Nokia 9 handset leaks:

ByNitish Singh-January 2 2019.1127 Figure 1 Google Image Courtesy Google is currently testing the Duo group video calling function launched in March 2018 for the first time. The software seeks to challenge the feature to the likes of FaceTime and Skype. With applications like Hangouts Google Talk and more recently Google Plus shutting down, Google’s luck with social media apps has been nothing to write to home about. The tech giant introduced Duo in the hope of breaking into the video call app market but continued to dominate competitors such as FaceTime and Skype. Google first revealed in March last year that it is working on a group video calling feature for the Duo. While the feature has been around on most popular messaging apps, it’s nice to see Google introduce some much-needed changes in the end. Last year, FaceTime received its group calling feature in a single call with support for up to 32 people and it looks like Duo will be limited to just seven. The functionality is currently being tested and if you want to see if you’re part of the internal test just head to the Duo app and see if you can add more than one video call touch. One gripe several users who are part of the test have is the inability to connect individuals to a continuous call. It’s entirely possible that Google will address these problems at the launch as at this point the company receives input from beta testers. One of the good things about the new feature in the Duo app is that even after a call ends, groups stay formed. You can just tap the saved party, and start another call. The software also comes with a dim mode to make it easier for users to use the device in the dark. There is currently no news on when the functionality will go live for all users, but we can expect the launch to take place at least a few weeks away, which is the average time server testing runs for Google apps. To talk with other members of our online community about this subject. Opera for Android Now Comes With a Free-of-Charge Built-In Vpn Service

ByNitish Singh-February 8, 2019.1128 Opera brought back its Vpn service for Android users; this time as a feature in the browser. The feature is currently available to users of Opera Beta, and will go live in the coming week for all devices. Opera launched its own Vpn a while back for mobile users but it was shut down after SurfEasy purchased the company in April last year. With the introduction of a Vpn directly to the Android devices web browser, Opera users will soon be able to access First Party virtual private network services. Unfortunately no reports have been made about an iOs update coming out soon at any time. The functionality rolls out to all users who run Android’s latest version of the Opera beta app. Opera has warned users that when using the Vpn as the data being re-routed will slow down browsing speeds performance may not be optimal. Opera’s Alejandro Viquez has confirmed that the new feature: “is a no-log service that means we won’t collect any information that passes through the network servers. This will secure your private data from intruders when linked to a public Wi-Fi network. ‘ .1129 Figure 1 Credits: While the company’s older Vpn did not require you to use the Opera browser to provide Vpn services as an in-browser option, more users may be attracted. The Vpn lets you manually set a location and prevent tracking of your data. You can also set it to exclude search results unique to it.Can you use all passwords to Binge-Watch Cbs?

Once all episodes of Why Women Kill have been released, you can easily watch them all if you have a subscription to Cbs All Access. To access them all, you will simply have to log in to your account. You can also use sites such as Google Play YouTube iTunes Amazon Prime Vudu or Microsoft Store to go the other way and buy episodes or the full season. We don’t have the ties yet because the show hasn’t aired, but we’ll update soon. Make sure you check them all out before you buy, so you can find a better deal. Reviews and interviews for more Tech news guides. Preben Wik Furhat Robotics: Social Robots Based on Human Evolution

Can you use all passwords to Binge-Watch Cbs?

Once all episodes of Why Women Kill have been released, you can easily watch them all if you have a subscription to Cbs All Access. To access them all, you will simply have to log in to your account. You can also use sites such as Google Play YouTube iTunes Amazon Prime Vudu or Microsoft Store to go the other way and buy episodes or the full season. We don’t have the ties yet because the show hasn’t aired, but we’ll update soon. Make sure you check them all out before you buy, so you can find a better deal. Reviews and interviews for more Tech news guides. Preben Wik Furhat Robotics: Social Robots Based on Human Evolution

