Showing posts with label Technology. Show all posts
Showing posts with label Technology. Show all posts

Sunday, February 14, 2016

Android in 2020: how much could Google's OS change?

Cast your mind back to late 2008, when the first
Android-powered handset saw the light of day. Obama
won his first Presidential election, Apple launched its App
Store (the iPhone had appeared the year before),
Google announced its own Chrome browser and we got
our first look at the company's new mobile OS on the T-
Mobile G1 .

The Android of 2016 is a world away from that 2008
version, where the Android Market was in its infancy,
there were no native video playback capabilities embedded
and the G1 had no multi-touch support. In short, it was a
phone that sat very happily on the pile of 'might make it
big one day if the stars align' moonshots that companies
were throwing out at that time.

But Google did make a success of Android, seeing it grow
to the most dominant operating system in the smartphone
world - but it will need to keep innovating and improving
its mobile OS to keep that lion's share.

We've re-tooled this article to take a peek into the
future with our new knowledge, helping us see what
Android might look like in the year 2020.

With new Android monikers now appearing about once a
year ( Android N expected around October), its codename
should start with an "R" - Rhubarb Pie, Rocky Road or
Rice Pudding, perhaps? Or maybe even Rolos, giving
Google another chocolate brand tie-up?
Here are the four key features we think could play the
biggest part in Android's ongoing evolution over the next
seven years:

Maps in Android in 2020

Apple's Maps app may not have set the world alight
when it launched, but it's now growing in use (to the
point where the brand is claiming it's the dominant
mapping platform on iPhones) and that means Google
needs to keep enriching its mapping app to stay ahead.
Recent Google Maps refreshes have brought with them
a greater level of customisation based on your personal
searches, and this will only increase in the future.

With Google Now tracking your every move, you might
already be seeing directions to your favourite watering
hole appear on-screen every Friday lunchtime or to the
football field every Monday evening, all handled
automatically.

Richard Jones, Principal Lecturer in Computing at
Buckinghamshire New University thinks this knowledge of
your habits could be key to the future of how we
interact with our phones and may alter how much we
depend on our phones.

He believes that what will drive innovation is what he
calls "Ambient Intelligence". He told us that "In essence
this will see people functioning naturally in digitally
enabled/enhanced environments using presence-
responsive devices that are tailored to their personalised
requirements and anticipatory of their behaviour."

So, for example, in 2020, if the bar in question has an
Android-friendly program installed, you might even find
your tipple of choice waiting for you when you arrive,
because Android will have been able to figure out where
you're going, what you're doing, and what you want to
drink.

The question of whether this will actually happen isn't as
clear - many people won't like to have their movements
predicted to such a degree, so it will likely be strictly opt-
in and have to involve some kind of credit - after all, no
bar is going to pour drinks on the off-chance you
appear, no matter how likely that is.

As for all of the services hanging off Maps, Google is
already hiring out the Street View cameras and enabling
you to peek inside buildings - you can expect Android
2020 to offer better imagery of most public buildings, as
well as tappable info as you move around.

Google augments its own data with user-generated
content to provide an even more up-to-date view of the
world, and once initiatives such as Jump (Google's own -
expensive - 360-degree VR rig) become more established
you'll be able to see most parts of the world in stunning
detail and from the comfort of your own home with the
rise of Cardboard... or whatever Google is up to next in
VR.

More broadly, with the rise of the Internet of Things,
we can expect mapping data to get even better. As
more gadgets come online that can provide real-time
updates on traffic, weather and more, directions are
going to get even better and more accurate, saving us
more time when travelling.

Perhaps one of the most interesting potential mapping
innovations could come out Google's Project Tango. This is
a real-time 3D mapping technology that uses phones with
two cameras on recreate your view in 3D - a bit like
Microsoft's Kinect.

This technology could be used not just to create cool-
looking 3D maps (imagine a 3D Streetview you could zoom
around like Grand Theft Auto), but could have practical
applications too such as helping the blind and partially
sighted navigate more easily - all using the power of your
phone.

Multiple brands are launching Tango-enabled phones this
year, so by 2020 this should have become an
established part of the Android ecosystem.
This isn't your typical Android security story.
Most articles about Android security tools focus on
malware-scanning suites like Lookout, Norton and AVG.
But with the layers of protection already built into the
platform, those sorts of apps are arguably unnecessary
and often counterproductive -- or even needlessly
expensive.

For most Android users, the seven tools below should
cover all the important bases of device and data
security. Some are third-party apps, while others are
native parts of the Android operating system. They all,
however, will protect your personal info in meaningful
ways -- and without compromising your phone's
performance. Plus, all but two of them are free.
(If you're an enterprise-level user, of course, your
company may require extra layers of protection to
safeguard shared data and separate personal info from
corporate property -- but that's a whole other can of
worms.)


Your mission, should you choose to accept it: Make your
way through this list, then tighten up your Google
account security settings -- and breathe easy. Security
doesn't have to be scary.

1. Android's own screen
pinning system

One of Android's most useful security tools is also one of
its most easily overlooked. Screen pinning made its debut
with Google's Android 5.0 Lollipop release in 2014 -- but
I'm willing to bet the vast majority of Android phone-
owners either have forgotten all about it or never even
realized it existed in the first place.

Let's fix that, shall we? Screen pinning is designed for
those moments when you want to hand someone your
phone -- to look at a photo, check something out on a
Web page or maybe make a quick call -- without taking
the chance of them poking around and getting into your
personal stuff.

Take a minute and make sure the feature's activated
now so it'll be ready when you need it: Just head into
the Security section of your system settings and look for
the option labeled "Screen pinning." Tap that line, then
check to see that the toggles are activated next to both
"On" and "Ask for unlock pattern before unpinning."
You activate the screen pinning feature in the
Security section of Settings (left). Go to Recent
Apps, scroll up and tap the pushpin key to lock
your phone to that app (right).

The next time you need to pass your phone to someone,
first open the app you want them to be able to use.
Then tap the Recent Apps key (the typically square-
shaped icon next to the Home key). Your app should be in
front as the most recently opened app; just scroll
upwards until you see a circular pushpin icon.

Tap that pushpin, and you're all set: Your phone is now
locked to that app and that app alone. In order to do
anything else on the device, you'll need to tap and hold
the Back and the Overview key at the same time and
then enter your pattern, PIN or password to continue.

2. A password management app

Perhaps the greatest risk to your personal security is the
use of weak or frequently repeated passwords. We all
have about a billion passwords to our names these days,
and it's virtually impossible to make each one strong and
unique without a little help.

Well, here's your knight in shining armor: a password
management app like LastPass. LastPass makes it dead
simple to generate and store strong passwords for every
site you sign into. It'll even fill the passwords in for you
across all the apps on your phone (and do the same on
your tablet, laptop or desktop system as well). The
program uses advanced encryption to keep your info
safe; all you have to do is remember a single secure
password to unlock your vault at the start of each
session.

LastPass costs $12/yr. for the full premium version,
which is what most people will want. Other popular
password managers include 1Password and Dashlane,
though the former is less polished and user-friendly than
LastPass while the latter is significantly more expensive,
at $40/yr. for the full set of features.

3. A two-factor authentication utility

No matter how secure your passwords may be, they'll
never be bulletproof. Adding a second layer of protection
is the best way to keep unwanted intruders out -- and
it's really quite easy to do.

