Posts

How Alibaba Cloud challenges AWS, Azure, and GCP ?

Image
 Most people will at this point have known about Alibaba, the monster Chinese aggregate, with business intrigues that incorporate retail, monetary administrations, coordinations, media, and advanced marking and advertising. The innovation spine supporting these specialty units, Alibaba Cloud, is the third biggest cloud supplier internationally, behind Amazon Web Services and Microsoft Azure. And keeping in mind that Alibaba Cloud gives extensively comparable contributions to AWS, Microsoft Azure, and Google Cloud, it has a couple of amazements.  An overall newcomer to the worldwide cloud market, Alibaba Cloud has profound pockets, and a sharp longing to advance beyond Amazon universally. In April of this current year they reported designs to put $28 billion in foundation throughout the following three years. Did I notice they have profound pockets? This venture will go to building server farms, custom working frameworks, and semiconductors for equipment quickened arrangements. To quick

SonarSnoop attack can steal your smartphone’s unlock patterns

Smartphone unlock patterns can be hacked using SonarSnoop attack Researchers from Lancaster and Linkoping University have come up with a new attack technique that uses your smartphone’s speaker and microphone to steal unlock patterns from Android devices, reports ZDNet. Dubbed as ‘SonarSnoop’, this method transforms a smartphone’s speaker and microphone into a sonar and uses sound waves to track a user’s finger position across the screen. In other words, the attack technique depends on the basic echo principle of sonar systems. For those unaware, Sonar (Sound Navigation and Ranging) uses sound propagation normally in submarines for detecting objects on or under the surface of the water, such as other vessels. The study has been published in the research paper titled “SonarSnoop: Active Acoustic Side-Channel Attacks” that has detailed testing information of SonarSnoop on a Samsung Galaxy S4 running Android 5.0.1. How does the SonarSnoop attack work? SonarSnoop use

BitTorrent launches uTorrent Web for simple torrenting experience

Image
uTorrent Web is the next generation of torrenting from BitTorrent BitTorrent, Inc., the company behind the world’s most popular P2P communications protocol, has officially released the first version of µTorrent Web to help users quickly download and play torrent files inside their browser. µTorrent Web (not to be confused with uTorrent) is a Web-based torrent client for Windows that aims to make torrenting simpler and most importantly it supports torrent streaming. “Our vision for µTorrent Web was to build a torrent client with quick playability and simplicity at its core,” said BitTorrent, Inc. in a press release statement. “Through years of serving the BitTorrent community with products used by hundreds of millions of users, we took our passion and experience to build a torrent client that meets the streaming demands of today’s users.” BitTorrent commonly refers to the infamous peer-to-peer (P2P) file-sharing protocol associated with piracy. Each year, BitTorrent’s des

Google launches ‘Dataset Search’ to help scientists and journalists

Google Dataset Search: This new search engine helps scientists hunt for public data Google on Wednesday launched a new search engine targeted at the scientists, data journalists, data geeks or anyone else looking for precise datasets online. The service called Dataset Search is a targeted search that can help scientists and data journalists find the data required for their work and their stories, or simply to satisfy their intellectual curiosity. The new search engine works similar to Google Scholar, the company’s popular search engine for academic studies and reports. Dataset Search enables users to find datasets stored across thousands of repositories on the Web, making these datasets universally accessible and useful. “Dataset Search lets you find datasets wherever they’re hosted, whether it’s a publisher’s site, a digital library, or an author’s personal web page,” Natasha Noy, Research Scientist, Google AI, said in a blog post. To create Dataset Search, Google develope

Android Q will warn users for running apps made for older Android versions

Image
It’s only been a month since Google has released the latest version of Android 9.0 Pie, but it looks like the search giant has already started gearing up for Android Q. However, this time with Android Q, it plans to aggressively push developers to update their apps. Last year, Google had released a new policy that imposed restrictions on the apps uploaded and updated on the Play Store. According to the policy, the new apps are required to target API (Application Programme Interface) level 26 (Android 8.0 Oreo) as of last month or later version and the same API level for updates to existing apps from November 2018 onwards . Besides this, a new commit (spotted by XDA-Developers) on the Android Open Source Project (AOSP) shows Android Q will warn users attempting to install apps on the new platform that target Android Lollipop or lower. An image quoted by XDA-Developers reads a warning message that says, “This app was built for an older version of Android and may not work proper

North Korean hacker charged for WannaCry and Sony cyberattacks

U.S. charges North Korean hacker for WannaCry, Sony cyber attacks The U.S. government on Thursday charged and sanctioned a North Korean hacker for the 2014 Sony hack and the 2017 WannaCry global ransomware cyberattack, U.S. officials said. The accused, Park Jin Hyok worked as part of a team of hackers, also known as the Lazarus Group, has been charged under the strategy planned by the U.S. government for naming and shaming the hackers in order to prevent future cyber attacks. According to an FBI wanted poster released on Thursday, Park is identified as an alleged North Korean programmer who is accused of being “part of a state-sponsored hacking organization responsible for some of the costliest computer intrusions in history.” Those attacks include the Sony Pictures Entertainment hack, the WannaCry attack and “a series of attacks targeting banks across the world that collectively attempted to steal more than one billion dollars,” according to the FBI. The U.S. Treasury De

வாடிக்கையாளர்களை ஏமாற்றியதால் நேர்ந்த கதி.. குப்பைக்கு வர தொடங்கிய ராயல் என்பீல்டு பைக்குகள்

Image
     ராயல் என்பீல்டு நிறுவனத்தின் மோசமான நடவடிக்கைகளால் ஆத்திரம் அடைந்த உரிமையாளர்கள், ரூ.2.40 லட்சம் மதிப்பிலான தங்கள் பைக்குகளை, குப்பையில் வீச தொடங்கியுள்ளனர். வெற்று எச்சரிக்கை என எதிர்பார்க்கப்பட்டதற்கு மாறாக, பைக்குகள் குப்பைக்கு வந்ததன் மூலம், ராயல் என்பீல்டு நிறுவனத்திற்கு கடுமையான எதிர்ப்பு பதிவு செய்யப்பட்டுள்ளது. இதுகுறித்த விரிவான தகவல்களை காணலாம். இந்தியாவின் முன்னணி இரு சக்கர வாகன உற்பத்தி நிறுவனங்களில் ஒன்று ராயல் என்பீல்டு. ராயல் என்பீல்டு நிறுவன மோட்டார் சைக்கிள்களுக்கு இந்தியா மட்டுமல்லாது, உலகின் பல்வேறு நாடுகளிலும் ரசிகர்கள் பட்டாளம் இருப்பது நாம் அனைவரும் அறிந்த ஒன்றே. ராயல் என்பீல்டு நிறுவனமானது, கிளாசிக் 350 சிக்னல்ஸ் எடிசன் என்ற மோட்டார் சைக்கிளை, கடந்த வாரம் இந்தியாவில் லான்ச் செய்தது. இந்திய ராணுவத்துடனான ராயல் என்பீல்டு நிறுவனத்தின் நீண்ட கால உறவை போற்றும் வகையில் இந்த மோட்டார் சைக்கிள்கள் உருவாக்கப்பட்டுள்ளன. அதுமட்டுமின்றி முப்படையினரின் சேவையை கௌரவிக்கும் வகையிலான அம்சங்களும், கிளாசிக் 350 சிக்னல்ஸ் எடிசன் மோட்டார் சைக்கிள்களில் இடம்பெற்றுள்ளன.        இ