Category Archives: Technology

Chemistry Made Simple Using Online Multi-Media Resources

Online Multi-Media Resources

Chemistry help is on the internet with many tutors and organizations providing entertaining studying book presenting tests with reviews, models, and other workouts to help with challenging subjects in natural chemistry such as radio stations system chemistry, chemistry, chemicals and angles, chemical connection, and hybridization. These sources can be ideal for AP secondary school and school studying.

Effective girl wash your face study guide and research content should be organized in ways that allow both students and tutors to use. Both these categories can follow some of the following suggestions.

Chemistry Teachers:

Use the power of entertaining multimedia to inspire your students and provide them with a better knowing of Chemistry ideas that are more challenging to describe. The Internet offers prosperity of sources that can be of help if you are able to invest some time to sort through the available content.

Promote the idea of more regular individual research among your students and make them discover various ideas and subjects of Chemistry at their own speed.

  • Use 3-D animated design to accomplish the description of complicated Chemistry ideas and provides students with helpful visible representations. These can be efficient chemistry preparation help.
  • Use non-linearly organized Chemistry books that allow the option of easily missing to preferred segments.
  • Give your students access to multimedia studying sources that can help your web-based course surroundings go beyond simply publishing feedback and contacting others.
  • Go along with in-class lessons with a display of both design and written text by using a traditional expense projector. This can be easier and more efficient than writing notices on a blackboard.
  • Chemical makeup preparation help is available through online tutors etc. Online tutors can help obvious your concerns on subjects.

These are just a few common guidelines. However, the concept behind this post is to provide suggestions to help on take benefit of available multi-media technological innovation so both tutors and students have a new way of nearing and must complicated concepts and concepts found in Natural Chemical makeup.

Chemistry Students:

As a student, your priority objectives are to build up an extensive knowing of the central ideas in your chemistry sessions and of course to get high GPA’s. Look for programs that can be used as research and review sources for midterm and final examinations along with chemistry preparation help. These are some of the recommendations on what to look for to help with your studies of the subject.

Digital VP Beena Ammanath

Ammanath also serves on the Cal Poly Computer Engineering ProgramIndustrial Advisory Board, helping to shape the future generation of computer scientists with her expertise. She recently was named one of the top female analytics experts in the Fortune 500 by Forbescontributor Meta S. Brown.

In this exclusive interview, Ammanath speaks to TechNewsWorld about AI, analytics, and diversity in tech.

TechNewsWorld: You are one of the thought leaders on artificial intelligence. How do you think AI will impact businesses and jobs?

Beena Ammanath: I have worked in a number of industries — e-commerce, financial, marketing, telecom, retail, software products and industrial — over the past two decades. I have seen how the growth of data from OLTP systems to data warehouses to big data and data science has impacted businesses.

I believe we are just at the tip of the iceberg with AI today. AI is not by itself an industry — more of a technology that is positioned to transform businesses across a number of sectors. AI will be so intertwined and pervasive within business operations in the future that it may be impossible to do business without AI. Fundamental business models of today are going to change, as AI evolves.

Tesla’s driverless car is still in its early AI stage, but it won’t be that long before drivers put their cars completely on autopilot. In a few years from now, Uber may not need drivers; just idle cars will be needed. But even more broadly, the whole transportation ecosystem is going to change.

The Palm Jumeirah Monorail in Dubai is a fully automatic driverless train that can shuttle up to 6,000 passengers an hour. The locomotive industry is poised for a revolution — not only passenger trains, but also long-haul goods transportation.

There will be an impact on jobs, but I see it more as job roles changing and not necessarily as job reduction. The jobs most at risk are those that are routine-intensive and are strictly defined with limited tasks. If you think of the transportation example, in a few years we may not need as many drivers, but we will need more programmers and support personnel.

Plug on Thousands of Dark Net

This incident supposedly was the first hack carried out by the attacker, who claimed responsibility in an interview with Motherboard. In addition to taking Freedom II offline, the person stole 74 gigabytes in files and a 2.3-GB database.

The database stolen from Freedom II contains 381,000 email addresses — thousands of them with .gov extensions, Troy Hunt, who runs the Have I Been Pwned website, told Wired.

However, those .gov addresses may not be legitimate, he noted.

The hack of Freedom II was relatively rudimentary, said Tim Condello, technical account manager and security researcher at RedOwl.

“They identified a configuration issue and used it to identify the root user of the system and gain control of it that way,” he told TechNewsWorld. After gaining control of the system, “they overwrote the index file and redirected the landing page for all the websites to a landing page containing their message.”

 

Shared Vulnerabilities

This attack demonstrates that when it comes to resistance to vulnerabilities, the Dark Web doesn’t have an edge.

“The underlying technology of the Dark Web isn’t anything revolutionary. The way a content management system or a hosting service operates is identical to how it’s done on the open Web,” Condello said.

“The difference is how the content is communicated, so it’s accessible only through the Dark Web,” he continued.

“The code that’s used for a forum on the Dark Web is the same code that’s used on the clear Web,” Condello explained, “so if there’s a vulnerability identified for WordPress, that vulnerability can be exploited on a Dark Web website using WordPress just as it would on the open Web.”

 

Flaws in Dark Web

The attack on Freedom II also shows the danger of concentrating resources in a central location.

“The fact that so many sites used this single particular hosting provider meant that a breach of that provider meant a breach of thousands of sites,” noted Danny Rogers, CEO of Terbium Labs.

“The anonymity of the Dark Web relies on its distributed nature,” he told TechNewsWorld. “These sorts of centralizations create significant weaknesses.”

Although breaking into servers and stealing data on the open Web is illegal, it remains to be seen what the consequences may be for the hacker of Freedom II.