The dual-layer protection process is known as two-
factor authentication, and it basically means that in
order to get into your most important accounts -- like
those on Google, Dropbox, a variety of financial
institutions and even password management apps like
LastPass -- you'll need both your regular password and a
second temporary code generated by a device only you
would have. With the combination of those two keys, the
odds of someone else being able to pick your virtual lock
is impressively low.

A free app called Authy is a great place to get started,
as it's intuitively designed and able to run on your phone,
tablet and even your desktop or laptop system if you'd
like. Google also has its own Authenticator app for
Android , but it's far less versatile and pleasant to use
than Authy's offering.

4. Android's Smart Lock feature
Securing your phone with a pattern, PIN or password is
important; we all know that. But having to put in that
code every time you want to use the device can get
annoying fast -- so it's no surprise a lot of people opt to
skip the hassle and just leave their phones unprotected.

Android's Smart Lock feature gives you the best of both
worlds by cutting down on the annoyance factor while
still allowing you to keep your phone secured when it
really counts. You can choose to have your phone remain
unlocked whenever you're in a trusted location, like your
home, or anytime you're connected to a trusted Bluetooth
device, like a smartwatch that's always on your arm or
a stereo that's inside your car. You can even opt to
have the device stay unlocked if it hasn't left your
pocket or purse since you last put in your passcode.
Android's Smart Lock tool gives you a variety of
ways to keep your content safe without too much
trouble (left). You can even opt to have the device
stay unlocked if it hasn't left your pocket (right).
Any time you aren't in one of those secure situations,
your phone automatically locks itself and requires your
code to get in. And that's the end goal that matters.
Look for Smart Lock in the Security section of your
system settings (on Android 5.0 or higher) to get set up.

5. Android's advanced app-scanning feature

You wouldn't know it from all the third-party companies
peddling anti-virus software for smartphones, but Android
has actually had its own native malware-scanning system
in place since 2012 . In addition to checking apps for
potentially harmful code when they're installed, the OS
can continuously scan your device over time to make sure
nothing problematic ever pops up.

All you have to do is opt in by going into the Google
section of your system settings (or into a separate app
called Google Settings, if you have an older device).
Select "Security" and then activate the "Scan device for
security threats" option, if it isn't already activated.
That's it: Your device and the software already on it will
handle the rest.

(It's worth noting that this system works in conjunction
with a server-side system that scans all apps uploaded to
the Google Play Store before you ever see them. All
Android devices also automatically watch for signs of
SMS abuse, and the Chrome Android browser keeps an
eye out for dangerous sites on the Web.)

6. Android Device Manager
Another important security tool Android provides is one
that can find, ring and even remotely lock or erase your
phone from a computer or other mobile device.

The tool is called Android Device Manager, and it's
already on your smartphone and waiting to be used.
Confirm that you have it enabled by going into the Google
section of your system settings (or into the separate app
called Google Settings) and then selecting "Security." You'll
want both options under "Android Device Manager" to be
activated.

The Android Device Manager can locate your
device, have it ring (so you can find it) and, in the
worst case, erase all the contents.

Now, if you ever lose your device, just open up the
Android Device Manager website or Android Device
Manager app (from another phone or a tablet) to track
and secure it.

7. An Android VPN client
This final item isn't one everyone needs, but if you spend
a lot of time surfing the Web through open Wi-Fi
networks -- at airports, hotels or other public places --
it's worth considering. A VPN, or virtual private network,
encrypts all of your data and keeps strangers from
snooping in and seeing your personal info.

It can allow you to mask your actual IP address and
location, too, and thus access websites and services that
might normally be blocked in your area -- something that
could be relevant and beneficial for some users.

Android has a fair number of VPN clients available , but
the one I'd recommend looking at is an app called
SurfEasy . A big part of the reason is trustworthiness,
especially for an app of this nature: SurfEasy is owned
and operated by the same company behind the Opera
browser -- in other words, a known and reputable
organization. But beyond that, the app is exceptionally
simple to use and also reasonably priced, with plans
starting at $3/mo. for unlimited use on a single device.
All said and told, taking into account everything on this
list, that brings your grand total for personal Android
security to a whopping $1 to $4 per month. And you
know what? That's a small price to pay for practical
peace of mind.

Apple and AT&T sued for infringement over iPhone haptic patents

Haptic technology company Immersion has accused Apple
and carrier AT&T of infringement of three of its patents
in the latest iPhone models and Apple watches.

Immersion, which claims over 2,100 issued or pending
patents worldwide covering various aspects and
commercial applications of haptic or touch feedback
technology, has asked the U.S. International Trade
Commission to ban the import of the specified iPhone and
Apple Watch models in the U.S., besides suing for
damages in a Delaware federal court, company CEO
Victor Viegas said in a conference call Thursday.

Under the rules, it will take the ITC 30 days to decide
on instituting an investigation, and the subsequent
proceedings could take another 16 months, making an
appeal to the ITC the most effective and quick way for
redress, Viegas said

The Apple products named in the actions are the iPhone
6, iPhone 6 Plus, iPhone 6s, iPhone 6s Plus, Apple
Watch, Apple Watch Sport and Apple Watch Edition.
Haptics play a central role in these products, according
to the complaint in the U.S. District Court for the District
of Delaware, which added that the 3D Touch and Taptic

Engine features in the latest iPhone 6s and iPhone 6s
Plus provide haptic feedback, "including feedback based on
pressure-sensitive interactions with the touch screen."
The Apple Watch likewise has haptic features promoted
under the names Force Touch and Taptic Engine,
according to the complaint.

Immersion decided to include AT&T and subsidiary AT&T
Mobility in the action because the carrier is the most
significant distributor of the iPhone in the U.S. Its decision
to sue at this point, some months after Apple started
selling its latest products, like the iPhone 6s and the
iPhone 6s Plus, was a matter of strategy, Immersion
said. It also described as strategy its decision to name in
the complaint only AT&T and not the other carriers that
offer the iPhone in the U.S., such as Verizon and T-
Mobile.

The patent company alleges that the iPhone 6, iPhone 6
Plus, iPhone 6s, iPhone 6s Plus, Apple Watch, Apple
Watch Sport and Apple Watch Edition infringe two of its
patents.

Five sue Apple over Error 53 and bricked iPhones

Five plaintiffs yesterday sued Apple and asked a federal
court to designate the case a class action lawsuit
because their iPhones were allegedly "bricked" after they
had either repaired their smartphones themselves or
went to a third-party shop for repairs.

According to a complaint filed Thursday, the five were
represented by the Seattle, Wash. law firm Pfau,
Cochran, Vertetis, Amala (PCVA), which earlier this week
solicited possible plaintiffs for a class action suit.

The complaint was based on "Error 53," an error
message that has appeared on iPhone 6, 6S, 6 Plus and
6S Plus devices. It appears when a do-it-yourself owner
or a third-party shop has replaced the Home button --
which includes the Touch ID sensor -- and/or the
connecting cable. Once the error appears, the iPhone is
"bricked," or rendered unusable.

Error 53 is triggered when users update or upgrade to a
new version of iOS, and the operating system detects
that components have been changed in the iPhone .

Apple has said the error message and subsequent
crippling of the iPhone are "security checks designed to
protect our customers." If iOS sniffs out a new Home
button or cable, Touch ID, the fingerprint-based
authentication technology used by the iPhone, is disabled.

"This security measure is necessary to protect your device
and prevent a fraudulent Touch ID sensor from being
used," Apple said in a statement Tuesday.

A recently published support document on Apple's website
provided additional information about the circumstances
that can trigger Error 53, including a screen
replacement. "An unauthorized or faulty screen
replacement could cause the check to fail," the support
document stated.

