Wednesday, 19 August 2015

Google's Modular Ara Phone Delayed

Project_Ara

Google’s Project Ara Delayed – 2016

Google has delayed its plan in releasing its modular smartphone concept, codenamed `Project Ara’ hardware till sometime in 2016. The Ara team had tweeted a messaging confirming the delay and shift away from plans to test the modular phone project, later this year, in Puerto Rico. However Google had been quick to note that it is in the process of exploring few locations in the US for Ara.

The explanation for the change by Google recommends that the team had been working hard in making Ara a reality. The team had told followers in a sequence of tweets,that `Project Ara is not going anywhere’, but had been set back by `lots of iteration, more than we thought’. Project Ara enables users to swap out as well as upgrade the core components of smartphone namely processor, camera etc. independently instead of replacing the complete device.

It portrayed a dramatic rethinking of the device and those attending the Google I/O were pleased when the working prototype was showed on stage in May by the company. The development of the product seems to be longer than expected but Google had earlier aimed to have between 20 and 30 Ara modules made available for the now scrapped Puerto Rico trial.

Components Can be Added/Taken Away

Project Ara seems to be Google’s interesting efforts in developing a smartphone which comes in bits, which means that certain components could be added or taken away without the requirements of complex alterations to the device. It would also be less costly to replace smashed screens or worn batteries as well as enable others to develop modified hardware for a particular task.

San Francisco based designer Garrett Kinsman while writing on a forum for developers who were interested in working on Project Ara, had said that he felt a sense of overwhelming sadness at the delay. The Project Ara team had announced at the beginning of this year that it would launch the modular smartphones this year in Puerto Rico as a part of its pilot program.

But the team has now confirmed that its phone will not launch till 2016 along with the announcement of pilot market re-route to a few locations in the US instead of Puerto Rico.

DIY Smartphone

The company has not yet revealed any particular location in the US where it intends launching modular phones. In a tweet, it said, `when? 2016’, followed by the hastags yes we are late and Project Ara - #yeswearelate and #ProjectAra.Project Ara further clarifies that the re-routing does not seem to mean that there would be no modular phone launched in Puerto Rico. It stated that `and this is not goodbye Puerto Rico’. The project expects to kick-start an era of do-it-yourself smartphones which Google has been stressing that it is not targeting weeds.

Google had showcased its Spiral 2 modular smartphone prototype in January Project Ara Spiral 2 prototypek had a HD – 720x1280 pixels screen, choice of Nvidia Tegra K1 or Marvel PX1928 processor, 5-megapixel primary camera, battery, Micro-USB port, speaker as well as connectivity options which included Wi-Fi, Bluetooth and 3G. The Spiral 2 prototype comprised of 11 working modules inclusive of 3G, Wi-Fi, Bluetooth, Receiver with light as well as proximity sensors, USB charger module and a 2x2 battery module. Spiral 3 also tends to feature the electro permanent magnets in the exoskeleton, thereby saving space in the modules.

The Myths Surrounding Cloud Computing


Cloud Computing
The strange thing about cloud computing is that there are so many misconceptions surrounding this technology. Many businesses seem to be sceptical about it; perhaps because it’s a relatively new option. However, it is speedily growing in popularity over time. Let’s try to debunk some of the pesky, stubborn myths that are still hanging around cloud computing.

Data Isn’t Secure On The Cloud

In every company, security is paramount. Many people seem to assume that data kept on the cloud is vulnerable. In fact, it makes more sense that opting to go without the cloud system is more likely to lead to data breaches. Whether that’s through theft or natural disasters, or broken or stolen hardware with files on can’t be replaced, your data is at risk. If it’s on the cloud, you can still access your information, no matter what happens, and it’s all password protected.

Cloud Computing Costs Jobs

Cloud computing has actually created thousands of jobs! Yes, it will lower the amount of IT personnel you might need for your company, but it creates vacancies in other businesses that provide cloud computing services. It just means that it’s not coming out of your pocket!

Cloud Migration Is Too Much Trouble

The problem with change is that many people are resistant to it and they are easily convinced that it will be more trouble than it’s worth. In fact, moving across to cloud computing is extremely easy, needs very little training, and will be migrated before you know it. You will also have a support team on-hand to walk you through any confusing aspects, but it really will be self-explanatory. It’s certainly worth the effort.

Not For Mission-Critical Use

Although some companies consider cloud computing for simple processes, many decide not to use it for documents that are highly critical. This goes back to the myth before about the cloud not being safe enough to trust. As we’ve already discussed, this isn’t the case at all, and many companies run solely from the cloud.

