Showing posts with label Computers. Show all posts
Showing posts with label Computers. Show all posts

Monday, December 14, 2020

Massive outage hits Google services worldwide

Paris, France — A massive outage knocked Google services, including Gmail and video sharing platform YouTube, offline across much of the globe Monday.

Within minutes, social media sites were awash with hashtags including #googledown and #YouTubeDOWN as hundreds of millions of internet users tried vainly to connect to the US search engine.

Google indicated the outage had affected all of its services for the “majority” of users.

Agence France-Presse

Friday, July 17, 2020

Intel event invite foreshadows a ‘big’ surprise announcement


While Intel is mysteriously teasing the announcement of “something big” on a press invite for a special event on Sept. 2, there’s little question in the industry as to what hardware reveal is expected to take place.

Earlier this year at the annual CES conference, Intel previewed their laptop-exclusive 11th Gen 10nm Tiger Lake processor, and already various computer makers like Acer have admitted that their upcoming notebooks — which could reach customers as early as this fall — will be powered by this new CPU.

It is extremely likely that this “big” surprise that will make an appearance in September will be Tiger Lake.

Like most other tech gatherings and conferences which have not been canceled in light of the COVID-19 outbreak, this event will take place virtually.

On Sept. 2, we can expect the pricing and specs of these new processors to be detailed.

AFP relaxnews

Thursday, August 23, 2018

Facebook suspends hundreds of apps over data concerns


SAN FRANCISCO, US — Facebook on Wednesday said it has suspended more than 400 of thousands of applications it has investigated to determine whether people’s personal information was being improperly shared.

Applications were suspended “due to concerns around the developers who built them or how the information people chose to share with the app may have been used,” vice president of product partnerships Ime Archibong said in a blog post.

Apps put on hold at the social network were being scrutinized more closely, according to Archibong.

The app unit launched in March by Facebook stemmed from the Cambridge Analytica data privacy scandal.

Facebook admitted that up to 87 million users may have had their data hijacked by Cambridge Analytica, which was working for Donald Trump’s 2016 presidential campaign.

Archibong said that a myPersonality app was banned by the social network for not agreeing to an audit and “because it’s clear that they shared information with researchers as well as companies with only limited protections in place.”

Facebook planned to notify the approximately four million members of the social network who shared information with myPersonality, which was active mostly prior to 2012, according to Archibong.

Facebook has modified app data sharing policies since the Cambridge Analytica scandal.

“We will continue to investigate apps and make the changes needed to our platform to ensure that we are doing all we can to protect people’s information,” Archibong said.

Britain’s data regulator said last month that it will fine Facebook half a million pounds for failing to protect user data, as part of its investigation into whether personal information was misused ahead of the Brexit referendum.

The Information Commissioner’s Office began investigating the social media giant earlier this year due to the Cambridge Analytica data mishandling.


Cambridge Analytica has denied accusations and has filed for bankruptcy in the United States and Britain.

Silicon Valley-based Facebook last month acknowledged it faces multiple inquiries from regulators about the Cambridge Analytica user data scandal.

Facebook chief Mark Zuckerberg apologized to the European Parliament in May and said the social media giant is taking steps to prevent such a breach from happening again.

Zuckerberg was grilled about the breach in US Congress in April.

source: technology.inquirer.net

Thursday, November 23, 2017

Facebook moves to help users know if they got tricked by Russian propaganda during 2016 US polls


A software tool would be released by end 2017 that would allow users to know if they were taken in by so-called Russian propaganda during the last presidential campaign in the United States, as Facebook bids to help people tell if they liked or followed posts considered part of a Russian effort to meddle with the 2016 US election.

The software tool would let users see whether they engaged with Facebook pages or Instagram accounts linked to the Internet Research Agency (IRA) between January 2015 and the August before the presidential election in 2016.

The IRA is seen as a Russian resource for spreading propaganda online.

“It is important that people understand how foreign actors tried to sow division and mistrust using Facebook before and after the 2016 US election,” the leading online social network said in a blog post.

The creation of the new tool comes in the face of Congressional pressure on Facebook and other internet giants to let users know if they were exposed to Russian propaganda prior to the election.

Google, Facebook, and other tech firms joined global news organizations earlier this month in an initiative aimed at identifying “trustworthy” news sources, in the latest effort to combat online misinformation.

Microsoft and Twitter also agreed to participate in the “Trust Project” with some 75 news organizations to tag news stories which meet standards for ethics and transparency.

Google, Twitter and Facebook have come under fire for allowing the spread of bogus news – some of which was directed by Russia – ahead of the 2016 US election and in other countries.

During a quarterly earnings call with analysts this month, Facebook chief executive Mark Zuckerberg addressed criticism over allowing disinformation and manipulation during the US presidential election, just hours after the company’s top lawyer faced a grilling at a Washington congressional hearing.

“Our community continues to grow and our business is doing well,” Zuckerberg said.

“But none of that matters if our services are used in ways that don’t bring people closer together. Protecting our community is more important than maximizing our profits.”

Facebook told Congress that the apparent political meddling included use of its image-sharing application Instagram.

Facebook general counsel Colin Stretch told a hearing that Instagram posts by suspect Russian accounts were seen by some 20 million Americans last year.

