Thursday, 5 March 2015

Emerging Graphics File Formats - New and Upcoming Graphics Formats


Algo Vision LuraTech
"Algo Vision LuraTech GmbH is one of the leading developers of JPEG2000 implementations and technology for the compression of images, data and scanned documents in color."
LizardTech
"LizardTech develops imaging software and solutions that simplify and enhance the distribution, management and control of digital images and documents." Products include DjVu for digitizing paper documents and MrSID for high quality compression of photos and other images.
Zoomify
Solutions for delivering high resolution images over the Web.
About MNG - Multiple-Image Network Graphic
MNG (pronounced "ming") is the proposed multiple-image extension of the PNG (Portable Network Graphics) format for Web animation. Here you'll find resources for its support and development.
About SVG - Scalable Vector Graphics
SVG stands for Scalable Vector Graphics, a new vector format currently in development for Web graphics and animation. Here you'll find SVG authoring tools, samples, source code, technical specifications, and the latest news and information about SVG development.
JPEG Format - About JPEG and JPEG 2000 File Formats
JPEG (or JPG) stands for Joint Photographic Experts Group, and was named for the organization that developed the format. Here you'll find information and specifications on the JPEG (jpg) and upcoming JPEG2000 (jp2) graphic file formats used on the Web and in digital photography. Includes software for working with JPEG images, technical specs, news, answers to frequently asked questions, and tips for working with JPEG graphics

Tuesday, 3 March 2015

QHN, Our big story - Net Neutrality

Quantum Hack Networks-QHN, bring to you the new word in the tech industry and it means and stands for, Net Neutrality, enjoy.
Net neutrality (also network neutralityInternet neutrality, or net equality) is the principle that Internet service providers and governments should treat all data on the Internet equally, not discriminating or charging differentially by user, content, site, platform, application, type of attached equipment, or mode of communication. The term was coined by Columbia University media law professor Tim Wu in 2003 as an extension of the longstanding concept of a common carrier.[1][2][3][4]
Examples of net neutrality violations include when the Internet service provider Comcast intentionally slowed peer-to-peercommunications.[5] In 2007, one other company was using deep packet inspection to discriminate against peer-to-peer, file transfer protocol, and online games, instituting a cell-phone style billing system of overages, free-to-telecom value-added services, and bundling


Net neutrality[edit]

Network neutrality is the principle that all Internet traffic should be treated equally.[7] According to Columbia Law School professor Tim Wu, the best way to explain network neutrality is as a principle to be used when designing a network: that a public information network will end up being most useful if all content, sites, and platforms are treated equally.[8] A more detailed proposed definition of technical and service network neutrality suggests that service network neutrality is the adherence to the paradigm that operation of a service at a certain layer is not influenced by any data other than the data interpreted at that layer, and in accordance with the protocol specification for that layer.[9]

Open Internet[edit]

The idea of an open Internet is the idea that the full resources of the Internet and means to operate on it are easily accessible to all individuals and companies. This often includes ideas such as net neutrality, open standardstransparency, lack of Internet censorship, and low barriers to entry. The concept of the open Internet is sometimes expressed as an expectation of decentralized technological power, and is seen by some as closely related to open-source software.[10]
Proponents often see net neutrality as an important component of an open Internet, where policies such as equal treatment of data and open web standards allow those on the Internet to easily communicate and conduct business without interference from a third party.[11] A closed Internet refers to the opposite situation, in which established corporations or governments favor certain uses. A closed Internet may have restricted access to necessary web standardsartificially degrade some services, or explicitly filter out content.

Dumb pipe[edit]

Main article: Dumb pipe
The concept of a dumb network made up of dumb pipes has been around since at least the early 1990s. The idea of a dumb network is that the endpoints of a network are generally where the intelligence lies, and that the network itself generally leaves the management and operation of communication to the end users. In 2013 the software company MetroTech Net, Inc. (MTN) coined the term Dumb Wave which is the modern application of the Dumb Pipe concept to the ubiquitous wireless network. If wireless carriers do not provide unique and value added services, they will be relegated to the dumb pipe category where they can't charge a premium or retain customers.

