Wednesday, December 10, 2014

Google’s Project Ara store



Google’s Project Ara modular smartphone dream may not be a reality yet, but in preparation, it’s building an online marketplace for parts already. The company struck a deal with software solutions company Globant to work on a modular smartphone parts marketplace that’s as easy to use as the Google Play Store.

Ideally, the marketplace will serve as a one-stop shopping center for those brave, adventurous souls who want to build their own smartphones piece by piece. Presumably, companies – whether it’s small independents, or well-known manufacturers such as LG, Samsung, and Sony – will sell components and modules for Project Ara directly to the public, much like the Play Store works for apps.

In a statement, Globant said Google hopes Project Ara will create “a two-sided market between module developers and consumers, with module developers gaining direct access to consumers (versus having to market to original equipment manufacturers), and consumers benefiting from a more diverse ecosystem of functional hardware options for their device.”

Once all the different modules are on the site, users will be able to browse through components and decide which camera module, processor, storage option, and other features they want on their modular smartphone. Just like the Google Play Store, the Project Ara component marketplace will feature user reviews of different modules and recommendations from early adopters. It’s unclear whether the site will offer a how-to guide for users who want to build their own phones, or if all the components will be compatible with each other.

Obviously, it’s still early days for Project Ara and its marketplace will undoubtedly take clearer shape once Google announces it’s ready to bring modular phones to the world. Although the Project Ara team does have a working prototype running Android, it seems unlikely the project will be ready to go live at the second Project Ara Developers Conference in January. The team is expected to reveal a new Ara Module Developers Kit and an update on its progress at the event.

Visit Us : @ Hyperjet

Thursday, November 13, 2014

Navdy's transparent Head-Up Display (HUD)





A modern heads-up display (HUD) projects a great deal of what was traditionally shown on a car’s instrument panel onto the windscreen, and is becoming must-have equipment for high-end modern cars. However, as many of us don’t drive high-end expensive cars, we don’t get to take advantage of this technology. That’s where Navdy comes in. Currently in prototype form, the device promises to bring a projection display with voice and gesture controls to any car.

The Navdy prototype HUD integrates with your smartphone and your car’s instruments (accessed via the vehicle’s OBD II port) to emulate the functionality of a high-end projection display, whilst adding voice and gesture controls. To achieve this, the creators claim that the device can be paired with an iPhone (iOS 7+) or Android (4.3+) to allow any function that your phone has – such as maps, messages, and music streaming – to be accessed (or even read aloud) by Navdy.

A built-in infrared camera provides touchless gesture control so that drivers can answer a call by swiping left or dismiss it by swiping right, while the voice recognition capabilities of Siri or Google voice, depending on your phone, can also be used to initiate phone calls or to dictate texts or social media comments.
Navigation capabilities, complete with alerts and turn-by-turn directions are also provided, with the added bonus that the on-screen navigation doesn't vanish when a call comes in. Instead the navigation continues whilst the conversation takes place, allowing you to talk to someone without getting lost.



The Navdy team says their device will also display information, such as speed, RPM, distance-to-empty, fuel economy, tire-pressure warning or battery-voltage warning, all from the car’s computer, provided that your car is built after 1996 and has an OBD II port – and you plug it into it.

Boasting a dual core processor running Android 4.4, a 5.1 in (12.9 cm) wide display, an accelerometer, e-compass, ambient light sensor, Wi-Fi (802.11 b/g/n), Bluetooth 4.0/LE, along with audio out via Bluetooth or 3.5 mm jack, a mini-USB port, and an Internal speaker and microphone, the Navdy certainly appears to be prepped with all the features to meet its claimed capabilities.

Of course, there are other aftermarket HUD devices out there – the Garmin HUD being one notable example – and many smartphone apps allow speed and navigation details to be projected onto the windscreen. But the Navdy aims to produce a unit that is more integrated into a vehicle by accessing a cars on-board computer and by providing a single hub to access all smartphone-connected features without all of the messy compromises generally required for in-car add-on equipment.

Slated for shipping in early 2015, Navdy is now available to pre-order at a discounted price of US$299 for the next 30 days, before reverting to its regular price of US$499.



Visit Us : @ Hyperjet



Monday, November 10, 2014

Wi-Fi Security for Public Networks





Introduction
 
Wi-Fi hotspots present a unique set of security problems, quite different from the security issues involved in home and office networks. These hotspots have unknown computers accessing them. And in this case, the very nature of a public hotspot demands that it broadcasts its SSID. A public hotspot also has to do away with encryption and MAC address filtering to enable hassle free access to all users. 