The data on Instagram is on top of the estimated 126 million Americans exposed to Facebook posts from Russian entities seeking to create divisions during the election campaign.

“I’ve expressed how upset I am that the Russians tried to use our tools to sow mistrust,” Zuckerberg said earlier this month.

“What they did is wrong and we are not going to stand for it.”            /kga

source: technology.inquirer.net

Friday, November 10, 2017

Synology DiskStation DS218j 2-Bay NAS Server


Synology has recently launched another 2-Bay NAS server ‘DiskStation DS218j’ for the mass market. Designed for home and personal cloud storage, this cost-effective NAS server is packed with a 1.3GHz Marvell Armada 385 88F6820 32-bit dual-core processor, a 512MB DDR3 RAM and two 2.5-/3.5-inch SATA HDD/SSD bays (up to 24TB).


Featuring real-time incremental backup technology – your data stored on a PC can be backed up to a Synology NAS instantly using minimal system resources, this 2-bay NAS server comes with a Kensington Security Slot, 2x USB 3.0 ports, 1x Gigabit Ethernet port and 1x built-in 92mm fan.

Running on DiskStation Manager (DSM) 6.2 OS, the DiskStation DS218j supports for multiple RAID setups including Synology Hybrid RAID, Basic, JBOD and RAID 0, 1. The Synology DiskStation DS218j is available now for $169.99. [Product Page]

source: techfresh.net

Saturday, August 1, 2015

Windows 10 entices millions in first day


WASHINGTON—Some 14 million people installed the Windows 10 operating system in the first 24 hours following its release, Microsoft said, calling the response “overwhelmingly positive.”

The company said its new operating system aimed at computers, mobile devices and other gadgets got off to a strong start toward its goal of reaching one billion devices.

“We’re humbled and grateful to see the response to Windows 10,” corporate vice president Yusuf Mehdi said in a blog post late Thursday.

“We have seen unprecedented demand for Windows 10, with reviews and customer feedback overwhelmingly positive around the globe.”

The stakes are high for Microsoft as it pushes out the new operating system for both traditional computers and mobile devices such as tablets and smartphones.

The company is hoping the new system can help it gain traction in mobile, where it lags behind Google Android and Apple iOS, and in emerging technologies for computing.

Windows 10 — Microsoft skipped directly from Windows 8, which got a lackluster response — is being offered as a free upgrade for most devices, making it possible to be available quickly on billions of devices.

It will allow for voice, pen and gesture input, and in some cases biometric identification for improved security.

Mehdi said the company is rolling out the software in phases to make the transition easier.

“Our top priority has been ensuring that everyone has a great upgrade experience, so, we are carefully rolling out Windows 10 in phases, delivering Windows 10 first to our Windows Insiders,” he said.

“While we now have more than 14 million devices running Windows 10, we still have many more upgrades to go before we catch up to each of you that reserved your upgrade.”

In one sour note, the chief executive of Mozilla, which makes the Firefox Web browser, complained that Windows 10 imposes the new Edge browser as the default option, overriding choices made by users.

“The update experience appears to have been designed to throw away the choice your customers have made about the Internet experience they want, and replace it with the Internet experience Microsoft wants them to have,” Mozilla CEO Chris Beard said in an open letter to his Microsoft counterpart Satya Nadella.

Beard said the new operating system makes it more complicated to choose a competing browser such as Firefox.

“It now takes more than twice the number of mouse clicks, scrolling through content and some technical sophistication for people to reassert the choices they had previously made in earlier versions of Windows,” Beard said.

“It’s confusing, hard to navigate and easy to get lost.”

Beard urged Microsoft to “respect people’s right to choice and control of their online experience by making it easier, more obvious and intuitive for people to maintain the choices they have already made through the upgrade experience.”

source: technology.inquirer.net

Friday, January 31, 2014

Spam drops in 2013, says security software firm


MANILA, Philippines—Could the days of spam or unwanted and unsolicited messages received through email be over?

According to a study by international computer security software company Kaspersky, there was fewer number of spam messages in emails in 2013 compared to previous years.

“The percentage of spam in total email traffic decreased by 2.5 percentage points in comparison with the previous year and came to 69.6 percent,” Kaspersky said in its security bulletin posted on its computer security website securelist.com in January 2014.

“For the first time in many years the average annual spam percentage is less than 70 percent,” it said. Also the amount of spam messages has decreased by 10.7 percent over the last three years.

China and the United States were both seen as the top sources of worldwide spam email with 23 percent from China and 18 percent from the US.

“The amount of spam advertising legitimate goods and services is gradually decreasing. Advertisers increasingly prefer legitimate advertising to spam: more varied types of online advertising are becoming available, and these generate higher response rates at lower costs than spam can offer,” Kasperskysaid.

More malicious emails

Kaspersky however said that it detected more fake messages containing viruses or malicious software (malware) that can steal confidential information from the user.

“Fake confirmations of hotel or airplane ticket reservations have become a common part of spam; we saw such messages in spam traffic throughout the year. Instead of booking confirmations, files attached to such messages include malware,” it said.

Certain spam messages were also found to be impersonating anti-virus companies urging the recipient to download a file that supposedly updates their anti-virus program but actually contains a virus.

The fake file, known as a Trojan, “is designed to steal sensitive user data, particularly financial info,”Kasperksy said.