Source:Wikipidea

The strange Chinese word and the Internet


The launch of a new word in China is threatening to break the internet, with the character being shared millions of times despite no-one knowing what it means.
The character, known as "duang", has appeared more than 8m times on China's leading social media site Weibo since it emerged a week ago, generating hundreds of thousands of online conversations.
Foreign Policy, the magazine, has now dubbed the character as a "break the internet" viral meme in the same ilk as last year's image of Kim Kardashian and last week's multi-coloured dress.
The new character has connections to film star Jackie Chan. A fake advert featuring Chan, who sponsors numerous products in China, appeared on video streaming site Youku for herbal shampoo Bawang, which Chan endorses. At the end of advert, Chan appears to say of the product: “It’s just … it’s just … duang!”

USA and UK hack consumer sim cards



US and British intelligence agencies hacked into a major manufacturer of Sim cards in order to steal codes that facilitate eavesdropping on mobiles, a US news website says.
The Intercept says the revelations came from US intelligence contractor turned whistleblower Edward Snowden.
The Dutch company allegedly targeted - Gemalto - says it is taking the allegations "very seriously".
It operates in 85 countries and has more than 40 manufacturing facilities.
The Intercept says that "the great Sim heist" gave US and British surveillance agencies "the potential to secretly monitor a large portion of the world's cellular communications, including both voice and data".
It says that among the clients of the Netherlands-based company are AT&T, T-Mobile, Verizon, Sprint and "some 450 wireless network providers around the world".
Full investigation
The Intercept alleges that the hack organised by Britain's GCHQ and the US National Security Agency (NSA) began in 2010, and was organised by operatives in the "Mobile Handset Exploitation Team". Neither agency has commented directly on the allegations.

However GCHQ reiterated that all its activities were "carried out in accordance with a strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate".

Monday, 2 March 2015

Here comes the terabyte phone

A big selling point of smartphones is their ability to hold much of your data -- photos, videos, your entire music library -- on a little device.
But over the years, their storage capabilities, usually no more than 64 GB, haven't kept pace with all the movies, games, apps and other memory-hogging minutiae of modern digital life.
Many people keep stuff in the cloud, but that requires Wi-Fi access.
It's frustrating to have to delete music or videos every time you want to store something new on your phone. But thanks to some advances in memory design and construction, we may be about to expand our devices in a big way.
"Because it's this amazing material, the industry understands it," Tour said, noting that the key to the scalability of the design is industrial availability. Indeed, Rice's RRAM can be manufactured at room temperature and relatively lower voltages compared with other versions.
RRAM is the next step for an industry that's finding the limits to flash memory. Like flash, RRAM doesn't need continuous power. But it's also much faster, since it can be built into more versatile arrays and stacked into bigger pieces.
"You've got to get into the third dimension to pack up enough density in the memory" in order to keep the capabilities growing, Tour said. Flash memory has kept up with Moore's Law -- the ever-increasing power of microchips -- by giving more functionality to the devices on the chips, he says.
But RRAM does a better and more efficient job.
"It's this insatiable desire for memory that's driving all this," he said.
Tour's team is one of many working on the problem, though he believes his approach has an edge because of its use of silicon oxide instead of more exotic materials. Licensing is under way, he says, and prototypes will be further test the concept's viability.
But if everything pans out, phones with a terabyte of memory -- that's 1,000 GB, enough to hold hundreds of feature-length movies -- are just the beginning, Tour says.
"Because silicon oxide is glass and it's transparent, we've built these on glass, we've built this on top of plastic, so it can even be part of the coating you're looking at through the screen," he said.
Tour believes it'll be a world like that portrayed in the movie "Minority Report," with flexible, rollable digital "newspapers" and writable smart windows.
Talk about expandable.

Nigeria Zero Discrimination Law


In a statement issued by the United Nations Information Centre (UNIC) to commemorate Sunday’s Zero Discrimination Day, UNAIDS commended Nigeria’s commitment to ending stigma and discrimination against people living with and affected by HIV. UNAIDS Country Director for Nigeria and UNAIDS Focal Point for ECOWAS, Dr. Bilali Camara was quoted in the statement to have said, “I would like to thank the National Assembly for crafting the humanly sensitive bill and President Goodluck Jonathan for signing the Anti-Discrimination law. This law is a big boost to improving Nigeria’s AIDS response because it gives back human rights and dignity to people living with or affected by HIV and ensures that the country ends the AIDS epidemic by 2030”. With the signing into law of the bill, it becomes illegal for employers of labour to either subject prospective employees to HIV tests or to discriminate against employees who are living with the virus. “It is hoped that the new law will create a more supportive environment, allowing people living with and affected by HIV to carry on their lives as normally as possible in the society and the work places’, UNIC spokesman, Oluseyi Shoremekun said in the statement - See more at: http://www.ngrguardiannews.com/news/national-news/200236-un-commends-nigeria-s-assent-to-zero-discrimination-law#sthash.sKLFFrmW.dpuf

Sunday, 11 January 2015

2014 Tech developments

2014 Benz Car
2014 has come and gone, last year  saw a lot of development especially in the Technology sector. here is a review of all the development that happened in the tech, ICT and Science sector last year
Click Here.