Even if a public hotspot used encryption and user verification, it is not possible to tell which customer accesses the network with a malicious intent.
Under these circumstances, the precautions have to come from the users who access a WiFi public hotspot. Here are a few things you can do to protect yourself while using a public hotspot. 

1. Use legitimate access points

This is an often overlooked, nevertheless important safety step. Malicious access points that connect to hijackers’ databases have started coming up everywhere. These have the same SSID as a legitimate access point. The malicious ones can collect such information as your usernames, passwords and even credit card data of people who sign up for new services. 

Steer clear of anything that doesn’t look as coming from a legitimate provider. Also check the list of all legitimate SSIDs in any given area. Avoid setting the wireless card in your gadgets to automatically connect with any available network. Turn off peer-to-peer mode when you are in a public place to avoid others connecting directly to you, and last but not the least, keep your WiFi card in the off position when you don’t use it! 

2. Encrypt your sensitive files
 
Emails, usernames and passwords and virtually anything you beam from your device to the access point can be intercepted by someone close by. A lot of this information is going as clear text and not in a converted format, making it possible for the interceptor to access your information. Therefore encrypt any sensitive information you send via email from a public hotspot. There are numerous file encryption programs, freeware and shareware to help you with this.

3. Use a VPN
 
A VPN or virtual private network creates a tunnel between your device and the hotspot, thus preventing anyone in between from intercepting your data. This has become a standard requirement for companies to allow remote employees to connect to their networks. If your company does not provide you with a corporate VPN, you can go for a commercial one like JiWire SpotLock. 

4. Set up a personal firewall
 
Connecting to a public wireless network implies that you are joining a local network of unknown computers. These are on the same IP subnet, so it is easier for them to capture the traffic between your computer and the hotspot. Therefore always install a personal firewall program to protect your personal laptop. In the case of a corporate device, consult the IT manager before installing any firewall. 

5. Install and regularly update your anti-virus software
 
Public networks are places where your machine is the most vulnerable to attacks from viruses and other malicious code. It is more important here to have effective antivirus software in your system. Also take care to visit the vendor’s website and download the latest update, or avail the auto-update features. 

6. Update your OS
 
Most large utility and business software vendors like Microsoft and Apple frequently develop additional security patches for their operating system and programs. In the case of Microsoft Windows, you can visit the Windows Update site to get the new patches. In the case of Mac OS, enable the automatic Software Update feature in System Preferences.
Also be wary of the attachments that come with emails, as most of the recent viruses and worms have spread through them. 

7. Ensure privacy
 
Take care while you are typing information like name and password while you are at a public hotspot. There are people around you. 

8. Use Web-based email instead of Outlook
 
Avoid sending emails through Outlook, Eudora or Apple Mail when you’re using a public hotspot. Always use web-based email that uses secure http. 

9. Disable file sharing

You may be using file sharing while you are using your home or office network. Make sure that this feature is turned off before you access a public hotspot, for obvious reasons. 

10. Protect your confidential files with strong passwords
 
Use a strong password for access to your computer and a separate password to protect sensitive files. It would be a good idea to back up this with your most important data stored in an encrypted keychain storage device. 


