RSS
 

Arquivo para a ‘Computer – Hardware’ Categoria

Smartphone recognizing surface

12 Sep

Researchers at this university have created a type of camera called SpeCam that can EmReuniaoEnrecognize the surface that the smartphone is and set different tasks for it.
For example, if the phone rings and you put it upside down on the laptop, it could send a message to the caller saying “sorry, I’m in a meeting” or put it in your pocket could suggest to another colleague.
SpeCam is actually a program that allows existing phones to use the camera’s function to recognize different materials to which the smartphones are exposed, linked to a database that recognizes the fabric and links it to a message.
The work was presented in the recent 19th. International Conference on Human-Computer Interaction by Mobile Devices and Services, ACM SIGHI MOBILEHCI 2017, Vienna Austria, on Wednesday, September 6 by researchers led by Aaron Quigley.
“This is an example of what we call Discrete Computing or discrete interaction, where subtle and subtle user actions can result in entirely new forms of interaction. , recognize materials, all surfaces around us become a screen for our imagination. ”
SpeCam cleverly uses the display / display on a smartphone as a multi-spectral light source and the front camera to capture the reflection of the material that has been placed face up.
SpeCam: Sensing Surface Color and Material with Front-Facing Camera of a Mobile Device” received an honorable mention award at MobileHCI, one of five such articles throughout the the program.

 

What are the best plans for clouds

29 Aug

We’ve gone through floppy disks, CDs, pendrives and now it’s cloud storage,aDriveEn there are good, medium services, but the great ones are still to come.


Important detail check that when buying a tablet or notebook if it no longer has a cloud service available, most often fears the user or know how to use, is what is written as 25 GB of storage, may be more or less, but Which means lifelong storage, more secure than any other service.


If you put in the tip of the pencil, free services, you will find 5 good: Dropbox, OneDrive, Box, Google Drive and iCloud, but still have ADrive, Amazon, CloudDrive and SpiderOak services that are good, even taking free A little hand in his pocket.


The Box is one of the most reliable services in the world, being a well balanced option in terms of space and security, but like some competitors, the disadvantage is the incompatibility with the Linux system.


One of the most famous cloud storage services is also one of the most robust, Dropbox has little space for storage in the free plan.


The Google product, Google Drive has considerable storage space, syncs photos automatically, has quick features, is already installed on almost all Androids and Chromebooks, making it an easy option for those who already use other services of the company.


These other plans such as ADrive came to gain prominence in recent years when it offered high storage space without cost gained market, but then it only allowed subscription plans

 

Unknown Stories of Computing

21 Aug

Charles Babbage built two machines called Analytical Engine and Diferential EngineMEMEX, these machines, their systematizations and thoughts would not have arrived until we were not working patiently Ada de Lovelace (1815-1852), daughter of Lord Byron who compiled and organized the work of this Pioneer, making it understandable to mathematicians of the time.

Later David Hilbert (1862-1943) listed 23 mathematical problems at the time without solutions, one of which was to organize an algebraic system in order to solve the problem computability problem by algorithms, Kurt Gödel thinking about this problem creates a paradox about Completeness of systems, stating that it can not prove having proof by an assertion within the system, then consistency problems weaken such systems.

Thus it was necessary that logic, besides being constructed with good properties, had consistency (no contradictions), completeness (any proposition would be either truth or false exclusively) and the systems were decidable (existence of a method allowing to establish if any formula whether the formula was true or false).

This latter property was called by Hilbert as the “entcheidungsproblem”, or problem of “decision”.

Alan Turing and Claude Shannon working on coding machines (for US government messages) and decoding (a machine called Enigma was captured from Hitler’s army), as both projects were secret, found in meals and work breaks as indicated The book by James Gleick and talk about the problem proposed by Hilbert and not solved by Gödel, a secret document proves this passage of Turing, who was English, by Bell Laboratories, where he worked on deciphering the Enigma machine code.

Shannon at that time worked as a monitor at MIT in Vannevar Bush’s laboratory, who had proposed a “read” machine called MEMEX (it appeared in TIME magazine) was not a computer itself, but a machine to cross information from books.

Vannevar Bush suggested to Claude Shannon Boole’s Algebra..

