Posts

Showing posts from January, 2016

Here’s Why Oracle Is Killing The Java Browser Plugin – A Good News For Plugin-free Web

Image
Short Bytes:  Oracle has announced that it’s removing the Java browser plugin from its future releases. In its whitepaper, the company said that the rise of web usage on mobile devices has inspired the browser vendors to look for plugin-free technologies. This plugin has been repeatedly exploited to install malware and attack users during its lifetime . T he most popular web browsers like Chrome, Edge, Firefox, and Safari don’t support plugins anymore. In a related development, Oracle has finally accepted that its Java plugin doesn’t fit in today’s world of plugin-free web.  The company has announced that the Java browser plugin will be deplored when the next version of Java, Java Development Kit 9, will be released on September 22nd. In another future release, this plugin will be entirely removed. With time, the modern web browsers have worked to reduce the plugin support on their browsers. As a result, the developers of applications that depend on Java browser p

Microsoft Edge Browser May Be Storing Your Private Browsing Data

Image
Short Bytes:  Microsoft Edge browser made a lot of hype before setting in the steps in the internet browsing market. Microsoft Edge was thought to be more secure, faster, light-weight and many more features were also integrated with it like Cortana Assist, Reading List and the new In Private browsing mode. According to a new research, the browser might be storing your private data even in the In Private mode. But in Private browsing   mode is no more private as it was supposed to be. According to an   investigation   made recently over the In Private browsing mode of Microsoft Edge browser, a user’s browsing data can easily be recovered from the hard drive by examining the Web Cache file. Visited sites are stored in the same “Container_n” table that stores tab history from conventional browsing, the investigation found. This table can be of great help to a hacker who might be able to reuse a user’s browsing history, whether in Private Mode or not. Edge is n

‘Fate of Bitcoin’, Statement Given by Lead Developer Who Just Quit

Image
  Short Bytes: Once again Bitcoin has been declared dead. This time, the announcement has come from a prominent developer Mike Hearn who just quit the project. In a long blog post on Medium, he called Bitcoin an ‘experiment’ that has now failed.   M ike Hearn, a prominent Bitcoin developer, has decided to abandon the project by calling it a failure. He worked on the project for five years and was one of the five senior-most developers. The Bitcoin community was taken by this announcement and Bitcoin slid by 10 percent. “Despite knowing that bitcoin could fail all along, the now inescapable conclusion that it has failed still saddens me greatly,” Hearn said in his a long post on Medium. In his blog post, Hearn detailed many reasons that compelled him to take this step — a dying community, lack of improvements in the system, lack of communication, and domination of a minority. Calling Bitcoin an ‘experiment’, he said that like all experiments it was vulnerabl

Bitcoin is Now Officially a Commodity: United States

Image
Short Bytes:  As the latest developments indicate, Bitcoin is on its way to become an internationally accepted virtual currency. Meanwhile, United States CFTC has given it a status of an official commodity that must be regulated. B itcoin, the virtual money, is being recognised by the world’s biggest banks and as a result, its acceptance is increasing each day. These developments are indicating that slowly and gradually, Bitcoin will be adopted into your daily financial activities. The digital currencies have now been given the status of an official commodity by the United States Commodity Futures Trading Commission (CFTC). The Commission said that Bitcoin operators must register their companies immediately. According to the press release, “In this order, the CFTC for the first time finds that Bitcoin and other virtual currencies are properly defined as commodities.” This decision has come after CFTC and FBI jointly carried out an investigation into the activi

The 21 Bitcoin Computer is a Small Linux-powered Machine for Bitcoin Mining

Image
Short Bytes:  The startup 21 Inc. has released its first product. The company has launched a Linux-powered bitcoin mining computer called 21 Bitcoin Computer. Read more about it and pre-order it from Amazon. 21 Inc. is an Andreessen Horowitz-backed startup and it has released its first product in the market. The  21 Bitcoin computer  from the company aims to integrate this digital currency in your daily life by making the bitcoin mining game easy and profitable. The 21 Bitcoin computer comes with complete access to the Bitcoin network and is coupled with a Linux Box Bitcoin ASIC miner combo. With this, you can mine the cryptocurrency and trade the digital goods for more profit and fun You can use the device independently or plug it in your PC. The 21 Bitcoin Computer also comes with a micropayments server to handle the payments and avoid any third-party interference. Also read:   Bitcoin is Now Officially a Commodity in United States In a Medium post, CEO of

Project Natick..!!

Image
                                         "UNDER WATER DATA CENTER"   Data centers have an immense importance that it stores valuable information of people and has major value in business world. However this is the one to be protected from vulnerable attacks. We have heard news like any leading company will not reveal the place where the data center of the company is resided.The data has such values and it is to  be kept secured. In the above category the corporate "MICROSOFT"stands little unique. Microsoft has planned to build its data center in underwater environment. The famous quote of Microsoft says that " 50% of us live near coast , why cant our data?" This project named " NATICK" is to check the feasibility of data centers being built near the coast, its ease and difficulties. The initiative for this work started because of the requirement to reduce latency and to provide customers the maximum speed as p

Happy 20th Birthday IPv6 – The Hero To Save Our Internet?

