Blog

Useful yet handy UI (user-interface) design tips

Prior to plunging into the significance of tips that may help you design more effective User Interface, dwelling on human-computer interaction, let me remind you that the design process should not only be hundred percent user oriented but also portray an amalgamation of technical functionality along with aesthetic look. Needless […]

Read more

Phishing Attacks And How To Prevent Them

A phishing attack is an example of a social engineering attack where hackers deceive an individual into providing them with information or installing malware into their devices. Hackers that use social engineering attacks don’t hack into devices in the technical sense and instead target the emotions and behavior of an individual. Therefore, it is always more challenging to defend against such attacks, which could explain why phishing traces to as far back as the early 1990s and is still be...

Read more

Worth Reading, Google+ Shut Down!

Google advises how to download your photos and other content after Google+ shut down has been announced Although Google earlier announced their decision to shut down Google+ for consumers due to low usage and challenges involved in maintain a successful product that meets consumers’ expectations, factual revelations tell a different story, which is reproduced below in toto. “Following a massive data exposure first reported on by The Wall Street Journal, Google announced that it is sh...

Read more

Windows 7 Support to Cease in a Year, Microsoft Discloses !!

Regardless of whether it is hardware or software, you need support from the manufacturer or dealer to run the stuff suitably and satisfactorily. More so, if you are dealing with something that is a specialized item. Take for instance, an automobile, such as a 1908 T model Ford car for which you cannot possibly expect any support from Ford Motor Car Company. Of course, that does not mean that you won’t be able to run the vehicle at all, save and expect that you have to pay through your nose t...

Read more

Braille Technology Firm Builds ‘Kindle for the Blind’

“Books are as useful to a fool as a mirror is useful to a blind person” said Chanakya (350-275 BCE), eminent statesman and philosopher attached to the Court of Emperor Chandragupta, the first ruler of Mauryan Empire in India. Nevertheless, blind people do read books, while fools indulge in using mirrors that reflect their foolishness. However, here is how it all started. Young Louis Braille (1809 – 1852) at the age of three inadvertently blinded himself in one eye with a stitching...

Read more

Facebook Enforces Stricter Ads Rules for Countries with Big 2019 Votes

Facebook Inc, inter alia, made an announcement in San Francisco that it would amend a few of its advertising rules related to political issues with a view to controlling election intervention in countries that include India, Nigeria, Ukraine, as also the EU prior to election and voting scheduled to take place soon. The social media giant, on account of it powerful presence felt in most world countries since 2016 has become a hot bed for posting fake news and similar sundry propaganda by polit...

Read more

How Unsecured is our Data Stored in Computers and Money in our Banks

Nowadays most of our communications occur through the internet. While an increasingly connected world makes our lives pleasanter, it also poses great risk as we expose our personal data to cyber criminals or hackers. The hackers have devised numerous ways to steal important data which is then put to misuse. Below are six most common ways your data can be stolen. Phishing basically is a fake email that poses as legitimate. Taking advantage of this apparent vulnerability, hackers create phishin...

Read more

Dissecting Artificial Intelligence to Know More about Human Brain!!

In the natural world, applied intelligence takes many forms. For instance, bats use echo-location to navigate in the dark, while snakes utilize their heat-sensing ability to hunt down prey. In the computer science world too, many forms of artificial intelligence are to be found, where diverse networks perform different tasks. Cognitive scientists, for instance, are currently using some of the newly developed networks to know more about one of the most complex intelligence system – the human ...

Read more

Protecting Data Seems to be the Need of the Hour Today

Notwithstanding what Cambridge Analytica have revealed, we hardly know how and where our data is stored online, leave aside how to protect it. While some may argue in favor of deleting Facebook, it is not feasible since many of us do use Facebook as a way to connect with old friends or collect information prior to taking a tour. But does this mean that your data will remain unprotected forever?  Certainly not, though it may involve use of technology and tools to fulfill the purpose. Meanwhile, ...

Read more