Later using the model of the mathematician Alonzo Church that finalized the design of Alain Turing, and the call Turing Machine is actually based on Turing / Church model.
Norbert Wiener’s model were electronic models of feedback machines, although he founded Cybernetics, the idea was to create models for movements and turn them into problem-solving models, they were contemporary with Vannevar Bush of MIT

 

IoT and data security

21 Jun

Many aspects of data security have been developed, but there is a maxim of computingIoTSecurity that states that no system is totally secure, and if we anticipate an exponential growth of connections to the Internet of Things, it is a fact that the security problem also has a growth In this proportion.
While the world of IoT has arrived (smartphones, watches, TVs, cars, glasses and other gadgets, we can say that there is a really safe IoT platform with simple operations.
To the experts, one of these basic security features is data encryption, but it must be added to the Big Data treatment, since this for the current data volume is almost indispensable, with IoT being compulsory.
IoT devices transact tons of data, cryptography is already an obvious aspect of these data, but it is still rarely used, let alone if we think from end to end, ie from producer to consumer of data, and so IoT is more gloomy.
With the advancements in quantum computing, cryptography may also not be enough to protect vital data, since quantum computers can discover cryptographic keys even faster, and algorithms though efficient now, there is no totally secure, cryptographic keys with Use of quantum computing will be more quickly opened, and while most hackers do not have access to this level of computing we can be sure, but for how long?
We must begin by rethinking two issues, BigData’s data processing and quantum-computing cryptographic keys before these features are in the hands of hackers.
Privacy data, often vital for certain systems, are and will be in check more and more

 

MacronLeaks and elections in France

08 May

Even with Macron’s victory in the second round of the French elections,MacronLeaks and the defeat of ultra-right Marine Le Pen, did not let to be noticed a case that was the most serious Hacker attack ever known to try to influence an an election.

Post-truth times after the urgency on Saturday morning of the National Committee for Control of the Presidential Campaign in France that begged the press not to disclose the information on Macron, the fact in the digital universe that there is no control as to how Control of false information, the only possibility is to publicly deny it.

Following an emergency meeting this morning (6) to examine the case, the committee extended the notice to all the population and users of social networks warning that the disclosure of these documents (the “MacronLeaks”, as it has been called in France) May involve “criminalliability” of its perpetrators.

Still no effort of despair, because people who do this kind of action does not have an ethical conscience on the fact, the body asked that “the actors present in Internet sites and social networks, first means, but also all Citizens, to have responsibility and not to transmit such content, in order not to alter the transparency of the election, not to break the law and not to expose itself to a criminal offense. “

In addition, he warned that they were “mixed with false information”, so retransmission of these facts is “susceptible to receive a criminal qualification of many types and to carry the responsibility of its authors.”

En Marche, founded by Macron after breaking with the left-wing Holland government, reported on Friday night that it was the victim of a “mass and coordinated hacking attack” that led to the leak “in the internal social information networks Of diverse natures “, we are waiting for the final result of the elections for analysis.

But an irreversible fact is that some form of control over false information in election campaigns will be necessary from now on because the network effect can make them uncontrollable facts of lying versions about the candidates reversing opinion and forces in a campaign.

European newspapers speak of “relief”, “thank you to France” and the strengthening of the European Union, but “hidden” forces may favor authoritarian and conservative positions.

 

 

TOM TOM go Brasil

03 May

The Tom Tom GPS is already famous all over Brazil, and already had TomToma version for many countries around the world now, now has come Tom Tom Go Brazil, at least for now free and better than Waze, because it works even if your phone is off -line and update all maps online without needing that: “update and gps”.
The application already works for Androids devices and is promising soon for brazilian HiPhones, and enters a direct competition with Waze, the popular application for transit here.
The driver can check the traffic conditions on various routes; know where speed radar in many cases identifying mobile speed radars, such as maximum speed of the route, but the most interesting option to download several diverse maps.
Although this is interesting, it gives some balls, for example, Ceará is in the Northeast region, but it is pointed as North, so to download make sure for sure in which region is according to Tom Tom.
It has interesting services like telling friends the arrival time, it will calculate and redo the schedule according to the traffic and stops, ideal for caronistas and people who love to stop for the snack.
Until July 13 (because of this date), the “Get Tom Tom GPS Navigation ‘application can be downloaded for free, after this date it will cost $ 1, about 3 brazilian reais.
The bad news is that after the testing period, the user has to pay US $ 15 a year to use the licenses of the maps, or it will be outdated, and it is unknown if the service can be cut.

 

Touchless beyond IoT

04 Apr

In addition to devices and sensors that allow the Internet of Things (IoT), touchless technology Touchless2predicts that anything touchable can trigger devices and controls in our environment, is the fiction of the 2002 Minority Report, now almost within reach.

In the film John Anderton related to databases through the holographic movement of hands with gestures and clicking on the air choosing elements for interaction.

As we move forward, cloud storage and intelligence linked to the data, sensing through gestures, it will soon be possible to communicate without a keyboard, without a mouse or sensors, just if we have some “wearable” equipment in our body: a clock , A bracelet, or even clothing that has Wifi or Bluetooth communication.

