welcome to TECHNO WORLD
Showing posts with label Technology Updates. Show all posts
Showing posts with label Technology Updates. Show all posts

Saturday, 6 September 2014

Google Starts Selling Glass ‘Explorer Edition’ On The Play Devices Store

We already know Google Glass a mighty New Technology Era .. so as to make it as soon as possible ..  Google Started selling it's great Tech innovation of Google Glass


Google is selling the Glass Explorer Edition on its Play devices store, still for $1,500, with your choice of a free frame or sunglass shade in the mix. The Glass model listed is still very much Google’s experimental product, but the descriptions in the listing make it sound more like falling into the category of an “Explorer” is now more about how many extreme sports you’re involved in than how comfortable you are with alpha software builds.
Putting Glass up on its devices storefront signals yet another widening of the availability of the wearable computer, after Google first opened up the program to everyone (instead of just those invited to participate) temporarily, and then permanently. By making it easier to find and acquire, Google is slowly broadening its potential user base for the devices, even if it isn’t making any claims about a consumer launch or taking the hardware out of beta.
I remain skeptical about the future of Glass, and whether we’ll see it evolve into something beyond the marginal curiosity it is today, but Google putting it up on its main devices store should at least remind people that it’s still around, and that developers are still building software for the face-based computer. It’s also interesting that it’s for sale just under Android Wear, which is the platform I see Google betting on for wearables in the foreseeable future. For those wondering if this Play launch means it’s making its way to other countries finally, the answer, sadly, is no.



Friday, 4 April 2014

Google has released a video (embedded below) showing a glimpse of what’s going on behind the scenes at Project Ara, one of the hardware shunkworks projects coming out of its Advanced Technology and Projects (ATAP). The ATAP group is also working on a 3D mapping handset which Google showed off in February, called Project Tango.




Google has released a video (embedded below) showing a glimpse of what’s going on behind the scenes at Project Ara, one of the hardware shunkworks projects coming out of its Advanced Technology and Projects (ATAP). The ATAP group is also working on a 3D mapping handset which Google showed off in February, called Project Tango.
Project Ara is the codename for the modular phone concept that Motorola was working on, and which Google retained when it sold the rest of Motorola Mobility to Lenovo.
As Google’s moonshots go, Project Ara is relatively tame — compared to Project Loon‘s connectivity balloons, say. Or the biggie, Calico: Google’s attempt to hack death.
But deconstructing the complexity of a smartphone and refashioning it as a bunch of swappable components which can be slotted together in various custom combinations by the user is clearly no cake walk.
Nor is getting people to grok the concept of speccing out their own phone in hardware terms. (Although, really, when you think about it, the modular hardware concept is much like the modular software that users are now very comfortable with — aka apps.)
Designing an interface to explain the modular smartphone concept to users is something the video touches on, with an Ara configurator app shown to be in the works. ”We’re really trying to make this interface as simple as possible, and as spacially intuitive as we can,” says Eric Gunther, co-founder of SoSo Ltd, an interactive design studio that’s working with Google’s ATAP on the design of this app.

The connecting force Google is going to use to bind all the phone blocks in each modular device is magnetism. Or “electro-permanent magnetism”, as the video puts it — which presumably means the magnetism is switched on when you want the device to stay together, and off when you want to swap out components.
Making sure those connections are robust enough for everyday use is going to be a key requirement of the Ara project. Things fall apart, sure; but smartphone owners aren’t going to want their phone to do so in their jacket pocket.

The video also includes a view of the metal exoskeleton where prototype modules are being tested by the ATAP team:

Plus, there’s a glimpse of how different size configurations of the modular device might look in terms of end-user design —  with phablet, standard and small handsets being specced out – albeit, in render form at this nascent stage:


The most interesting thing about the video — which very much has the feel of a crowdfunding pitch video you might find on Kickstarter or Indiegogo — is that Google is clearly continuing to put marketing muscle behind Project Ara to try to get outsiders excited about the prospect of a modular device.
It’s running a two-day developer conference for the device this month, which likely explains the release timing of this video.
The conference is the first in a series planned for this year, with the first event focusing on the alpha release of the Ara Module Developers’ Kit (MDK) — to get developers building Ara modules. More events are planned, so expect more details about Ara to keep dropping, piece by piece. source by TC.




