Sunday, 17 December 2017

How to Transfer Contacts from One Android Phone to Another Android


Bored of your old android phone, Planning to buy a new one? If you are upgrading to a new android device then transferring contacts is the most important task you need to perform. This task can be quite irritating if you are not an android geek. So here are couple of methods which will guide you to transfer contacts from one android device to another.

Two Methods to Transfer Contacts from Android to Android
1) Transferring phone contacts using Gmail (Recommended)
2) Manually transfer contacts

**How to Transfer Contacts Using Your Gmail Account?
If you have enabled automatic backup on your android device then all your contacts will be automatically backed up to your Gmail account. You can check this by navigating to Phone settings and selecting backup and reset.

If Back up my data is turned on then all the contact are automatically synced with your Gmail account and if it’s turned off then follow the below guide to manually backup android contacts to your Gmail account.

=> On your android device go to contacts and tap on the more option icon.
=> Now select Import/Export option.
=>You will find various options to import and export contacts, => Remember we need to export our contacts so tap on Export to .vcf file.
=> Save the .vcf file in your SD card or internal storage, Where-ever possible.
=> Now connect your android device to your computer using data cable and copy the .vcf file that we have exported in the previous step.
=> Once the file is copied sign in to your Gmail account using your computer. On the left hand side click the drop down arrow and select contacts. Refer the below screenshot.
=> A new windows will open where you can access all your Gmail contacts. Click on more option on the left side and select Import.
=> You might get a popup as shown below, This is because the new version of google contacts doesn’t support importing contacts so we need to switch to the old Google Contacts. Click on GO TO OLD CONTACTS to proceed further.
=> Again a new tab will open with old Google contacts interface. On the left hand side click on import contacts.
=> Now choose the .vcf file which we have copied earlier from our android device and hit import.
=> You’re done! Just sign in on your new android phone using this email and all your contacts will be imported automatically.

**How to Manually Transfer Contacts from Android to Android
This method is quite similar as the first one. Here instead of importing contacts from your Gmail account we are directly importing the backup of contacts file (.vcf file) on your new android phone.

=> First Android Device (Contacts to be transferred From)
*Go to contacts and tap the options button.
*Click on Import/Export.
*Further click on Export to .vcf file and save the backup file on your SD card.
*Now copy the exported .vcf backup file to your new android phone where you want to transfer your current contacts.

=> Import the Backup File
*Again go to contacts on your android phone and tap on options icon.
*Click on Import/Export and further select Import from .vcf file.
*Select the contacts backup file which we have copied from old android phone.
*That’s it! all your contacts will be transferred from your old android phone to your new android phone.

How to Track a Lost iPhone Without Any App




Losing your iPhone can be disheartening, All the data and media on the phone are lost (if you don’t have a backup). But losing it doesn’t have to mean buying a new phone. You can track your iPhone that was either lost, stolen or you simply left it squashed between your sofa cushions.

Have you lost your iPhone and looking for ways to track it or find it? Find the best tips on mspy.

**Different Methods to Track an iPhone

1. Find My iPhone
This inbuilt feature of iPhone allows the owner to track his iPhone with ease; all you need is your phone be connected to the internet or Wi-Fi as this app uses the company’s iCloud services to locate your lost phone. You can also lock your phone, set a pass-code or erase all the data on the phone, without holding the phone in your hand using some another iOS device or laptop.

If you have lost the iPhone, to track an iPhone, open the Find My iPhone on another iOS based device like the iPad, MacBook, or another iPhone. You can find the location of your phone if the phone is connected to the internet. And if not, lock your phone and create a message so that the person finding the phone is able to get in touch with you on the number you provide in the message. Someone will surely return your phone back to you seeing the message, as mine did come back after being lost.

**How do you track an iPhone 6?
To track an iPhone 6, go on the iCloud site, click on ‘All Devices’ option and select your device and select the ‘Lost Mode’ and you will be able to track an iPhone 6 in a jiffy.

**What can you do if your iPhone is stolen?
If you fear the iPhone may be lost forever and there are minimal chances of it coming back, you have a wonderful option to delete all the data and information stored on your phone. If this data falls into wrong hands, you might get into trouble.

2. Using Google Timeline
To track an iPhone you can also use the Google Timeline, previously known as the Location History. Google not only collects data but also makes it accessible to you when you require. You will be able to track the last location your phone sent to Google and in case your phone is still on and connected to the internet, you will be able to track its current location. This will help you track the iPhone’s last used location even if the phone is switched off.

**To use this service

Log on to com/maps/timeline
Type in today’s date on the left side of the screen.
See the timeline and scroll down the page to see the last reported location of your iPhone.
Along with the location, you are able to keep track of the time of location as well.
Check to see if your phone is moving about or is static waiting for you to come pick it up.
So these were few methods to track the location of your lost iPhone without using any third party application.

6 steps to improve security for small and middle sized businesses



Many large businesses usually have invested heavily on their security given that they usually know what they have at stake-it is usually a lot!

However, when it comes to small and middle sized businesses, they are usually reluctant to dedicate a good amount of their capital and revenue on their company’s physical and cyber security.

Most of them think that they are too small a company to be a target for attackers or rather what they have at stake is really not worth investing that much. Well, that is the wrong approach!

