Skip to main content

Posts

Showing posts with the label News

Cisco’s Managed Threat Defense

  Managed Threat Defense provides dynamic real-time detection and remediation against known vulnerabilities as well as advanced persistent threats. Cisco provides the hardware, software and expertise to deliver threat defense in a subscription-based model via a global network of security operation centers. Cyber Threat Defense exposes advanced threats using the following automated capabilities: NetFlow analysis—Identifies suspicious network traffic patterns inside the network File analysis—Performs reputation scoring and dynamic analysis of files traversing the network Deep-packet inspection—Identifies exploits that can lead to system compromise Log analysis—Uncovers stealthy activity that may be spread across days, weeks, or months.   Source: Cisco.com & Youtube

Touch Screens of the Future

Carnegie Mellon's Chris Harrison demonstrates TouchTools and TapSense, tablet apps he built to explore new ways of that people might interact with screens in the future. Source: YouTube

Bluetooth Ring to Control Your Devices

  The Nod ring is a Bluetooth-enabled gesture controller that connects to your smartphone to accomplish a number of input and controller tasks all by using natural motions with your finger. In addition extending the capabilities of your smartphone, the ring can also be connected to other smart devices, such as a smart television and other Internet-connected devices like the Nest. If a device doesn't have Bluetooth capability, you can connect the ring to your smartphone, which will then connect to the device via Wi-Fi. Read more

So, What is MHL?

  MHL Stands for ‘Mobile High-Definition Link’ . It is an industry standard for a mobile audio/video interface that allows consumers to connect mobile phones, tablets, and other portable consumer electronics (CE) devices to high-definition televisions (HDTVs) and audio receivers. The MHL 3.0 standard supports up to 4K (Ultra HD) high-definition (HD) video and 7.1 surround-sound audio, including TrueHD and DTS-HD, while simultaneously charging the connected device. MHL-enabled products include adapters, automotive accessories, AV receivers, Blu-ray Disc players, cables, DTVs, monitors, projectors, smartphones, tablets, TV accessories, and more. Key Features of MHL Technology Real Plug & Play Fast Charging Greater than 900mA power to charge your mobile device Brilliant Resolution HD display with up to 1080p60 video Immersive Audio 8-channel sound Remote Control Interoperable remote control features to navigate your apps on the big screen No Lag Ideal for playing music, vide...

Android Powered Cars

  The first Android-connected cars are planned for launch by the end of 2014. The alliance is also developing new Android platform features that will enable the car to become a connected Android device. It would allow the apps and music on Android smartphones and tablets to work better with onboard car systems. Google is inviting more companies to join the OAA initiative and help it build a common platform” for the road. Click the image for more / Source

Firefox OS

iOS and Android are great, but they each have their own rules and policies that certainly inhibit the creative efforts of developers. Mozilla has since decided to build a new mobile operating system from scratch, one that will focus on true openness, freedom and user choice. It’s Firefox OS . Firefox OS is built on Gonk, Gecko and Gaia software layers – for the rest of us, it means it is built on open source, and it carries web technologies such as HTML5 and CSS3 . Click the image for more info:

Parallella – Supercomputer in $99?

  Making parallel computing easy to use has been described as "a problem as hard as any that computer science has faced". With such a big challenge ahead, we need to make sure that every programmer has access to cheap and open parallel hardware and development tools. Inspired by great hardware communities like Raspberry Pi and Arduino, we see a critical need for a truly open, high-performance computing platform that will close the knowledge gap in parallel programing. The goal of the Parallella project is to democratize access to parallel computing. If we can pull this off, who knows what kind of breakthrough applications could arise?  Maybe some of them will even change the world in some small but positive way. For more info click the image below -

CCIE Voice Re-certification!

 

Fundamentals - Unified Computing System

 

Samsung ‘Youm’ – Flexible OLED Screen

 

What most schools don't teach – Code

 

Latest Technology - Instant Touchscreen Kit

Demo of Cisco Cius

Cisco CEO John Chambers demos the Cisco Cius Part -1 Part –2

Cisco Cius

A mobile collaboration tablet for business Part –1 Part –2

Remote network management via Facebook and Twitter?? ….. wow!

Enterasys Networks is offering a new technology that enables remote network management via consumer and enterprise social media services, including Twitter, Facebook, LinkedIn and Salesforce.com's Chatter. Administrators can not only receive tweets and messages about port usage and oversubscription from devices on their network, they can tweet commands back to the devices in natural human language rather than via command line interface (CLI). Enterasys' project "isaac" is software that integrates with the company's Network Management System (NMS) and allows network managers to create profiles on consumer and enterprise social media services for their Enterasys network switches, routers and wireless infrastructure. The devices can then send messages through those services to a whitelist of network administrators about any number of preprogrammed events, such as port usage changes, access point oversubscription and device failures. Network managers can also progra...