FireChat for Android launched, lets users chat without a data connection




A new mobile messaging application called FireChat is empowering nearby smartphone users to stay in touch even when there's no cellular service or Internet connection.
In just two weeks since its release on the iPhone, FireChat already has provided a flicker of hope for people pining for more effective, secure and affordable ways to communicate. That's because the free messaging app harnesses a technology called wireless mesh networking, which might someday allow a myriad of devices to connect like links in a chain.
The technique might someday be used to tie together thousands of devices with built-in radios and make it possible to be online without having to pay for the access. It could also enable online communications in remote areas or disaster zones without Wi-Fi or cellular signals. Furthermore, the conversations in these so-called "off-the-grid" networks can't be easily hacked into by spies and mischief makers or shut down by governments trying to stifle free speech.
"We trying to create networks built by the people for the people," said Micha Benoliel, CEO of Open Garden, maker of the FireChat app.
Open Garden, a San Francisco startup with just 10 employees, is taking another step toward its ambitious goal with Thursday's release of a FireChat app for Android phones.
FireChat could be an even hotter commodity on Android given the demographic differences between that platform's user base and the typical iPhone owner. The app already has been installed on more than 1 million iOS devices.


Many smartphones running on Google Inc.'s free Android software are cheaper than Apple Inc.'s iPhone. That has made Android phones the top-selling mobile devices in less affluent countries, including in regions where Internet access is inadequate or expensive.
Google is among the big Internet companies intrigued with mesh networking's potential to bring more of the world online.
Sundar Pichai, Google's executive in charge of Android, has touted mesh networks as a way to connect wearable computers, such as the company's Glass eyewear. Mesh networks also could be used to bring a wide variety of everyday appliances online, helping to build an Internet of things instead of just websites.
FireChat's reach so far is limited. When connecting off the grid, iPhone app users have only been able to send text and photos to other FireChat users within a range of 30 to 100 feet.
Later this year, Open Garden plans to upgrade FireChat's iPhone app so off-the-grid users will be able to hopscotch through a daisy chain of devices to extend the reach of a local network. If this works, a FireChat user sitting in the right-field bleachers of a baseball game would be able to text with a friend on the other side of the stadium if enough other iPhone users in the ballpark also are on FireChat.
This extended range will be available immediately on FireChat's Android app because Open Garden released a mesh networking app for that operating system nearly two years ago.
FireChat's iPhone app piggybacks on an often overlooked feature called the Multipeer Connectivity Framework that Apple Inc. included in its latest mobile operating system, iOS 7, released last September. Apple says more than 80 percent of people using its mobile devices rely on iOS 7.
For now, Android phones and iPhones with the FireChat app won't be able to engage in off-the-grid conversation. Open Garden, though, believes it will eventually be able to make mesh networking work on phones running on different operating systems.
As the mesh networking software improved, Benoliel realized Open Garden needed to come up with application to demonstrate what the technology could do. In that practical sense, FireChat is similar to the word processing and spreadsheet programs that Microsoft released decades ago to help broaden the appeal of its Windows operating system for personal computers, said Christophe Daligault, Open Garden's marketing chief.
FireChat's development was driven by the popularity of other mobile messaging apps such as Snapchat and WhatsApp that enabled smartphone users to text and send pictures to their friends and family without having to pay smartphone carriers.
Like texts and photos sent on Snapchat, nothing transmitted through FireChat is saved. All content evaporates once the app is closed. FireChat also allows all its users to remain anonymous, another feature that is becoming popular on a variety of mobile messaging apps, such as Wickr and Rumr.
There still aren't enough people using FireChat to ensure users will find someone nearby to message. To pique people's interest in the app, FireChat offers an "everyone" option that allows users to enter a digital chat room with up to 80 other random users located in the same country. This option requires a Wi-Fi or cellular connection.
Dailigault concedes FireChat's chat room isn't as high-minded as mesh networking.
"We are finding a lot of people are using it when they are just looking for something to do for a few minutes," Dailigault said. "Some of the discussions there are turning out to be more interesting than anything they can find on Facebook."