Cyber criminals do not spare SMBs
In fact, small and middle-sized businesses have an equal need to put in a good security system in place as that of large businesses. Do you doubt it?

Take an example of Codespace, a small and middle-sized business that went out of business just 6 months after it had a major cyber-attack. This was just an illustration that also small and medium business stands to lose even more in the case of a security breach compared to large businesses.

In fact, recent reports state that up to a huge 60% of small and medium-sized companies run down within six months of a major attack on the company, unlike large businesses which only suffer a for a financial quarter or at most a year before getting back on its feet.

Now that you know some of these facts, here are a few reasons of security why cyber criminals normally target small and middle-sized businesses:

They are easier to infiltrate since they have not invested much on their security hence giving the attackers an easy time on the playground.
Although they might be small, a good number of them have access to valuable information, which will translate to good money for attackers.
Small and middle-sized businesses are more likely to pay ransom to these attackers to get their company back since they have no expertise to stop the attack.
This therefore calls for urgent measures from the perspective of small and medium-sized businesses to boost their firm’s security because who knows, attackers may be attacking your business next.

How to boost security in SMBs
Boosting security in these small and middle-sized businesses is usually tricky, as it has to be done in a sensible way such that it must be easy to deploy and it should require minimal IT management since most of these organization do not have enough man power.

It should also be easy to use and greatest of all; it should be affordable enough to fit in the company’s financial scope. Here are six steps that will help small and middle-sized businesses to boost their company’s security.

1) Establishing a data security plan for the whole business:
This includes deciding on a suitable method of protecting your firms’ data such a necessary security appliances and software to protect your company. It also involves restriction of access privileges’ to employees about their level in the firm and in the case of a breach scenario.

It is also vital to define the measures to be taken to handle the attacks such that it causes little harm possible on the business operations. Examples of best network security appliances for SMBs are Enterprise-class UTM for SMbs, WatchGuard Firebox T10 etc.

2) Training and educating employees on secure data handling:
Most breaches are usually facilitated by are an insider in any level in the business whether intentionally or not. Therefore, by training them on how to handle data, they will be careful on their practices hence leaving no loophole for an attack.

Employees are also required to report any unusual activity in the system since may be it can be an attack underway. Consequences should be dictated clearly to the employee to prevent cases of insider threat.

3) Establishing a good data storage policy:
This is just a precaution that should be taken by firms as a precaution in case of an attack which leads to loss of data. This would enable them to get back on their feet as soon as possible and make necessary repairs on the system that would prevent further attacks of the similar manner in the future.

This policy will also outline what data must be retained, what should be disposed, and who can access the stored data. This will reduce the risk by a considerably huge percentage.

4) Embracing and training the mobile workforce:
Mobile workforce is connected to the company base by use of devices such as laptops and phones which in these situations are referred to as endpoints. These ends are usually the most vulnerable point of the system and therefore the task force at the ends must be well trained on how to perform their operations with utmost care to prevent system loopholes.

The mobile devices also should not be allowed to access the company’s network without complying with the company’s security policies. This prevents third party entry into the network and access company data.

5) Encrypting the business network with the highest form of encryption:
Strong and the most recent form of encryption using SSL certificate is necessary for an organization, which protects personal details such as names addresses and payment details.

However, firms should not solely depend on encryptions as its only form of encryption since professional hackers can find their way around encryptions.

6) Taking a multilayered security solution:
Since most SMBs lack the enough work forces for their security staff, they should look for a security solution, which targets both internal and external threats, attacks, and malicious intention before it happens actually.

They should look for a multilayered solution that is easy to install manage and maintain from a trustable security solutions vendor.

**Conclusion
It is a high time for the small and middle-sized businesses to mind their security and giving it the attention it really deserves. They should understand that criminals these days have shifted their focus to them and they are the new targets.

Luckily, with the above steps and many other minor solutions, small and middle-sized businesses are able to take care of their security threats at a manageable and an affordable cost with digging deep into the firm’s finances.

How Malware Makers Make Money



Typically where there is crime, there is usually money. The same is true for cyber-crime incidents.

In the early days of computers, malware was created for fun. Playing a practical joke or mischievously damaging someone’s computer was the sole motive behind it. Viruses and worms were more popular in those days, and they were created by curious minds that had a lot of time on their hands.

Today, we have come a long way.

Malware is now developed for profit, for money and for selfish gains.

Each variant of malware has a different way of generating money for the perpetrator, so I will begin by detailing how each of them work.

Ransomware
The newest kind of financial malware that is currently wreaking havoc in cyberspace is called Ransomware. It encrypts your data and displays a message that your files can be decrypted or unlocked only after you pay a certain amount of money.

This is the nastiest kind of malware ever because there is often no other way to gain back access to your private data without giving in to the extortionist’s demands.

If you do not pay the demanded amount of money by a given deadline, you risk losing your data permanently.

Well, this is just one kind of malware attack and it’s still quite new for everyone.
However, malware developers have been making money long before this scheme was created.

Providing your credit card information and paying the attacker directly is not always the case. They can profit off of you in several other ways.

Spyware and Trojan
These are data-stealing malware schemes. They are capable of harvesting personal information from your computer like credit card numbers, banking account details, social security IDs or email passwords.

