Posts

Showing posts from October, 2015

Project ara -> modularity redefined !!

Image
Google's Project Ara is a modular smartphone which could re-define the market                                 Google might have gone a bit sideways with the Nexus 6, but before that the company has proved it clearly knows a thing or two about what your typical Android phone buyer wants from their devices; something that's not too expensive, not too fussy, and nicely tailored for a great experience on the Android platform. No frills, and no unnecessary bits that bump up the cost, essentially. So it's not too surprising that the firm  has looked into its crystal ball and realized that there's a market for a user-tailored phone experience. The modular smartphone. Similar to the custom PC market, there will be users out there who want to simply buy the bits they need to do what they want to do, and to be able to upgrade/retrofit whenever they like. Google's solution is Project Ara. T...

RoBoHoN -> A Robotic SmartPhone The next generation Mobile !!

Image
The cute smart bot ..!! People like smartphones and they like robots so   Sharp   figured it would combine the two to create a strange device called the RoboHon The device is a mobile phone robot that was created jointly with Tomotaka Takahashi's robot creators.  The robot is able to walk on two legs and is dubbed the "next generation of mobile information communication terminal."   Specification The bot has integrated LTE/3G supporting voice calls, email, and a camera.  It’s like a very basic mobile phone with the ability to walk around. The robot also has an integrated projector that allows it to project photos, video, maps, and other content on the surface of a desk or on a wall. RoBoHoN has a Snapdragon 400 chip inside which is a quad-core unit operating at 1.2GHz.  A 2-inch touchscreen is integrated into the rear of the device with QVGA resolution for controlling the robot features.  Users can also control the functi...

Two-step Authentication For Google, Facebook

Image
Short Bytes : Two-factor authentication is amongst many options, yet one of the most underestimated methods, to improve your online security. If you haven’t enabled the 2-step verification for your password protection yet, then it is time you go for it. W hen Google itself recommends methods to stay safe online , then it is time you understand the gravity of the situation and adopt some security measures. As most of the news feed nowadays is filled with cyber attacks and security breaches rendering the connected users helpless, each and every effort to safeguard yourself counts. Two-factor authentication is one of the methods to strengthen your online security. It provides an additional layer to your standard password protection system using a second electronic device. Mostly, it utilizes your phone number for verification and gives alerts whenever your account is being accessed. Almost all the services like Google, Facebook, Yahoo, PayPal, Twitt...

“Dislike” Button is Here in facebook with 6 different reaction.!!

Image
Short Bytes: Facebook has finally revealed how its upcoming dislike/empathy button will look like. The social networking giant is going to add 6 new empathetic emoji alongside the “like” button and is testing the feature before official rollout. B ack at Facebook’s Town Hall public Q&A session, CEO Mark Zuckerberg confirmed that the social network is working on some way to introduce the dislike button on Facebook. Later, it was confirmed that Facebook is working on some kind of “Empathy” button as a Dislike button would be too negative. Today, Facebook offered a glimpse at how the like button on Facebook is about to change. The social networking website is preparing the launch of “Reactions” – a feature that will add 6 empathetic emoji to the lonely ‘”like” button. According to our sources, Facebook will be testing the feature in Spain and Ireland as soon as the next couple of days. The six emoji that will be added alongside the like button are: ...

Beware !!! Malware that roots the smartphone :(

Image
  Short Bytes: A new malicious adware is here to make your lives harder. Kemoge adware has the ability to do some serious damage to your precious smartphone by rooting it and then flooding it with tons of ads. T here is no dearth of malware that are designed to serve unwanted ads in your mobile phone and steal your user information. Some of them just stick to severing tons of ads and don’t cause any harm. The security firm FireEye has reported a malware that belongs to the other class. The malicious adware, dubbed Kemoge, can do some serious damage to your Android phones. Apart from serving the intrusive ads, Kemoge has the ability to root your devices and make them more vulnerable to attacks. Just like every other malware and adware, Kemoge spreads by hiding itself under the hood of some popular app. Then via the route of 3rd-party app stores, it reaches the smartphones of users and starts causing the harm. Also read: Here’s the Best Antiviru...