Visit Us : @ Hyperjet

Monday, October 27, 2014

Biggest Technology Changes to Come in Next Decade




In relation to describe here the biggest technology changes to come in next decade we must perceive the indications in the tech changes of our time and in past decades. Within just two consecutive decades before or after the dawn of the new millennium we experienced the biggest array of changes in the field of technology and tech interfaces of everyday life. These changes have been so gigantic and far reaching in effect that twenty first century modern life experienced the greatest transformation in the hands of technology itself. Among the wide array of changes that are taking place and are continuing to make the use of technology shift in more ways than ever some of the most prominent ones are particularly from the computing world, in delivery framework, devices, communication and collaboration channels, consumer interfaces and mobile computing based applications. While some of these gigantic changes like the increasing replacement of traditional computers and computing by the mobile devices are widespread and all sorts of applications are increasingly penetrating into our different lifestyle fields, in the time to come it is only going to be more rigorous to blur the separation between lucid computing maneuvers and solid material reality. Here are our picks on biggest technology changes to come in next decade.
  1. Implications of Biotechnology
Biotechnology is already considered as the most promising field of healthcare and with gigantic research output that is further going to be irreplaceable for the treatment of many health disorders and for organic transplantations. Bionic limbs are already in place which is only going to develop in sophistication and maneuverability in the time to come. If bionic limb is one aspect, then stem cell research and incorporating stem cell replacement is another aspect that is going to take the implications of technology in healthcare further. With stem cell therapy a great array of challenging diseases in which cell level degeneration plays an important part can be successfully thwarted. Biotechnology and the array of biotech discoveries are going to present one of the revolutionary areas of biggest technology changes to come in next decade.
  1. Big Data Analysis
With the proliferation of mobile computing to an astounding level the volume of data has reached to a gigantic limit and it is really amazing that more than 80% of data was created only in the past two years. This huge body of data comprising every computing communication, mails, social networking posts, videos and everything you share, save and put into use on the computer is accumulatively called Big Data which is increasingly being the subject of analytical purposes of various ends. Big Data analysis is the next big area of importance for assessment, discovering opportunity and analyzing potential. Though already the analytical use of Big Data is in place particularly for assessing consumer behavior and business potential in key rigorous sectors like retail, in the decade to come it is going to change the face of business analysis to the ultimate extent.
  1. Cloud computing will be the driving force
Cloud storage and cloud computing is already a big force since the proliferation of mobile devices that are continuing to replace the traditional mode of computing. Especially as mobile applications and lucid non-device specific interactions are increasingly becoming the order of the day, it is more or less obvious that cloud computing in the coming decade would replace traditional computing. Thanks to cloud based applications and storage now you can access your data, do computing work, process information, share, mail, interact from anywhere irrespective of the devices and locations. With mobile computing in handheld devices fast replacing the traditional client side storage solutions and servers and device specific operation systems, the trend in few years time is only going to make a clean sweep creating access to data and computing.
  1. Speedier communication network will make the world even smaller
Just think of the irony of the reality :- a tsunami in Japan has been sensitized faster through Facebook even before government agencies could signal high alert! Yes social networking made the world really a cozy place to live and in the time to come it is going to be even cozier. Some of the biggest technology changes to come in next decade will be experienced in social networking with ideas, information and entertaining content being shared in real time with more fluid pace making the world a smart place to interact where so called geographical barriers will not have any meaning except for cultural reference.
  1. Digital literacy is going to replace academic literacy
One thing is already evident, that education and especially literacy is no longer going to be the same after the proliferation of handheld devices and technologies to a mass level. In coherence with this trend digital literacy is going to outpace even the common literacy and introduction to education for the coming generation of children and adolescents. In the years to come education aspirants will be more conversant and equipped with digital knowledge of information processing and handling devices than earlier times thanks to especially the wide range of small handheld digital devices with internet which are fast replacing the books as source of knowledge.
  1. Solar powered cities
Energy is the greatest ever concern for our civilization with all sources of energy fast going to exhaust and as the demand for the electricity and energy is ever increasing thanks to our hi-tech life and lifestyle gadgets, solar power is increasingly being viewed as the next big alternative to play a big role in creating sustainable source of energy while causing least damage to the environment. Completely solar powered cities are being viewed as one of the biggest technology changes to come in next decade. Already a great number of cities have started to adopt the solar power to use in the local level and it is being viewed as clear indication to completely solar powered cities of future.
  1. Revolving and Intelligent Architecture
Dynamic architecture or rotating architecture or revolving architecture or smart architecture, in whatever way you call them they are the new dimensions in the architectural design of our time which is just going to change the way we think of a building and correspond to its utility and aesthetics. A building floor that rotates or the twisting of the building to various dimensions to intelligent self regulating interior temperature and lighting, modern architecture has come up with an array of smartest way of corresponding to our sense of utilization of architecture and building structures which are only going to be more developed and widespread within the coming decade.
  1. More interactive, multimedia based education
When e-learning was unearthed for the first time it was seen widely as a leap towards the digitization of education but ever since in every way the education system became more interactive, hi-tech and dependent on real time input through vast digital network. Most important of all with the reading technologies like electronic books, applications on the mobile devices being widespread on everyone's hand, education is no more about getting the knowledge and pouring them on papers but it is more about real time intelligence use, practice and sharing through being involved on the subject on a vast network using digital technology and devices. From taking notes to presentation to problem solving to career focused learning to professional exposure, in the digital space of education you do not need to wait for anything, because through a rewarding network of students and professionals study goes hand in hand with professional exposure.
  1. Virtual, lucid, mobile simulation of many things
Everything is destined to go mobile as we are increasingly becoming dependent on our handheld devices for all our living needs, from shopping to education to contacting family doctors to getting the baby from the play school to self organizing to booking flight tickets. Tiny light applications on your 6 inch screen on hand take care of your different purposes and utilities just round the clock. You require a dieting information instantly just when you are cooking or need to know the traffic condition to calculate the time before you venture to go somewhere at the end of the day, you do not need to ask anyone or call any god dam service to know these, there are applications for every bit of your requirement. Lucid, simulated experience of mobile applications is encompassing every area of life at fastest speed and is one of the biggest technology changes to come in next decade.
  1. Remotely controlled healthcare
Remotely controlled healthcare services using digital technology, devices and applications is already in use in a big way which is only going to be the mainstream of healthcare in the time to come. With the development and proliferation of remote sensing and remote control technology that can share the medical data and media in the real time to make specialists and practitioners involved from various remote places, remotely controlled healthcare is going to be the order of the day in the coming decade elevating the standard and efficacy of healthcare practice to several notches.