ByGabriela Vatu-June 1 2019.1134 Figure 1 from Bucharest Tech Week A social robot capable of holding a conversation will stand out everywhere and so will Furhat. It has no body it has no “muscles” and once wore a fur hat to cover the many cables coming from the prototype’s head but Furhat leaves an impression. Preben Wik, also known as Ben, is one of the team members who built one of the most advanced social robots in the world, Furhat Robotics co-founder. He’s been employed as an engineer for a long time and he’s a philosophy doctor who’s concentrated on speech communication that’s pretty much what made Furhat get so good at talking with us all. TechNadu: Most prominent voices in the tech industry, including Elon Musk, expressed fears that singularity would come and what that would mean to mankind. Do you ever think this is going to happen? Is this something that could happen very far away in the future? Preben: If we’re talking to Elon Musk, I think he always made the point that we don’t need to be scared of the actual robots. That is something made up by Hollywood. So the threats of A.I. They might be dominated by their physical presence, but it’s not the physical presence that makes it scary. And so you could be having an A.I. That’s just in the cloud or something that could be harmful. I think we have some extremely smart people involved and I think we have some extremely smart people who don’t care. And not just educated but well aware. The universe is kind of split into these two distinct groups. You’ve got someone like Google’s Larry Page Ceo who says “eh it’s no question.” We’ve got Ray Kurzweil the Google Technical Chief who’s got his own written books where he’s like “everything’s going to be fine.” And when you’re working in the field it’s easy to fall into that category because you can explain what you do. And I used to quote a guy Andrew Ng for a while who said: “I’m not concerned about A.I’s risks. For the same reason that I’m not worried about people overpopulating Mars. “Maybe it will happen sometime in the future but it’s so far in the future that we should be worrying about something else. And I know that there is a meaning to that. It’s definitely convenient to take that approach when you see where we are today and realize how primitive things are. Yet I think there is a reason to listen to those other people at the same time. And then there is an example that I like a lot from this Swedish guy who is a professor at M.I.T. Max Tegmark I’ve heard that. He is saying: “A.I. It’s like rocket fuel. “And that’s something we’re excited about and that’s going to make us go very far. But there is more to a rocket than air. It requires a steering mechanism, and a destination is needed. And so one thing we should be thinking about is where we want A.I to go. Because it is very strong and if we don’t know how to steer it and we don’t have a clear vision of where we want to go it could end up being really poor. And so it might be the best thing that has ever happened to mankind or the worst thing that ever happened to mankind. And it depends on us. So we need to have the conversation and they say this is perhaps the most important conversation for humanity ever. TechNadu: And do you think this is where governments are expected to step in and bring some sort of regulation? You know somebody can cheat but it’s still like if you’ve got a very smart chemistry Ph.D. student and you’re approaching this guy and saying “hey you want to work for me I’m going to do some chemical weapons.” He’ll probably say “no that’s not cool,” but if you do the same with A.I. It’s going to come from someone like the American Defense or something today, and then perhaps he’ll be respected and take a lot of it. So these kinds of questions yes they need political [ intervention ] we have to decide on what’s Ok and what’s not Okay. So, what is this “rocket fuel” you should use for? TechNadu: I think Google had programs that enabled the Department of Defense to use machine learning on some maps and they backed out after a lot of criticism. Preben: I’m not sure we’re talking about the same thing but I think it’s the same thing that Google’s employees complained for. But hey, I think the staff said, “No we don’t want to work on this.” And that’s fine. Yeah, but if you have another powerful company where it’s not done by the workers then they can do a lot of damage. TechNadu: That’s a demonstration of workplace ethics but a touch of Google concern. But then if somebody else doesn’t do it, Google will. Preben: And I think there is a reason to worry. That said, if we look back 100 years and see