Wednesday, 7 January 2015

Here comes the terabyte phone

A big selling point of smartphones is their ability to hold much of your data -- photos, videos, your entire music library -- on a little device.
But over the years, their storage capabilities, usually no more than 64 GB, haven't kept pace with all the movies, games, apps and other memory-hogging minutiae of modern digital life.
Many people keep stuff in the cloud, but that requires Wi-Fi access.
It's frustrating to have to delete music or videos every time you want to store something new on your phone. But thanks to some advances in memory design and construction, we may be about to expand our devices in a big way.
cnn 10 ideas orig mg_00005716
"Because it's this amazing material, the industry understands it," Tour said, noting that the key to the scalability of the design is industrial availability. Indeed, Rice's RRAM can be manufactured at room temperature and relatively lower voltages compared with other versions.
RRAM is the next step for an industry that's finding the limits to flash memory. Like flash, RRAM doesn't need continuous power. But it's also much faster, since it can be built into more versatile arrays and stacked into bigger pieces.
"You've got to get into the third dimension to pack up enough density in the memory" in order to keep the capabilities growing, Tour said. Flash memory has kept up with Moore's Law -- the ever-increasing power of microchips -- by giving more functionality to the devices on the chips, he says.
But RRAM does a better and more efficient job.
"It's this insatiable desire for memory that's driving all this," he said.
Tour's team is one of many working on the problem, though he believes his approach has an edge because of its use of silicon oxide instead of more exotic materials. Licensing is under way, he says, and prototypes will be further test the concept's viability.
But if everything pans out, phones with a terabyte of memory -- that's 1,000 GB, enough to hold hundreds of feature-length movies -- are just the beginning, Tour says.
"Because silicon oxide is glass and it's transparent, we've built these on glass, we've built this on top of plastic, so it can even be part of the coating you're looking at through the screen," he said.
Tour believes it'll be a world like that portrayed in the movie "Minority Report," with flexible, rollable digital "newspapers" and writable smart windows.
Talk about expandable.
 

Monday, 29 December 2014

Best security software 2015 awards


From a cybersecurity standpoint, the year of 2014 has been saturated with brand-new trends and
innovative approaches to the old ones. Further rapid rise of cloud computing, the growth of social media popularity, the increment of smart phones’ share on the cyber arena, enhanced techniques for online identity protection and, on the other hand, the increasing sophistication of malware attacks – these factors have substantially influenced the way the security software industry should respond to these challenges so as not to lag behind. In this constantly evolving environment, it certainly matters what computer programs to use for proper protection. Experts working on the Privacy PC project have come up with a rating of the software suites that will meet most demanding users’ requirements in terms of reliable defenses in 2015.
Privacy PC is an ambitious initiative aimed at keeping track of computer security, data protection and user privacy issues. Since its launch back in 2003, the project has been continuously testing security software in the prevalent categories according to a robust set of evaluation criteria. Other areas of the team’s expertise include incident response, cyber warfare, social engineering, virus cleanup, data encryption, to name a few.
Getting back to the rating, here is what David Balaban, Privacy PC’s Chief Editor, has to say:
Over the course of the year, we have been testing security software representing all the major niches. Owing to an extensive list of benchmarking parameters, the verdicts on what is where on the scale of overall efficiency and usability have become obvious.
The Gold, Silver, Bronze and Editor’s Choice award winners are listed for the following software clusters: antivirus, Internet security, antimalware, antispyware, mobile security, free antivirus, Internet privacy, encryption, and password management. Download links and brief highlights about each product are provided in one place. Users can also navigate to the respective full review pages for all programs directly from the evaluation page. Last but not least, the impartiality of the rating is attained owing to a clear-cut testing algorithm, where applications are assessed in terms of usability, feature set, efficiency and support. The sum of grades by the above criteria is what ultimately determines the total score.
Keeping one’s cyber life intact is essential these days. Security software ratings like this help users stay on the safe side by separating the great products from the mediocre ones.