Sunday, 23 March 2014

A new programming Language Introduced by Facebook - { hack }



Facebook has just released [ Introduced ]  a new programming language called 'HACK', designed to build complex websites and other software quickly and without many flaws and also the main motive of decreasing resource conservation. The company has already migrated almost all of its PHP-based social networking site to HACK over the last year, but it has nothing to do with Hacking.

Facebook :- 
Today we're releasing Hack, a programming language we developed for HHVM that interoperates seamlessly with PHP. Hack reconciles the fast development cycle of PHP with the discipline provided by static typing, while adding many features commonly found in other modern programming languages.
We have deployed Hack at Facebook and it has been a great success. Over the last year, we have migrated nearly our entire PHP codebase to Hack, thanks to both organic adoption and a number of homegrown refactoring tools.
We're also proud to release an open source version of Hack to the public at http://hacklang.org/ as part of our HHVM runtime platform, which will now support both Hack and PHP.

Download Link:- http://docs.hhvm.com/manual/en/install.php 


Official site :- http://hacklang.org/



Thus, Hack was born! Facebook Team decides to develop a new programming language that could combine elements of static-type programming languages such as C or C++ with dynamic-type languages like PHP, now called "HACK Programming Language".

"Hack has deep roots in PHP. In fact, most PHP files are already valid Hack files." Facebook said, "We have also added many new features that we believe will help make developers more productive."

HACK is a new version of PHP, requires Facebook’s HHVM (Hip Hop Virtual Machine) which is designed to execute programs written in Hack and PHP. The top 20 open source frameworks on Github run on HHVM.











by Facebook's - { hack } official site  :- 
The following are some of the important language features of Hack. For more information, see the full documentation, or follow through the quick interactive tutorial.
  • Type Annotations allow for PHP code to be explicitly typed on parameters, class member variables and return values:
<?hh
class MyClass {
const int MyConst = 0;
private string $x = '';
public function increment(int $x): int {
$y = $x + 1;
return $y;
}
}
  • Generics allow classes and methods to be parameterized (i.e., a type associated when a class is instantiated or a method is called) in the same vein as statically type languages like C# and Java):
<?hh
class Box<T> {
protected T $data;
public function __construct(T $data) {
$this->data = $data;
}
public function getData(): T {
return $this->data;
}
}
  • Nullable Types are supported by Hack through use of the ? operator. This introduces a safer way to deal with nulls and is very useful for primitive types that don’t generally allow null as one of their values, such as bool and int (using ?bool and ?intrespectively). The operator can be used on any type or class.
  • Collections enhance the experience of working with PHP arrays, by providing first class, built-in parameterized types such as Vector (an ordered, index-based list), Map(an ordered dictionary), Set (a list of unique values), and Pair (an index-based collection of exactly two elements).
  • Lambdas offer similar functionality to PHP closures, but they capture variables from the enclosing function body implicitly and are less verbose:
<?hh
function foo(): (function(string): string) {
$x = 'bar';
return $y ==> $x . $y;
}
function test(): void {
$fn = foo();
echo $fn('baz'); // barbaz
}
Other significant features of Hack include ShapesType AliasingAsync support, andmuch more