“The malware is capable of modifying the contents of bank websites loaded on the browser by embedding malicious scripts in order to obtain authentication data such as logins, passwords and security codes,” it said.

Shift to social media

Kaspersky noted the increase in attacks on Social Media through phishing, or stealing personal information by pretending to be a legitimate entity asking for certain information.

“In 2013, we saw phishers targeting more organizations that have no direct link to any financial data or service. There was a 7.6 percentage points increase in attacks using social networks,” it said.

“This can be partly explained by the fact that today’s email accounts often give access to a lot of content, including email, social networking, instant messaging, cloud storages and sometimes even a credit card,” Kaspersky said.

It noted that cybercriminals are constantly looking for different ways to steal information from people because they have become more aware of spam messages as security threats.

“Spam is changing and as traditional advertising declines we see far more fraud, malware and phishing. As a result, even experienced Internet users have to be more alert than ever to avoid stumbling into a cybercriminal’s trap,” Kaspersky said.

source: technology.inquirer.net

Thursday, January 23, 2014

‘Mac’ turns 30 in changing computer world



SAN FRANCISCO – Decades before changing the world with iPhones and iPads, Apple transformed home computing with the Macintosh.

The friendly desktop machine referred to as the “Mac” and, importantly, the ability to control it by clicking on icons with a “mouse,” opened computing to non-geeks in much the way that touchscreens later allowed almost anyone get instantly comfortable with smartphones or tablets.

The Macintosh computer, introduced 30 years ago Friday, was at the core of a legendary rivalry between late Apple co-founder Steve Jobs and Microsoft mastermind Bill Gates.

Thousands of Apple faithful are expected for a birthday party this weekend in a performing arts center in Silicon Valley, not far from the company’s headquarters in the city of Cupertino.

‘Quantum leap forward’

“The Mac was a quantum leap forward,” early Apple employee Randy Wigginton told AFP.

“We didn’t invent everything, but we did make everything very accessible and smooth,” he continued. “It was the first computer people would play with and say: ‘That’s cool.’”

Prior to the January 24, 1984 unveiling of the Mac with its “graphical user interface,” computers were workplace machines commanded with text typed in what seemed like a foreign language to those were not software programmers.

Credit for inventing the computer mouse in the 1960s went to Stanford Research Institute’s Doug Engelbart, who died last year at 88.

“The Mac’s impact was to bring the graphical user interface to ‘the rest of us,’ as Apple used to say,” Dag Spicer, chief content officer of the Computer History Museum in Silicon Valley, told AFP.

“The Mac GUI was picked up by Microsoft, who named it Windows.”

The man remembered today as a marketing magician was a terrified 27-year-old when he stepped on stage to unveil the Mac, then-chief executive John Sculley said of Jobs in a post at the tech news website CNET.

“He rehearsed over and over every gesture, word, and facial expression,” Sculley said.

“Yet, when he was out there on stage, he made it all look so spontaneous.”

Orwellian Super Bowl ad

Apple spotlighted the arrival of the Mac with a television commercial portraying a bold blow struck against an Orwellian computer culture.

The “1984″ commercial directed by Ridley Scott aired in an expensive time slot during a US Super Bowl football championship in a “huge shot” at IBM, Daniel Kottke of the original Mac team told AFP.

“In the Apple board room, there were strong feelings that it was not appropriate; there was a big battle,” Kottke said.

“Fortunately, Steve Jobs and his reality distortion field won the day and it left a strong memory for everyone who saw it.”

There was a drive to keep the Mac price within reach of consumers in a market where computers costing $10,000 or more were typical.

While clicking an on-screen icon to open a file appeared simple, memory and processing demands were huge for the computing power of that time.

“Every time you move that mouse, you are re-drawing the screen,” Kottke said. “It is almost like video.”

The original vision of launching a Macintosh with 64 kilobytes of RAM and a $1,000 price gave way to introducing one with 128 kilobytes of RAM at $2,500.

“Steve really was crazy about details,” Wigginton said. “He wanted everything to be just right. Compared to the IBM PC of those days, it is just gorgeous.”

Macintosh also arrived with a new feature called “drop-down menus.”

“The Macintosh brought a new level of accessibility for personal computing to a much wider market in the same way the iPad did 25 years later,” Kottke said.

Mac prowess at page layouts and photo editing won the devotion of artistic types. The release of “hypercard” is credited with inspiring fanatical loyalty to Macs.

“It was the idea that you could create a page on your screen and create links to other pages,” Kottke said.

“You could have all your computers networked to share data; it was like a private Internet.”

The Windows-Apple rivalry

Macs sold decently out of the gate, but Windows machines hit with a low-price advantage for budget-minded buyers. Microsoft released the first version of Windows in late 1985.

The ensuing rivalry is the stuff of Silicon Valley legend and coffee shop smack talk.

“I think Steve Jobs cultivated a sense of Windows versus Mac,” Kottke said.

“Steve Jobs was always taking swipes at Microsoft, but it really heated up when Microsoft released Windows. He would say they copied us.”

Microsoft took the lead in the home computer market by concentrating on software while partners cranked out Windows-powered machines at prices that undercut the Mac.

“Really, Apple could well have gone out of business in the late 1990s,” Kottke said.