The New Microsoft Band 2 is Microsoft Answer to Smartwatches

Image
Short Bytes:  Microsoft has unveiled the new Microsoft Band 2. This device is an answer to the smartwatches being sold by different smartphone companies.  A t its  Windows 10 device launch event , Microsoft released its second iteration of Microsoft Band. The first version was a pretty good fitness wearable with lots of sensors at an affordable price. The new Microsoft Band comes with a curved AMOLED display and it feels more comfortable that the first iteration which had a flat display. The new Microsoft Band comes in three different sizes. The new version responds to touch and it comes with tougher and scratch-resistant gorilla glass. The new Microsoft Band retains the major features of the original Band and comes with lots of sensors: Optical heart rate sensor, 3-axis accelerometer, Gyrometer, GPS, Ambient light sensor, Skin temperature sensor, UV sensor, Capacitive sensor, Galvanic skin response, Microphone and a new addition in the...

A liquid cooled smart phone , Brilliant move by silicon valley giant !!

Image
Every processor the planet creates heat. More precisely, computer chips convert  electrical  energy into  thermal  energy. Even the most simple circuit has some amount of resistance, and that resistance is manifest in heat. It’s the nature of the beast. Electronics don’t particularly like heat – in fact, a circuit that runs too hot will eventually burn itself out. That’s where the genius of a liquid cooled smartphone comes in to play. First, let’s lay some groundwork. The nanometer push When designing computerized components, the challenge has been to create smaller circuitry that requires less power to accomplish the same tasks. This has been one of the driving factors behind what I’ll call “the nanometer push”. When you talk about computer chips, you’ve probably heard the term “nanometers” mentioned (or nm, for short). A nanometer is a unit of measurement that is 10 – 9 meter (or one billionth of a meter). The Qualcomm Snapdragon 810, f...

HOW TO RECOVER DELETED FILES-A GUIDE FOR TOP TOOLS

Image
As a human you will make some mistakes while working with computer without our knowledge. Here you can find a better solution for deleted files, which can also be recovered. You can also be recovering the important files and data’s from your computer. It is not that much easy to recover and you want to know in which place you saved your deleted files and folder exactly. You can also recover the data, movies, music and files which are stored in your computer and also you can recover the hidden files and photos also. So you can prevent the accidental loss. DON’T GET PANIC, YOUR DATA IS NOT DELETED Encrypted files and folders on hard drive is not lost. Mostly in new modern hard drives, it will happen not easily than 1000 full encryption. If a file is deleted, it is just deleted from the directory of files. To remove it from recycle bin, you can also use SHIFT+DELETE option and it also in recoverable and leaves traces in hard disk. Suppose if you use the free v...

HOW TO USE WHATSAPP WEB FOR IOS:

Image
Finally WhatsApp web started supporting for an ios devices. Basically WhatsApp web feature is released before six months for all devices expect ios. The addition feature for ios device, which is web functionality is added to iphone users. By using this you can synchronize your chats with WhatsApp web app. For Android,Windows and Blackberry Devices, this WhatsApp Web was launched this year back January. Due to certain limitations in ios devices, they were back to release WhatsApp Web for ios devices. Knowingly, even for Nokia s60 WhatsApp Web is supporting but not supporting for an ios device but it came now with a great start with more functionality. The verge earlier, WhatsApp Web spokesperson told “ ios device has no proper push technology and also there is no background multitasking. So they conclude that it is a bad user experience in apple”. In January, WhatsApp has launched voice calling to keep a pace with competitors, and ios is one of the last platform to ...

Un conteur exceptionnel .. !!!

Image
N'a pas pensé comme conteur spécial. Oui, voici Spotlight la technologie de Google qui permet à 360 raconter des histoires de degré qui a été inventé par ATAP. Voici la première histoire, En ce spot, il est possible pour nous d'avoir une expérience interactive en prenant les avantages des capteurs de téléphonie mobile. La première histoire publiée est "LIVRAISON SPECIAL" qui vise la célébration de Noël. Le film peut nous rediriger vers d'autres mini films sous différents angles, il a ses propres parcelles pour diverses autres opérations. Il sera pris en charge dans l'application YouTube sur les systèmes d'exploitation Android et iOS.

How to Protect Your Wi-Fi Router From Hacking Using Simple Tricks

Image
Short Bytes : The humble wireless router in your home, as you might not think, could be the biggest loophole in your personal cyber security measures. Read the article to know simple ways to protect your Wi-Fi router. T hese are the times when anything and everything digital is prone to hack. From  ATMs  to connected cars, and from  satellites  to the so-called secured government offices, hackers are laughing all the way. So, the blatant use of the specification “unhackable”, which today, has become the USP for the products by almost all the brands, doesn’t come as a surprise. Many people are now aware and take good measures for their online safety, but safeguarding the Wi-Fi router still lies low at the priority list of the most. The reasons may range from lack of knowledge to mere carelessness, but your home router’s security is as important as your front door’s because it is the foremost target of hackers trying to invade through your system. ...