how oil was used, which is the catalyst for the industrial revolution as a whole, and if there were any visionaries at the time saying like all but you could use it for bad things, we should also ban the use of oil … Actually come to think of it now, the whole thing about climate change is expense. And maybe it would have been smart for them to say “let’s not.” But you know we can’t stop people from doing research, and have them say “oh let’s ban A.I.” Even if someone did it wouldn’t function. So, I think that human curiosity won’t stop. Then what we have to do is decide where we want to go? What is it that we want to do? And where do we want to go on the whole thing about us as humanity? TechNadu: Okay so let’s think about Furhat a little bit because it’s a pretty cool appliance. What makes Furhat different from similar humanoids robots / Ai-powered. Let’s do something of a “surgery” on it. Wik Preben: Yeah. So, one of Furhat’s unique features is that it’s not mechatronic. It’s a back-projected system that means we get the power of the computer graphics you have on a real robot in games and movies, and so on, and without the limitations that you get on a mechatronic robot. For example, all these muscles that we have in the face – we have 50 muscles in the face that everybody has to function in synchrony with each other to make smooth lip coordination and other emotional movements – and no one can do that in a good way. So on the mechatronics robots it looks a little weird and it’s noisy it’s very costly it breaks down and so on and so on, whereas it’s a software update and it’s quiet and less expensive. And it allows us the flexibility to change the texture in order to make it look like a man or a woman or Albert Einstein or an avatar or Obama or anything else. And if you were to do the same thing with the mechatronic solution you would spend a million dollars and then one thing looks like that. If you want to adjust that you need to spend a million more. TechNadu: So during the conference you spoke about this slightly earlier. There’s a little tension in there. Do we want robots to look like machines, because we know they’re robots, or do we want them to look more like humans, making it easier to communicate with them, but also to trick them in a way? Preben: I guess that’s an interface we can look at. And so there’s a front end and there’s a back end and there can be anything on the back end – it could be an Ibm Watson or Google Home or something we’ve built up. But as an interface front end we should do whatever works best for the system. So I think an Alexa or a Google Home is restricted in that sense because it doesn’t smile it may blink to show that it is paying attention but you have to learn how to communicate with it and it has some obvious limitations. So we are building on the foundation of what we’ve been doing for 50000,000 years. If it looks like a robot, it’s good to send clear messages that it’s not a human being, but it should send clear messages to the user as well. This means you can communicate with it and then it opens up by having human traits that we know how to interact with. It allows people to interact in the way they intend. If it does work. I mean clearly the dream is that it’s going to work. But if we could communicate with technology the way we interact with each other we don’t need to have an instruction book that we already know how to interact with this stuff. So, that would be the advantage. TechNadu: I kept thinking about the “Her” film when I saw Furhat in action and how interactive it is, and watched the presentation at the conference this morning. Are we somewhat at risk of a social robot achieving that level of connectivity? Preben: You mean the part of falling in love? TechNadu: Well maybe friendship. Preben: When we reach that point of capacity … Because that was Her’s unrealistic aspect – that she was so good at communication and all that. This is very hard and that’s what we are dealing with and we can’t do it yet. Even if we could have a digital friend I don’t see anything wrong with that except that some people may not be looking for analog friends. Conversation can be smoother. And that’s kind of what happens even without this one today. I’ve got a 16-year-old son who spends his time playing computer games and is online… 1138 AromaRest is another fascinating gadget of this kind. This system has three main features including playing soothing dual defuser music that releases scented oils and 96 million colors Led lighting that is designed to either help you fall asleep or wake up. If you like you can use all of these apps.