What is missing from the movie Minority Report are the holographic environments, how do we go about triggering them? Still the technology has advanced little in this direction, because they would be thousands of pixels (actually voxels, because they will be volumetric pixels) to be processed.

What is already available are projections on surfaces and cameras that capture the movements on these surfaces where we can touch switch images, and projected virtual control devices and camera captures, the future is there.

They will say that it is more of a barbarity, but as soon as the barbarians are launched they invade the market.

Let’s talk about the technologies that are already available.

 

 

The news of Motorola Razr is pitfail

03 Apr

The new model of Motorola Mobile, which had been sold to Google and now is Lenovo, is theMotoG5 Motorola Mobi, in fact it is a model called Motorola Mod.
Among the untrue about the Mod, any was presented in TecMundo, one is that it would have a cover that could also serve as wireless charger, extra battery and an LED giving different colors for the actions actions of the device, another fantasy is that could such Mod Razr , Would have a solar panel and a “walkie-talkie”.
What has actually been a contest including models to reach the market, it is not impossible that has some of the above features, but even if it is called Razr, there will be nothing nostalgic about the model, because technology like novelty.
While we are waiting for some news, we have already posted the Moto G5 models and the results indicate that they are gaining market, of course with specifications are Moto G4 Plus, but many people are still in doubt if it is worth because of the price of this fashion model.

 

First Impressions Moto G5

27 Mar

On March 7, Motorola officially launched its new Moto G5 and Moto G5 Plus models MotoG5in an event held in São Paulo Brazil,  yesterday morning, the advertising spoke of design, performance and memory, but we must wait to see the reality;
The old Moto G models have always been competitive in price, and in cost x quality they ended up beating the competitors to the Brazilian’s pocket, now starting by packing the model from the charger to the headset the first impression is very good.

Although the announcement is about the “aluminum finish”, the Moto G5 is almost all plastic body; it is possible to notice a small metal plate on the back, removable to give access to the battery compartments, SIM chips and the slot storage.

Among the optional colors: platinum, blue (safira) and black, stands out the novelty of the gold.
The Moto G5 has also decreased in size, now 144.3 in height by 73 mm in width, and 9.5 mm in thickness, which means that the new model is finer in the new models, and is lighter with only 145 grams.

But the big surprise is the technical features: 5-inch IPS LCD screen with Full HD resolution (1080×1920 pixels), giving a density of 441 ppi, with Wi-Fi 802.11 a / b / g / n, Bluetooth 4.2 with LE / A2DP and GPS / A-GPS / Glonass / Beidu for location.

With the Qualcomm Snapdragon 430 chipset with eight cores and maximum clock rate at 1.4 GHz, Adreno 505 GPU, 2 GB of RAM and 32 GB of internal storage space, which can be expanded via microSD card up to 128 GB, comes to Market competition.

The price is rotating around 900 to 1,000 reals (around U$ 300) for the common model, while the plus is around 1500 reais (around U$ 650).

 

 

IoT and upcoming future prospects

23 Mar

The IoT seen as a paradigm of a changing society may change, among many other IoTenthings, cultural libraries and equipment allowing greater interaction with users and providing new services, some of which may come from applications in the clouds.
Most of the objects that surround us today will be in the network in one way or another, so that you can have complete information about each one of them, it will be necessary to use repository in clouds, information sharing and data reliability.
Among the technologies for identifying objects are radio frequency identification (RFID) and sensor networks that will grow to meet this new challenge, what will be the new information and communication systems that will be present, although invisible to the user, Which will have an environment around us.
This will result in the generation of huge amounts of data that must be collected, stored, processed and presented transparently, efficiently and with intuitive interpretation by the users, ie simplicity and efficiency summarizing.
This means that model will consist of these services will become commodities as products and should be delivered in a similar way to traditional commodities.
Cloud computing should provide the virtual infrastructure for such utilitarian computing that integrates monitoring devices, storage devices and should behave both analysis tools whose foundations are found in Information Science, as visualization and delivery platforms to the customers, whose foundations are Both in Information Architecture and in Information design, this being to express beauty and help in the intuitive environment.
The model needs to consider the cost that Cloud computing offers, that is, the service must be end-user accessible to users and businesses to access on-demand applications from anywhere without the user’s chatting.
Intelligent connectivity with existing networks and computing able to use context to handle network resources will be an indispensable part of IoT.
An internet that in addition to current applications including sensors and actuators connecting the physical world should emerge consolidating IoT.
IoT’s progress is only beginning, but the period of mistrust has passed.