Stay tuned to +Techno World  for more Technology updates  



Wednesday, 12 February 2014

Yamaha is ready to preparing R15 Version 3 and a big FZ updates for India

We  have learnt from our sources that Yamaha plans to launch one more scooter before it shifts focus back to motorcycles. Yamaha says the volumes are important and being in the scooter space and consolidating its success and sales growth is critical.
To that end, the company has oft late, been reluctant to talk motorcycles lest the message about Yamaha scooters be diluted. That, however, is set to change.
We understand that while the R25 is still some time away (and we think the IndianR25 may not have that international parallel twin engine), Yamaha is working hard to bring to market a new R15 V3.
Yamaha has only rolled out one significant update in the entire history of the R15 and we believe 2014 is when the second update comes. We believe that there will be updated styling and bits but the significant update will be a change to the the ECU which will bring most likely a smoother, fatter torque curve and perhaps a minor rise in power. There is no official word on this motorcycle’s launch plan, but we believe Yamaha will have this on sale before the festive season this year.
Yamaha is also working on an update for the FZ and contrary to the rumours of a 250cc FZ, what we are likely to get is some styling updates – see the FZ concept images for the sort of look we are talking about and a larger engine, perhaps 165-170cc for more torque and power. If Yamaha rolls this out at the same or similar price tag, then the FZ, which is a popular motorcycle in the 150cc segment, should see its popularity reignited.



Monday, 3 February 2014

Which Social Networks Should You Care About in 2014 and few detailed infographic view about Facebook ,twitter,you-tube,goggle+ ... from 2014


It’s hard to believe that Facebook will be ten years old this February and yet social media still seems new to many of us. Brands are struggling as much as they ever have done to understand what to do with it, and which networks actually have any real value. I noticed a number of social challenges that brands faced in 2013 but probably the two most common questions I got asked were:
  1. Which social networks should I focus on?
  2. How much of my time and resources should I allocate to each one?
The answers to these questions are not as complicated as people often think, but neither is there correct answer to either of them. Many people have written blog posts suggesting that they have the answer – but rather than add my own opinions to that long list, I thought I’d just look at the data to see where the world seems to have been spending it’s time over the last 12 years. (Infographic created in Adobe Photoshop obviously!)…

The figures… source by backtohack
I’ve purposely focused here on the total number of user profiles for each network*. I did this purely for the sake of comparison (rather than daily / monthly active users), so before anyone bursts a blood vessel and calls me out in the comments, let’s save the messy debate around active v inactive fans for another time. All I want to do here is look at which social networks people have chosen to join over the last decade or so.
 The figures themselves highlight a couple of interesting points that social media executives often miss:
  • There are almost as many social profiles just among these 21 networks, as there are people in the world!
  • Many business people forget that China has 3 of the world’s largest and most powerful social networks. (Sina Weibo for example has the same market penetration in China that Twitter does in the US).
  • Some of the Middle Eastern brands I spoke to last year told me that YouTube was far more valuable to their brand than either Twitter and Facebook, and they built their social strategies accordingly.
  • Many Spanish brands have chosen to focus their efforts on the local network Tuenti instead of Facebook.
  • The oldest social network on the list Friendster, has a surprisingly large and active fan base (admittedly now with a different purpose than it was created for).
  • Bebo is still going and planning to be properly re-launched again by original co-founder Michael Birch.
  • Google+ (the network we all like to poke fun at), has become the place for commenting on YouTube.
  • Market analysts suggested in 2013 that Pinterest (not even 4 years old), had double the click-through-rate of Twitter and drove 2x the average order value of Facebook, even though it only has 5% of the user base.
  • Russian network VK is bigger than Instagram globally with a massive 228m registered users.
  • SnapChat (hacking issues aside), 2013 saw more photos distributed on SnapChat (up to 400m each day) than there was on Facebook.
  • But… old-timer Orkut (the forgotten Brazilian network owned by Google) is still “bigger” than the trendy new kid on the block SnapChat.
“All of this is very interesting, but just because these appear to be the world’s largest networks, still doesn’t mean you should be paying attention to them…”





Sunday, 19 January 2014

Get Alert notification when some unfriend you from Facebook - how to see some one unfriended me