Visit Us : @ Hyperjet


Tuesday, October 21, 2014

Tips: WiFi Security for Home Networks


Security is a huge concern for anyone setting up a WiFi network, as anyone who is close enough to the hotspot can break into your system and access the information. Therefore it is important that suitable security measures are adopted along with setting up a WiFi network, whether at home or workplace.
Here are a few tips that can help you establish reasonably good security measures for your home or small office WiFi network, with a standard wireless router and one or more roaming access points. 

Change the router’s default name and password
 
This is the most fundamental step, as intruders can easily find out the default name and password of the manufacturer. In fact most of the manufacturers stick to the IP addresses 192.168.1.1 or 192.16.2.1. Therefore ensure to rename the router and have a strong password to access the router configuration software. You may even consider changing the IP addressing. 

Disable Peer-to-Peer Networks
 
Go for the infrastructure mode on all access points and do not allow the ad-hoc mode that would permit intruders to enter your network through a legitimate user of your network. 

Do not broadcast your router’s network ID
 
In technical terms, this is called disabling SSID (Service Set Identifier) broadcast. A wireless hotspot access point will regularly – as often as ten times per second- broadcast a beacon signal that announces its presence. It is possible to find information such as strength of the signal, the access point’s functional capabilities and the SSID from the beacon. Therefore it is advisable for any private WiFi hotspot to disable this beacon. This way, only those who already know the SSID can connect with the hotspot.
This method is not completely foolproof, as it is still possible for seasoned hackers to detect such closed networks. However this way you will at least be doing what best you can do. 

Identify and approve all your authorized users in advance
 
This is made possible by turning on the Media Access Control (MAC) addressing filter in your router. This is a standard procedure with most WiFi gateways. Each connectible device (laptops, PDAs, computers, Wi-Fi cards etc) has a unique MAC address. By pre-defining which MAC addresses can access your network, you can prevent intruders from connecting with your resources.
This again is not foolproof, as it is still possible for hackers to intercept the wireless data packets as they travel from your network to an authorized user. And with these data packets, the hacker also gets the SSID and the MAC address of the authorized user. The hacker can then easily use this MAC address to help his system look like an accepted user. 

Use wireless data encryption

Use either WEP (Wired Equivalent Privacy) or WPA (Wi-Fi Protected Access) encryption. It has been found that WEP is relatively easy to crack however some protection is still better than none at all. WPA and its more recent version WPA2 are safer bets, as they require all the devices including the source as well as the clients be set to its code.
Regardless of which encryption you use, it is more important to change your encryption as often as possible. 

Check router logs regularly for unauthorized users 

Wi-Fi gateways usually show the MAC addresses of current users on a status screen. Many gateways can also keep a log of the users. Scout around regularly for anything that looks suspicious, like an unauthorized user staying connected for long- and not connected because he happens to pass by. Change the encryption if you spot anything that maybe suspicious.
You can also install a packet sniffer like Ethereal that not only shows if unauthorized users are accessing your information but also shows what information they are getting. 