Once this information reaches the hands of cybercriminals, they can use it to their benefit by making high-priced purchases using your credit card, sending spam emails on a user’s behalf or even emptying bank accounts.

And Trojan viruses may sometimes employ keylogger programs within your system to capture and steal keystroke inputs from a user’s computer and then use them for criminal purposes.

Adware
As the name suggests, Adware is responsible for presenting unwanted advertisements and irritating pop-up messages on a user’s computer.

These ads may or may not lead you to receive genuine discount offers, but they always result in a bad browsing experience. In this case, the attacker gets paid by the company whose ads are being shown.

In addition to ads, pop-ups may also display some alarming messages like claiming a user’s computer is damaged or infected, and then asking you to buy a software product to fix it. It may also ask users to call a fake tech support center, which in turn demands money to pay for their professional fee to fix the problem (which doesn’t exist in reality).

Malvertising and Browser Hijacker
The injection of malware scripts into advertisements on legitimate webpages is called Malvertising. Advertisements are widespread on the web as they form a source of income for webmasters. Cybercriminals use these genuine advertising platforms to spread malware.

This kind of malware injection leads to automatic clicks and unintentional downloads of unknown software programs on a user’s computer.

It may even lead to the installation of Browser Hijacker programs that control a user’s web browser. A change of your default search engine to a sponsored network or homepage redirection to an unsolicited webpage are signs of a browser hijack.

Malware developers are paid by companies to which they drive clicks and visits.
You can remove them by using tools to fix a malware-infected browser.

Potentially Unwanted Programs
Programs sometimes referred to as Potentially Unwanted Program or PUP Malware get installed in a user’s computer without their consent. Often they come as part of a package bundled with a legit software product and get installed automatically.

This PUP can be in the form of adware, spyware or simply scareware.

Scareware programs try to scare users by giving a fake warning message and then scam them. You should avoid online scams that trick you out of money.

Phishing and Social Engineering
It’s not just Malware that makes money. Phishing and Social engineering scams are also a huge threat.

To explain it with an example: You might receive an email claiming to be from PayPal. It will ask you to verify your account details on a fake webpage designed to look like PayPal’s site.

Your username and password entered on this page are then recorded by the hacker behind it and then misused.

Social engineering involves psychological manipulation. They exploit people, not their software.

You can avoid it by using common sense - by avoiding giving personal details over email, and by ensuring the correct URL address of the service you are using.

Use a VPN when you are travelling to improve internet access




A VPN is useful for many things, such as security and privacy when connecting to the internet, but it can also be useful to get around content blocking and to bypass local restrictions.

In some parts of the world the internet is very restricted and filters on the connection block access to certain websites and web services.

It is more common than you might think and right now I am travelling and I am at a hotel with a very limited internet service. The Wi-Fi is OK and I can access Google, but most of the internet, including this website, is blocked.

It seems that you can search the web using Google, but very little else is working. Gmail is OK, but Outlook isn’t. I can get to the Microsoft website, but not the Apple website. The place has some weird filters.

This hotel is unusually restrictive, but I have also come across odd restrictions elsewhere and one coffee place I go to has blocked Pinterest for example. It is a popular site with over 100m users, but you just cannot access it.

I cannot access this website, not even the home page, never mind update it. What can you do?

=> Use a VPN
The solution is to use a VPN - virtual private network. This is software that creates an encrypted connection to the internet, a sort of tunnel, that bypasses local content restrictions and allows you to access what you want.

I am writing this using a VPN to access the RAWinfopages site because the hotel has blocked most of the web, apart from Google searches. Even Bing is blocked! Without a VPN I could not work.

There is a large number of VPN providers and lots of choice for users. Many of them are good, but the VPN I use is NordVPN. I am an affiliate, but also a customer and bought a great two year deal out of my own pocket. The company has more VPN servers around the world than many rivals and the VPN software has some useful features that isn’t in some alternatives.

Run the NordVPN software and it shows a map of the world with pins. Each pin is a location and you can choose where in the world you want to be by clicking a pin. You can be in Iceland, Australia, Europe, USA and other places.

Each pin contains multiple servers, sometimes dozens, and it automatically works out the best one to connect to in the area you select. However, you can view the entire list of servers and select the one you want manually too.

Once a connection is established, you can then use web browsers, email and internet connected apps in the usual way. With NordVPN up and running, I can access RAWinfopages and update it for example, which was impossible before.

VPNs are not just for people in foreign countries with oppressive regimes that limit or spy on internet access. I’m just 100 miles from home in a hotel that is blocking most things beyond Google. The privacy and the security provided by the VPN is useful, but mostly it is just to access the web like I do at home, without restrictions.

Sunday, 19 November 2017

5 common problems of the cloud security




Data leakage

Undoubtedly, the cloud storing space has the same security unsafety as the normal enterprise networks. Unfortunately, because of a huge data volume stored on the cloud servers, providers become attractive targets for bad guys. The unsafe level depends on the sensitivity of the data. They could come from personal information of finance, health, trading secrets, intellectual property and so forth. And the devastation will be imaginable when the leakage occurs.

As an incident, the business must be responsible for the law and usually be fined. In some cases, it will become a flaw in reputation causing the brand damage along with the partnership loss. For more serious, the compensation for customers can put the corporation into bankruptcy.