PCVA attorneys for the five plaintiffs -- who include one
each from Arizona, California and Oregon, and two
from Florida -- sued Apple for alleged negligence,
negligent misrepresentation, unjust enrichment and
violation of California's unfair competition and false
advertising laws.

"Plaintiff DeNoma decided to replace the screen himself
after researching how to do so," the lawsuit said,
referring to John DeNoma of Oregon. "While replacing
the screen, he broke the ribbon cable that connected the
Touch ID to the device, so he ended up replacing the
entire home button. The iPhone worked great after the
repair.

New Chromebook won't break with 365-pound person standing on it

A new laptop targeted toward classrooms is perhaps
among the toughest Chromebooks out there.
CTL claims its NL6x Extra-Rugged Chromebook for
Education won't break if a 365-pound (165 kilogram)
person stands on it. It can also withstand drops of 70
centimeters, more than 2 feet.

That makes the $269 laptop ideal for classrooms, where
clumsy children can drop and rough up laptops. The
device has the look of a small briefcase, with a
retractable handle on the top to carry it.

The laptop has been reinforced to ensure it doesn't
break. At the top is a protective cover that can double
as a whiteboard. The lower layer has a shock absorber
in case of drops. The hinges and open ports are also
reinforced.

The extra layers have made the laptop slightly heavy at
1.38 kilograms (3 pounds), about the same weight as
other rugged Chromebooks like Lenovo's Chromebook 11e.
The laptop is otherwise similar to many Chromebooks
available today. It has an 11.6-inch screen that displays
images at a resolution of 1366 x 768 pixels, 16GB of
storage, 4GB of memory, 802.11ac Wi-Fi and an Intel
Celeron 2940 dual-core processor.

The laptop can run for nine hours on a single battery
charge. External hard drives can be attached to the
USB 3.0 or USB 2.0 ports. The laptop also has a 2.0-
pixel webcam and an SD card reader.

The extra-rugged Chromebook has Chrome OS, which is
designed for computing on the Internet. Chromebooks are
popular for installations in places like schools as bare-
bones laptops accessing applications on internal clouds.

AT&T to run field trials of 5G wireless in Austin this year

AT&T announced today it will begin field trials of faster
5G wireless technology this summer in Austin, Texas.
The 3GPP industry standard for 5G, also known as
Fifth Generation wireless, is not expected to be
completed until 2020, with the earliest phase completed
in 2018.

Wireless speeds with 5G could be 10 to 100 times faster
than with 4G LTE, which generally averages in the 10
Mbps to 20 Mbps range for users downloading data.
Both AT&T and Verizon have ambitious 5G rollout plans,
prompted by the recent explosion of wireless video and
Internet of Things connectivity. AT&T estimates that its
wireless network grew 150,000% from 2007 to 2015,
largely because of video traffic; more than 60% of its
wireless traffic in 2015 was video.

Self-driving cars, robots, smart cities and other
technologies are expected to test networks like never
before, and "5G will will help make them a reality," said
John Donovan, chief strategy officer at AT&T
Technology and Operations.

AT&T said it is working with Ericsson and Intel on
laboratory tests of 5G in the second quarter, with the
outdoor tests and trials starting in the summer. By the
end of the year, AT&T expects to make 5G connections
to fixed locations, such as buildings and homes, while
wireless connections to moving objects, like cars and
devices used by passengers aboard trains, are harder to
achieve.

AT&T's trials are intended to precede full 5G standard
adoption so that the carrier can "pivot to compliant
commercial deployments once 5G technology standards
are set," AT&T said in a statement.

The advent of 5G will be more efficient and cost-
effective for carriers. AT&T plans to build its version of
5G on a software-centric architecture that adapts
quickly to new demands, Donovan said. That means AT&T
will deliver 5G in connection with software defined
networks (SDN), big data, new security tools and open
source software, he added.

Apple is reportedly making a TV show starring Dr. Dre

Apple appears to be getting in on the original content
game. According to The Hollywood Reporter , Apple is
developing a TV series starring Dr. Dre — who, of
course, is a co-founder of the now Apple-owned Beats.
Dre's series is already said to have started filming. The
show is reported to be a dark drama called Vital Signs,
and there is known to be at least one orgy scene. It's
supposed to have six 30-minute episodes in total, with
each taking a semi-autobiographical look at how Dre
responds to different emotions. Sam Rockwell and Mo
McCrae are also reportedly in the cast.

Apple is likely to debut the series all at once — Netflix
style — on Apple Music, according to the Reporter . This
would be Apple's first entry into the world of original TV
series, so it's not clear exactly how it would launch. Vital
Signs doesn't at all sound like the type of dad-friendly
content you'd expect from Apple (e.g. a U2 album), but it's
easy to see why it might have chosen to start here. For
one, it obviously has a close relationship with Dre, and it
makes sense to leverage that. But we're also coming off
the huge success of Straight Outta Compton , which is
essentially an origin story for Dre. There's clearly interest
in his stories. It sounds like Apple is hoping to tap into
that, too.

Apple will replace some USB-C cables because of a 'design issue'

USB-C cables have run into yet another stumbling block .
Apple has announced a worldwide replacement program
for the USB-C cable that it shipped between April and
June 8th of last year. The cable was released alongside
the 12-inch Retina Macbook and also sold separately at
the Apple Store. According to Apple, it's possible for the
cable to fail without warning due to a design flaw. "As a
result, your MacBook may not charge or only charge
intermittently when it’s connected to a power adapter
with an affected cable," Apple says.

The company has already corrected its mistake and has
been selling fixed USB-C cables for months, but early
MacBook buyers may be stuck with a bum one. If you gave
Apple your mailing address when registering your
MacBook, you'll receive a new cable by the end of this
month. Everyone else can either make a Genius Bar
reservation, visit a local authorized Apple service provider,
or contact Apple customer support. And if your original
cable failed and you bought another one, you may be
eligible for a refund. You can identify which USB-C cable
you've got using the image below.

UK court: GCHQ hacking phones and computers is legal

Computer and smartphone hacking by
spying agency GCHQ is legal, the UK's
Investigatory Powers Tribunal has
said.

Senior judges ruled that they are "satisfied" that the agency's ability to
force its way into devices to obtain intelligence is striking a "proper
balance" between privacy of individuals and the need to investigate crimes.

During the case, bought by civil liberties group Privacy International ,
GCHQ admitted for the first time that it conducted hacking, officially known as computer network exploitation (CNE) as one of its tactics. Devices hacked have been both in the UK and abroad and the campaign group said the practice still remained "intrusive"
and that it was "disappointed".

GCHQ in court over 'dark precedent' of device hacking
GCHQ's hacking was first revealed in documents published by NASA
whistleblower Edward Snowden .

Despite the judges saying the intrusive abilities had raised "a number of serious questions" they said the current practices were legal.
Equipment allowed to be hacked includes -- but is not limited too --
computers, servers, routers, laptops, mobile phones and more. The tribunal was told that it is possible for cameras to be remotely turned on as well as microphone, every key pressed on a keyboard logged, malware being installed, the tracking of locations and
the remote copying of documents from equipment.

Interference powers are currently guided by a code of practice, which was published ahead of the government's draft Investigatory
Powers Bill . For hacks to take place a warrant must be issued.
A simple guide to GCHQ's hacking powers

The judges said the code had the right balance between the "urgent need of the Intelligence Agencies to safeguard
the public and the protection of an individual's privacy and/or freedom of expression".

