Relax with Nature

Friday, April 17, 2020

Top 10 emerging technologies of 2019

The Internet of Things (IoT) is the emerging technology offering the greatest opportunities to create new business and revenues, according to CompTIA's second annual Top 10 Emerging Technologies report, released Monday.
The 10 technologies named in the report were ranked according to the near-term business and financial opportunities each creates for IT firms and other business technology companies, and selected by the organization's Emerging Technology Community.

1. IoT     { Internet of Things}

IoT is driving business changes by providing the data needed to improve marketing, increase sales, and decrease costs, the report found.
"Everybody in the technology world, as well as many consumers, is hearing the term Internet of Things," Frank Raimondi, a member of the CompTIA Emerging Technology Community leadership group who works in strategic channel and business development for Chargifi, said in a press release.
However, "to say it's confusing and overwhelming is an understatement," he added. "IoT may mean many things to many people, but it can clearly mean incremental or new business to a channel partner if they start adding relevant IoT solutions with their existing and new customers. More importantly, they don't have to start over from scratch."

2. Artificial Intelligence (AI)

AI is already significantly impacting the way customers interact with businesses via intelligent websites and bots, and these tools are becoming increasingly commoditized and integrated into daily work, the report noted.
"The largest impacts across all industries—from retail to healthcare, hospitality to finance—are felt when AI improves data security, decision-making speed and accuracy, and employee output and training," Maddy Martin, community vice chair and head of growth and education for Smith.ai, said in the release. "With more capable staff, better-qualified sales leads, more efficient issue resolution, and systems that feed actual data back in for future process and product improvements, companies employing AI technologies can use resources with far greater efficiency. Best of all, as investment and competition increase in the AI realm, costs are reduced."

3. 5G

The rise of 5G networks is increasing our ability to move, manipulate, and analyze data across wireless platforms, according to CompTIA. As 5G rolls out more fully in the coming years, it will drive the development of more complex apps to solve problems and increase growth across industries.
"The development and deployment of 5G is going to enable business impact at a level few technologies ever have, providing wireless at the speed and latency needed for complex solutions like driverless vehicles," Michael Haines, community chair and director of partner incentive strategy and program design for Microsoft, said in the release. "Additionally, once fully deployed geographically, 5G will help emerging markets realize the same 'speed of business' as their mature counterparts. Solution providers that develop 5G-based solutions for specific industry applications will have profitable, early-mover advantages."

4. Serverless computing

Serverless computing allows organizations to create a NoOps IT environment that is automated and abstracted from underlying infrastructure, reducing operational costs and allowing businesses to invest in developing new capabilities that add more value, the report found.
Serverless computing was new on the list this year, along with robotics, replaced quantum computing, and automation, CompTIA noted.

5. Blockchain

More organizations are exploring and implementing blockchain to solve the increased need to secure and manage transactions across the internet.
"Blockchain came down crushing from its peak of hype cycle, and that's probably for the best," said Julia Moiseeva, a member of the community's leadership group and founder of CLaaS (C-Level as a Service) Management Solutions Ltd, in the release. "Now that the luster of novelty and furor of the masses are gone, the dynamic of work around blockchain took a complete U-turn, again, for the best."

6. Robotics

Robotics is automating routine processes by using machines to make businesses faster, less expensive, and more efficient, the report found.

7. Biometrics

Biometrics—including face, fingerprint, and retina scans—are becoming mainstream methods for verifying identity. These methods will form the secure foundation for solutions delivered by IT companies moving forward, CompTIA said.

8. 3D printing

3D printing offers a solution for the low volume manufacturing of complex parts, as well as fast local production of difficult-to-find products, the report noted. As more affordable products become available, opportunities for this industry will continue to grow, it added.

9. Virtual reality (VR)/Augmented reality (AR)

Using VR, AR, mixed reality, AI, and sensor technologies can help organizations improve operational efficiency and individual productivity, according to the report.

10. Drones

Drones enable robotic automation with fewer geographical restrictions, the report noted. Opportunities for development and integration are high for this market, it added.
   Source: techrepublic.com      By: 

Thursday, July 19, 2018

Wednesday, June 13, 2018

NASA Live - Earth From Space (HDVR) ♥ ISS LIVE FEED #AstronomyDay2018 | ...

NASA Live - Earth From Space (HDVR) ♥ ISS LIVE FEED #AstronomyDay2018 | ...