Password loss

The data leakage and attacking types often focus on obtaining the login information including passwords, authentication keys and so on. Most of the businesses find it difficult to manage users and their data access activities liking with the cloud space. More importantly, sometimes, they forget to remove the access authority at the end of projects.

Account fraud

For years, cases of data attack keep occurring and gaining a lot of success. And the cloud storing services are facing with an additional object since attackers can eavesdrop on the network activities, intervene in transactions and edit the data. Moreover, they entirely can make use of another cloud application to enter the system and do wrong things.

Normal protective tactics may still have gaps. The businesses should not use shared or multiple-user accounts. An account had better be carefully monitored so that every transaction can be tracked and recorded. It is an essential element to protect the account from losing the data.

Malicious code

The intrusion of the data system shows in many aspects. They may be former employees, system administrators, business partners, and collaborators. The purposes are definitely different. For a simple one, they just want to have the data. But if the thing gets more serious, these outsiders are planning to sabotage.

In the context of the cloud storage, such risk is far more dangerous since intruders can destroy the entire system or change much data. The unsafety is the greatest for the case in which the system just depends on a single cloud security provider.

Detected vulnerability

The system vulnerabilities and bugs in the program are not something new. But, they will become a much more significant matter if the businesses keep dismissing. The companies share their device memories, databases and other resources across the cloud system which leads to a new route for hackers.

Fortunately, IT experts discovered these faults and classified as the basic in such industry. In the long term, the best way to handle the vulnerabilities is to scan the system, update adjustments and keep track of the security bulletins.

Tuesday, 14 November 2017

Windows 7/8/10 Password with Command Prompt

Command Prompt is an easy yet free way to reset your forgot Windows 7 Administrator password, but it's difficult and risky to perform Command Prompt especially for those who lack of technical knowledge.



1) First you need to restart your computer
2) Then press F8 to enter "Safe Mode" then navigate to the "Advanced Boot Options".
3) There are 3 boot options for your choice, select the Safe Mode with Command Prompt.
4) Wait for a while, you can see Windows 7 boots up to the login screen. Choose administrator,
5) Go to Start > Run and type cmd.exe, a Command Prompt dialog box pops up.
6) Type net user and press Enter. All the windows accounts will be listed, then type the acount you wish to change.
7) when the command is completed successfully, the new password has been successfully reset.

Frankly speaking, When you're locked out of Windows, I don't suggest you perform this method if you're not a tech guy, if you persist in that, you may damage to your computer or lost system data, all at your own risk. You might take a look at the Part 2 and then determine which method is the best.

Bypass Administrator Password on Windows 7/8/10 with Recovery Utility

To bypass the Windows 7 screen password, you might be told to try pre-created password reset disk to remove your password, but in most case,  this is impossible because the password reset disk must created before your forgot the password. If you don't have a reset disk, maybe the Command Prompt works for you. Or try professional but safe program - iSeePassword Windows Password Recovery application to bypass Windows 7 password without system reinstallation. With it, you will be able to retrieve the lost or forgotten Administrator password and grant your access to your system, it provides two ways to create a booable reset disk with USB drive or DVD, then safely and easily reset administrator and other local user accounts for Widnows 7, 8/8.1 and Windows 10. The principle of this program is very simple, it just writes a new ISO image files to your flash drive or DVD to create a reset disk, never damage to your original data and system.


iSeePassword - Windows Password Recovery Pro
Just 3 simple steps to reset forgotten Windows local administrator, domain and other user account passwords.
Two ways to create bootable reset disk with CD/DVD or USB flash drive. No need to format or re-install Windows!
Support various brands of desktops, laptops and tablet PCs, like Dell, Hp, Sony, Toshiba, Acer, Samsung and ThinkPad, etc.
Support Windows 10, 8.1, 8, 7, Vista, XP, 2000, etc. and Windows server.

Support Windows OS : Windows 10/10.1/10.2, Windows 8/8.1 and Windows 7/Vista/XP

What You Need:

1) Prepare a blank DVD/CD or a USB flash drive with no less then 1G capacity.

2) An accessible Windows computer. You can borrow from your friend's if you haven't.

3) Password reset tool, directly download it below.


1) Download and Install Windows Password Recovery on Your Another Normal Computer

First of all, you need to download and install program on another accessible computer firstly, the installation is easy to operate, then open the program. You will see the main Window below.


2) Start to Make a Bootable Recovery Disk ( Here we take USB for example)

This program provides two ways to create a recovery disk (USB or DVD/CD), here we take USB flash for example. After the installation, insert your USB flash to a normal Windows computer, then you'll be asked to select a Media type to create a recovery disk.

Here you should click the USB Device button and select your USB drive from the drop-down list. Then click "Burn USB" to let the program burn the ISO images files to your USB drive. It will take some time to finish the burning process. Please be patient! Don't disconnect your USB to your computer before the burning finishes.


3) Insert the USB Drive to Your Locked Computer and Boot Computer from USB

After created a recovery disk with your USB drive, then insert it to your locked computer. Here it's also noteworthy that you must  change BIOS boot sequence to make it boot from USB. Restart your locked computer and press "Del" or "F2" button while the computer is initializing, then Go to the bios setting and change the BIOS options. After all, press F10 to save your changes.