Final Thoughts

These are just some of the 2018 Sleep Gadgets that we found at the conference this year. This fascinating field of technology is becoming more popular by the day and it is being tried by people who have sleep problems. It’s important to get enough sleep and shape healthy sleeping habits but are sleeping gadgets the way to go? After last year Ces who was first for sleep tech, some doctors had their say on the subject.

Toyota Car Seat Supplier Pay $37 million to Bec Scammers

ByBill Toulas-September 12, 2019.1139 Toyota Boshoku charged $37 million back in August to Bec Scammers and has now revealed the accident. So far Toyota has had a very tumultuous cyber-security year with malware attacks in several breaches and now a Bec scam. Last week, Toyota Boshoku revealed they had fallen victim to a Bec (Business Email Compromise) attack, losing 4 billion yen because of it. That’s the equivalent of around $37 million so for the company it’s a pretty big amount of money. As the announcement details the scammers targeted the firm’s European subsidiary and received fake payment instructions that were accepted and processed by Toyota’s employees. The firm actually noticed the transaction’s potential risk soon after it went through and tried to recover the stolen funds but this request was not yet accepted. The incident took place on 14 August 2019, and the attack was based on social engineering targeting a single worker. As much as this employee can feel sorry about what happened he / she should have taken steps beforehand to check the legitimacy of the request for payment. As we discussed in the past Bec scams are typically executed via an internal email address previously compromised by the actors. That can make distinguishing between legitimate requests and scammer messages particularly difficult. There are, however, security steps that can be implemented and in this region Toyota Boshoku seems to be missing. For starters, automated scam detection and warning systems that can recognize fraudulent messages and notify the recipient should be a no-brainer for companies of this scale. Two-factor authentication for internally accessing email accounts should also be a good step towards avoiding take-overs resulting in the loss of millions. And ultimately, training staff on how to recognise the signs of a scam and how to use security measures is crucial in the situation as a whole. So long as companies tend to neglect these fundamental anti-Bec measures, actors will continue to increase their attempts to collect large amounts of cash. Until now, Toyota has not had a successful cybersecurity year. Back in February the Australian arma story emerged in Japan Vietnam and Thailand over numerous Toyota data breaches with the number of customers impacted exceeding a whopping 3.1 million. The exposed data was vulnerable including email addresses of names etc. The hackers behind these attacks were cyber-espionage organisations such as Apt32, supported by the State. Satellites and Drones: Government Spies in the Sky

BySydney Butler-June 28, 2019.1140 It’s easy to forget in an era of cyber warfare surveillance malware that the easiest way to spy on someone is to actually watch them. A perfect job for the drones and satellites. Since inventing surveillance cameras you would need an actual government agent to track someone and observe him. Perhaps they’ve drilled a hole at the ceiling and watched their target from there. They might just pose as a neighbor or somebody sitting on a park bench. It might be shocking if the government needed details about the lengths they would go to for this.

A Sea of Eyes

They don’t even have their own bugs to plant these days. There’s always the risk that you could compromise smart devices and web-connected cameras that you voluntarily brought to your home. While these methods and techniques enable national powers to take an intimate look at what their interested persons are doing, it is not the view of a bird. That’s why we’ve seen the creation of some amazing flying camera tech over the last century or so. Usaf most likely ordered the first spy satellites back in the mid-50s due to the Cold War and the subsequent space race. Sputnik 1 was launched just about two years after the Us started developing spy satellites and, of course, there were concerns that Sputnik itself might be such a weapon, even though it was a simple prototype in fact. Any nation that can afford it today has satellite spy in orbit. We have become smaller, and heavier. If you think the photos you can get off Google Earth on the satellite are spectacular you’re in for a surprise! In the 1970s, satellite technology was already higher than the image quality on Google Earth that a person gets to see. We say this, due to the Hexagon spy satellite being declassified. Today, cutting edge satellites such as the WorldView-3 are reportedly capable of viewing the phone screen from space in your pocket. There is a reason why rogue nations execute their secret dodgy dealings, because these satellites can not see through the Earth at least for now.

Manned Surveillance Craft.1142 The only real way for governments to look at who they chose to spy on before surveillance satellites was to put high-resolution cameras on aircraft that could scale incredible heights. Hopefully higher then might your opponents sail. The Sr-71 Blackbird is the most well-known example of a reconnaissance plane. Today, manned craft is no longer truly used. There’s no question that this is the drone generation.

Military Drones

For almost all military organizations, keeping human personnel out of harm has always been a holy grail. In the days of spy planes, being a pilot in that role was regarded as incredibly risky. Not only did they risk being shot down but it could lead to massive security losses if they were captured. That is why some recon pilots were bringing suicide pills with them. First took flight in 1998 with the Northrop Grumman Rq-4 Global Hawk. Although drones such as these are considered at the outset to be armed today, they were merely for observation. Those drones have since become much more autonomous and efficient. When people are on the ground in action they have no idea they are watching. They operate at such altitudes that they can’t be detected without specialized equipment.