Wednesday, February 1, 2017

How to Find Out Who’s Tracking You Through Your Smartphone





How to Find Out Who’s Tracking You Through Your Smartphone

How to Find Out Who’s Tracking You Through Your Smartphone

Safety should always be our top priority. With the help of just a few short codes, you can find out more about the settings of your phone and work out whether or not your messages and information are protected and whether you’re being tracked.
Bright Side has gathered together some of the most useful and important codes for smartphones all in one article, together with some instructions for those who’re worried about being tracked.
With this code, you can find out whether your calls, messages, and other data are being diverted. The status of the different types of diversions that are taking place along with the number the information is being transferred to will be displayed on your phone’s screen. This function is most often set up by either jealous partners or parents who are trying to protect their kids from spam or criminals. Elderly people often become victims of this practice when they lend their phone to a stranger to make a single call. If they do so, they risk having information about where they live, who their friends and family are, their habits and daily activites, and even their financial circumstances passed on to criminals.
Dial this code if you want to find out where calls, messages, and data are being redirected to if it seems that no one can get through to you. The chances are in this case that your voice calls are being redirected to one of your cell phone operator’s numbers.
This is a universal code for switching off all forms of redirection away from your phone. It’s a good idea to use this before you have to use roaming. In this case, money won’t be taken from your account for calls that are redirected by default to your voice mail.
With the help of this code, you can find out your IMEI (International Mobile Equipment Identifier). If you know this number, you can find your phone if someone steals it. When switched on, its location is automatically conveyed to the network operator even if a different SIM card is inserted. If someone knows your IMEI number, they can find out the model and technical characteristics of your phone.
Special codes exist that allow someone to track your location and also to determine whether someone is following you. For this, you need the utility netmonitor. Type in one of the following codes:
for iPhone: *3001#12345#* 
for Android: *#*#4636#*#* or *#*#197328640#*#*
Step 1. Go to the section called UMTS Cell Environment, then UMTS RR info, and write down all the numbers under Cell ID. These numbers are the basic stations located nearby. Your phone will connect by default to the one that emits the best signal.
Step 2. Go back to the main menu, and click on the MM info tab, then on Serving PLMN. Write down the numbers under Local Area Code (LAC).
Step 3. With the help of these two numbers and an ordinary website (the fourth tab to the left), you can determine the location on the map of the basic station that your phone is connected to.
The ones to be suspicious of are mobile basic stations — this could be a truck or small bus with a large antenna. These kinds of vehicles are used at rock festivals and in places where Internet coverage is poor. If there’s one of them nearby, seemingly without any logical reason, it’s just possible that someone is engaged in spying.
If you use Android, you should periodically check your phone for viruses. PlaceRaider is one of the most dangerous ones that can infect your device. Developed by American experts, it was meant to show how vulnerable our devices are. Once it gets onto a phone, this Trojan takes a series of photographs of the surrounding area, creates a 3D model of the building you’re in, and then takes advantage of any Internet connection to send the data that it’s gathered, adding along with it all the data on the phone and your passwords.
  • National security agencies in virtually all countries now cooperate with cell phone operators, who often provide the former with access to information on any of their customers provided they have a warrant from a court. As a minimum, they provide data from the last three months.
  • If your phone has been tapped by a security agency, the chances are you won’t even notice. If a phone makes odd noises during a conversation, loses battery power rapidly, overheats, or unexpectedly restarts, this is merely an indication that you need to get it repaired rather than a telltale sign that you’re being listened to.
  • People generally don’t reveal all that much in phone conversations, so from the point of view of those who want to listen in it’s much more worthwhile to set up special devices ("bugs") in someone’s home. Radio wave detectors can be used to work out whether such bugs are present in a building.
  • Use messaging apps that are completely closed to outsiders, such as TelegramChareWickr, or Signal.
  • Determine what information it’s safe to make accessible to all. Should everyone really be able to find out your phone number or have access to information about your family, loved ones, or your lifestyle? Be very careful when posting photographs of children.
  • Don’t install unknown programmes on your phone, keep close track of the apps you have installed, and use multiple security locks wherever you can. Don’t click on unsafe links, and don’t connect your phone to suspicious "free" charging points.
  • Only your cell phone operator should ever offer you tracking services, and they should only turn them on with your explicit agreement. Websites and applications that offer to find out the location of other people are almost certainly acting with criminal intent. Be careful!

Tuesday, October 25, 2016

10 radiation-emitting cell phone brands you need to throw out immediately

l
We won’t leave the house without it. We panic when we can’t find it. We scurry to recharge it when the battery is low. We feel empty without it in our hands or nearby. We are constantly checking it. We are more attached to it than we realize. Our cell phones are becoming an extension of our bodies. Literally. They are giving us cancer-inducing radiation.