4) Start to Reset Your Password, then Reboot Your Computer

Keep the USB dive plugged to your computer and reboot your computer after the boot order has been changed into USB. Then Windows Password Recovery program will be startup during the booting, you will see the main screen. It will automatically detect all the current account and list to you. Just select the target user that you want to reset. Then click the "Reset Password" button.

After the password reset, the password of the target user you select will be blank. "Congratulation" message will pop up once the password has been reset successfully. Then Click "Reboot" to restart computer without login password.


There is one thing you can guarantee yourself of and that is security. No amount of crucial data is going to be lost while the software does its work. You can be sure that safety is the number one priority here and you can absolutely rely on its system functions to provide you the best of password recovery services. If you're locked out of Windows 10, 8, Windows 7, Vista or XP, you can either use the professional, personal or advanced version to suit your needs. It is flexible with several application ranges that can be used successfully to gain the best recovery benefits. Therefore you no longer will have to worry if you forgot the Windows password and need to get it fixed urgently without having to resort to monetary services.

There is no doubt that password protection on your Windows 7, 8 or 10 is very important to your files, without password, anyone who can get physical access to your Windows and stole your files, photos or emails. If you forgot it, you still have the chance to bypass Windows 7 login password. This iSeePassword Windows Recovery tool will guide you through the process that will be responsible in giving you back your password. Just do it by yourself.

Sunday, 12 November 2017

What is data mining?



What is data mining?

Data mining is the process of discovering patterns in large data sets involving methods at the intersection of artificial intelligence, machine learning, statistics, and database systems. In other words, data mining is mining knowledge from data. It uses sophisticated mathematical algorithms to segment the data and evaluate the probability of future events.


While large-scale information technology has been evolving separate transaction and analytical systems, data mining provides the link between the two. Data mining software is one of a number of analytical tools for analyzing data. It allows users to analyze data from many different dimensions or angles, categorize it, and summarize the relationships identified. It also able to answer questions that cannot be addressed through simple query and reporting techniques. Generally, any of four types of relationships are sought:


=> Classes - 
Stored data is used to locate data in predetermined groups.

=> Clusters - 
Data items are grouped according to logical relationships or consumer preferences.

=> Sequential patterns - 
Data is mined to anticipate behavior patterns and trends.

=> Associations: 
Data can be mined to identify associations. The beer-diaper example is an example of associative mining.

Data mining tools and techniques

Data mining techniques are used in many research areas, including mathematics, cybernetics, genetics and marketing. While data mining techniques are a means to drive efficiencies and predict customer behavior, if used correctly, a business can set itself apart from its competition through the use of predictive analysis.

Web mining - a type of data mining used in customer relationship management, integrates information gathered by traditional data mining methods and techniques over the web. Web mining aims to understand customer behavior and to evaluate how effective a particular website is.

Other data mining techniques include network approaches based on multitask learning for classifying patterns, ensuring parallel and scalable execution of data mining algorithms, the mining of large databases, the handling of relational and complex data types, and machine learning.

Benefits of data mining

In general, the benefits of data mining come from the ability to uncover hidden patterns and relationships in data that can be used to make predictions that impact businesses. Today, data mining is primarily used by companies with a strong consumer focus - retail, financial, communication, and marketing organizations. It enables them companies to determine relationships among internal factors such as price, product positioning, or staff skills, and external factors such as economic indicators, competition, and customer demographics. And, it enables them to determine the impact on sales, customer satisfaction, and corporate profits. 

With data mining, a retailer could use point-of-sale records of customer purchases to send targeted promotions based on an individual's purchase history. By mining demographic data from comment or warranty cards, the retailer could develop products and promotions to appeal to specific customer segments. 

8 Artificial Intelligence Technologies: Future Of Life



8 Artificial Intelligence Technologies: Future Of Life

Human is evolving yet in bringing technological revolutions. What sounds difficult now becomes the future! If you ask what is applications of artificial intelligence, then to mention preliminarily there are several. Keep reading this article to get detailed insight. The fact is that more than present there are future advantages of artificial intelligence.

This article is mainly focused to discuss Artificial Intelligence technology or in short AI technology.

What is artificial intelligence?

Artificial intelligence or AI is a technology that deals with computer science that directs in the making of intelligent machines that work and respond like humans.

Some of the artificial intelligence examples are:

1. Speech recognition

2. Learning

3. Planning

4. Troubleshooting problems

There are a few artificial intelligence applications like a computer can defeat a world chess champion and understand voice commands on Smartphone, but real AI has not yet arrived. The pace of change is rapid, though.

Some says it will save humanity.

Others say it could destroy us totally.

But without the real advent of AI, we can’t imagine reality.

The market for AI technologies is booming. Besides the hype and the high media attention, numerous start-ups and internet biggies are racing to acquire them; there is great increase in investment and adoption by the enterprises

The term was coined in 1955 to describe a new discipline in computer science field, “Artificial Intelligence” today covers a variety of technologies and tools, and some tested with time, others relatively new. To help know about what’s hot and what’s not, Forrester recently published a TechRadar report on Artificial Intelligence, a detailed assessment of 13 technologies enterprises must consider taking in, to support human decision-making.

Here we share a list of the 8 best AI technologies:

(1) Natural Language Generation:

Yielding text from computer data. Presently used in customer service, generating a report, and making a gist of BI insights.

