The Essential Phone: a first look at the hardware


Immediately after Essential CEO Andy Rubin finished up his interview with Walt Mossberg at the Code Conference, I headed to the hotel to track the phone down and see it for myself. The units on hand here are prototypes, early enough that they have their individual identification numbers etched directly on to the ceramic back in giant font. So while I can’t really say a ton about performance or the software (beyond that it’s plain Android with Google apps), I do have some thoughts on the hardware.



It is, in short, not what you might expect given the recent trend in Android phones. It’s unapologetically wide and almost blocky compared to the curved Galaxy S8 and the skinny-tall LG G6. That’s not to say it’s phablet-sized, though: the bezels are so small on the 5.7-inch screen, it doesn’t feel as massive as it could.

But Essential isn’t trying to compete directly with Samsung by creating some kind of liquid curvature on the edges of the screen. It’s a squarish phone, and that’s what it’s intended to be. The titanium rail around the phone is squared off at 90 degrees with just enough of a curved edge to keep it from biting your hand. It feels substantial without being too massive.

The back is a glossy ceramic and it feels like glass, honestly, but presumably it’s much more damage resistant. The fingerprint sensor is blessedly simple to reach compared to Samsung’s Galaxy S8, and it’s big enough that it should be an easy target.




True to Rubin’s promise, the only ports you’ll find are a USB-C port on the bottom, flanked by a single speaker grille and the microSD nano-SIM tray. Actually, that’s not entirely fair: there is one more port, namely the wireless one on the back. It works with two pogo pins that are designed simply to transfer power. To get accessories to stick you use a magnet, and to transfer data the phone utilizes wireless USB.

There are two cameras on the back, each 13 megapixels. Since this is such an early unit (and since it was far away from the hotel), I didn’t get a chance to test them. But we know that one is a regular color sensor and the other is monochrome, which allows it to take in more light and data to improve the regular color image. The two-tone flash is there, too, and all three are thankfully flush with the device.

But I know why you’re here. You’re here to read about the crazy screen that wraps around the front-facing camera. Here it is, up close:



I’ll say this about it: it’s super weird at first to have a camera sitting in the middle of the top of the screen, where you’d expect it to cover up stuff you’d need. But Android almost never puts anything in that space — it’s empty status bar up there. And Rubin said onstage that it won’t cut into movies either. In the few minutes I played around with the Essential phone, my eyes kept getting drawn to that gap... until they didn’t. I am guessing that people who see the phone will find it strange, but people who use the phone won’t mind it at all.

I can’t promise you you’ll like the Essential Phone’s hardware, but I can say this: it’s managed to have its own unique design identity even though it’s hitting on the same bezel-less, curved-screen design trends we’ve seen on other phones. It feels satisfyingly dense, which is hopefully a sign that the battery inside it is capacious enough to last through a full day.



We’ll have much more to say about the Essential Phone, the ambitious / Quixotic plan to create an ecosystem of wireless modules, and all the rest. We’ll be watching carefully to see if Rubin’s plan to keep carrier bloatware off the phone really comes to pass, too.

The good news is that we won’t have to wait especially long to find out the answers to some of those questions. Rubin implied onstage tonight that he hoped to ship the phone within the next 30 days.

Microsoft Reveals What Data Windows 10 Collects From Your PC


 Since the launch of Windows 10, there has been widespread concern about its data collection practices, mostly because Microsoft has been very secretive about the telemetry data it collects.

Now, this is going to be changed, as Microsoft wants to be more transparent on its diagnostics data collection practices.

Till now there are three options (Basic, Enhanced, Full) for Windows 10 users to select from under its diagnostics data collection section, with no option for users to opt out of sending their data to Microsoft.

Also, the company has never said precisely what data it collects behind these options, which raised huge privacy concerns among privacy-conscious users.

But now for the first time, Microsoft has revealed what data Windows 10 is collecting from your computer with the release of the Windows 10 Creators Update, bringing an end to nearly two years of its mysterious data collection practices.