Unfriend Notify is a free extension available for both Chrome and Firefox that alerts you when someone has unfriended you on Facebook. Addictive Tips originally covered it as a Chrome extension, but as it turns out by visiting the extension's Web site, you'll also find a Firefox extension.
Without an extension such as Unfriend Notify, there isn't a straightforward method to discovering who has deleted you as a friend on Facebook. The only two methods available from Facebook directly are to browse through your friends list and try to figure out who is missing, or you can search for someone specifically if you suspect they have deleted you. Neither method is user-friendly, and both can take up a fair amount of your time.
By installing the Unfriend Notify extension you'll find a "Lost Friends" link is placed at the top of your friends list. The link, after someone has unfriended you, will include a number indicating how many people have recently unfriended you.
When Chrome or Firefox is running and the extension discovers someone has unfriended you it will even display an alert, letting you know of the tragic event.
The extension is free, requires no setup other than installation, and starts working instantly. Unfortunately there's no way for the extension to tell you who has unfriended you prior to installing it, but going forward it should work as advertised. source by cnet.
You can find the Firefox version here, or the Chrome version here.



Friday, 17 January 2014

What is Malware ? and Types of Malicious Software's and Trojan Horse , Logic Bomb , Back Door or Trap Door , Virus, worm , rabbit, spyware, adware, Zombies of different virus and malware Documentation




What is Malware ? 

Malware is a malicious software. This software include the program
that exploit the vulnerabilities in computing system. The purpose of
malicious software is harm you or steal the information from you.



Types of Malicious


Softwares:

There are three characteristics of malwares:
1 Self-replicating malware actively attempts to propagate by creating
new
copies, or instances, of itself. Malware may also be propagated
passively,
by a user copying it accidentally, for example, but this isn't self-
replication.
2 The population growth of malware describes the overall change in
the number
of malware instances due to self-replication. Malware that doesn't
selfreplicate
will always have a zero population growth, but malware with a
zero population growth may self-replicate.
3 Parasitic malware requires some other executable code in order to
exist.
"Executable" in this context should be taken very broadly to include
anything
that can be executed, such as boot block code on a disk, binary code




Trojan Horse :


Self-replicating: no
Population growth: zero
Parasitic: yes
The most famous malicious software is Trojan
Horse.
There was no love lost between the Greeks and the Trojans. The
Greeks had
besieged the Trojans, holed up in the city of Troy, for ten years. They
finally
took the city by using a clever ploy: the Greeks built an enormous
wooden horse,
concealing soldiers inside, and tricked the Trojans into bringing the
horse into
Troy. When night fell, the soldiers exited the horse and much
unpleasantness
ensued.
In computing, a Trojan horse is a program which purports to do some
benign
task, but secretly performs some additional malicious task. A classic
example is
a password-grabbing login program which prints authentic-looking
"username"
and "password" prompts, and waits for a user to type in the
information. When
this happens, the password grabber stashes the information away for
its creator,
then prints out an "invalid password" message before running the real
login
program. The unsuspecting user thinks they made a typing mistake
and reenters
the information, none the wiser.




Logic Bomb:

Self-replicating: no
Population growth: zero
Parasitic: possibly
The oldest type of malicious software. This
program is embedded with some other program. When certain
condition meets, the logic bomb will destroy your pc.
It also crash at particular date which is fixed by attacer. It will be
included in legitimate or authorized person like this:
legitimate code
if date is Friday the 13th:
crash_computerO
legitimate code
Eg:
if some antivirus trying to delete or clean the logic bomb. The logic
bomb will destroy the pc.