Mini Drones .1144 Figure 2 Photo: Corporal Daniel Wiepen/Mod [Ogl v1.0 (http:/] While military drones are formidable machines and they have seen increased domestic use they are a little too big for use up close in urban settings. If you want to conduct small scale surveillance, there’s a whole host of options. The commercial Black Hornet Nano is a pretty good example of the size and operating zone for these drones. It has a similar search area to large drones but is far less costly and far less obtrusive. A swarm of nano-drones like no other will cast a surveillance net. At the very least, in theory.

While current drones tend to be aircraft or helicopters, there is a strong trend towards next-generation drones using bio-mechanical mimicry. Several laboratories around the world are working on drones that look like bird bees and other living creatures, and behave like them. This not only comes with an advantage in camouflage. Such security robots also take advantage of trillions of years of evolution to create efficient designs. The Harvard Microrobotics Laboratory, for example, has developed the Robobee which is now able to fly independently. The Russian have produced a drone that at least from far away looks like an owl in flight. It means we’re moving into a future where you might look straight at and never know a surveillance drone in your house garden or on the street.BySydney Butler-March 11, 2018.1145 The intention was to have no central core when the original design of today’s internet was first conceptualized. You would still be able to communicate with each other if you cut out any part of the network that was left. That is no longer entirely true today. Many critical web services have built hubs on the internet that would be truly debilitating if they went down but there is an even more subtle process of centralization that has taken over the web and we’re all buying into it.

The Internet Big Brothers.1146 Think about all the cloud services that currently have your info. Items such as Google Docs Dropbox Onedrive and much more provide us with a convenient and powerful new way of working. You must also believe these businesses to abide by their own privacy policies. Once a paper is submitted it is practically out of their hands. Just because a corporation has the slogan “do not be bad,” it doesn’t mean they are going to do what they’re preaching! What should we do, then? Go back to the dark ages of sneakernets and surrender all the benefits of modern cloud services? The response is no and the technology that could address the major issues of privacy is known as “decentralized” internet and applications.

You’ll have a server in the conventional internet setup that manages your data user authentication and runs parts of web applications on the server side. In the hands of third party systems, you have to trust lots of different systems. The bottom line is that once you’re using a service like Google Docs or Dropbox, the data is no longer owned in any other way than legal. You don’t have any direct control over who gets to see the data and who isn’t. No user can even say exactly where they store their data. There is no trust granted to an intermediary service within a decentralized internet service. You have real control over your own knowledge and anybody else can look at the products only by your leave. How does

Work? You may have seen it coming but the crypto-blockchain technology is revolutionizing yet another part of the internet. By using blockchain technology, it is possible to have internet applications that you can access from anywhere without the need for central data stores to centralize user identity protection or anything that usually requires a public cloud service. To be sure such providers can still use a service such as Dropbox and Amazon S3 for actual data storage. Nevertheless, the data is encrypted so that none of these providers know what is stored on them. The decryption keys are in your hands, and they can also be saved or backed up in a distributed computer network. So how do you actually build an app or service that is decentralized? You need a specific Api or programmer interface for applications.

Say Hello to Blockstack

Figure 1 A Blockstack Api Model: Picture is Blockstack Property (Fair Use) Blockstack is one of the leading names in this new web revolution. Indeed the name tells us a lot. It’s a full-stack Api allowing anyone to build their own decentralized services. Blockstack applications ‘ backbone is a blockchain, and a peer-to-peer network that hosts it. Blockstack applications can therefore combine data storage identity protection and crypto-currency tokens for peer-to-peer payments. None of which as a base requires a big brother cloud service. And did anybody actually build anything with the technology? O, they got them!

Graphite Docs – A Killer by Gdocs? In the first week of February, further safety measures also rolled to block potentially offensive tweets with the aid of “Safe Quest.” Now tweeted Twitter Safety Now you won’t be informed of responses to conversations started by people you’ve blocked / muted unless the replies are from people you follow. — Twitter Security (@TwitterSafety) February 16, 2017 Twitter has carried out a number of changes over the last few weeks to address the problem of bullying amid high profile harassment cases. Also excluded offensive tweets from search results even obscured ‘ @ ‘ replies and made building a twitter account very difficult for harassers.