The Windows 10 Creators Update, which will be available from April 11 for users to download for free, comes with a revamped Privacy settings section.




During the process of upgrading to the Creators Update, you will be displayed a new Privacy Settings screen that will ask you to toggle the following features:

  • Location – Allow Windows and apps to request your location and share that data with Microsoft.
  • Speech Recognition – Allow Cortana and Windows Store apps to recognize your voice and send that data to Microsoft to improve speech recognition.
  • Tailored experiences with diagnostic data – Allow Microsoft to use diagnostic data from your computer to offer tips and recommendations.
  • Relevant ads – Allow apps to use advertising IDs to show ads more interesting to you based on your app usage.

What's more? On Wednesday, Microsoft published a massive list of diagnostics data – both the Basic and Full levels of diagnostics – on its TechNet site, showing what data gets collected.

  • Basic – The Basic level collects a limited set of data that is critical for understanding the device and its configuration. This data includes basic device information, quality-related information, app compatibility, and Windows Store.
  • Full – The Full level collects data for the following nine categories: common data; software setup and inventory data; product and service usage data; browsing, search and query data; content consumption data; linking, typing, and speech utterance data; and licensing and purchase data.

Windows chief Terry Myerson said in a blog post published Wednesday that Microsoft hoped the transparency would allow users to make "more informed choices" as the company starts rolling out its new Creators update to the operating system.

This more transparency in gathering diagnostic data after two years of the Windows 10 release is likely Microsoft's response to European Union regulators that's publicly pressuring the company about its privacy practices for the past year.



In February, European Union regulators said they're still unsatisfied with the privacy changes announced by Microsoft and seeking further clarification from the company.

Marisa Rogers, the privacy officer of the Microsoft's Windows and Devices Group, said that the company is planning to "share more information about how [it] will ensure Windows 10 is compliant with the European Union's General Data Protection Regulation."

Ex-Mozilla Engineer: Disable Your Antivirus Software (Except Microsoft's)



Ex-Mozilla Engineer: Don’t use third-party antivirus software, Use Microsoft Defender instead

If you are using any third-party antivirus software on your PC or laptop, you may actually be harming your computer in the long run. This is what an ex-engineer with Mozilla foundation says. He has made a detailed blog post on why installing third-party antivirus solutions are really bad for your computer.

Robert O’Callahan who was formerly with the makers of Firefox browser has claimed that the software can “poison the software ecosystem”. He asked users not to buy AV, or uninstall it if they have it already installed, and just use Microsoft’s solution, Windows Defender.

Robert says that a rather heated tweet exchange with Chrome security engineer Justin Schuh and information security expert Dr. Vesselin drove him to write the post.

In the post, he blames AV vendors for not following “standard security practices”, unlike Microsoft whom he called “generally competent”. He explained:

“AV products poison the software ecosystem because their invasive and poorly-implemented code makes it difficult for browser vendors and other developers to improve their own security.”

About the long-term adverse impact of such third-party AV products, Rober says that these products can break other secure products like browsers. He said that due to AV products effect, users tend to believe that browsers are bad. The AV products also block important security updates which can put the user’s computers to risk.

“Several times AV software blocked Firefox updates, making it impossible for users to receive important security fixes. Major amounts of developer time are soaked up dealing with AV-induced breakage, time that could be spent making actual improvements in security.”

Robert makes a strong case for PC and laptop users to use Microsoft’s native AV product, Microsoft Defender to protect their computers against virus, trojans, and malware.

Robert has a point, though. The AV products are resource hungry, eat a lot of storage space and slow up RAM. They also make computers somewhat sluggish and sometimes block legitimate software by flagging them. They also make installation of drivers a bit difficult. However, to completely deride the AV products is a bit foolish considering that Microsoft itself has said that its Microsoft Defender is a work-in-progress product and can’t be 100 percent efficient.

What To Do If You’ve Been Hacked



Getting hacked is a serious concern. If your e-mail, Facebook or any other social media account gets hacked, there’s a good chance that your sensitive and valuable information will end up in the wrong hands. The ramifications are severe. Payments could be made by cyber criminals, potentially emptying your bank account, any secretive company information could get leaked and your private data could be leveraged as blackmail.

