Saturday, 30 September 2017

IBM unveils a new high-powered analytics system for fast access to data science

IBM unveils a new high-powered analytics system for fast access to data science
IBM, announced the Integrated Analytics System, a new unified data system designed to give users fast, easy access to advanced data science capabilities and the ability to work with their data across private, public or hybrid cloud environments.
The system, which comes with a variety of data science tools built-in, allows data scientists to get up and running quickly to develop and deploy their advanced analytics models in-place, directly where the data resides for greater performance. And because it is based on the IBM common SQL engine, clients can use the system to easily move workloads to the public cloud to begin automating their businesses with machine learning. In fact, because the popular database engine is used across both hosted and cloud-based databases, users can move and query data across multiple data stores, such as the Db2 Warehouse on Cloud, or Hortonworks Data Platform.

Monday, 25 September 2017

Ever Wonder How Facebook Picks your ‘People You May Know’ ?


Ever Wonder How Facebook Picks your ‘People You May Know’ ?
It might seem that Facebook works in mysterious ways when it comes to suggested friends. But there is a set algorithm that Facebook follows to gather the suggestions.

It happens ever so often that you save the contact of a new person on your phone and the next thing you know is that you see that person pop up on your Facebook suggested friends list. Though it might seem like sorcery for a moment, trust me it is not. Facebook has some methods of doing it among others.

Besides this, don’t be surprised if Facebook suggests some long lost friend you hardly even remember. Facebook’s official Help Center page says that ‘People You May Know’ suggestions are assimilated from things like having friends in common, or mutual friends, this is the most common reason for suggestions.

Monday, 18 September 2017

Introducing Tez, a mobile payments and commerce app from Google


Introducing Tez, a mobile payments and commerce app from Google

Introducing Tez, a mobile payments and commerce app from Google

After several weeks of speculation and leaked details, today Google officially unveiled its first big foray into mobile payments in Asia. The Android and search giant has launched Tez, a free mobile wallet in India that will let users link up their phones to their bank accounts to pay for goods securely in physical stores and online, and for person-to-person money transfers with a new twist: Audio QR, which uses ultrasonic sounds to let you exchange money, bypassing any need for NFC.

“Send money home to your family, split a dinner bill with friends, or pay the neighbourhood chaiwala. Make all payments big or small, directly from your bank account with Tez, Google’s new digital payment app for India,” Google notes in its information portal about the new app.

Friday, 8 September 2017

From Bad To Worse: The Future Of Cyberattacks

From Bad To Worse: The Future Of Cyberattacks
Cyberattacks continue to grab attention, with large-scale breaches disrupting some of the world’s largest companies. Britain’s National Health Service, FedEx, Honda, Merck, Mondelēz International, Nissan, Renault, and Telefónica are just a few on a growing list. While these companies are high-profile targets, the intent is changing, and so is the victim.
No longer are hackers bent on embarrassing companies by overloading their systems to inhibit services through distributed denial of service attacks or defacing their websites. Hacking has evolved from a disruptive enterprise to a lucrative one, and ransomware has emerged as a growing business.

Sunday, 3 September 2017

All You Need to Know About Solid-State Drives


All You Need to Know About Solid-State Drives


If you are in two minds about buying an SSD, you’ve come to the right place! This post has all you need to know about SSDs, so read on and decide for yourself if they are worth your money.
What are solid-state drives?

A solid-state drive is a storage device that stores data persistently using integrated circuit assemblies as memory. An SSD carries out the same functions as that of an HDD, but in a more efficient and direct manner.



Friday, 25 August 2017

Top 10 Hacking Methods


Top 10 Hacking Methods
Balabit, a leading provider of contextual security technologies, today announced its recent CSIReport. 494 IT security practitioners participated in the research that highlights the Top 10 Most Popular Hacking Methods which aims to help organisations to understand which methods or vulnerabilities attackers are using the most – or taking advantage of – when they want to get sensitive data in the shortest time. The key finding of the survey is that outsiders want to become insiders with the least possible effort, and insiders help them do so – mostly accidentally.

Tuesday, 22 August 2017

Android Oreo today launched here are the list of features


Android Oreo today launched here are the list of features
Today, Google had officially introduced Android 8.0 Oreo, the latest release of the platform–and it’s smarter, faster and more powerful than ever. It comes with new features like picture-in-picture and Autofill to help you navigate tasks seamlessly. Plus, it’s got stronger security protections and speed improvements that keep you safe and moving at lightspeed. When you’re on your next adventure, Android Oreo is the superhero to have by your side (or in your pocket!).