Microsoft loses Word patent battle

Software giant Microsoft finally lost its battle over Word patent with Toronto's i4i Inc. <strong>Industry: </strong>Computer Hardware and Software <strong>2007 Sales: </strong> $51 billion Despite years of antitrust battles, the Redmond (Wash.) giant still accounts for almost 9 out of every 10 computer operating systems. Yet analysts took note when Windows&#8217; market share dipped below 90% in December. The Mac OS has been making slow but steady gains, partly due to the unpopularity of Microsoft&#8217;s latest operating system, Vista. Internet Explorer, another blockbuster Microsoft product, commands 70% of the Web browser market, down from 95% in early 2003. Yet industry analysts don&#8217;t think Microsoft (MSFT) has reason to panic, especially with Windows 7 and a new version of IE on the horizon. " border="0" alt="<strong>Location: </strong> Redmond, Wash. <strong>Industry: </strong>Computer Hard...

Low-cost laptops set to roll out after 6 years

Six years after it was conceived, the first lot of 10,000 laptops – the HRD ministry calls it low-cost access-cum-computing device — would be delivered to IIT-Rajasthan in late June, and over the next four months 90,000 more would be made available at Rs 2,200 apiece. The announcement was made on Wednesday at the state education ministers' conference. Ministry officials said once the supply of one lakh devices is made, each state would be given 3,000 pieces. The Centre would subsidize 50% of the cost. Effectively, a student would have to pay Rs 1,100 for the gadget. Officials said manufacturing of one lakh laptops has been done in India. As for the cost escalation from the earlier promised price of Rs 1,500, officials said it is due to increase in input cost. "But once more orders are placed, the price would be renegotiated and brought down to Rs 1, 500," an official said. IIT-Rajasthan is the nodal institute for conceiving and monitoring the progress of manufacturing ...

Facebook extends facial recognition tech

Facebook has rolled out facial recognition technology which moni tors people's photos in the UK, in a move which has made a security expert question the privacy implications of the service.   The social networking site is now searching its servers for photos that look like UK Facebook users, and asking friends of those users to tag the photos, according to Sophos senior technology consultant Graham Cluley.   "Facebook not only gathers information about what you do, but also what you look like," Cluley told ZDNet UK on Tuesday.   Users have found that Facebook had enabled photo recognition outside of the US in the last few days, said Cluley, who criticized the company for enabling photo recognition by default.   "Unfortunately, once again, Facebook has added a new feature to share additional information about its users, and turned it on by default," said Cluley. "Most Facebook users still don't know how to set their privacy options safely, finding the wh...

Cyber Crime–Are you safe?

P ictures, PowerPoint slides, PDFs, even innocuous ads on legitimate sites can carry malware that will install itself on your PC by exploiting flaws in the browser you use. Undetected by anti-virus software, robot software can piggy-back on bank transactions, avoid anti-fraud detections systems, and send money to "mule" accounts operated by criminals in Eastern Europe. That's exactly what happened to 3,000 bank customers when online thieves stole $1 million dollars before they were caught last July by M86, a networking security firm.   Unsuspecting customers visited legitimate-looking websites to download, say, a screen saver. Others received an email with pictures of cute animals or a PowerPoint presentation with a patriotic theme and, responding to heartfelt exhortations to forward it or risk a lifetime of bad luck, they obediently sent it to friends. Read more/Source

Hackers attack another Sony network, post data

BOSTON/NEW YORK: Hackers broke into Sony Corp's computer networks and accessed the information of more than 1 million customers to show the vulnerability of the electronic giant's systems, the latest of several security breaches undermining confidence in the company. LulzSec, a group that claims attacks on US PBS television and Fox.com, said it broke into servers that run Sony Pictures Entertainment websites. It published the names, birth dates, addresses, emails, phone numbers and passwords of thousands of people who had entered contests promoted by Sony. "From a single injection, we accessed EVERYTHING," the hacking group said in a statement. "Why do you put such faith in a company that allows itself to become open to these simple attacks?" The security breach is the latest cyber attack against high-profile firms, including defense contractor Lockheed Martin and Google Inc. LulzSec's claims came as Sony executives were trying to reassure US lawmakers a...