“That would not have surprised people.”

The rivalry between Microsoft and Apple has yielded to the mobile age, with Google and its Android operating system targeted as the new nemesis as lifestyles center on smartphones and tablet computers.

The original boxy Macintosh with a mouth-like slit below the screen for “floppy” data disks has evolved into a line that boasts slim, powerful laptops and a cylindrical Mac Pro desktop model.

“I am thankful to have been a part of it,” Wigginton said.

“Once you go through an experience like that, and it was extremely painful, you look back and every sacrifice is absolutely worth it. It is when Apple leapfrogs in technology that they succeed.”

source: technology.inquirer.net

Friday, January 3, 2014

NSA building ‘quantum computer,’ says Washington Post


WASHINGTON—The US National Security Agency (NSA) is making strides toward building a “quantum computer” that could break nearly any kind of encryption, The Washington Post reported on Thursday.

The Post said leaked documents from fugitive ex-NSA contractor Edward Snowden indicated the computer would allow the secret intelligence agency to break encryption used to protect banking, medical, business and government records around the world.

Quantum computing has been a goal among commercial firms, such as IBM, because it can harness the power of atoms and molecules, vastly increasing speed and security of computers and other devices.

But experts cited by the newspaper said it was unlikely that the NSA would be close to creating such a machine without the scientific community being aware of it.

Improbable

“It seems improbable that the NSA could be that far ahead of the open world without anybody knowing it,” Scott Aaronson of the Massachusetts Institute of Technology told the daily.

The NSA declined to comment on the report.

The Post said the leaked documents indicated that the agency carries out research in large, shielded rooms known as Faraday cages designed to prevent electromagnetic energy from entering or exiting.

Encryption breaker

Because of its vast computing power, a working quantum computer would break the strongest encryption tools in use today for online activities, including banking and e-mails.

Some technology firms, such as Google and Yahoo!, have said in recent weeks that they were stepping up efforts to encrypt their communications following reports that the NSA had been able to break or circumvent many of the current encryption standards.

A September report by The New York Times, ProPublica and The Guardian, also based on leaked documents, said US and British spy agencies were able to decipher data even with the supposedly secure encryption to make it private.

The documents indicated that the NSA, working with its British counterpart, Government Communications Headquarters, accomplished the feat by using supercomputers, court orders and some cooperation from technology companies.

Defeating security

If the reports are accurate, the highly secretive program would defeat much of what is used to keep data secure and private on the Internet, from
e-mails to chats to communications using smartphones.

IBM researchers said last year they had made advances in quantum computing that has the potential to outperform any existing supercomputer.
The new type of computing uses information encoded into quantum bits or qubits, putting into use a theory that scientists have been discussing for decades.

Quantum computing expands on the most basic piece of information that a typical computer understands—a bit—and thereby can perform millions of calculations at once.

source: technology.inquirer.net

Friday, December 20, 2013

Intel set to expand digital literacy program


MANILA, Philippines – As computers continue to become a large part of people’s lives and society as a whole, digital literacy becomes increasingly important so that a person may utilize the technology and improve his life.

International computer technology company Intel said that being able to fully utilize computer technology allows people to uplift their lives and also drive the growth of the economy.

“Definitely education is key … you educate a person, it drives the economy,” Calum Chisholm, Country Manager of Intel Philippines said during the 2013 year-end review and 2014 predictions event last December 10.

Intel is looking toward 2014 and beyond to expand its digital literacy program both in schools and in the small and medium enterprises (SME) sector.

“In 2014, we will start to see digital literacy programs extend beyond school education. Governments need to invest to accelerate digital literacy throughout the community; a digitally literate SME sector will boost Asia’s global trade,” Philip Cronin, Intel Asia Pacific Director for Regional Sales said in a statement.

“Intel is working closely with governments to extend the digital literacy programs to adult communities,” he said.

Intel East Steps program, implemented by the National Computer Center, Commission on ICT, and the Technology Education and Skills Development Authority (TESDA), has already trained some 54,000 people, Chisholm said.

The primary target of their programs include those who had dropped out of school and the farmers and fishermen some of whom were not able to go to school.

Asked how he would be able to convince a fisherman to learn how to use computers when he might skeptical that it would not directly improve the amount of his catch, Chisholm said “but he might know the price of the fish and where to best sell it to make more money.”

The fisherman could also discover new things to do with the fish he has caught in order to develop a new innovation. “Just some simple things like that can absolutely enhance [their life],” Chisholm said.

“And that’s just the beginning, because actually a lot of the best ideas will come from the fisherman if the [software] developer then goes and talks to them,” he said.

Intel however admitted that there are challenges in improving digital literacy in the Philippines such as the geography, internet connectivity, and affordability of computers.

“Some people don’t even have electricity, connectivity, or internet devices, actually a lot, and that whole digital literacy is still a big challenge here in the Philippine,” Chisholm said.

“Its a big challenge but its something we feel passionately about … that’s our challenge to bring these accessible, affordable devices [to remote regions],” he said.

source: technology.inquirer.net

Sunday, December 8, 2013

Software lets blind see via computers


DAGUPAN CITY, Philippines—Crisanta Marcelino, an 18-year-old blind student, used to do research for her assignments by sifting through thick Braille books in her school library.