It’s important to understand how this can occur. One way involves large-scale account hacks. Recently, these sort of hacks have been committed against a number of big corporations, most notably Sony and Ashley Madison. Millions of passwords and log-in details of its users were stolen. Since many people use the same username and password for multiple accounts, the hackers also suddenly had access to many other facets of their lives. It’s also possible to expose yourself via phishing (fake e-mails that coax the recipient into giving up their details) as well as malicious software that infiltrates your computer and gathers data in the background.

If you are the victim of hacking, try not to panic. There are a number of steps you can take to regain control and ensure that the fallout is minimal.

Reset your passwords.

Immediately change the passwords of the affected accounts and any other accounts that had the same details. It’s important to get into the habit of changing your passwords on a regular basis anyway but now is more urgent than ever. Also, make sure that your passwords are strong and complicated and not merely your surname with a number thrown on at the end. You need a long password that contains a mixture of upper and lowercase letters, numbers, and symbols. Since remembering multiple secure passwords is challenging, using a password manager is worthwhile, since you only have to remember a single master password.


Activate your antivirus software


If it’s malware that got into your system you’re going to need to track it down and quash it if you can. If you haven’t already (you really should have), download a solid anti-virus program and run a scan for any and all viruses. There are a number of free antivirus programs out there, but if you want a more thorough scan, it’s advisable to pay for something more high end.

Set up a two-factor authentication

This is a preventative measure for the future. A two-factor authentication is a double security system that, in addition to your usual login details, will ask you for a separate password when trying to activate your account. The code is usually sent to you via SMS and means that even if your account is hacked in the future, the cybercriminals won’t be able to find out the second code, leading to a significantly more secure account or device. Google even offers a USB security key, taking two-factor authentication to even more stringent level of security.

Intel Releases First 375GB Optane SSD That Can Also Be Used As RAM


Intel Unveils Optane SSD DC P4800X Series For Data Centres

Intel on Sunday introduced its first Optane “3D XPoint” (pronounced 3D Crosspoint) storage product, the SSD DC P4800X for the PCI Express or NVMe slots in servers. It’s basically a datacenter-focused product with high read/write loads and low latency, and can also be used as RAM. Its primary beneficiaries are data centres and companies that require high-speed storage and store huge amounts of data.

The new Intel Optane SSD DC P4800X Series will drive new solutions with applications such as artificial intelligence and machine learning, faster trading, deeper insights into medical scans, and expands the reach of cloud computing solutions.

Intel also promises higher endurance than your typical SSD. The inaugural Optane model can withstand stresses normally associated with RAM, writing about 12.3 petabytes of data in its lifespan.

“Delivering an industry-leading combination of low latency, ultra endurance, high QoS, and high throughput, the Intel Optane SSD DC P4800X Series is the most responsive data center SSD. Built with the revolutionary new 3D XPoint memory media, the SSD DC P4800X is the first product to combine the attributes of memory and storage. This innovative solution is optimized to break through storage bottlenecks by providing a new data tier. It accelerates applications for fast caching and storage, increases scale per server, and reduces transaction costs for latency sensitive workloads. In addition, data centers can now also deploy bigger and more affordable datasets to gain new insights from large memory pools,” said the company.

Intel is offering the 375GB P4800X in PCIe add-in card form factor for $1520 starting yesterday with a limited early-ship program, which will be followed by the broad availability in later 2017. During the second half of the year, a 375GB U.2 model will ship, as well as a 750GB add-in card, The company also intends to release a 1.5TB PCIe card, and 750GB and 1.5TB U.2 stick in the second half of 2017.

Nokia & Facebook Break Fiber Optic Speed Record By Transmitting Data At 32 Tbit/s


Nokia, Facebook Successfully Does Trials Of Undersea Spectral Efficiency

Nokia and Facebook have successfully set a new spectral efficiency record over a transatlantic subsea cable using Nokia Bell Labs’ new probabilistic constellation shaping (PCS) technology. The field trials saw 2.5 times more capacity than the traditional optical transmission technology.