There Aren’t Many Cloud Options

Many people seem to think that the cloud is somehow still in its infancy, meaning that there are few options for cloud packages and companies. This is not true at all. In fact, it seems like everyone and their mother has cloud software. You will be able to easily find something that will suit your business, so don’t worry! The Dell virtual client is a great package, making it a great place to start.

You Have To Use Just The One Cloud System

You can actually mix and match as much as you like. This may not be a great idea for your business, if you like everything in one place, but the option is always there. Maybe you’d rather use a cheaper system for certain departments, and something a bit more expensive for the more sensitive documents that need extra protection.

What do you find is a common misconception about cloud computing? Let us know in the comments.

Tuesday, 18 August 2015

Mozilla Gripes at Microsoft for Giving Edge and Edge

edge

Mozilla’s Request to Microsoft - Easier Method of Browser Preference for Windows 10

Chris Beard, CEO of Mozilla recently published an open letter to Microsoft CEO Satya Nadella, calling on him to provide Windows 10 users with an easier method of setting their browser preference. Beard considered the lack of options in the Windows 10 experience as `very disturbing’ and seemed to be designed to supersede the preference of the user for apps and browser, compelling them in an experience which Microsoft wants them to have rather than the one they would prefer.

Carly Olsen, Microsoft spokesperson had informed that they had designed Windows 10 in order to provide a simple upgrade experience for users as well as an organized experience following the upgrade. Users who tend to upgrade to Microsoft’s Windows 10 with the express setup would have the new Edge browser set as their default.

She informed  that `during the upgrade, consumers will have the choice of setting defaults, including for Web browsing and following the upgrade, they could easily choose the default browser of their choice. Recently, Windows 10 was made available as a free download for Windows 7 and 8 users and has been downloaded more than 14 million times so far.

With Update, Some Programs Not Compatible

With each update of operating systems, users would probably observe that some of the programs may not be compatible. When the earlier versions of Windows were introduced, there have been several complaints over various issues. Beard requested that Mozilla make attempts to work with Microsoft to make sure that the users of Firefox would not come across any problems, but failed to do so.Charles King, principal analyst at Pund-IT had stated that `it seems fairly easy (to keep Firefox), especially since upgrading to Windows 10 does not uninstall third party apps, including browsers’.

He informed  that `users who tend to use Firefox, Chrome or others as their default browsers would have to undergo a manual process like the one in Windows 8. Besides updating the operating system, Windows 10 also seems to be replacing the long-running Internet Explorer with Edge, a browser which Microsoft claims to be faster, lighter as well as more modern than IE. Roger Entner, principal analyst at Recon Analytics had commented that considering the 73% or roughly three quarters of Internet users do not seem to be using Internet Explorer, it is a minor inconvenience or an annoyance’.

Nefarious Move by Microsoft

He further informed, that Microsoft’s position in the browser world seems to be a mere shadow of its former dominance. Beard suggested that Microsoft intentionally limited consumer choice to give itself an unfair advantage. According to Entner, he states that `people are seeing this as a nefarious move by Microsoft, though it could be the other way round. He remarked that `it could give people an opportunity to experience Edge, but Mozilla does not want them to try’.

King noted that the `previous versions of Windows had positioned IE as the default browser and if one wanted something different, they had to make it happen. Besides altering the process for choosing the default browser, Microsoft is doing what it had done for several years. Twenty years back in the summer of 1995, Microsoft had taken similar stand in using its newly launched Windows 95 to gain market share with IE that was closely tied to the OS. It is doubtful that Windows 10 and the Edge browser would activate a replay. There is even a possibility that Microsoft would not enjoy any advantage.

Could We Fly From London to New York in an Hour?


Airbus Patent – Hypersonic Passenger Plane

A patent has been won by Airbus for hypersonic passenger plane that would possibly fly from London to New York within an hour. Named as Concord 2.0, it would be capable of flying for more than four times the speed of the sound. The documents that were lodged with the US Patent Office mention an `ultra-rapid air vehicle and related method for aerial locomotion’.

 As per the documents the jet is said to reach speeds as great as Mach 4.5 or four and a half times the speed of sound which compares to Mach 2 for Concorde. The patent application also states that the aeroplane would be utilising various engines which would be serving different purposes and power would be coming from hydrogen that is stored on-board.