Aside from having to spend hours reading the Braille pages for her assignments as an Information Technology (IT) student in a private school here, she also had a hard time looking for the right books to read.

Today, she does her research on the Internet, thanks to a screen reader software that has been installed on the computers of the Area 1 Vocational Rehabilitation Center (AVRC) here.

According to the National Statistics Office’s (NSO) 2010 Census of Population and Housing, more than 1.44 million (1.57 percent) of the country’s then 92.1-million population had various forms of disability. A 2002 country profile drawn up by the Japan International Cooperation Agency (Jica) cited a 1996 NSO census report which estimated that 46 percent of Filipino PWDs were blind.

The AVRC, an attached agency of the Department of Social Welfare and Development, caters to persons with disability (PWD) from the Ilocos, Cagayan Valley, Central Luzon and Cordillera regions.

“We are really very happy that we have this software. Before, we could not use our computers and we envied our classmates who had normal vision,” Marcelino said.


Job Access


The software was introduced on Saturday in a forum participated in by IT students and businessmen at the SM City in Rosales, Pangasinan.

Jennifer Garcia, AVRC computer instructor, said the screen reader software, called Job Access with Speech (Jaws), reads everything displayed on the computer screen, enabling a blind user to “see” them.

“The screen reader allows the computer to talk. So visually impaired persons no longer need a monitor and a mouse. All they need is a CPU (central processing unit), a keyboard that serves as their mouse and a speaker or headset,” Garcia said.

The students, she said, first trains on how to use the keyboard and its shortcut keys. After that, they are introduced to different software, including word processing, spreadsheet and slide presentation software.

Social media

“They are also taught how to use social media, like Facebook and Twitter,” Garcia said.

Marcelino said that for two weeks, she had to work hard to understand the American accent of the voice in the software.

“I had a hard time understanding it, especially when it reads Filipino. But now, I’m so used to it and I can understand whatever it says,” Marcelino said.

Garcia said the only hitch in the screen reader software is its cost, which is around P48,000.

But she said there was a Linux-based free software, called nonvisual desktop access (NVDA), that can be downloaded from the Internet.

“But unlike Jaws, which is more user-friendly, the NVDA has limitations. The voice especially is irritating to the ear,” Garcia said.

She said most of the AVRC computers had the NVDA software.

Jersey Mendoza, SM City Rosales manager, said they hosted the forum hoping it would open up opportunities for PWDs, especially the blind.

“In our malls are Internet shops. One way of starting with this is to orient our tenants that there is this software, so that maybe they could allot a slot for PWDs in their Internet cafes,” Mendoza said.

source: technology.inquirer.net

Thursday, December 5, 2013

Tech Tips: Guide to protecting Internet accounts


NEW YORK, United States — Security experts say passwords for more than 2 million Facebook, Google and other accounts have been compromised and circulated online, just the latest example of breaches involving leading Internet companies.

Some services including Twitter have responded by disabling the affected passwords. But there are several things you can do to minimize further threats —even if your account isn’t among the 2 million that were compromised.


Here are some tips to help you secure your online accounts:

— ONE THING LEADS TO ANOTHER:

When a malicious hacker gets a password to one account, it’s often a stepping stone to a more serious breach, especially because many people use the same passwords on multiple accounts. So if someone breaks into your Facebook account, that person might try the same password on your banking or Amazon account. Suddenly, it’s not just about fake messages being posted to your social media accounts. It’s about your hard-earned money.

It’s particularly bad if the compromised password is for an email account. That’s because when you click on a link on a site saying you’ve forgotten your password, the service will typically send a reset message by email. People who are able to break into your email account, therefore, can use it to create their own passwords for all sorts of accounts. You’ll be locked out as they shop and spend, courtesy of you.

If the compromised password is one you use for work, someone can use it to break in to your employer’s network, where there are files with trade secrets or customers’ credit card numbers.

— BETTER PASSWORDS:

Many breaches occur because passwords are too easy to guess. There’s no evidence that guessing was how these 2 million accounts got compromised, but it’s still a good reminder to strengthen your passwords. Researchers at security company Trustwave analyzed the passwords compromised and found that only 5 percent were excellent and 17 percent were good. The rest were moderate or worse.

What makes a password strong?

— Make them long. The minimum should be eight characters, but even longer is better.

— Use combinations of letters and numbers, upper and lower case and symbols such as the exclamation mark. Try to vary it as much as you can. “My!PaSsWoRd-32″ is far better than “mypassword32.”

— Avoid words that are in dictionaries, as there are programs that can crack passwords by going through databases of known words. These programs know about such tricks as adding numbers and symbols, so you’ll want to make sure the words you use aren’t in the databases. One trick is to think of a sentence and use just the first letter of each word — as in “tqbfjotld” for “the quick brown fox jumps over the lazy dog.”

— Avoid easy-to-guess words, even if they aren’t in the dictionary. Avoid your name, company name or hometown, for instance. Avoid pets and relatives’ names, too. Likewise, avoid things that can be looked up, such as your birthday or ZIP code.

One other thing to consider: Many sites let you reset your password by answering a security question, but these answers —such as your pet or mother’s maiden name— are possible to look up. So try to make these answers complex just like passwords, by adding numbers and special characters and making up responses.