The multiple field trials were conducted over a 5,500-kilometer (3,418-mile) submarine cable between New York and Ireland. The cable used new PCS from Nokia Bell Labs, which uses ‘shaped’ quadrature amplitude modulation (QAM) formats to flexibly adjust transmission capacity to near the physical limits of a given fiber-optic link. It shaped 64-QAM setting a spectral efficiency record of 7.46 b/s/Hz (bits per second per Hertz) indicating the potential to upgrade this cable to 32 Tb/s per fiber in the future.

“Facebook wants to increase the pace of innovation and adoption of next-generation optical technologies,” Stephen Grubb, global optical network architect at Facebook, said.

“This field trial with Nokia demonstrates that the scalable optical technology of PCS together with narrow linewidth laser sources can achieve capacities extremely close to the Shannon limit. This ensures that we are both maximizing our investment in submarine cable systems, as well as continuing to drive the cost per bit of submarine transport lower,” he added.

Nokia achieved the highest ever spectral efficiencies for trans-oceanic distances, bringing the capacity of the cable from 13 Terabits per second (Tb/s) to 32 Tb/s. However, the tests increased capacity from 13 to over 17 Tb/s using commercially available hardware.

“We are thrilled to partner with Facebook to promote our common commitment to accelerating innovation in optical transmission. By demonstrating promising areas of Nokia Bell Labs research such as PCS, as well as coherent technologies available today, we hope to chart a path forward for the industry towards higher capacities, greater reach, and more network flexibility,” Sam Bucci, head of optical networking at Nokia, said.

Nokia also achieved the highest trans-oceanic single carrier (wavelength) data rate of 8-QAM wavelengths running at 200 Gb/s and 16-QAM wavelengths running at 250 Gb/s – a first for transatlantic transmission. While exhibiting sufficient performance margin to support reliable, commercial operation, 200G 8-QAM wavelengths supported a spectral efficiency of 4 b/s/Hz.

The results of the field trials will be presented in a post-deadline paper at the Optical Fibre Communication Conference and Exhibition (OFC) this week in Los Angeles, CA.

Google’s senior security engineer says antivirus apps are ineffective magic


Google’s senior security engineer and tech expert, Darren Bilby has told fellow hackers that the antivirus applications are actually useless and questioned the overall effectiveness of them, while speaking at the ‘Kiwicon’ hacking conference in Wellington on Thursday.

Referring tp a series of cyberattacks named ‘2009 Operation Aurora campaign’ that made several computers vulnerable to attacks, Bilby said there is no need of ‘magic’ through ineffective antivirus.

He further said, “We need to stop investing in those things we have shown do not work. Sure, you are going to have to spend some time on things like intrusion detection systems because that’s what the industry has decided is the plan, but allocate some time to working on things that actually genuinely help.

“Antivirus does some useful things, but in reality it is more like a canary in the coal mine. It is worse than that. It’s like we are standing around the dead canary saying ‘Thank god it inhaled all the poisonous gas’.”

While negative on antivirus software, Bilby urged his fellow hackers and security experts to concentrate on things such as intrusion detection systems that can make a real difference in an enterprise space and protect users even if they access malicious websites or open compromised documents.

“And sure you are going to have to spend some time on things like intrusion detection systems because that’s what the industry has decided is the plan, but allocate some time to working on things that actually genuinely help.”

Bilby told the conference that he thinks networks are not stable enough, as individuals can use mobile networks to upload data to various cloud services that are not adequately protected.

He concluded by giving advice to people in the workplace to practice safe internet was “horrible” as it shifts blame to the users themselves and away from those who manufactured hardware and software that is not secure enough to be used online.

“We are giving people systems that are not safe for the internet and we are blaming the user.”