Besides this, two turbojets beneath the fuselage and a rocket motor in the rear would be utilised at the time of take-off and would lift off vertically similar to a Space Shuttle. Once it is launched,. The turbojets would be shut down as well as retracted where the rocket motor would then kick in to ascend towards an altitude of over 100,000 feet.

Private Jet with 20 Passengers

Thereafter ramjets, which are usually used in missiles, would be kindled and the flight would reach a top speed of Mach 4.5.A website – PatentYogi, which has been dedicated in explaining patent ideas, had informed that the flight path of the jet would be making it the `highest rollercoaster ride in the world’.

Moreover, the jet would be with hammock like seats for passengers for sitting, necessary if they preferred to travel in comfort. Travellers would not have to share the cabin with others. The patent application has described it as more of a private jet with 20 passengers on-board at a time. This notion would also not be limited to commercial flight wherein, in the patent, Airbus has also listed military applications for the jet.

 In 2003, the iconic Concorde had been taken out of service due to high operating costs. The supersonic jet faced complaints with regards to the sonic booms as well as noise pollution developed by its four turbojet engines, in 1970.

Designs Reverberates Curves of Concorde

The outcome of it was that it was banned from operating over land and was never capable of becoming financially feasible. On the contrary, it operated as a high-altitude transatlantic taxi service for the wealthy.

The issue of sonic booms has been addressed in the patent application for the new jet. By ascending vertically, the latest design’s sonic boom would be degenerated in all directions and will not reach the ground. Besides this, the design has reverberates of the curves of Concorde which has been described as a `gothic delta wing’.

Airbus had been playing down the patents stating in a statement that the designs had been based on `concepts and ideas in a very promising stage of conceptualisation’ and the idea had first been published in 2011. It is only now that it has started being revealed since it had won approval from the US Patent Office.

Earlier, Airbus, known as the European Aeronautic Defence and Space Company – EADS had said that it would take 30 to 40 years, if at all to enter service. Airbus had made a mention that it would be working on two hypersonic projects one being with Japanese partners while the other with Russian and Australian involvement for the purpose of conquering speeds up to Mach 6.

Saturday, 15 August 2015

Spyware Demo Shows How Spooks Hack Mobile Phones

audio

Secretive Techniques to Spy Mobile Devices

Generally Intelligence agencies seldom make it public, their secretive techniques for spying on mobile phones but a UK security firm has portrayed to BBC, how a tool which is sold around the world spies and actually functions.

It enables spies to take secret images through the phone’s camera as well as record the conversations with the microphone without the owner being aware of it. The software of Hacking Team had been recently pilfered from the company by hackers and published across the web where almost any type of data on a phone, PC or a tablet could be accessed through the tool which is amazing on how much it can do.

When the source code for the program had been dumped online by the hackers, Joe Greenwood, of cybersecurity firm 4Armed, who had seen it, could not refrain from experimenting it. Though he had to work with the code in order to make it work, it took him a day before he could make it run.

The software comprises of the surveillance console displaying data retrieved from a hacked device together with malware implanted on the target device itself. The cybersecurity firm had been cautious to note that utilising it to spy on someone without their permission would be violating the law.

In-Built Features to Track Bitcoin Payments

Mr Greenwood, on testing the software on his own PC, observed the scope of its potentials. He informed BBC that one could download files, record microphones, webcam images, websites that were visited, check what programs were running as well as intercept Skype calls.

Besides these, the software also had some in-built features to track Bitcoin payments which could be difficult to connect with individuals without extra data on when and how the transaction could have been performed. He also showed a live demonstration of the system on how an infected phone could be made to record audio from the microphone even though the device seemed to be locked and utilise the phone’s camera without the knowledge of the owner.

He informed that photos could actually be taken without them knowing and the camera in the background tends to be running, taking photos every number of seconds. There is also the possibility of listening in on phone calls, access the list of contacts that were stored on the device as well as track what websites the user of the device had visited.

Indication of Message Sent Somewhere -A Red Flag Spike in Network Data Usage

Marc Wickenden, technical director of 4Armed as well as Mr Greenwood had stated that they were shocked by the sleekness of the interface and pointed out that though customers would be paying up £1m for the software and expecting it to be user-friendly especially if it is intended for usage by law enforcers.

As for the tracked user, there are few ways of discovering that they are being watched. According to Mr Greenwood, a red flag, is a sudden spike in the network data usage indicating that information is being sent somewhere in the background and experienced intruders would however, be cautious in minimising this to remain undercover.

Currently spy software of this type is only likely to be arrayed secretly on the phones and computers of those who seem to be key targets for intelligence agency.