Back Door or Trap Door :     
                       


Self-replicating: no
Population growth: zero
Parasitic: possibly
A back door is any mechanism which bypasses
a normal security check. Programmers
sometimes create back doors for legitimate reasons, such as skipping
a time-consuming authentication process when debugging a network
server.
As with logic bombs, back doors can be placed into legitimate code or
be
standalone programs.
username = read_username()
password = read_password()
if tisername i s "133t h4ck0r":
return ALLOW^LOGIN
if username and password are valid:
return ALLOW_LOGIN
e l s e:
return DENY^LOGIN
One special kind of back door is a RAT, which stands for Remote
Administration
Tool or Remote Access Trojan, depending on who's asked. These
programs
allow a computer to be monitored and controlled remotely;


Virus:            

                                   
Self-replicating: yes                    
Population growth: positive
 Parasitic: yes                                           
A virus is malware that, when executed, tries to replicate itself into                  
other executable                                                
code; when it succeeds, the code is said to be infected. The infected
code, when run, can infect new code in turn. This self-replication into
existing
executable code is the key defining characteristic of a virus.


Types of Virus

1.Parasitic virus:
Traditional and common virus. This will be attached with EXE files
and search for other EXE file to infect them.

2. Memory Resident Virus:
Present in your system memory as a system program. From here
onwards it will infects all program that executes.

3. Boot Sector Virus:
Infects the boot record and spread when the system is booted from
the disk containing the virus.

4. Stealth Virus:
This virus hides itself from detection of antivirus scanning.



Worm:    

                                               Self-replicating: yes 

Population growth: positive                                       
Parasitic: no                                                              
A worm shares several characteristics with a        
virus


The most important characteristic                                
is that worms are self-replicating too, but self-replication of a worm
is distinct in two ways. First, worms are standalone, and do not rely on other                                          
executable code. Second, worms spread from machine to machine
across networks.                                                





Rabbit:

Self-replicating: yes
Population growth: zero
Parasitic: no
Rabbit is the term used to describe malware that multiplies rapidly.
Rabbits
may also be called bacteria, for largely the same reason.
There are actually two kinds of rabbit.The first is a program which tries
to consume all of some system resource, like disk space. A "fork
bomb," a
program which creates new processes in an infinite loop, is a classic
example
of this kind of rabbit. These tend to leave painfully obvious trails
pointing to
the perpetrator, and are not of particular interest.
The second kind of rabbit, which the characteristics above describe, is
a
special case of a worm. This kind of rabbit is a standalone program
which
replicates itself across a network from machine to machine, but deletes
the
original copy of itself after replication. In other words, there is only
one copy
of a given rabbit on a network; it just hops from one computer to
another.
Rabbits are rarely seen in practice.




Spyware:


Spyware is software which collects information
from a computer and transmits
it to someone else.
The exact information spyware gathers may
vary, but can include anything
which potentially has value:

1 Usernames and passwords. These might be harvested from files on
the
machine, or by recording what the user types using a key logger. A
keylogger
differs from a Trojan horse in that a keylogger passively captures
keystrokes
only; no active deception is involved.

2 Email addresses, which would have value to a spammer.

3 Bank account and credit card numbers.

4 Software license keys, to facilitate software pirating.
Definitions



Adware:




Self-replicating: no
Population growth: zero
Parasitic: no
Adware has similarities to spyware in that both
are gathering information about
the user and their habits. Adware is more
marketing-focused, and may pop up
advertisements or redirect a user's web browser to certain web sites in
the hopes
of making a sale. Some adware will attempt to target the advertisement
to fit
the context of what the user is doing. For example, a search for
"Calgary" may
result in an unsolicited pop-up advertisement for "books about
Calgary."
Adware may also gather and transmit information about users which
can be
used for marketing purposes. As with spyware, adware does not self-
replicate.


Zombies



Computers that have been compromised can be used by an attacker for
a
variety of tasks, unbeknownst to the legitimate owner; computers used
in this
way are called zombies. The most common tasks for zombies are
sending spam
and participating in coordinated, large-scale denial-of-service attacks.

Signs that your system is Infected by Malware:

Slow down, malfunction, or display repeated error messages
Won't shut down or restart
Serve up a lot of pop-up ads, or display them when you're not
surfing the web
Display web pages or programs you didn't intend to use, or send
emails you didn't write.