They continued to say that whatever the outcome of the re-drafting of the IP Bill and its eventual passing into law the current use of hacking powers under the code of practice is acceptable. Hacking and mass hacking provisions exist in the planned
surveillance law.

Privacy International had claimed there was no clear lawful authority to conduct the hacking when the legal
complaint was initially lodged.

Scientists learn how young brains form lifelong memories by studying worms' food choices

Members of neuroscientist Cori Bargmann's lab spend quite
a bit of their time watching worms move around. These tiny
creatures, Caenorhabditis elegans, feed on soil

bacteria, and their very lives depend on their ability to
distinguish toxic microbes from nutritious ones. In a recent
study, Bargmann and her colleagues have shown that
worms in their first larval stage can learn what harmful
bacterial strains smell like, and form aversions to those
smells that last into adulthood.

Many animals are capable of making vital, lifelong memories
during a critical period soon after birth. The phenomenon,
known as imprinting, allows newly hatched geese to bond
with their moms, and makes it possible for salmon to return
to their native stream after spawning. And while the
learning processes of humans may be more complex and
subtle, scientists have long known that our brain's ability to
store a memory and maintain it long-term depends on when
and how that memory was acquired.

"In the case of worms, we were fascinated to discover
that their small and simple nervous system is capable of not
only remembering things, but of forming long-term
memories," says Bargmann, who is Torsten N. Wiesel
Professor and head of the Lulu and Anthony Wang
Laboratory of Neural Circuits and Behavior, as well as co-
director of the new Kavli Neural Systems Institute at
Rockefeller. "It invites the question of whether learning
processes that happen during different life stages are
biologically different."

In the study, she and Rockefeller graduate student Xin Jin
let both young and adult worms learn to avoid food smells,
and studied in detail the neural circuits that produced
memories of the experience. Their findings, published in Cell,
clarify which neurons, genes, and molecular pathways
distinguish the two types of memory, providing new vistas
into the neurobiology of learning.

Imprinted aversions last a lifetime
When adult C. elegans worms encounter pathogenic
bacteria they avoid it by moving in the opposite direction,
and they shun similar bacteria for about twenty-four hours.
But their memory soon fades.

Young worms, on the other hand, form more lasting
impressions. The researchers allowed newborn worms to
hatch directly onto a lawn of pathogens, and left them
there for their first twelve hours of life -- the first larval
stage. (The bugs gave the worms intestinal infections, but
didn't kill them.) Then, when the worms encountered the
pathogens again as adults -- three days later -- they fled.
Worms that hadn't been hatched onto poisonous bacteria
found them just as attractive as harmless ones.

Jin found that by silencing specific neurons in the worms,
and repeating the learning assays, she was able to
determine each nerve cell's contribution to the memory
process. The results of her experiments show that the
neural circuits that mediate the two types of learning are
similar, but not identical. Many neurons are needed for both
imprinted and adult learning, but cells called AIB and RIM
are uniquely important for the formation of the imprinted
memory during the larval stage.

A similar picture emerged when the researchers compared
the genes and signaling pathways that are activated when
worms form imprinted versus short-term memories. The two
processes rely on similar molecular components, but some
genes were found to be specifically required for only one
type of learning.

"These findings suggest that early imprinting isn't totally
different from other learning--it's the same system
enhanced with some special features," Bargmann says.
How memories are formed, stored, and retrieved

Several neurological processes are at play when we learn
new things. For example, when a baby songbird learns a
song from an adult bird, a memory of the tutor's
performance must first form and be stored in his brain.
Then, when it's time for the bird to debut with his own
song, that memory must be retrieved to practice and then
perform a vocal behavior.

Because most animals' brains are very complex, it has been
difficult for scientists to study these elements of learning in
detail. By using C. elegans, whose modest brain has only
302 neurons, the researchers were able to shed light on
the neural circuits that drive the formation and retrieval of
a worm's memory--and the two processes turned out to be
neurologically distinct.

"We learned that when worms form an early memory of a
food smell, they use one set of neurons to plant that
memory," Bargmann says, "and later in life, when they
encounter the same smell again, they use a different set of
neurons to pull the memory out."

How memories are stored in the brain -- in what neurons
they reside and what constitutes them at the molecular
level -- remains elusive. But Bargmann says her lab's
findings have laid the groundwork for future research into
stored memory and other open questions.

"The most evocative thing about this work is that it reminds
us that learning isn't some fancy innovation of a complex
brain," she says. "It's a fundamental function that any
nervous system can perform."

Memory replay prioritizes high-reward memories

Why do we remember some events, places and things, but
not others? Our brains prioritize rewarding memories over
others, and reinforce them by replaying them when we are
at rest, according to new research from the University of
California, Davis, Center for Neuroscience, published Feb. 11
in the journal Neuron .

"Rewards help you remember things, because you want
future rewards," said Professor Charan Ranganath, a UC
Davis neuroscientist and senior author on the paper. "The
brain prioritizes memories that are going to be useful for
future decisions."

It's estimated that we only retain detailed memories for a
small proportion of the events of each day, Ranganath
said. People with very detailed memories become
overwhelmed with information. So if the brain is going to
filter information and decide what to remember, it makes
sense to save those memories that might be most important
for obtaining rewards in the future.

Ranganath and postdoctoral researcher Matthias Gruber
put this to the test by scanning the brains of volunteers by
functional magnetic resonance imaging as they answered
simple yes-no questions on short series of objects -- for
example, "do these objects weigh more than a basketball?"
Each series of objects was shown on a background image
for context, and depending on the context, the volunteers
were told they would either get a large (dollars) or small
(cents) reward for giving correct answers. At the end of
a series, participants were told how much money they just
won.

Once participants completed this part of the experiment,
the volunteers were scanned during a resting period.
Afterward, outside of the scanner, there was a surprise
memory test for all objects that were shown during
scanning.

Although participants were not expecting the memory test
outside the scanner, they were better at remembering
objects that were associated with a high reward, said
Gruber, first author of the paper.

"Also, when an object was associated with high reward,
people remembered better the particular background scene
that was on the screen during scanning," Gruber said.
Memory could be biased toward high points of
experience

Even more interesting, participants' memory performance
was predicted by brain activity measured during rest. When
the researchers looked at brain scans of subjects at rest
after giving yes-no answers -- neither learning nor actively
recalling the memory -- they found the same pattern of
activity as when subjects were doing the high-reward task.
The subjects were apparently replaying the rewarding
memories, strengthening connections and helping to fix the
memory in place.

People who showed more replay of high-reward memories
showed better retention of these events during the post-
scan test, as well as increased interactions between the
hippocampus, a structure deep in the brain heavily involved
in memory, and an area called the substantia nigra/ventral
tegmental area complex, which is involved in reward
processing, suggesting that reward played a role in
stimulating the hippocampus after learning.

Although this study did not measure it directly, these
interactions were likely related to release of dopamine, a
neurotransmitter that is released in the brain when we
expect rewards. Conditions such as Parkinson's disease or
aging are linked to reduced dopamine and often involve
memory defects.

The results show how memory could be biased toward the
high points of experience, Ranganath said. "It speaks to a
memory process that is normally hidden from us,"

Ranganath said. "Are you remembering what you really need
to know? It could depend on what your brain does while
you are at rest."

