFi connection to be tested and download the application by pressing the download button.
Once the download is completed, the tool is able to detect the trespasser. AT the top of the main page of the app is the name of your network as well as a refresh and the settings menu button. You could tap on the refresh button update and the application shows which devices are connected to your WiFi network indicating whether the router is a Smartphone or a computer.
Apple and Windows Built-in Utilities
Besides this, there are other options in Fing like checking open TCP port, sending reports and much more. One of the advantages is to change the viewed IP name enabling the user to know who they could be on the app and who the infiltrators could be. Once this is done the intruder, simply click on the intruder and on the option to enter a name, provide a name for the IP address.
Apple and Windows computer have been equipped with built-in utilities which show the devices that are connected to the network and these tools could be used to check for unknown computers which should not be connected to your network. It is essential to know which device is authorized with each authorized computer to be assigned a computer name which can be recognized easily while printers have built in names which the user should be familiar with.
How to find a lost or stolen Android phone
Phones Equipped with Proper Tools in Locating Devices
Mobile phones hold plenty of information of the user and in the event of it being stolen or lost; it can be very disheartening to the person. Smartphone have now become part of our life and losing it could cause the user a lot of worry and tension. Since it has all important information related to the user, their contacts and addresses and even financial information, the user may be subject to losing all these information if their phone tends to gets into the hands of the wrong person.
In most cases, one would want the phone back with all the information safe. With technology making great headways in providing solution to every problem, retrieving a lost phone is not altogether an impossible task. Since our phones are already equipped with proper tools in locating devices as well as securing it from remote location, the problem of losing phone without any trace is a thing of the past. With the help of tools like Android Device Manager, and Lookout, user can now locate and get their phones back if stolen or lost.
Lock Screen Pattern or Password
Individuals could use Apps like AirDroid for remote access of files and information which are needed as well as utilize advanced features like remote camera access and SMS text messaging. The most important precaution and essential thing to do at first is to enable a lock screen pattern or password though this will not help to locate the phone but in the event of losing or it being stolen, the user’s information and privacy would be safe. Options for setting the lock screen information could be explored on the devices since there are some which have options for setting up lock screen information like the name and address of alternative number which can be reached in case phones are lost.
Register Through Android Device Manager
The main option in locating your phone is to ensure that the device is properly registered and accessible through the Android Device Manager which is a handy tool released by Google in 2013 using the advent of Google Play Services making sure of equipping all updated Android device with it though some of the devices have the features enabled out of the box. To get started, one could ensure that the Android Device Manager is enabled as a device administrator by going to Setting > Security and Screen Lock > Device Administrators, on the Android device.
Name of the menus and exact location may differ among phones and hence exploring or checking the user manual for specific device would be helpful. Thereafter the option of Android Device Manager could be checked. This will also be appropriate to head into the device’s location setting, making sure the GPS services are enabled and functional.
Though the GPS is not required in locating the device, it would make the reading accurate with a clear idea of the exact location of the device. Next is to go to Google Setting application and select Android Device Manager from the list of options and check on `Remotely locate this device’ and `Allow remote lock and factory reset’, which will be self explanatory once you reach the browser based dashboard, which is a simple user interface enabling to locate all devices from a remote location.
Mobile phones hold plenty of information of the user and in the event of it being stolen or lost; it can be very disheartening to the person. Smartphone have now become part of our life and losing it could cause the user a lot of worry and tension. Since it has all important information related to the user, their contacts and addresses and even financial information, the user may be subject to losing all these information if their phone tends to gets into the hands of the wrong person.
In most cases, one would want the phone back with all the information safe. With technology making great headways in providing solution to every problem, retrieving a lost phone is not altogether an impossible task. Since our phones are already equipped with proper tools in locating devices as well as securing it from remote location, the problem of losing phone without any trace is a thing of the past. With the help of tools like Android Device Manager, and Lookout, user can now locate and get their phones back if stolen or lost.
Lock Screen Pattern or Password
Individuals could use Apps like AirDroid for remote access of files and information which are needed as well as utilize advanced features like remote camera access and SMS text messaging. The most important precaution and essential thing to do at first is to enable a lock screen pattern or password though this will not help to locate the phone but in the event of losing or it being stolen, the user’s information and privacy would be safe. Options for setting the lock screen information could be explored on the devices since there are some which have options for setting up lock screen information like the name and address of alternative number which can be reached in case phones are lost.
Register Through Android Device Manager
The main option in locating your phone is to ensure that the device is properly registered and accessible through the Android Device Manager which is a handy tool released by Google in 2013 using the advent of Google Play Services making sure of equipping all updated Android device with it though some of the devices have the features enabled out of the box. To get started, one could ensure that the Android Device Manager is enabled as a device administrator by going to Setting > Security and Screen Lock > Device Administrators, on the Android device.
