Google, Apple and Microsoft reveal user information

The National Security Agency of the United States and the FBI are intervening directly on the central servers nine Internet companies to extract audios, videos, pictures, e-mails, documents and records in connection with which analysts can track movements and contacts a person over time, the newspaper The Washington Post (WP). The monitoring program on the internet, highly rated, is codenamed PRISM, had not been revealed, unlike the plan to access phone records, was already known Dubai Branding Agency. Both its…

Read More
0
Share

Closer to have a the Apple iWatch

Permanent Link to Closer to have a the Apple iWatch

The intelligent clock apple company could come in October 2014 iWatch What time is it? If you check your iWatch, you may find that this is a text message beyond a Twitter notification, but if the current environment, we find that we are living a great moment of portable technology. After over a year of waiting, the iWatch is finally a reality. But we are still about to see a watch with some surprise by the functions they will present,…

Read More
0
Share

ISO 20000 and IT Service Management

Permanent Link to ISO 20000 and IT Service Management

ISO / IEC 20000 is an international standard that establishes the requirements for certifying the delivery of IT services. The series ISO / IEC 20000 standard published by the ISO and companies (International Organization for Satandardization) and IEC (International Electrotechnical Commission) on December 14, 2005, is the internationally recognized standard for IT service management (Information Technology) . The number 20,000 comes from the adoption of the BS 15000 series developed by the British company standards, the British Standards Institution (BSI).…

Read More
0
Share

SNAPCHAT: The application to send messages that self-destruct after a while

Permanent Link to SNAPCHAT: The application to send messages that self-destruct after a while

Snapachat, the app was created to send photos and videos that will self-destruct soon have two years of life and is currently revolutionizing the market. SNAPCHAT Remember the popular phrase “This message will self-destruct in 5, 4, 3 …” was the TV series and movie spy ‘Mission Impossible’, now coming back into fashion, but for a messaging application increasingly popular . But why use an application without memory, the content does not last more than seconds; and which very successful…

Read More
0
Share

Google Glass: What You Need to Know

Permanent Link to Google Glass: What You Need to Know

Is the Glass Project represents the next big step in mobile communications? Google Glass The Glass Project is a research and development program of Google, to develop augmented reality glasses; product (Google Glass Explorer Edition) will be available to developers Google I / O for $ 1,500 DLLS in mid-2013, while the consumer version will be ready later this year. The purpose of Google Glass display information would be available for smartphone users without using the hands, also allowing access…

Read More
0
Share

The challenges of cyber security in the 21st century

Permanent Link to The challenges of cyber security in the 21st century

Cyber security: Part of the security that deals with crimes committed in cyberspace and the prevention thereof. In February, the International Safer Internet Day is celebrated with the goal of promoting worldwide a responsible and safe new technologies, especially among children and young people use. International Safer Internet Day is celebrated Sid 2013- in over 70 countries around the world and is dedicated to curbing the famous digital divide. Promoting dialogue and collaboration between generations, under the slogan: GET CONNECTED…

Read More
0
Share

How the Internet will be monitored after Snowden Revelations?

The uproar over the revelations of former American intelligence agent could strengthen the argument of those who want more control over the internet, as many experts dare to envision. The revelations of former CIA agent opened the discussion on monitoring the network: Is it a necessary measure to maintain the safety of a country or is a violation of the privacy rights of users? While all eyes have been focused on the whereabouts of Edward Snowden, a few days ago,…

Read More
0
Share

How metropolis of the future is going to affect the Big Data?

Permanent Link to How metropolis of the future is going to affect the Big Data?

Managing all the information through data logging is revolutionizing the world. The Big Data is useful for the design of cities more inclusive and more efficient government with its policies, thus large urban developments add sensors and real-time information about their citizens, which brings great benefits but also doubts about their privacy. More than two thirds of the population now lives in urban areas. Cities are places where problems arise and solutions are found. They are a fertile ground for…

Read More
0
Share

Create a device for charging the phone in 20 seconds

Permanent Link to Create a device for charging the phone in 20 seconds

Eesha Khare EU invented a kind of super capacitor that recharges cell phone batteries and cars in record time. The most important A California teenager will go to Harvard after winning a prize in science Eesha Khare developed a small supercapacitor to accelerate battery charging Your device could be used for car batteries in the future, said A small device that can recharge the batteries of cell phones in just 30 seconds made Eesha Khare 18 won a prize of…

Read More
0
Share

New way of Blackmail: The information your company has been kidnapped

It is happening in Europe, it’s time prevent, as hundreds of folders stored on the computer in a completely inaccessible encrypted company is the result of a new form of cyber-extortion with which the propagators of a virus hijack the device information and ask their owners until 4000 euros in exchange for his release. Ransom-ware is the virus that performed the operation, this type of attack, is an evolution of the “virus of the police”, so called because the criminals…

Read More
0
Share
  • 1
  • 2