Co-authors on the study were Maureen Ritchey, Shao-Fang
Wang and Manoj Doss, all at the UC Davis Center for
Neuroscience. The work was supported by multiple sources
including the Office of Naval Research, NIH, the
Guggenheim Foundation, a Parke-Davis Fellowship and the
German Research Foundation.

Gravitational waves detected 100 years after Einstein's prediction

For the first time, scientists have observed ripples in the
fabric of spacetime called gravitational waves, arriving at
Earth from a cataclysmic event in the distant universe. This
confirms a major prediction of Albert Einstein's 1915 general
theory of relativity and opens an unprecedented new
window onto the cosmos.

Gravitational waves carry information about their dramatic
origins and about the nature of gravity that cannot
otherwise be obtained. Physicists have concluded that the
detected gravitational waves were produced during the final
fraction of a second of the merger of two black holes to
produce a single, more massive spinning black hole. This
collision of two black holes had been predicted but never
observed.

The gravitational waves were detected on September 14,
2015 at 5:51 a.m. Eastern Daylight Time (09:51 UTC) by
both of the twin Laser Interferometer Gravitational-wave
Observatory (LIGO) detectors, located in Livingston,
Louisiana, and Hanford, Washington, USA. The LIGO
Observatories are funded by the National Science
Foundation (NSF), and were conceived, built, and are
operated by Caltech and MIT. The discovery, accepted for
publication in the journal Physical Review Letters, was made
by the LIGO Scientific Collaboration (which includes the
GEO Collaboration and the Australian Consortium for
Interferometric Gravitational Astronomy) and the Virgo
Collaboration using data from the two LIGO detectors.
Based on the observed signals, LIGO scientists estimate
that the black holes for this event were about 29 and 36
times the mass of the sun, and the event took place 1.3
billion years ago. About 3 times the mass of the sun was
converted into gravitational waves in a fraction of a
second -- with a peak power output about 50 times that
of the whole visible universe. By looking at the time of
arrival of the signals -- the detector in Livingston recorded
the event 7 milliseconds before the detector in Hanford --
scientists can say that the source was located in the
Southern Hemisphere.

According to general relativity, a pair of black holes orbiting
around each other lose energy through the emission of
gravitational waves, causing them to gradually approach
each other over billions of years, and then much more
quickly in the final minutes. During the final fraction of a
second, the two black holes collide into each other at
nearly one-half the speed of light and form a single more
massive black hole, converting a portion of the combined
black holes' mass to energy, according to Einstein's formula
E=mc . This energy is emitted as a final strong burst of
gravitational waves. It is these gravitational waves that
LIGO has observed.

The existence of gravitational waves was first
demonstrated in the 1970s and 80s by Joseph Taylor, Jr.,
and colleagues. Taylor and Russell Hulse discovered in 1974
a binary system composed of a pulsar in orbit around a
neutron star. Taylor and Joel M. Weisberg in 1982 found
that the orbit of the pulsar was slowly shrinking over time
because of the release of energy in the form of
gravitational waves. For discovering the pulsar and showing
that it would make possible this particular gravitational wave
measurement, Hulse and Taylor were awarded the Nobel
Prize in Physics in 1993.

The new LIGO discovery is the first observation of
gravitational waves themselves, made by measuring the tiny
disturbances the waves make to space and time as they
pass through Earth.

"Our observation of gravitational waves accomplishes an
ambitious goal set out over 5 decades ago to directly detect
this elusive phenomenon and better understand the
universe, and, fittingly, fulfills Einstein's legacy on the 100th
anniversary of his general theory of relativity," says
Caltech's David H. Reitze, executive director of the LIGO
Laboratory.

The discovery was made possible by the enhanced
capabilities of Advanced LIGO, a major upgrade that
increases the sensitivity of the instruments compared to the
first generation LIGO detectors, enabling a large increase
in the volume of the universe probed -- and the discovery
of gravitational waves during its first observation run. The
US National Science Foundation leads in financial support
for Advanced LIGO. Funding organizations in Germany
(Max Planck Society), the U.K. (Science and Technology
Facilities Council, STFC) and Australia (Australian Research
Council) also have made significant commitments to the
project. Several of the key technologies that made
Advanced LIGO so much more sensitive have been
developed and tested by the German UK GEO
collaboration. Significant computer resources have been
contributed by the AEI Hannover Atlas Cluster, the LIGO
Laboratory, Syracuse University, and the University of
Wisconsin- Milwaukee. Several universities designed, built,
and tested key components for Advanced LIGO: The
Australian National University, the University of Adelaide,
the University of Florida, Stanford University, Columbia
University of the City of New York, and Louisiana State
University.

"In 1992, when LIGO's initial funding was approved, it
represented the biggest investment the NSF had ever
made," says France Córdova, NSF director. "It was a big
risk. But the National Science Foundation is the agency that
takes these kinds of risks. We support fundamental science
and engineering at a point in the road to discovery where
that path is anything but clear. We fund trailblazers. It's
why the U.S. continues to be a global leader in advancing
knowledge."

LIGO research is carried out by the LIGO Scientific
Collaboration (LSC), a group of more than 1000 scientists
from universities around the United States and in 14 other
countries. More than 90 universities and research institutes
in the LSC develop detector technology and analyze data;
approximately 250 students are strong contributing
members of the collaboration. The LSC detector network
includes the LIGO interferometers and the GEO600
detector. The GEO team includes scientists at the Max
Planck Institute for Gravitational Physics (Albert Einstein
Institute, AEI), Leibniz Universität Hannover, along with
partners at the University of Glasgow, Cardiff University,
the University of Birmingham, other universities in the
United Kingdom, and the University of the Balearic Islands
in Spain.

"This detection is the beginning of a new era: The field of
gravitational wave astronomy is now a reality," says
Gabriela González, LSC spokesperson and professor of
physics and astronomy at Louisiana State University.

LIGO was originally proposed as a means of detecting
these gravitational waves in the 1980s by Rainer Weiss,
professor of physics, emeritus, from MIT; Kip Thorne,
Caltech's Richard P. Feynman Professor of Theoretical
Physics, emeritus; and Ronald Drever, professor of physics,
emeritus, also from Caltech.

"The description of this observation is beautifully described in
the Einstein theory of general relativity formulated 100
years ago and comprises the first test of the theory in
strong gravitation. It would have been wonderful to watch
Einstein's face had we been able to tell him," says Weiss.
"With this discovery, we humans are embarking on a
marvelous new quest: the quest to explore the warped side
of the universe -- objects and phenomena that are made
from warped spacetime. Colliding black holes and
gravitational waves are our first beautiful examples," says
Thorne.

Virgo research is carried out by the Virgo Collaboration,
consisting of more than 250 physicists and engineers
belonging to 19 different European research groups: 6 from
Centre National de la Recherche Scientifique (CNRS) in
France; 8 from the Istituto Nazionale di Fisica Nucleare
(INFN) in Italy; 2 in The Netherlands with Nikhef; the
Wigner RCP in Hungary; the POLGRAW group in Poland;
and the European Gravitational Observatory (EGO), the
laboratory hosting the Virgo detector near Pisa in Italy.
Fulvio Ricci, Virgo Spokesperson, notes that, "This is a
significant milestone for physics, but more importantly merely
the start of many new and exciting astrophysical
discoveries to come with LIGO and Virgo."

Bruce Allen, managing director of the Max Planck Institute
for Gravitational Physics (Albert Einstein Institute), adds,
"Einstein thought gravitational waves were too weak to
detect, and didn't believe in black holes. But I don't think
he'd have minded being wrong!"