Sample vendors: Attivio, Cambridge Semantics, Digital Reasoning, Automated Insights, Lucidworks, Narrative Science, SAS, Yseop.

(2) Virtual Agents:

“In words of Forrester they evolved from simple chatbots to advanced systems that have the ability to network with humans. Now used in customer service and support and in smart home management.

Sample vendors: Apple, Amazon, Artificial Solutions, Assist AI, Creative Virtual, Google, IBM, IPsoft, Microsoft, Satisfi.

(3) Speech Recognition:

Transcribe and convert human speech into the format necessary for computer applications. Now it is used in interactive voice and response systems and mobile applications.

Sample vendors: Nuance Communications, NICE, OpenText, Verint Systems.

(4) AI-optimized Hardware:

Graphics processing units and devices designed and created to run AI-oriented computational jobs. This is now, primarily making a difference in deep learning applications.

Sample vendors: IBM, Alluviate, Cray, Google, Intel, Nvidia.

(5) Deep Learning Space:

A special type of machine learning that consists of artificial neural networks with multiple layers. This is now, primarily used in recognizing patterns and applications for classification supported by large data sets.

Sample vendors: Ersatz Labs, Fluid AI, MathWorks, Peltarion, Deep Instinct, Saffron Technology, Sentient Technologies.

(6) Biometrics:

This helps more natural interactions between humans and machines that include recognition of image and touch, speech, and gesture. This is now used in market research.

Sample vendors: Affectiva, Agnitio, FaceFirst, Sensory, 3VR, Synqera, Tahzoo.

(7) Robotic Process Automation:

They use scripts and different methods to automate human activities to support business processes.

Sample vendors: Automation Anywhere, Advanced Systems Concepts, Blue Prism, UiPath, WorkFusion.

(8)Text Analytics and NLP:

Natural language processing or NLP utilize and supports text analytics by helping the understanding of sentence structure and meaning, sentiment, and intent via statistical and machine learning methods. Presently used in fraud detection and security, a wide range of automated help, and applications for mining data not well structured.

Sample vendors: Expert System, Coveo, Basis Technology, Indico, Linguamatics, Mindbreeze, Sinequa, Stratifyd, Synapsify.

There are definitely several business benefits profited from AI technologies in the present times, but according to the survey that Forrester conducted last year, there are so many obstacles to adopting AI as mentioned by businesses and sharing the reasons for no plans of investing in AI:

Statistical report as per the survey:

Absence of defined business case 42%

Unsure about AI application 39%

Lack the required skills 33%

Sunday, 29 October 2017

Cloud hosting and its application


Cloud hosting is used to save web information, run an application or email system management. With the current trend, a new cloud hosting regularly replaced old ones with advantages: stable, ready, flexible, cost,…

What is Cloud hosting?

In general, Cloud hosting places in a server to save, operate relating services and help them access from anywhere via the Internet.

Basically, Cloud hosting is made by Cloud server based on Cloud computing with many outstanding advantages. Therefore, Cloud hosting is usually used to:

Store and operate a website.
Operating the forum, personal blog.
Operate email system for small business.
Run software, tools.
Virtual environment to test, code.
Archive video, pictures.
Cloud acts based on Cloud Computing technology which used a server with the biggest boss in the world such as Cisc and saving system Cloud Storage with many principles. It uses Load Balancing technology among servers, providing faster access speeds than other types of Web Hosting, safe, security with Multi Downtime capability for Website.

Advantages of Cloud Hosting

Rapid Expansion: Cloud Hosting allows for more resources to be added quickly when needed and reduced when users do not need it. Users only pay for what they actually use, but always get the resources when there is a need.

Reliable: Cloud Hosting does not depend on any single hardware, so any faulty hardware will not affect the availability of cloud hosting, up to 99.99% uptime.

Full management: Cloud Hosting will include patches and operating system monitoring, as well as security firewalls, backup data from the high-tech cloud computing infrastructure.

Windows or Linux platform: Cloud Hosting supports both Windows or Linux operating system environments. So, users who develop on Microsoft SQL or MySQL, IIS or Apache, PHP or ASP.NET are all compatible.

Safety Data Backup: The storage system uses dual controller SAN and daily backup mechanism onsite and offsite at two points to ensure data is always available and continuously.

Flexibility: Cloud Server allows you to actively select the configuration and resources up or down according to actual demand. This is done quickly within minutes.

Features of Cloud Hosting

Optional Windows or Linux operating system
SLA server availability is guaranteed to be 99.99%
Narrow or narrow the resources when required
100 Mbps Internet connection
Services include firewall, monitoring, and patch operating system
Data is backup and restore server
24/7 technical support

In the recent year, there are many big websites in Viet Nam relating to Information Technology such as Tinh Te, VN – ZOOM, Sinh Vien IT, Nuke Viet, Chia Se Coupon, Ebooks VN, Thach Pham,… and social network such as Twitter, Facebook used Cloud hosting to save database and ensure system stability.

With high requirement nowadays, in the near future, Cloud hosting will become a new trend, new utilities for a new life.

Service virtualization

Service virtualization is one of the most significant invention in technology times, which is currently used in software engineering field. Along with the development of computing technology and network, virtualization is created and installed with an advance level. To find out the exact definition and and function of service virtualization, please read the article below.