Electromagnetic Radiation From Your Cell Phone

There are two types of electromagnetic radiation:
  1. Ionizing – high frequency and high energy (x-rays, cosmic rays, etc.)
  2. Non-ionizing – low frequency and low energy (radio frequency, power frequency, etc.)
Cell phones transmit a form of non-ionizing radiation from their antennas. This transmittance is how wireless calls and WiFi connections occur. Body tissues close to it absorb this energy.(1)
The radiation is increased during active phone calls, but the exposure continues long afterward. A study was published in 2009 that measured the pelvic bone density in 150 men, all of whom wore their phones attached to their belt for 15 hours a day for about six years. The scientists found the bone mineral density was decreased on the side of the pelvis where the cell was carried.
In one case, a woman with no predisposition for cancer became afflicted with multi-focal breast cancer. Her cancer specialists connected the dots, and the pattern and distribution of the cancerous cells outlined the shape of her cell phone. This seemed peculiar enough; then the woman explained that she is continuously tucking her phone into her bra. (2)

The 10 Worst Cell Phones

The FCC created guidelines to measure the radiation in tissue by using the Specific Absorption Rate (SAR). The SAR set a maximum for legal cell phone radiation at 1.6 watts of energy absorbed per kilogram of body mass. This test uses the thermal effects of phone radiation.
The limit is 1.6, but some phones have come pretty close.
  1. Motorola Droid Maxx – SAR 1.54
  2. Motorola Droid Ultra – SAR 1.54
  3. Motorola Moto E – SAR 1.5 (3)
  4. Alcatel One Touch Evolve – SAR 1.49
  5. Huawei Vitria – SAR 1.49
  6. Kyocera Hydro Edge – SAR 1.48
  7. Kyocera Kona – SAR 1.45
  8. Kyocera Hydro XTRM – SAR 1.44
  9. BlackBerry Z10 – SAR 1.42
  10. BlackBerry Z30 – SAR 1.41
  11. (ZTE Source – SAR 1.41)
  12. (ZTE Warp 4G – SAR 1.41) (4)

Protection Yourself From Radiation


  • First of all, get rid of those harmful phones if you have one. Every time you come into contact with it, you will receive an increased amount of radiation than other brands.
  • Keep children safe. Children are more susceptible to radiation, and this can cause behavior difficulties, emotional problems, social issues, and hyperactivity.
Reduce your usage. Turn off your phone when you are not using it; don’t just flick it to sleep mode where it is still sending off carcinogenic energies.
  • Only make phone calls with good reception. The weaker the connection is, the more power your phone is using, thus the dangerous waves can penetrate your body even more deeply.
  • Don’t carry your phone on your body. Avoid putting it in your pocket, belt clip, or your bra like the cancer-ridden woman in the above study. Just keep it away from wherever you don’t want cancer to grow. The fewer layers between you and your phone, the more radiation is being shot into your body.
  • Keep your phone six inches from your body when it is in use. This perimeter is the most dangerous zone from radiation. Stay away.
  • Use a shielded headset or speakers. (5)

Stay Safe

We’ve gone too far to be capable of giving up cell phones entirely. Yet using them wisely can still spare us from unnecessary radiation. If you would incorporate healthier foods or habits into your life to protect yourself and your family from cancer, then putting boundaries on cell phone usage falls under the same category.

Sources: The World of knowledge

Monday, June 29, 2015

Euglena

Euglena


Protist genus

Euglena, Euglena [Credit: Walter Dawn]genus of more than 1,000 species of single-celled flagellated(i.e., having a whiplike appendage) microorganisms that feature bothplant and animal characteristics. Found worldwide, Euglena live in fresh and brackish water rich in organic matter and can also be found in moistsoils. As photosynthetic protistsEuglena have a taxonomy that is somewhat contentious, and the genus is often placed either in the phylum Euglenozoa or the algal phylum Euglenophyta.
Euglena are characterized by an elongated cell (15–500 micrometres [1 micrometre = 10−6 metre], or 0.0006–0.02 inch) with one nucleus, numerous chlorophyll-containingchloroplasts (cell organelles that are the site of photosynthesis), a contractile vacuole (organelle that regulates the cytoplasm), an eyespot, and one or two flagella. Certain species (e.g., E. rubra) appear red in sunlight because they contain a large amount of carotenoid pigments. Unlike plant cells, Euglenalack a rigid cellulose wall and have a flexible pellicle (envelope) that allows them to change shape. Though they are photosynthetic, most species can also feed heterotrophically (on other organisms) and absorb food directly through the cell surface via phagocytosis (in which the cell membrane entraps food particles in a vacuole for digestion). Food is often stored as a specialized complex carbohydrateknown as paramylon, which enables the organisms to survive in low-light conditions. Euglenareproduce asexually by means of longitudinal cell division, in which they divide down their length, and several species produce dormant cysts that can withstand drying.
Some species, especially E. viridis and E. sanguinea, can develop large toxic populations of green or red “blooms” in ponds or lakes with high nitrogen content. E. gracilis is common in laboratory demonstrations, and a number of species are used to study cell growth and metabolism in various environmental conditions.