"The Advanced LIGO detectors are a tour de force of
science and technology, made possible by a truly exceptional
international team of technicians, engineers, and scientists,"
says David Shoemaker of MIT, the project leader for
Advanced LIGO. "We are very proud that we finished this
NSF-funded project on time and on budget."

At each observatory, the two-and-a-half-mile (4-km) long
L-shaped LIGO interferometer uses laser light split into
two beams that travel back and forth down the arms
(four-foot diameter tubes kept under a near-perfect
vacuum). The beams are used to monitor the distance
between mirrors precisely positioned at the ends of the
arms. According to Einstein's theory, the distance between
the mirrors will change by an infinitesimal amount when a
gravitational wave passes by the detector. A change in the
lengths of the arms smaller than one-ten-thousandth the
diameter of a proton (10 meter) can be detected.

"To make this fantastic milestone possible took a global
collaboration of scientists -- laser and suspension
technology developed for our GEO600 detector was used
to help make Advanced LIGO the most sophisticated
gravitational wave detector ever created," says Sheila
Rowan, professor of physics and astronomy at the
University of Glasgow.

Independent and widely separated observatories are
necessary to determine the direction of the event causing
the gravitational waves, and also to verify that the signals
come from space and are not from some other local
phenomenon.

Toward this end, the LIGO Laboratory is working closely
with scientists in India at the Inter-University Centre for
Astronomy and Astrophysics, the Raja Ramanna Centre for
Advanced Technology, and the Institute for Plasma to
establish a third Advanced LIGO detector on the Indian
subcontinent. Awaiting approval by the government of India,
it could be operational early in the next decade. The
additional detector will greatly improve the ability of the
global detector network to localize gravitational-wave
sources.

"Hopefully this first observation will accelerate the
construction of a global network of detectors to enable
accurate source location in the era of multi-messenger
astronomy," says David McClelland, professor of physics
and director of the Centre for Gravitational Physics at the
Australian National University.

Power walk: Footsteps could charge mobile electronics

When you're on the go and your smartphone battery is
low, in the not-so-distant future you could charge it simply
by plugging it into your shoe.

An innovative energy harvesting and storage technology
developed by University of Wisconsin-Madison mechanical
engineers could reduce our reliance on the batteries in our
mobile devices, ensuring we have power for our devices no
matter where we are.

In a paper published Nov. 16, 2015, in the journal
Scientific Reports, Tom Krupenkin, a professor of
mechanical engineering at UW-Madison, and J. Ashley
Taylor, a senior scientist in UW-Madison's Mechanical
Engineering Department, described an energy-harvesting
technology that's particularly well suited for capturing the
energy of human motion to power mobile electronic devices.
The technology could enable a footwear-embedded energy
harvester that captures energy produced by humans during
walking and stores it for later use.

Power-generating shoes could be especially useful for the
military, as soldiers currently carry heavy batteries to power
their radios, GPS units and night-vision goggles in the field.
The advance could provide a source of power to people in
remote areas and developing countries that lack adequate
electrical power grids.

"Human walking carries a lot of energy," Krupenkin says.
"Theoretical estimates show that it can produce up to 10
watts per shoe, and that energy is just wasted as heat. A
total of 20 watts from walking is not a small thing,
especially compared to the power requirements of the
majority of modern mobile devices."

Krupenkin says tapping into just a small amount of that
energy is enough to power a wide range of mobile devices,
including smartphones, tablets, laptop computers and
flashlights. For example, a typical smartphone requires less
than two watts.

However, traditional approaches to energy harvesting and
conversion don't work well for the relatively small
displacements and large forces of footfalls, according to
the researchers.

"So we've been developing new methods of directly
converting mechanical motion into electrical energy that are
appropriate for this type of application," Krupenkin says.

The researchers' new energy-harvesting technology takes
advantage of "reverse electrowetting," a phenomenon that
Krupenkin and Taylor pioneered in 2011. With this approach,
as a conductive liquid interacts with a nanofilm-coated
surface, the mechanical energy is directly converted into
electrical energy.

The reverse electrowetting method can generate usable
power, but it requires an energy source with a reasonably
high frequency -- such as a mechanical source that's
vibrating or rotating quickly.

"Yet our environment is full of low-frequency mechanical
energy sources such as human and machine motion, and
our goal is to be able to draw energy from these types of
low-frequency energy sources," Krupenkin says. "So reverse
electrowetting by itself didn't solve one of the problems we
had."

To overcome this, the researchers developed what they
call the "bubbler" method, which they described in their
Scientific Reports study. The bubbler method combines
reverse electrowetting with bubble growth and collapse.

The researchers' bubbler device -- which contains no
moving mechanical parts -- consists of two flat plates
separated by a small gap filled with a conductive liquid. The
bottom plate is covered with tiny holes through which
pressurized gas forms bubbles. The bubbles grow until they're
large enough to touch the top plate, which causes the
bubble to collapse.

The speedy, repetitive growth and collapse of bubbles
pushes the conductive fluid back and forth, generating
electrical charge.

"The high frequency that you need for efficient energy
conversion isn't coming from your mechanical energy source
but instead, it's an internal property of this bubbler
approach," Krupenkin says.

The researchers say their bubbler method can potentially
generate high power densities -- lots of watts relative to
surface area in the generator -- which enables smaller and
lighter energy-harvesting devices that can be coupled to a
broad range of energy sources.

The proof-of-concept bubbler device generated around 10
watts per square meter in preliminary experiments, and
theoretical estimates show that up to 10 kilowatts per
square meter might be possible, according to Krupenkin.

"The bubbler really shines at producing high power densities,"
he says. "For this type of mechanical energy harvesting,
the bubbler has a promise to achieve by far the highest
power density ever demonstrated."

Krupenkin and Taylor are seeking to partner with industry
and commercialize a footwear-embedded energy harvester
through their startup company, InStep NanoPower.

Their harvester could directly power various mobile devices
through a charging cable, or it could be integrated with a
broad range of electronic devices embedded in a shoe, such
as a Wi-Fi hot spot that acts as a "middleman" between
mobile devices and a wireless network. The latter requires
no cables, dramatically cuts the power requirements of
wireless mobile devices, and can make a cellphone battery
last 10 times longer between charges.

"For a smartphone, just the energy cost of radio-frequency
transmission back and forth between the phone and the
tower is a tremendous contributor to the total drain of the
battery," Krupenkin says.

Saturday, February 13, 2016

GPS tracking down to the centimeter





Researchers at the University of Califogrnia, Riverside have
developed a new, more computationally efficient way to
process data from the Global Positioning System (GPS), to
enhance location accuracy from the meter-level down to a
few centimeters.

The optimization will be used in the development of
autonomous vehicles, improved aviation and naval navigation
systems, and precision technologies. It will also enable users
to access centimeter-level accuracy location data through
their mobile phones and wearable technologies, without
increasing the demand for processing power.

The research, led by Jay Farrell, professor and chair of
electrical and computer engineering in UCR's Bourns College
of Engineering, was published recently in IEEE's

Transactions on Control Systems Technology. The approach
involves reformulating a series of equations that are used
to determine a GPS receiver's position, resulting in reduced
computational effort being required to attain centimeter
accuracy.

First conceptualized in the early 1960s, GPS is a space-
based navigation system that allows a receiver to compute
its location and velocity by measuring the time it takes to
receive radio signals from four or more overhead satellites.
Due to various error sources, standard GPS yields position
measurements accurate to approximately 10 meters.