Name of the menus and exact location may differ among phones and hence exploring or checking the user manual for specific device would be helpful. Thereafter the option of Android Device Manager could be checked. This will also be appropriate to head into the device’s location setting, making sure the GPS services are enabled and functional.
Though the GPS is not required in locating the device, it would make the reading accurate with a clear idea of the exact location of the device. Next is to go to Google Setting application and select Android Device Manager from the list of options and check on `Remotely locate this device’ and `Allow remote lock and factory reset’, which will be self explanatory once you reach the browser based dashboard, which is a simple user interface enabling to locate all devices from a remote location.
How Satellite Internet Services Work
Satellite Internet access is the system that lets you get Internet connection through communication satellites. Internet access services are typically brought to users by means of geostationary satellites, capable of providing high data speeds.
The whole system relies on the following primary components:
The satellite works as a bridge, allowing the connection between points situated on the ground. It is the middle of the so called bent-pipe architecture. This term describes the shape that the data path takes between antennas, with a satellite placed at the bend point.
There is also a set of antennas at the satellite, receiving communication signals from the Earth and transmitting signals to target locations.
The Gateway Earth Station, or simply Gateway, is also known as a teleport, ground station, or hub. Sometimes, the term is used to describe just the portion including the antenna dish, or it can describe the entire system, with all the associated components.
The gateway receives the radio wave signals emitted by the satellite. A modem situated at the gateway location performs a demodulation of the incoming signal into IP packets that are then sent to the local network.
The gateways manage traffic to or from the Internet. The system of gateways provides all the services necessary for satellite and terrestrial connectivity. In the continental part of the United States, the gateways must have a direct unobstructed view to the southern sky. Since the satellite’s orbit is geostationary, the antenna can point at a fixed position.
The outdoor unit is a reflective radio antenna having the form of a dish, constructed from a variety of materials. It must have a direct view to the sky, in order to allow adequate line-of-sight to the satellite. The antenna must be positioned correctly and, therefore, a set of four parameters is necessary: azimuth, elevation, polarization and skew.
The indoor unit necessary to get satellite Internet connectivity is a modem that acts as an interface between the outdoor unit and the customer’s equipment. It controls satellite reception and transmission.
If you want to know more about satellite Internet reviews, here you will all the details that might be of interest to you.
The whole system relies on the following primary components:
- A satellite in a geosynchronous Earth orbit (GEO);
- Several gateways (ground stations) that relay Internet information via radio waves;
- A very-small-aperture terminal (VSAT) dish antenna located at the premises of the subscriber.
The Satellite as the Central Piece of the Satellite Internet Puzzle
The broadband satellite networks have GEO satellites of the latest generation at their center. These satellites are positioned 35,786 km above the equator and operate in Ka-band mode (18.3-30GHz). They are designed for broadband applications and use narrow spot beams meant to target a smaller area compared to the earlier communication satellites that used broad beams. This technology allows the assigned bandwidth to be used multiple times, and the capacity is higher than what conventional satellites could offer.The satellite works as a bridge, allowing the connection between points situated on the ground. It is the middle of the so called bent-pipe architecture. This term describes the shape that the data path takes between antennas, with a satellite placed at the bend point.
There is also a set of antennas at the satellite, receiving communication signals from the Earth and transmitting signals to target locations.
Gateways to the Sky
Following the important changes in satellite technology that took place over the recent years, ground equipment has also evolved, as a consequence of higher integration and increased processing power.The Gateway Earth Station, or simply Gateway, is also known as a teleport, ground station, or hub. Sometimes, the term is used to describe just the portion including the antenna dish, or it can describe the entire system, with all the associated components.
The gateway receives the radio wave signals emitted by the satellite. A modem situated at the gateway location performs a demodulation of the incoming signal into IP packets that are then sent to the local network.
The gateways manage traffic to or from the Internet. The system of gateways provides all the services necessary for satellite and terrestrial connectivity. In the continental part of the United States, the gateways must have a direct unobstructed view to the southern sky. Since the satellite’s orbit is geostationary, the antenna can point at a fixed position.
What Are the Dishes Good for?
In order to get satellite Internet access, a user must have some additional components installed, besides a PC and a router.The outdoor unit is a reflective radio antenna having the form of a dish, constructed from a variety of materials. It must have a direct view to the sky, in order to allow adequate line-of-sight to the satellite. The antenna must be positioned correctly and, therefore, a set of four parameters is necessary: azimuth, elevation, polarization and skew.
The indoor unit necessary to get satellite Internet connectivity is a modem that acts as an interface between the outdoor unit and the customer’s equipment. It controls satellite reception and transmission.
If you want to know more about satellite Internet reviews, here you will all the details that might be of interest to you.
Written by Robert Kleymore
Internet technology expert, MIT graduate and a passionate blogger.
Internet technology expert, MIT graduate and a passionate blogger.