— A SECOND LAYER:

Many services offer a second level of authentication when you’re accessing them from a computer or device for the first time. These services will send you a text message to a phone number on file, for instance. The text message contains a code that you need in addition to your password. The idea is that a hacker may have your password, but won’t have ready access to your phone.

Facebook, Google, Microsoft and Twitter are among the services offering this dual authentication. It’s typically an option, something you have to turn on. Do that. It may be a pain, but it will save you grief later. In most cases, you won’t be asked for this second code when you return to a computer you’ve used before, but be sure to decline that option if you’re in a public place such as a library or Internet cafe.

— ONE FINAL THOUGHT:

Change your passwords regularly. It’s possible your account information is already circulating. If you have a regular schedule for changing passwords for major accounts, you reduce the amount of time that someone can do harm with that information.

You’ll need to decide what counts as a major account. Banking and shopping sites are obvious, as are email and social-networking services. It probably doesn’t matter much if someone breaks into the account you use to read newspaper articles (unless it’s a subscription).

And strong passwords alone won’t completely keep you safe. Make sure your computer is running the latest software, as older versions can have flaws that hackers have been known to exploit. Be careful when clicking on email attachments, as they may contain malicious software for stealing passwords. Use firewalls and other security programs, many of which are available for free.

source: technology.inquirer.net

Monday, November 25, 2013

New research aims to teach computers common sense


PITTSBURGH – Researchers are trying to plant a digital seed for artificial intelligence by letting a massive computer system browse millions of pictures and decide for itself what they all mean.

The system at Carnegie Mellon University is called NEIL, short for Never Ending Image Learning. In mid-July, it began searching the Internet for images 24/7 and, in tiny steps, is deciding for itself how those images relate to each other. The goal is to recreate what we call common sense — the ability to learn things without being specifically taught.

It’s a new approach in the quest to solve computing’s Holy Grail: getting a machine to think on its own using a form of common sense. The project is being funded by Google and the Department of Defense’s Office of Naval Research.

“Any intelligent being needs to have common sense to make decisions,” said Abhinav Gupta, a professor in the Carnegie Mellon Robotics Institute.

NEIL uses advances in computer vision to analyze and identify the shapes and colors in pictures, but it is also slowly discovering connections between objects on its own. For example, the computers have figured out that zebras tend to be found in savannahs and that tigers look somewhat like zebras.

In just over four months, the network of 200 processors has identified 1,500 objects and 1,200 scenes and has connected the dots to make 2,500 associations.

Some of NEIL’s computer-generated associations are wrong, such as “rhino can be a kind of antelope,” while some are odd, such as “actor can be found in jail cell” or “news anchor can look similar to Barack Obama.”

But Gupta said having a computer make its own associations is an entirely different type of challenge than programming a supercomputer to do one thing very well, or fast. For example, in 1985, Carnegie Mellon researchers programmed a computer to play chess; 12 years later, a computer beat world chess champion Garry Kasparov in a match.

Catherine Havasi, an artificial intelligence expert at the Massachusetts Institute of Technology, said humans constantly make decisions using “this huge body of unspoken assumptions,” while computers don’t. She said humans can also quickly respond to some questions that would take a computer longer to figure out.

“Could a giraffe fit in your car?” she asked. “We’d have an answer, even though we haven’t thought about it” in the sense of calculating the giraffe’s body mass.

Robert Sloan, an expert on artificial intelligence and head of the Department of Computer Science at the University of Illinois, Chicago, said the NEIL approach could yield interesting results because just using language to teach a computer “has all sorts of problems unto itself.”

“What I would be especially impressed by is if they can consistently say ‘zebra, zebra, zebra’ if they see the animal in different locations,” Sloan said of the computers.

Gupta is pleased with the initial progress. In the future, NEIL will analyze vast numbers of YouTube videos to look for connections between objects.

“When we started the project, we were not sure it would work,” he said. “This is just the start.”

Neither Mountain View, California-based Google Inc. nor the Office of Naval Research responded to questions about why they’re funding NEIL, but there are some hints. The Naval Research website notes that “today’s battlespace environment is much more complex than in the past” and that “the rate at which data is arriving into the decision-making system is growing, while the number of humans available to convert the data to actionable intelligence is decreasing.”

In other words, computers may make some of the decisions in future wars. The Navy’s website notes: “In many operational scenarios, the human presence is not an option.”

NEIL’s motto is “I Crawl, I See, I Learn,” and the researchers hope to keep NEIL running forever. That means the computer might get a lot smarter.

Or it might not.

source: technology.inquirer.net

Tuesday, July 23, 2013

Google drives huge chunk of online traffic


SAN FRANCISCO—Network analytics specialty firm DeepField on Monday said that Google accounts for nearly a quarter of Internet traffic in North America.

“Based on measurements of end devices and user audience share, Google is now bigger than Facebook, Netflix and Twitter combined,” DeepField chief Craig Labovitz said in a blog post.

While popular online video streaming service Netflix has larger bandwidth than Google, peak traffic levels last for a few hours each evening while about 60 percent of all Internet-linked devices exchange information with Google servers in North America every day, according to DeepField.