Differential GPS (DGPS), which enhances the system
through a network of fixed, ground-based reference
stations, has improved accuracy to about one meter. But
meter-level accuracy isn't sufficient to support emerging
technologies like autonomous vehicles, precision farming, and
related applications.

"To fulfill both the automation and safety needs of
driverless cars, some applications need to know not only
which lane a car is in, but also where it is in that lane--
and need to know it continuously at high rates and high
bandwidth for the duration of the trip," said Farrell, whose
research focuses on developing advanced navigation and
control methods for autonomous vehicles.

Farrell said these requirements can be achieved by
combining GPS measurements with data from an inertial
measurement unit (IMU) through an internal navigation
system (INS). In the combined system, the GPS provides
data to achieve high accuracy, while the IMU provides data
to achieve high sample rates and high bandwidth
continuously.

Achieving centimeter accuracy requires "GPS carrier phase
integer ambiguity resolution." Until now, combining GPS and
IMU data to solve for the integers has been computationally
expensive, limiting its use in real-world applications. The UCR
team has changed that, developing a new approach that
results in highly accurate positioning information with
several orders of magnitude fewer computations.

"Achieving this level of accuracy with computational loads
that are suitable for real-time applications on low-power
processors will not only advance the capabilities of highly
specialized navigation systems, like those used in driverless
cars and precision agriculture, but it will also improve
location services accessed through mobile phones and other
personal devices, without increasing their cost," Farrell said.

New glass technology discovered: Window doubling as a huge TV?


Kenneth Chau (left) and and Loïc Markley (right)coated small pieces of glass with extremely thin layersof metal.
Imagine if the picture window in your living room could double
as a giant thermostat or big screen TV. A discovery by
researchers at the University of British Columbia has
brought us one step closer to this becoming a reality.

Researchers at UBC's Okanagan campus in Kelowna found
that coating small pieces of glass with extremely thin layers
of metal like silver makes it possible to enhance the amount
of light coming through the glass. This, coupled with the
fact that metals naturally conduct electricity, may make it
possible to add advanced technologies to windowpanes and
other glass objects.

"Engineers are constantly trying to expand the scope of
materials that they can use for display technologies, and
having thin, inexpensive, see-through components that
conduct electricity will be huge," said UBC Associate

Professor and lead investigator Kenneth Chau. "I think one
of the most important implications of this research is the
potential to integrate electronic capabilities into windows
and make them smart."

The next phase of this research, added Chau, will be to
incorporate their invention onto windows with an aim to
selectively filter light and heat waves depending on the
season or time of day.

The theory underlying the research was developed by Chau
and collaborator Loïc Markley, an assistant professor of
engineering at UBC. Chau and Markley questioned what
would happen if they reversed the practice of applying
glass over metal--a typical method used in the creation of
energy efficient window coatings.

"It's been known for quite a while that you could put glass
on metal to make metal more transparent, but people have
never put metal on top of glass to make glass more
transparent," said Markley. "It's counter-intuitive to think
that metal could be used to enhance light transmission, but
we saw that this was actually possible, and our experiments
are the first to prove it."

Friday, February 12, 2016

Hacker Posts Stolen Data on FBI, Homeland Security Employees Online

T he U.S. departments of Justice and Homeland Security on
Monday announced they were investigating reports that a
hacker broke into government computer systems and stole
sensitive information about employees at the agencies.

The hacker posted stolen information for about 9,000 DHS
employees online Sunday and made public data on 20,000 FBI
employees Monday.

"We are looking into the reports of purported disclosure of
DHS employee contact information," DHS said in a statement
provided to TechNewsWorld by spokesperson S.Y. Lee.

"We take these reports very seriously; however, there is no
indication at this time that there is any breach of sensitive or
personally identifiable information," the department added.
A DOJ spokesperson wasn't immediately available for comment
for this story.

The department was investigating "unauthorized access of a
system operated by one of its components containing employee
contact information," DOJ spokesperson Peter Carr told The
Guardian, adding that no sensitive personally identifiable
information appeared to have been compromised
Cobweb Data

DHS data posted to the Web contained phone numbers and
email addresses of people who hadn't worked for the agency
in years, according to an examination of the information by
Kwetu Shy blog. The data also included outdated titles.
Motherboard reported the data theft Sunday, saying a hacker
had turned the stolen information over to it and announced
his intention to go public with the information.

Using the compromised email account of a DOJ employee, he
used social engineering to get into the agency's intranet and
download 200 GB of files, the hacker explained to
Motherboard.

After failing to penetrate a DOJ Web portal, the hacker said,
he phoned a government department, acted like a newbie, and
was given a code for accessing the portal by an employee.

Once inside the portal, the hacker said he gained access to
the computer used by the person whose email he had
compromised. From there, he had access to DOJ's internal
network.

Untied Shoes
As cyberattacks go, this one was an unsophisticated one.
"It was a fairly simplistic attack combined with social
engineering, but audacious when you're going after an FBI
employee," said Richard Stiennon, chief research analyst with
IT-Harvest .

It's easy for complacency to set in at high-volume call
environments such as government help desks, he told
kwetu shy blog

"If you flood a help desk with password reset requests and
similar requests without any negative consequences, eventually
operators are going to get comfortable handing out login
tokens," Stiennon explained.

This breach illustrates that no matter how secure a system is
believed to be, it always has an Achilles' heel, noted Jeff Hill,
channel marketing manager for Stealthbits Technologies.
"All the advanced algorithms, machine learning and log
aggregators can't protect an organization from a gullible
employee susceptible to the 'Look, your shoe's untied' ruse," he
told Kwetu Shy blog

Weakest Link
Organizations need to monitor employee behavior if they want
to be secure, Hill noted.

"In today's world, the best cybersecurity strategy is to look for
and identify suspicious behavior of legitimate accounts," he said.
"Believing that a security plan can realistically prevent
motivated hackers from compromising credentials in the first
place is naïve at best," Hill said.

While some organizations have turned to training to combat
employee exploitation by hackers, training is not enough,
maintained Chase Cunningham, director of cyberthreat
research and innovation at Armor , formerly FireHost.
"Government thinks it can train its workforce out of this, but
this is proof that that's not the case," he told
Kwetu shy blog.

"Government is bound by the budget it's given, so it can't
replace people with technology," he added, "even though that
would be the best solution in a lot of cases."

HTC One M10 to feature 5.2 inch display and 12Mp rear camera with OIS

HTC One M10 to feature 5.2 inch display and
12MP rear camera with OIS

By Kwetu Shy blog / 12 Feb 2016, 19:02
HTC’s One M10 is easily their most eagerly anticipated
device since the M9 a year earlier.

The internet abounds with rumours as to the device’s configuration.
We now hear that the device will sport a Sony
IMX377 12MP, 1.55um sensor with laser
autofocus, phase-detection autofocus and optical
image stabilisation (OIS). The front camera is
purported to be a Samsung s5k4e6 5MP, UltraPixel
sensor. We’re curious to see how the M10’s camera
will fare considering that it seems to be using the
same sensor as the Nexus 6P and 5X .

Lending some credence to the rumours however, is
Llabtoofer , one of the more reliable sources on
HTC’s devices in general. He also claims that the
device will boast of a 5.2 inch, WQHD screen rather
than the 5.1 inch screen that some suspected.

Evan Blass , the guy who leaked the initial
image of the HTC One M10 also added that the
device is expected to see a May 9th release date in
the US.