Saturday, 19 August 2017

Artificial intelligence based system warns when a gun appears in a video

Artificial intelligence based system warns when a gun appears in a video
Scientists from the University of Granada (UGR) have designed a computer system based on new artificial intelligence techniques that automatically detects in real time when a subject in a video draws a gun.


Their work, pioneering on a global scale, has numerous practical applications, from improving security in airports and malls to automatically controlling violent content in which handguns appear in videos uploaded on social networks such as Facebook, Youtube or Twitter, or classifying public videos on the internet that have handguns.

Sunday, 13 August 2017

5 Announcements from the 2017 Microsoft Event

5 Announcements from the 2017 Microsoft Event
Soon Microsoft will be riding Apple’s coattails to the bank. At this year’s Microsoft Event in Redmond, Washington, Microsoft showcased its visionary outlook on Windows as a platform with powerful introductions to the Surface Studio, the Surface Book, and the future of HoloLens technology in the hands of consumers.


Let’s recap five of the biggest – and let’s face it, most awesome – announcements from Microsoft’s headquarters.

Wednesday, 9 August 2017

Top Five Worst Viruses For the Computers.




Top-Five-Worst-Viruses-For-the-Computers.


Top Five Worst Viruses For the Computers.

we all are familiar with the pain of computer viruses. It attaches itself to a program or file, enabling it to spread from one computer to another, leaving infections as it travels. Almost all viruses are attached to an executable file, which means the virus may exist on your computer, but it actually cannot infect your computer unless you run or open the malicious program. These viruses can affect your computer in a very bad way as it can slow down the performance, might corrupt your system files, make some programs faulty or corrupt or just damage your boot sector creating problems when you boot into the windows. Computer viruses have flooded the computer user for a long time now. Here are five most dangerous and Worst Viruses For the Computers.

Thursday, 27 July 2017

Improving disease prediction with Big Data analytics

A better approach to disease prediction through big data analytics
Big data holds great promise to change health care for the better. However, much of the technology that will someday transform health care and its delivery is not yet mature enough for hospitals and other systems to use.

Sunday, 23 July 2017

11 hidden WhatsApp features

11 hidden WhatsApp features
Whether you're just starting to use WhatsApp or are a years-long addict, you're probably missing out on a few of these helpful, hidden features.

1. Format message text on demand

WhatsApp lets you bold, italicize or strike through text on the fly. To do so, you'll need to add a couple of special characters before and after whatever it is you want to format.

Friday, 14 July 2017

Why Home Network Is 192.168.0.1 AS Default Gateway ?

Why Home Network Is 192.168.0.1 AS Default Gateway ?

Someone recently asked me why their wireless routers always had a default IP address of 192.168.0.1 and I really could not come up with a good answer! Being an IT guy myself, I was obviously irritated by the fact that I hadn’t really thought about something that’s in my face pretty much every day before.

Saturday, 8 July 2017

Artificial intelligence and the coming health revolution

Your next doctor could very well be a bot. And bots, or automated programs, are likely to play a key role in finding cures for some of the most difficult-to-treat diseases and conditions. Artificial intelligence is rapidly moving into health care, led by some of the biggest technology companies and emerging startups using it to diagnose and respond to a raft of conditions.



Tuesday, 27 June 2017

New IoT malware targets IP cameras via known flaw

New IoT malware targets IP cameras via known flaw

At least 1,250 camera models produced by a Chinese manufacturer possess the bugs, the researcher went on to claim.In April, Trend Micro noticed a new malware that spreads by exploiting the same products via the recently disclosed flaws. The security firm estimates that about 120,000 cameras are vulnerable to the malware, based on Shodan, a search engine for internet-connected hardware. The Persirai malware is infecting the cameras to form a botnet, or an army of enslaved computers. These botnets can launch DDoS attacks, which can overwhelm websites with internet traffic, forcing them offline. Once Persirai infects, it'll also block anyone else from exploiting the same vulnerabilities on the device. Security firm Qihoo 360 has also noticed the malware and estimated finding 43,621 devices in China infected with it. Interestingly, Persirai borrows some computer code from a notorious malware known as Mirai, which has also been infecting IoT devices, such as DVRs, internet routers, and CCTV cameras, but by guessing the passwords protecting them.