Samsung Galaxy S6

 It is no secret that the core purpose for the Galaxy S6, release date of which is rumoured to come as early as January 2015, is for Samsung to better compete with Apple's iPhone 6 and propel the South Korean tech giant back to the top of the global smartphone market.
But the big question is - will Samsung deliver this time around and deploy with the Galaxy S6 the essential functionalities that will boost its chances of upending the market leader that is the iPhone 6?
In a report by The Motley Fool, the S5 replacement appears to be the monster device "that will outclass (both) the iPhone 6 and 6 Plus." Specifically, the same report indicates that the Galaxy S6 will shine in three key areas:
Higher RAM provision and latest technology
The minimum expectation is for the Galaxy S6 to overtake the specs and capabilities that Samsung had presented with its twin 2014 flagships - the Galaxy S5 and the Note 4. One possibility that is gaining ground is a variant of the GS6, likely the international build, will flash the Snapdragon 810 processor by Qualcomm.
That happening will mean that the next Galaxy flagship is very much open for supersized spec upgrades, the most notable of which will be felt in the random access memory department or RAM.
It will be hardly surprising that with the Galaxy S6, Samsung will jump from LPDDR3 to LPDDR4 and the upcoming device will boast of at least 3GB of RAM with the high likelihood of higher provision once the phone is out of the box - 4GB perhaps.
Efficiency, however, is the most exciting benefit that the GS6 will get from the LPDDR4 memory technology. That would mean the device is equipped with extreme mobile powers not found on any of the iPhone 6 models plus one welcome bonus - the Galaxy S6 will not be a power-hog, promising single-charge battery juice that could last more than 24 hours even in extensive usage.
Superfast Internet access
The Note 4, according to The Motley Fool, is already a powerhouse in terms of LTE speed and clearly outperforming any of the iPhone 6 and 6 Plus in mobile download speed. It's only natural that the Galaxy S6 will do significantly better, likely leaving the Apple hero phones behind by many miles.
Again with the Snapdragon 810 powering up the next Samsung pride, it will likely sport a cellular radio signal that is governed by the Category 9 LTE-Advanced technology, which translates to maximum speeds of 450 megabits per second (MBPS) for download and 50MBPS for upload.
...and breakneck Wi-Fi speed
Complementing the Galaxy S6's LTE edge over its rival is a Wi-Fi standard that will deliver download top-speed of 650MBPS. This is made possible by Broadcom's BCM4358 that takes full advantage of the latest Wi-Fi 2x2 802.11ac solution.
The chance is quite high that the chip - or even a much better version - will find its way to the Galaxy S6 as the same is already showing prowess via the Galaxy Note 4, The Motley Fool noted on its report.
Additional come-ons for the device is a freshly-engineered body - light and slim - and Samsung's unique TouchWiz render of Android 5.0 Lollipop, which suggests it will be first Samsung kit to get a solid taste of Google's latest mobile operating system.
And if indeed Samsung is so raring to take on the iPhone 6 with the Galaxy S6 then the latter could be really set for a release date anytime in January 2015 with the grand introduction to be packed with the CES 2015 in Las Vegas that will kick off on the 6th of the month.
Source.

'The Interview' illegally downloaded 750,000 times on Christmas

"The Interview" was a big hit with pirates on Christmas.


There are thousands of people currently sharing the movie illegally on BitTorrent. On Christmas, about 750,000 people stole digital copies of "The Interview" by using the file-sharing software, according to piracy blog TorrentFreak.
BitTorrent is a peer-to-peer file sharing network, allowing people to upload, share and download content. Though there are legitimate purposes for the software, it is largely used as a way for people to host and download pirated movies and TV shows.
Sony (SNE) Pictures opted to release the movie digitally on Wednesday, a day before it hit theaters. That simultaneous digital and theatrical release concerned movie theater chain owners. They worried that making the movie available online would increase piracy and keep people from buying tickets.
But piracy did not appear to have much of an impact on movie theater attendance. "The Interview" had a very limited release: just 331 independently owned movie theaters opted to show the film, and many reported sell-out crowds on Thursday.
Related: For moviegoers, 'patriotic duty' to see 'The Interview'
"The Interview" also scored a lot of legal digital purchases as well. Though Sony said it would not provide the number of online streams, the movie soared to YouTube's No. 1 most-streamed movie on Christmas. "The Interview" also was available for streaming on Google (GOOGL, Tech30) Play, Microsoft's (MSFT, Tech30) Xbox and a special website set up by Sony.

Animal Affairs I & II

                                                                Animal Affairs I & II   Chicken I . I am scared for my life. Chicken II...