Sunday, June 21, 2015

Robots could replace immigration officers under new technology presented in Paris

 visitor tries French manufacturer Thales'border control system with automated biometric at the International Paris Airshow at Le Bourget
A visitor tries French manufacturer Thales 'border control system with automated biometric at the International Paris Airshow at Le Bourget Photo: AFP
Robots will replace immigration officers if new airport technology unveiled at the Paris Air Show this week is adopted.
The futuristic designs of French electrical systems company Thales promises to go beyond enabling passengers to bypass check-in desks.
It has designed a machine that scans passports prints boarding passes, and – the real novelty - records an image of the passenger's face and iris, sharing all the information with computers around the airport.
The images are already in the system when the passenger arrives at the immigration desk, allowing a tall, white robot to automatically confirm the person's identity without the need for human border staff.
"You would only need one agent for every four or five machines," Pascal Zenoni, a Thales manager presenting the equipment at the air show, told AFP.

Robots will replace immigration officers if new airport technology unveiled at the Paris Air Show this week is adopted
"These systems can free up staff for the police and create more space in the airport," he added.
The passenger's face is also printed in encrypted form on the boarding pass so that it can be scanned by staff at the gate for a final identity check.
Thales hopes to build on its expertise as the maker of biometric passports and ID cards for 25 countries, including France.

Brainwave-reading headset lets you control your TV with your mind

The low-cost brainwave reading headset in action
The low-cost brainwave reading headset in action 
Mind-controlled TV may sound like the stuff of science fiction, but the BBC has been testing a new headset that it claims can translate brain activity into actions.
The prototype brainwave-reading headset allows the wearer to open an experimental version of BBC iPlayer and select a TV programme using their mind alone.
Developed by Shoreditch-based user experience company This Place, the headset has one small sensor that rests on a user’s forehead and another on a clip that attaches to the ear. These sensors measure electrical activity in the brain.

Facebook isn't dying. It's just changing

A global map of interactions between Facebook users created in 2010..what about 2015? Almost everywhere.
Reports of Facebook's death are greatly exaggerated, says Rhiannon Williams. We just prefer to stalk over sharing
Every few months, a report is published suggesting Facebook is in decline. A notable study from researchers at Princeton University published earlier this year declared the social network would lose 80 per cent of its users and die out “like the bubonic plague”. Another from YouGov branded Facebook and rival Twitter's popularity in decline in June, stating a lack of interest, concerns over privacy and advertising fatigue among the key reasons.
Yet for all this doom-mongering, are any fewer of us using Zuckerberg's decade-old platform? GlobalWebIndex has published a comprehensive report on social media use across 32 global markets, encompassing some 170,000 internet users in the largest on-going study into the life of the digital consumer.
Facebook was the only network to see a drop in active usage among its 16-24 year-old users, of 0.5 per cent. Since the start of 2013, sharing photos and messaging friends has fallen by around 20 per cent, according to the report. While more than four fifths (83 per cent) of online adults have Facebook accounts, only 47 per cent consider themselves active users, a decrease of around 100 million users between the beginning and end of 2014.
As it stands, this doesn't look great for Facebook. While it may have more global members (some 867 million), YouTube receives more traffic, with 85 per cent of online adults outside of China regularly visiting the site. YouTube's membership numbers may be lower at 656 million, but it beats Facebook's 76 per cent rate of regular visitation by a comfortable margin.
What this suggests is that users are flocking to YouTube with a specific purpose in mind (to watch funny, educational or just plain weird videos), while Facebook is having difficulty encouraging the users it does have to actively use the platform.

How hackers took over my computer

Online threat: hacking has become more commonplace.
Online threat: hacking has become more commonplace. Photo: PHOTOLIBRARY.COM
Whether you're a nation or a citizen, cyber security is an ever-growing issue – new hacks or data breaches emerge daily, in which people's information is exposed or leaked, from bank details to intimate photographs. But is the threat of being hacked something that you or I really need to worry about? And if someone did hack into your computer, what would they be able to do with the information they found?
Over the summer I decided to put these questions to the test. I got in touch with an 'ethical hacker' called John Yeo, who works for cyber security firm Trustwave, and asked him to try and hack me.
The job of an ethical hacker is to do 'penetration testing' for companies. This means they adopt the role of a real hacker and use the same tools that real hackers use to try and break into a company's computer systems, to identify vulnerabilities. The ethical hacker then tells the company what they have found, so that it can fix the vulnerabilities before a real hacker discovers and exploits them.
Hacking an individual is quite a different matter, and John warned me that the attempt may be unsuccessful. Apart from anything else, I knew that it was coming, so would inevitably be more cautious than usual about opening suspicious emails. He also explained that most hackers would 'spread their bets' and target large numbers of people in one go, rather than just one, to increase their chances of success. However, he said he would give it a go.

CONTACT US

PHONE NUMBER:
  1. 0789-795370
  2. 0759-701360

THE MAGICS OF GOOGLE DRIVE

Google Drive is the cloud storage is the place where you can store any file, Google Drive resembles Dropbox and Skydrive in many ways but integrates seamlessly with Gmail, is synchronized with Google Docs and Google +, and, most importantly, allows you to store all your files in one single place that is accessible at all times!
 Benefits of Google Drive
 Google Drive lets you send large files to your colleagues, clients and friends directly from your Gmail account. When you join Google Drive, you automatically have 15 GB of storage space. It is also possible to buy more GO at a low cost. For Google Drive prices, click here.
 Google Drive allows you to access your files remotely. Indeed, Google Drive can be synchronized with your computer. With Drive, all your files become available on the web. You have a big presentation coming up? No need for a USB key!
Read this article to learn how to synchronize your computer with Google Drive.
 Google Drive has its own mobile application which gives you access to your files on your iPhone or smartphone, no matter where you are!

Monday, June 15, 2015

IMPORTANCE OF COMPUTER SECURITY



  Computer is a delicate thing, and this is due to the things that are stored in it, such as data is very sensitive case when comes to security issues because in data so many important information are found, financial documents, company’s technologies, people’s privacies  and so much more. Therefore there must be a better of running computer security so that one may be able;
   Industrial and Business competitions;  people steal other company’s secrets so that they may copy and offer similar services or something more than what they copied.
  To compact frauding; stealing money from financial institutions like bank
  To prevent data destruction and stealing; Unprotected computer is exposed to attackers where sometimes they destroy data stored in it, this may lead loss to the company or an individual if the data were so sensitive.
To prevent corruption of operating systems; some OS corruptions are due to malware condacts.
  To prevent Poor network signal and speed; Some malwares which are specifically for consuming network bandwidth such as worm which eventually slow down the network speed and signal, hence unrealiable network services may be encountered.

COMPUTER VULNERABILITIES

   It refers to inability of a computer to withstand hostile environment such as cyber attacks, vulnerability occurs when conducive environment for attackers are created that is proper security measures are not considered. Such environments are;
 Working with operating systems(OS) with  little security technology; There some OS’s they have little security technology which makes easy for attackers to have access to the computers running that particular OS.

The usage of free ant-malware;