What is service virtualization?

Service virtualization is an approach to emulate the behaviour of components such as API-driven applications, cloud-based applications and service-oriented architectures. This method is able to create virtual environment for software development and system testing.

Thanks to this type of virtualization, the software development and system testing can easily proceed. Unlike usual, the service virtualization allows the process to be lauched without accessing the live components. It is an advantage that most company leaders are interested in.

How service virtualization improves the modern technology

Service virtualization play an important role in a lot of aspects, which totally change how people work in computing system, engineer the software or even deal with the trouble happening. For example, with the virtual services, participants can easily connect with each other, share information, resources, transfer the data or finish daily tasks directly on the virtualization system. This will be much more time-saving and convenient than the traditional one.

Moreover, in case there are any problems occur, it can be solved in such a short time. The service virtualization allow users to discover the problem to fix it, and protect the data from being get loss at the same time. Therefore, a lot of company tend to create service virtualization to enhance the working efficiency and minimize the risk during administrating the whole complicated system.

This type of virtualization is recognized by vendors, industy analysts, industry publications. They tend to focus on the benefits and advantages of it.

The application of service virtualization

Service virtualization includes creating and deploying a virtual asset which stands in for a dependent component with appropriate performance. It will participate directly in the process of application testing progress.

Service virtualiztion is commonly applied in website service. This involves listening for an XML message over http, jms, mq and so on.

Thanks to the benefits of service virtualization, people currently manage the computing network and software engineering in more efficient way. Many companies have used this virtual network to encourage better result in administration, business and so on. It is supposed that this type of virtualization is a key of success in software and computing technology, so each system should be installed with service virtualization.



Wednesday, 25 October 2017

Cyber Security Threats to Businesses



For a business, it is quite critical mitigating the cyber security threats that may affect organisation’s goodwill or businesses financially. An enterprise and its top management should be well aware of taking necessary actions.

Misuse of Company Assets:

It is very common that employees maliciously misuse the company assets, which remains an on-going threat to the organisation. Such misuses occur during the normal course of duties being performed by the employees, which is difficult to prevent. Monetary personal gains inspire guilty employees performing such acts irrespective of any cadre i.e. from top executives to the lowest level. Another high risk pertains to theft of the physical devices, which may store, or process or transfer business information. Such devices may include laptops, smartphones, pen drives, etc. stolen from office premises, personal vehicles or employee residences, mostly owing to employee’s carelessness.

In order to mitigate such risks, the organisation should regularly arrange back-ups for their data and should encrypt all the mobile devices. Employee awareness programs should be conducted. IT policies should be formed to discourage employee perpetrating from such acts and monitoring should be strengthened to timely identify such insider employees.

At PSI, we use various techniques in-line with ISO 27001 standards, like disaster recovery plan that has extensive details covering the security aspects not limited to only data and application back-ups, laptop encryption using bit locker, etc.

Infringements at Point-of-Sale (PoS) Terminals:

Due to infringements at point-of-sale systems or smart cash registers, large volumes of thefts pertaining to payment card information have been reported. These kinds of attacks pose threats for MSME businesses like grocery stores, restaurants, etc. These attacks involve compromising the PoS device, installation of malware on PoS node for collecting the magnetic strip information, retrieving the stolen data for using it for the financial gain.

Mitigating this attack can be performed by avoiding the use of remote access products and services like PCAnywhere, Microsoft RDP, etc. used to manage PoS nodes. Using anti-virus products for effective identification of popular keystroke logging tools, like Perfect Key-logger, etc. The operator employees of PoS should not be allowed to access the internet for other activities like e-mail access from these PoS terminals. Finally, the operating systems of the PoS terminal should be hardened.

At PSI, we do not allow remote access to the network without a virtual private network. All the systems are protected by corporate licensed antivirus software whose virus definitions are updated regularly, with close monitoring of all the user system on the regular basis.

Denial of Service (DoS) Attacks:

This attack shuts down all customer interacting websites. In such an attack, the internet protocol is exploited to reject other users from the genuine access to the information or systems. The individual or some group of individuals introduces these attacks.

Such attacks are done for various malicious reasons, like rescind the ability of the device to function by deleting or changing configuration information or power interruptions, etc. To vitiate the ability of the device to function, like opening many simultaneous connections to the single device, etc. To engulf the bandwidth capacity of the network device. The attack can be in the form of Distributed Denial of Services (DDoS), where a blend of DoS attacks are performed in concert from various hosts to punish the target host from further serving its function. Normally, these attacks include SMURF attack, SYN Flood Attack, Ping of Death, Teardrop Attack, etc.

In order to mitigate such attacks, network design should be such that it provides high availability and redundancy, the network should be protected by the firewall, network devices, and hosts should be hardened and several layers of security should be applied to the data and the network.

PSI uses Dell Soni firewall to protect its network and devices. The network is designed with state of art, ultra-modern robust devices that minimize the risk of DoS.

Web Application Attacks:

This is the most common type of data breach, in which weakness of the web application is abused. The unfixed application vulnerabilities provide the way to the attacker for taking control of the machine’s and have access to the system resources. System resources are not limited to intellectual properties, personally identifiable information of the organization, but also may have unencrypted and unguarded financial information like credit card, banking details, etc. These attacks typically include SQL injections, Zero-day Vulnerability, URL Interpretation, Cross-Site Scripting (XSS), Buffer Overflow, etc.