Image
  Short Bytes: We have just completed the 20 years of the IPv6 launch. This standard was developed by IETF to replenish the drying pool of IP addresses and bring numerous performance improvements. However, the adoption numbers of the IPv6 protocol hasn’t been very encouraging. Internet Protocol (IP) saw the launch of its most recent version 20 years ago when IETF developed IPv6 to replace IPv4. But, where did IPv4 fail to deliver? Why has it witnessed just 0.5 percent growth each year over the past 2 decades? The need of a new protocol arose after the rapid growth of the internet in the 1990s. With time, the popularity of IPv6 protocol has increased at a slow pace and it’s measured by Google with the help of a Javascript program. The latest Google statistics tells that on December 26, we reached 9.98 percent IPv6 adoption. Just a year ago, this percent was below 6 percent. As we celebrate the 20th birthday of the protocol, Belgium tops the cha

Linux-powered “World’s Safest Drone” Fleye Is Better Than Google Glass? - Here is the answer

Image
  Short Bytes: Here is the world’s safest drone – Fleye. It is as small as a soccer ball and equipped with everything you need in a perfect companion to help you with your daily tasks. W ith the growing realm of robots in our day-to-day life, it’s time to say hello to the future of autonomous flying robots with Fleye. Fleye is a startup that made its appearance on Kickstarter . It has been described as a whole new kind of drone which is – safe, fun, autonomous, easier to use, open and programmable, and a result of 18 months of research and development. Fleye was founded by two engineers who shared a common passion for robotics and other flying machines, namely, Laurent and Dimitri. What is Fleye? Fleye is a unique drone with all its moving parts shielded, thus, making it safer and robust in case it hits something or someone, kudos to the “ducted fan UAV” concept, which used in larger industrial/defense drones. It is exactly the same size and weight as

Fold LG’s New OLED Displays Like A Newspaper

Image
  Short Bytes: At CES 2016, LG is expected to launch the new fold able OLED displays. LG is known for its work in the ultra-thin display segments and it’s moving ahead to make the truly futuristic devices a possibility. B ack in 2014 LG announced that it has built an 18-inch-OLED display that rolls up like your daily newspaper. Now the company is ready to remove the drapes of secrecy and unveil its ultra-thin display at CES 2016. These roll able, bendable, and curving displays are already being pushed forward by the likes of Samsung, Sony, Sharp and other others. Along the similar lines, LG has announced in the past that it has invested $8.7bn into OLED development. The company aims to bring these screens  into your pockets and household interiors At CES 2016, LG is expected to show off proof-of-concept displays and a 25-inch “waterfall” curved screen wrapped on the car in the Auto Zone section. For WI-Fi certifications, companies submit their products

NVIDIA'S Super Computer for self driving cars

Image
  Short Bytes: Participating in the self-driving car race, NVIDIA has launched NVIDIA Drive PX 2 – the world’s most powerful engine for in-vehicle artificial intelligence. Using the AI advantage, Drive PX 2 aims to provide a safe and comfortable self-driving experience. T echnology company NVIDIA has announced a new AI-powered supercomputer to drive cars autonomously. Called Drive PX2, it’s a follow-up to the last year’s Drive CX. The supercomputer is the size of a lunchbox and has power equivalent to “150 MacBook Pros.” In a conference leading to CES 2016, NVIDIA CEO Jen-Hsun Huang labeled Drive PX 2 as the “world’s first supercomputer for self-driving cars.” Powered by the 12 NVIDIA GPUs, Drive PX allows the cars to use artificial intelligence to tackle the complex real world problems faced by automobiles. The 12 CPU cores support a combined 8 teraflops and 24 deep learning tera operations per second. “Drivers deal with an infinitely complex world,” said Je

Friends Use Windows 7 at your own risk-some serious problems

Image
  Short Bytes: Microsoft Marketing Chief Chris Capossela has made a surprising statement about Windows 7 by calling it unsafe to use. He warned the users and asked them to use it “at their own risk, at their own peril”. However, the reality offers a totally different picture.  Earlier this week Microsoft announced that Windows 10 is its fastest growing OS with more than 200 active installations since last July. However, Windows 7 continues to power millions of PCs around the world and big names at Redmond offices are disliking these numbers. In order to push Windows 10 installation in a much faster manner, Microsoft has come up with deceitful tactics that were slammed by the experts. In a surprising development, Microsoft Marketing Cheif Chris Capossela warned the Windows 7 users and asked them to use it “at your own risk, at your own peril”. According to Windows executive, continuing using Windows 7 is a risky option and made statements about the future Windows

Some of the Worst Software Of 2015 With Most Bugs that Will Surprise You

Image
Short Bytes: In this article we are bringing to you the software of 2015 with most bugs. The list is topped by Mac OS X, iOS, and Adobe Flash. Take a look at the list below to know about other software with most flaws. The year 2015 has just ended and Apple’s Mac OS X has been recently been crowned as the software with most vulnerabilities. Mac OS X won the title of the software that needed the most bug fixes with 384 vulnerabilities. Apple’s iOS was the runner-up software with 375 vulnerabilities. The other software adorning the top 5 places were Abode’s Flash, AIR SDK, and AIR. Over the whole year, Adobe Flash Player recorded 314 vulnerabilities, Adobe AIR SKD witnessed 246 vulnerabilities, and Adobe SDK came 5th with 246 vulnerabilities. You might start questioning the results of this survey by CVE Details as Microsoft Windows didn’t appear at the top. But, Windows versions are split separately and many vulnerabilities are bound to overlap. The

Instrument (Device )as a Service

Image
DaaS ....!                                                          Device as a Service In the list of 1. SaaS ( Software as a Service) 2. Paas ( Platform as a Service) 3. IaaS ( Infrastructure as a service) 4. Daas (Desktop as a Service) 5. Daas ( Data as a Service) here is the new service provided by Hp systems called as Device as a Service. Hp have recently announced that the organisation is offering device as  a service in Australia under-which tablets, desktops, PC are managed and maintained. The organisation has extended its service across many countries like Japan, Singapore, Asia and Pacific regions. It is again Pay as you use system scheduled for a period of three  to four years. The PC is assumed to be a utility and offered as a service. Some of the features provided by this service are PC configuration, Installation, Support, Up-gradation, data migration etc., Devices offered as a Service