Set up a strong firewall
 
The steps we discussed so far can only prevent a wireless user from accessing the information in your network. In other words, WEP and WPA encryption protect only data in the air. They do not take care of a hacker breaking into your hotspot from the wired end.
Standard home networking routers have built-in firewalls and they usually monitor incoming traffic. Typically, they block all incoming ports. There are also Stateful Packet Inspection (SPI) firewalls that can report attacks, intrusions and all suspicious activities.
The standard firewalls can take care of your requirements in most cases. However if you are part of peer-to-peer file sharing networks, you need to take special precautions. TCP ports 135, 137, 138, 139 and 445 are best blocked from external access. You would also do well to disable NetBIOS over TCP/IP. Personal firewalls are also worth considering. 

Use passwords for your computers and files

This aspect is typically ignored in home networks, but can easily add more security. You may choose to password to your computer or special files or areas. It makes sense to choose passwords that are not easy to guess.
Make sure to preserve sensitive or confidential files in folders that are set to authorized access. All the new operating systems like Windows 2000, Windows XP and Mac OS X have built-in password capability. 

Segment the wired and wireless networks
 
Designate your wireless access points as separate subnets with firewalls in between them and the main network. Also make sure that your community names are not easy to guess, as these get broadcasted with network management tools like SNMP.

Switch off your connectible devices when you are not using them

The logic is simple. No one can access your laptop or computer when it is switched off. If you have multiple users to your network, you may need to leave the wired connection on even when you are not using them. But you can still switch off your own PC or laptop. 

Visit Us : @ Hyperjet


Thursday, October 16, 2014

Google Unveils Android Lollipop






On Oct. 15, a 10-foot-tall statue of a lollipop joined sculptures of an ice cream sandwich, a chocolate doughnut, and other confections on Google’s (GOOG) campus in Mountain View, Calif. This was how news came of the latest major update to Android, the operating system that runs on 85 percent of the world’s smartphones: not with a hyped press conference or long lines outside gadget stores, but with the installation of an oversize lawn ornament. 

Lollipop is the 13th major version of Android. But it’s the first to be fully developed under Sundar Pichai, the Google senior vice president and confidant of Chief Executive Officer Larry Page who took over the OS operation last year. Along with Lollipop, Pichai introduced three Google-designed devices, including the supersize Nexus 6 smartphone, manufactured by Motorola with a gigantic 6-inch screen, half an inch bigger than the one on the iPhone 6 Plus. Pichai hopes the phone will be the first of a series of new Lollipop-powered computers in living rooms, cars, and just about everywhere else. “We aren’t only trying to ship two [products],” he says, obliquely referring to rival Apple’s (AAPL) well-received pair of new iPhones. “We are trying to enable thousands.”

Lollipop has arrived at an unusually important moment in Google’s attempt to control the next generation of computing devices. Samsung (005930:KS), Google’s largest partner, warned on Oct. 6 that it expects to miss its quarterly sales targets because of price cuts on its phones. In Europe, regulators are examining whether Google violates antitrust law by forcing manufacturers that use Android to preinstall its apps, which Google denies. Meanwhile, Apple has gotten rave reviews for iOS 8 as well as for its hot-selling iPhone 6 and 6 Plus. On Oct. 16, Apple will convene the media to ooh and aah over new iPads. With the new version of Android, Google “has to overcome concerns that there is not parity between Android’s ecosystem and iOS,” says James McQuivey, an analyst at Forrester Research.


Lollipop is Google’s answer to the ominous rumblings in Android land. It’s a svelte OS, capable of running on 512 megabytes of memory, which means that even the cheap phones spreading through China and India can pack in Android’s latest features. (Older versions used considerably more memory.) Lollipop’s look, called “material design,” uses moving icons and shifting font sizes in an effort to more clearly organize information onscreen. It also attempts for the first time to standardize and connect the interfaces of a user’s various Android devices, including a new set-top box that plays Web video on a TV.

Motorola’s Nexus 6 smartphone has a sleek, curved aluminum back and a crisp screen. The company says it can run for hours after charging for just 15 minutes. The phone will go on sale (subsidized) at all major U.S. carriers by the end of the year, when an unlocked version will sell online (fully priced) for $649. Pichai studiously avoids using the word “phablet” but says the Nexus 6 screen was a response to consumer demand. Large-screen phones now make up 25 percent of Android devices, up from 1 percent three years ago, according to researcher Strategy Analytics. It’s unclear whether customers who now have a supersize option from Apple will still flock to an Android version.



Visit Us : @ Hyperjet


Popular Posts

Recent Posts

Text Widget