Wednesday, February 10, 2016

iPhone 7: concept sketch suggests 'liquidmetal' handset might be waterproof

Technology

Description : Ukrainian designer Herman Haidin
investigates the possibility of a fully waterproof iPhone

Concept sketches for upcoming iPhones tend to come in
two distinct flavours: those that try to imagine what the
next generation will actually be and those that simply
investigate what it could potentially be.

Designer Herman Haidin's drawings definitely fall into the
latter category.

In a series of sketches published on Behance.ne t, the
Ukrainian imagines an iPhone constructed from "liquidmetal"
– for which Apple acquired the patent in 2010 and could
potentially make the handset completely waterproof.


So what is liquidmetal? Many of us already own a piece of
it - every iPhone box sold today comes with a small piece of
the material in it: the small prong SIM ejector.

Liquidmetal is an alloy with "an amorphous atomic structure
and a multi-component chemical composition", tech site BGR
says. "The special metal has high tensile strength, corrosion
resistance, water resistance and better elasticity."

In his concept sketch, Haidin imagines the iPhone 7 with a
layer of liquidmetal incorporated just beneath the screen to
act as the cooling system for the new handset and help its
internal components stay dry.

Samsung has officially announced an event believed to be the unveiling of the Galaxy S7 edge

Samsung has officially announced an event believed to be the
unveiling of the Galaxy S7 and its stable-mates, the firm
posted a video to its YouTube channel revealing the Samsung
Unpacked 2016 event for February 21 - it'll take place in
Barcelona just a day before CES, and kicks off at 18:00
GMT. As we've mentioned before, Samsung has brought new
Galaxy S flagship hardware to such Unpacked events before
MWC for the last few years, so we're pretty certain
(considering other rumours also support this) that the new
devices will be at the event. Not only that but the firm
hashtagged the video with #TheNextGalaxy and the tagline
"get ready to rethink what a phone can do." It's worth noting
the GearVR headset features prominently in the promo, so
there'll probably be some tie-in involved.
Samsung Galaxy S7 Rocks Up In AnTuTu
Wearing Snapdragon 820

Sunday, February 7, 2016

North Korean rocket puts object into space, angers neighbours, U.S



SEOUL- North Korea launched a long-range rocket
on Sunday carrying what it called a satellite, but its neighbours
and the United States denounced the launch as a missile test,
conducted in defiance of U.N. sanctions and just weeks after
a nuclear bomb test.

The U.S. Strategic Command said it had detected a missile
entering space, and South Korea's military said the rocket had
put an object into orbit.

North Korea said the launch of the satellite
Kwangmyongsong-4, named after late leader Kim Jong Il, was
a "complete success" and it was making a polar orbit of Earth
every 94 minutes. The launch order was given by his son,
leader Kim Jong Un, who is believed to be 33 years old.
The launch prompted South Korea and the United States to
announce that they would explore the feasibility of deploying an
advanced missile defence system in South Korea, which China
and Russia both oppose, "at the earliest possible date."

North Korea's state news agency carried a still picture of a
white rocket that closely resembled a previously launched
rocket, lifting off. Another showed Kim surrounded by cheering
military officials at what appeared to be a command centre.
North Korea's last long-range rocket launch, in 2012, put
what it called a communications satellite into orbit, but no signal
has ever been detected from it.

"If it can communicate with the Kwangmyongsong-4, North
Korea will learn about operating a satellite in space," said
David Wright, co-director and senior scientist at the Global
Security Program of the Union of Concerned Scientists.
"Even if not, it gained experience with launching and learned
more about the reliability of its rocket systems."

The rocket lifted off at around 9:30 a.m. Seoul time (0030
GMT) on a southward trajectory, as planned. Japan's Fuji
Television Network showed a streak of light heading into the
sky, taken from a camera at China's border with North
Korea.

North Korea had notified U.N. agencies that it planned to
launch a rocket carrying an Earth observation satellite,
triggering opposition from governments that see it as a long-
range missile test.

The U.N. Security Council will hold an emergency meeting on
Sunday to discuss the launch, at the request of the United
States, Japan and South Korea, diplomats said.

Isolated North Korea had initially given a Feb. 8-25 time frame
for the launch but on Saturday changed that to Feb. 7-14,
apparently taking advantage of clear weather on Sunday.
North Korea's National Aerospace Development Administration
called the launch "an epochal event in developing the country's
science, technology, economy and defence capability by
legitimately exercising the right to use space for independent
and peaceful purposes".

The launch and the Jan. 6 nuclear test are seen as efforts
by the North's young leader to bolster his domestic legitimacy
ahead of a ruling party congress in May, the first since 1980.
North Korea's embassy in Moscow said in a statement the
country would continue to launch rockets carrying satellites,
according to Russia's Interfax news agency.

NEW MISSILE DEFENCE?

South Korea and the United States said that if the advanced
missile defence system called Terminal High Altitude Area
Defence (THAAD) was deployed to South Korea, it would be
focussed only on North Korea.

South Korea had been reluctant to discuss openly the possibility
of deploying THAAD.

"North Korea continues to develop their nuclear weapons and
ballistic missile programs, and it is the responsibility of our
Alliance to maintain a strong defence against those threats,”
Gen. Curtis M. Scaparrotti, U.S. Forces Korea commander, said
in a statement. "THAAD would add an important capability in a
layered and effective missile defence."

China, South Korea's biggest trading partner, repeated what it
says is "deep concern" about a system whose radar could
penetrate its territory.

South Korea's military said it would make annual military
exercises with U.S. forces "the most cutting-edge and the
biggest" this year. North Korea objects to the drills as a
prelude to war by a United States it says is bent on toppling
the Pyongyang regime.

The United States has about 28,500 troops in South Korea.
U.S. Secretary of State John Kerry said the United States
would work with the U.N. Security Council on "significant
measures" to hold North Korea to account for what he called
a flagrant violation of U.N. resolutions on North Korea's use
of ballistic missile technology.

South Korea's navy retrieved what it believes to be a fairing
used to protect the satellite on its journey into a space, a sign
that it is looking for parts of the discarded rocket for clues
into the isolated North's rocket programme, which it did
following the previous launch.

China expressed regret over the launch and called on all sides
to act cautiously and refrain from steps that might raise
tension. China's Foreign Ministry said late on Sunday that it
had summoned the North Korean ambassador to "make
representations and make clear China's principled position".
China is North Korea's main ally, but it disapproves of its
nuclear weapons programme.

Russia, which has in recent years forged closer ties with North
Korea, said the launch could not but provoke a "decisive
protest", adding Pyongyang had once again demonstrated a
disregard for norms of international law.

"We strongly recommend the leadership of the Democratic
People's Republic of Korea think about whether a policy of
opposing the entire international community meets the interests
of the country," Russia's foreign ministry said in a statement.
U.N. Secretary-General Ban Ki-moon strongly condemned the
launch and urged North Korea to "halt its provocative actions".
South Korean President Park Geun-hye said it was an
unforgivable act of provocation.

Australia condemned what it called North Korea's dangerous
conduct while Japanese Prime Minister Shinzo Abe said the
launch was "absolutely unacceptable", especially after the
North's nuclear test last month.

North Korea has said that its fourth nuclear test was of a
hydrogen bomb. The United States and other governments
have expressed doubt over that claim.

North Korea is believed to be working on miniaturising a nuclear
warhead to put on a missile, but many experts say it is some
way from perfecting such technology.

It has shown off two versions of a ballistic missile resembling a
type that could reach the U.S. West Coast, but there is no
evidence the missiles have been tested.


Created By Blogget