Top 10 Best Antivirus For PC Windows/MAC – 2017

Desktops, Laptop and smartphones rather become a part of our day to day life. All these devices contain number of important files, projects, documents and other stuff like music, songs, games and other applications. But as our devices contains huge amount files. So it necessary to take care about the protection from virus. As we are using number of different applications and software in our devices. We download them and install them without reading any conditions and install just by clicking next, next and next. No doubt we all don’t have so much time to read each and every point comes while installation. During this some unwanted files which includes Trojans, Malware, Spam and other viruses. Which may cause any great problem for your device. For better protection from malware and adware we prefer to specialized malware removal tools. But for overall protection of your devices its necessary to install some best antivirus for PC which protect your offline and also online web data more secure and make your firewall more stronger.

List of Best Antivirus For PC Windows.

1. AVG Antivirus.




Personally we also use AVG freeware home edition for PC protection. AVG provides better security from different viruses and other Trojans within the applications. AVG provides computer, Web, Email, Identity and also make your firewall more secure. It also have PC analyzer which recover your registry, error, junk and fragment files.

www.avg.com/in-en/homepage


2. Avira Antivirus.



We also use avira many times for my personal computer it is also freeware and provide protection from number of different viruses, malware, adware and also from the autorun files which may harm your device. Avira automatically detect and remove all these unwanted files and make your pc more safe.

http://www.avira.com

3. Avast Antivirus.



For your personal computer protection avast is also best software. But at the level of profession Avast have limits but it provide best security from small unwanted files and viruses.

https://www.avast.com/en-in/index

4. Malwarebytes.



Malwarebytes is not a full protection anti-virus software but you can use it with other anti-virus for more protection. It is light waited software. Malwarebytes provide best protection for web. It remove and block unwanted software, adware which automatically comes in your PC and you are not able to remove. Malwarebytes automatically remove all these files for better protection.

https://www.malwarebytes.com

5. Bit Defender Total Security.



Bit Defender Total Security is one of the amazing software in the list of best Antivirus tool for PC. It is an award winning Antivirus program. It keeps our PC secure from many type of malicious programs and virus. Bit Defender Total Security provide one year license for three PC only in 58.47 USD dollars. It keep our PC safe and secure from malicious program. It is available for different version of Windows. Bit Defender Total Security also provide 30 days trial free of cost.


https://www.bitdefender.co.uk/solutions/antivirus.html


6. Eset Smart Security.




Eset Smart Security is one of the famous program in the list of best Antivirus for PC. It is cross platform app which is available for Windows, MAC, Linux and Android phone. It is paid antivirus which provide its trial version for free with limited features. Eset can easily detect malware, auto-run, Trojan horse and other virus. It provide fast scanning speed and optimize system activities and maximize its performance. Its various packs are available on its website which is given below.

https://www.eset.com/us

7. 360 Total Security.



360 Total Security is also a good antivirus in the list of Best Antivirus for PC. It is totally free to download. It is available for Windows, MAC and Android. 360 Total Security is a light weight software tool with awesome interface. It provide complete protection from virus, Trojans and other potential threats. It keep our system performance optimize by managing its services, boot up items etc. 360 Total Security also clean our PC by removing junk file.


http://www.360safe.com/en-us

8. Panda Antivirus.



It is also a good antivirus tool. If you are looking for a good antivirus tool with low cost then this is good option. We can easily protect our internet browsing, Baking and our social sites. It also keep our CPU speed fast and optimized. Panda keeps us secure from our malware, shortcut virus, Trojan horse etc. It is a light weight tool with smart security.


http://www.pandasecurity.com/india

9. Kaspersky Antivirus.



Second anti-virus software which we can’t forget  for security. It provide protection from malicious files which latest. It also provide protection from hacking files.


https://www.kaspersky.com

10. Smadav Antivirus.


If you are afraid of Shortcut antivirus and want to freedom from it without installing heavy antivirus then this is good option for you. Smadav Antivirus is a light weight tool with awesome green interface. It provide total protection of our USB flash devices. It automatic detect and scan our USB after plug in. Smadav Antivirus also unhide the hidden files easily. It also provide its free version and pro version. Pro version provide some additional features like auto update, schedule scanning etc.

www.smadav.net