The analysis included traffic from computer Internet browsers as well as mobile applications and “embedded devices” such as Apple TV, Roku, and videogame consoles, according to DeepField.

source: technology.inquirer.net

Friday, July 19, 2013

New Intel Core processors bring more power, capabilities to digital devices


MANILA, Philippines – In the next generation of computer devices, the distinction between desktops, laptops, and smartphones and tablet computers may be even more blurry as they are now.

This reality now seems imminent with the unveiling recently in the Philippines of new Core processors developed by international computer technology company Intel Corp. These processors are expected to pave the way for computers that have the power and speed of desktop computers, the mobility of laptops, and the ease-of-use of smartphones and tablets.

“It’s not clear anymore what’s a computer, what’s a phone, what’s a tablet, all these three are merging, they’re coming together and the lines are being blurred between consumption devices and productivity devices,” Leighton Philipps, Director of Product Marketing for Intel Asia Pacific, said during the launch.

“The usage model is no longer constrained to the desk, the capability we have on the desktop will be taken beyond the desk, the device will actually change [for] the user rather than the user having to change to the device,” he said.

Improved battery life

The latest family of Core processors boasts a 50 percent improvement in battery life from the previous generation through reduced power consumption. This was the biggest improvement in the history of Intel, Philipps said.

Some computers that will be powered by these new processors can have up to nine hours of active battery life use and can last 10 to 13 days on standby.

This is through the scalable architecture of the processor which allows Intel to create several processor “families” that range from a power consumption of 6 watts up to 95 watts, Philipps said.

“What this means is that there is not a computing form factor on the planet that cannot be delivered using this microarchitecture,” he said.

“The fourth generation core is the first time that we have been able to compress the thermal and the wattage down so much that we can now move that processor from under the keyboard to behind the screen,” Philipps added. “We can bring the best of the PC and the best of the tablet into one device.”

Among the computer devices that the fourth generation core will power are ‘‘2-in-1s’’ or laptops that can convert into a tablet by separating the screen from the rest of the body or by folding the screen back.

Philipps said that the spread of touch-enabled devices was driving the change in computers. By the end of the year, 50 percent of devices produced that are not tablets or smartphones will already be touch-enabled.

With the new fourth generation core processors, “100 percent of every Ultrabook built will be touch enabled,” Philipps said.

No compromise

Traditionally, Philipps said there was a hard time balancing between the “trifecta” of form factor, battery life, and performance of computers.

“Historically it was hard to have all three; if you wanted a lot of performance some of your battery life went down,” Philipps said.

“With the fourth generation … any design of product with this microarchitecture does not have to make a compromise, it has the form factor, performance graphics, battery life,” he said.

This was achieved because of the fourth generation’s system-on-chip design that integrates the video processor into the processor eliminating the need for a separate video card and speeding up the encoding process in creating videos.

The latest generation processors will also allow for features such as voice control, movement and gesture recognition, as well as facial recognition that can remember the user’s face even as he grows older, Philipps said.

Industrial application

The new processors will also find use in various industrial sectors such as the health and retail sectors, Intel said.

Computer manufacturers will be able to “design thinner, lighter, and sleeker medical devices such as portable ultrasound equipment and patient monitors or wearable PC’s for fire and police department employees,” Intel said in a statement released during the launch.

“In industrial market segments, this also enables support for smaller form factors in computer intensive applications while helping equipment manufacturers address new environments and save factory floor space,” it said.

Philipps said that removing the keyboard and making these industrial machines fully touch-enabled could make their operation “more natural with touch and even with voice and gesture.”

source: technology.inquirer.net




Saturday, March 16, 2013

How to Keep Your Child Safe on an iPad


Child proofing is a rite of passage for parents with young children: locks on cabinet doors, gates on stairs and clips on book shelves. And this safety-first mentality needs to extend to kids toys, experts warn, especially the iPad.

“It’s very common for kids to use iPads these days more so than using computers,” says Jinny Gudmundsen, author of iPad Apps For Kids For Dummies. “Parents unfamiliar with the technology open it up, turn it on and don’t realize they can customize it to become more user friendly to kids.

Children as young as one are learning to swipe their way to fun and games on tablets, but parents need to create safeguards to make sure they aren’t exposed to inappropriate content.

Here are ways to ensure your child and iPad are safe from each other.

Safety Tip No.1: Disable In-App Purchases

Apps are the heart and soul of tablets and they can be easily downloaded in a matter of seconds—which is convenient, until kids starting buying apps without parent consent.  Not only can this expose young users to unsuitable content, it can also rack up a  big bill.

And just because an app is free, that doesn’t mean they can’t rack up a big tab. Gudmundsen says many of the free apps make money by giving players the option to spend real money on things in the game. Those little purchases can end up to a hefty bill. The problem has become so widespread that it sparked a class action lawsuit. Late last month Apple settled a class-action lawsuit related to app purchases made by children without the consent of the account holder. Apple agreed to provide a $5 iTunes store credit to as many as 23 million people who were affected, according to Reuters.  Those that claimed $30 or more were offered a cash refund from instead.

“These in-app purchases are frequently confusing to kids who have difficulty distinguishing between buying things with in-game currency and buying them with real money,” says Gudmundsen. To prevent in-app purchases, parents need to not only enable a password but close the 15-minute window where another purchase can be made without typing in your password.