The paramount protection for these attacks is to have the secured applications developed, keeping up-to-date patches, having secured application configuration over the applications and hosted servers.

The developers at PSI use industry best practices while designing and coding the applications for its customers. The quality analysts pre-checks all such attacks on the applications to avoid any sort of security related bug leakages.


Best websites for a programmer


The life of a programmer is not so easy, can't survive with the knowledge that you gain from school or collage. Everyone must learn that every day there has a new programming language being written, a new framework being created.
It's nearly impossible to learn all those languages. But as a programmer, it is very important to keep eyes open to the emerging trends so that you'll not lose the potential opportunities
The best way to keep yourself up to date by learning online. In this geek story, we are going to list some good resources to learn programming and improving your programming skills.
Learning is the best way to keep yourself up to date. More you learn the more you write better program. The below websites list offer great tutorials for learning programming.
Online tutorials Codecademy Khan Academy Treehouse GeeksforGeeks Udemy Code School Code Project Sitepoint W3Schools Programming by Doing Tutorialspoint Tutsplus
Lynda



Why C is so popular and still the best programming language?


Computer programming has changed a lot since the 1960’s but one language has managed to stay the same through thick and thin C. When C compilers had gotten into the hands of the common man, things really exploded. At a glance, there have nothing special about C compared to Ruby or Python, but C is way more powerful than anything.

There are many programming languages, today, that allow developers to be more productive than with C for different kinds of projects. There are higher level languages that provide much larger built-in libraries that simplify working with JSON, XML, UI, web pages, client requests, database connections, media manipulation, and so on. But despite that, there are plenty of reasons to believe that C programming will remain active for a long time. Here are some reasons that C is unbeatable.

1. Portability and Efficiency - C is almost a portable assembly language. Before C, programmers had to rely on Assembly. Assembly is no doubt a great language, but there was one drawback - it was based on system instructions differing between CPUs. When C came along, it break all the barrier. It is as close to the machine as possible while it is almost universally available for existing processor architectures. There is at least one C compiler for almost every existent architecture.

2. C has no pre-defined style - Despite its reputation of chat-channel flame wars, the fact that C has no style guide can actually be quite good. In a sense, C teaches us to accept the fact that not the only one coding in the world. Macro naming, function naming, and data structure naming all depends on your preference of style.

3. Deterministic Usage of Resources - Arbitrary memory address access and pointer arithmetic is an important feature that makes C a perfect fit for system programming. At the hardware/software boundary, computer systems and microcontrollers map their peripherals and I/O pins into memory addresses. System applications must read and write to those custom memory locations to communicate with the world. So C’s ability to manipulate arbitrary memory addresses is imperative for system programming.

Another common language feature that system programming cannot rely on is garbage collection, or even just dynamic allocation for some embedded systems. Embedded applications are very limited in time and memory resources. They are often used for real-time systems, where a non-deterministic call to the garbage collector cannot be afforded. And if dynamic allocation cannot be used because of the lack of memory, it is very important to have other mechanisms of memory management, like placing data in custom addresses, as C pointers allow.

4. C is small and simple - C has a very small runtime. And the memory footprint for its code is smaller than for most other languages. Since C is fully based on variables, macros, functions, and structures, there isn't all that much to it. Due to this, C has been embedded on almost any modern microprocessor, from fridges to alarm clocks. It lacks the expressivity of sophisticated OOP or functional languages, but its simplicity means it can be picked up quickly.

5. Reasons to Learn C - C is not a hard language to learn, so all the benefits from learning it will come quite cheap. Since almost all programming languages nowadays are themselves implemented in C, knowing C basically gives you a free ticket to knowing all programming languages. It's true to say that C is very different from C++ and Objective-C, but from a learning standpoint they all aren't that far apart. Of course, C is a procedural language, which means classes and objects are non-existent compared to languages like Python, but Python’s class model itself is written in C. This means that understanding C may not teach you object-oriented programming, but it will teach you how it was conceived, designed, and implemented.

6. Many Interesting Projects to Power the World - C is the best programming language today is still the fact that it simply powers everything. From your phone to your Wifi, no other language provides the level of hardware interaction with the practicality. Many of the C projects that exist today were started decades ago.

The UNIX operating system's development started in 1969, and its code was rewritten in C in 1972. The C language was actually created to move the UNIX kernel code from assembly to a higher level language, which would do the same tasks with fewer lines of code.

Oracle database development started in 1977, and its code was rewritten from assembly to C in 1983. It became one of the most popular databases in the world.

In 1985 Windows 1.0 was released. Its kernel is mostly written in C, with some parts in assembly. Linux kernel development started in 1991, and it is also written in C. The next year, it was released under the GNU license and was used as part of the GNU Operating System. The GNU operating system itself was started using C and Lisp programming languages, so many of its components are written in C.

But C programming isn't limited to projects that started decades ago, when there weren't as many programming languages as today. Many C projects are still started today.


what is Juice Jacking SCAM

  Juice Jacking is a cybersecurity threat that occurs when cybercriminals manipulate public charging stations, such as USB charging ports in...