Parents can even choose to block In-app purchases altogether.  “If you opt to let your kids explore these games, make sure the In-App Purchases option is ‘Off,’ or at least make sure that you set the password requirement to ‘Immediately’,” she recoommends.

Safety Tip No.2: Set Media Parameters

The Internet offers a wealth of information—both good and bad.  but it. To prevent a child from accessing anything they shouldn’t when using the iPad, parents need to set restrictions.

“The iPad allows you to set the age appropriateness of the media your kids use,” Gudmundsen says. “The setting you want is called ‘Allowed Content’, and you’ll find it under ‘Restrictions’.

Parents can restrict music and podcasts, movies, TV shows, books and apps. Parents can choose age categories for apps including 4+, 9+, 12+ and 17+. If the parent chooses 4+ it’s essentially a G rating while 17 + can be considered a R rating.   

Safety Tip No.3: Turn Off Location Services  

Many apps ask for or rely on a user’s location, but experts say not to allow this if kids use the device.

To disable this feature on the iPad, go to ‘Settings’ and then turn off ‘Location Services’’.  This prevents strangers from being able to locate a child user and retailers from sending targeted advertisements to kids.

This restriction doesn’t prevent using any app that requires a location, if an apps needs it, say for instance one for star gazing , Gudmundsen says the app will alert the user to enable the location feature. Just remember to disable it when you are done.

Safety Tip No.4: Buy a Protective Cover

iPads are expensive and kids can be destructive, so experts advise parents find a sturdy cover to protect the gadget. These covers cost anywhere from around $30 to $80, and can be found at electronics retailers and/or through Apple. “Children drop things,” says Gudmundsen. “A protective cover puts a lot of padding around the iPad.”

source: foxbusiness.com

Monday, November 26, 2012

Cambridge to study technology’s risk to humans


LONDON – Could computers become cleverer than humans and take over the world? Or is that just the stuff of science fiction?

Philosophers and scientists at Britain’s Cambridge University think the question deserves serious study. A proposed Center for the Study of Existential Risk will bring together experts to consider the ways in which super intelligent technology, including artificial intelligence, could “threaten our own existence,” the institution said Sunday.

“In the case of artificial intelligence, it seems a reasonable prediction that some time in this or the next century intelligence will escape from the constraints of biology,” Cambridge philosophy professor Huw Price said.

When that happens, “we’re no longer the smartest things around,” he said, and will risk being at the mercy of “machines that are not malicious, but machines whose interests don’t include us.”

Fears that machines could overtake humans have long been the subject of science fiction — the computer HAL in the movie “2001: A Space Odyssey,” for example, is one of film’s best-known computer threats.

Price acknowledged that many people believe his concerns are far-fetched, but insisted the potential risks are too serious to brush away.

“It tends to be regarded as a flakey concern, but given that we don’t know how serious the risks are, that we don’t know the time scale, dismissing the concerns is dangerous. What we’re trying to do is to push it forward in the respectable scientific community,” he said.

While Price said the exact nature of the risks is difficult to predict, he said that advanced technology could be a threat when computers start to direct resources towards their own goals, at the expense of human concerns like environmental sustainability.


He compared the risk to the way humans have threatened the survival of other animals by spreading across the planet and using up natural resources that other animals depend upon.

Price is co-founding the project together with Cambridge professor of cosmology and astrophysics Martin Rees and Jann Tallinn, one of the founders of the internet phone service Skype.

The university said Sunday the center’s launch is planned next year.

source: technology.inquirer.net

Monday, November 19, 2012

Sony issues consumer alert on hacked PS3 units

Hacked PlayStation 3 units have been prevalent and a big concern for Sony Computer Entertainment. Hackers who have tried to crack the machine have met many difficulties in getting through the block that allows users to sign in the PlayStation Network with a “jailbroken” console in the years following the system’s release. 
 
Recently,  LV0 keys had reportedly been released online by hackers, enabling hacked units to access PSN content with the assistance of a PC. It’s a legitimate concern that Sony has addressed via their official website, issuing a consumer alert the addresses PlayStation Network and Sony Entertainment Network Services users.
 
Sony’s Notice Statement from the US Playstation website is as follows:
 
“Dear valued PlayStation 3 customers,
 
Unauthorized software for the PlayStation 3 system was recently released by hackers. Use of such software violates the terms of the “System Software License Agreement for the Playstation 3 System” and the “Terms of Services and User Agreement” for the PlaStation Network/ Sony Entertainment Network and its Community Code of Conduct provisions.
 
Violation of the System software License Agreement for the PlayStation 3 system invalidates the consumer’s right to access that system. Consumers running unauthorized or pirated software may have their access to the PlayStation Network and access to Sony Entertainment Network services through PlayStation 3 system terminated permanently.
 
To avoid permanent termination, consumers must immediately cease using and delete all unauthorized or pirated software from their PlayStation 3 systems.
 
In order to help provide a safe, fair, online environment, consumers who we belive violate “Terms of Services and User Agreement” for the PlayStation Network/ Sony Entertainment network or the applicable laws or regulations of their country or region risk having access to the PlayStation Network and access to Sony Entertainment Network services terminated permanently.”
 
 
In summary: those with hacked units and accessing the PSN or Sony Entertainment Network will get their accounts terminated immediately. PlayStation users best heed this bit of news.— TJD, GMA

source: gmanetwork.com