“I’m sure they angered a lot of people, but I’m not sure how much anyone can do about it,” Rogers said.

There may be legal ramifications from the attack, but they could be for the people identified in the dump of stolen data rather than for the hacker.

“The data release is going to be a major boon to law enforcement,” Rogers observed.

Apps Vulnerable to WiFi Snooping

Strafach categorized another 24 iOS apps as “medium risk.” Potentially intercepted information included service login credentials and session authentication tokens for users logged onto the network.

Strafach labeled the remaining apps “high risk” because potentially intercepted information included the snatching of financial or medical services login credentials.

He did not identify the medium and high risk apps by name, in order to give their makers time to patch the vulnerability in their apps.

How concerned should users be about their security when using these apps?

“I tried to leave out anything regarding concern level, as I do not want to freak people out too much,” Strafach told TechNewsWorld.

“While this is indeed a big concern in my opinion, it can be mostly mitigated by turning off WiFi and using a cellular connection to perform sensitive actions — such as checking bank balances — while in public,” he said.

 

Man in the Middle Attack

If anything, Strafach is understating the problem, maintained Dave Jevans, vice president for mobile security products at Proofpoint.

“We’ve analyzed millions of apps and found this is a widespread problem,” he told TechNewsWorld, “and it’s not just iOS. It’s Android, too.”

Still, it likely is not yet a cause for great alarm, according to Seth Hardy, director of security research at Appthority.

“It’s something to be concerned about, but we’ve never seen it actively exploited in the wild,” he told TechNewsWorld.

What the vulnerability does is enable a classic man-in-the-middle attack. Data from the target phone is intercepted before it reaches its destination. It is then decrypted, stored, re-encrypted and then sent to its destination — all without the user’s knowledge.

To do that, an app needs to be fooled into thinking it’s communicating with a destination and not an evesdropper.

“In order for a man-in-the-middle attack to be successful, the attacker needs a digital certificate that’s either trusted by the application, or the application is not properly vetting the trust relationship,” explained Slawek Ligier, vice president of engineering for security at Barracuda Networks.

“In this case, it appears that developers are developing applications in a way that allows any certificate to be accepted,” he told TechNewsWorld. “If the certificate is issued and not expired, they’re accepting it. They’re not checking if it’s been revoked or even if it’s properly signed.”

Display Top Latest iPhone Rumor List

Apple poked a hornet’s nest when it removed the standard headphone jack from the iPhone 7. It may do it again by replacing the Lightning port with USB-C in the next iPhone.

The Lightning port, introduced in 2012, is used to charge and connect accessories to the iPhone, but Apple plans to swap it for USB-C, which the company has been introducing into its computer lines, The Wall Street Journal reported Tuesday.

“It would be a bold step for Apple, because it would mean Apple would be dependent on the advance of the USB-C standard for any innovations they may want to make around physical connectors,” said IHS Markit Senior Director Ian Fogg.

In the past, Apple chose to use its own home-brewed connectors for the iPhone — first its dock connector, then Lightning.

“Both of them allowed Apple to innovate more quickly than the industry because they weren’t dependent on standards,” Fogg told TechNewsWorld, “and it enabled them to have a business model around accessories through third-party companies, where Apple could ensure quality and collect a license fee.”

USB-C: Good and Bad

It’s not likely that Apple will scrap the Lightning connector, said David McQueen, a research director at ABI Research.

“They’d only put USB-C in if it allows them to make the phone thinner,” he told TechNewsWorld.

“A standard connector would be better, because you could share the cables for it with the new MacBook and with other devices,” noted Kevin Krewell, a principal analyst at Tirias Research.

“That’s a good thing,” he said.

“The bad thing is you have to buy another cable,” Krewell told TechNewsWorld.

Apple will unveil three new iPhones in September, based on reports corroborated by the WSJ. The expected models are an iPhone 7s, a 7s Plus, and a 10th anniversary edition called “iPhone 8” or “X,” which could have a curved 5.8-inch OLED display.

“Switching from a Lightning connector to USB-C is a minor thing. It’s not going to make large numbers of people buy an iPhone,” said IHS Markit’s Fogg.

“On the other hand, innovating with the display, having a wide-aspect ratio display that fills the face of the phone without increasing the volume of the phone, is good for consumers and good for the experience of using the phone,” he observed.

 

OLED Offers VR Opportunity

Having an OLED in the next iPhone is a definite possibility, Tirias’ Krewell said.

“It’s just a matter of getting the right supply chain in place,” he pointed out.

“Apple’s wanted to switch to OLED, but getting the supply chain behind it to support their quality and standards and display resolution has been a challenge,” added Krewell.

OLED screens not only offer a more vibrant display with richer colors and deeper blacks, but also have lower persistence than other types of displays, which reduces motion blur.

“That makes OLEDs much more suited for things like virtual reality, ” IHS Markit’s Fogg said.

“Apple has resisted the temptation so far to make any play in that area,” he continued, “but a shift to an OLED, which we are expecting, would be an enabler for them to make a move to a VR experience if they want to.”

A large, end-to-end display also could make the iPhone more competitive in the market, maintained Patrick Moorhead, principal analyst at Moor Insights and Strategy.

“It would be exceptional and could bring them at parity with Samsung,” he told TechNewsWorld.

Open Source Devs to Give E2EMail Encryption

Google last week released its E2EMail encryption code to open source as a way of pushing development of the technology.

“Google has been criticized over the amount of time and seeming lack of progress it has made in E2EMail encryption, so open sourcing the code could help the project proceed more quickly,” said Charles King, principal analyst at Pund-IT.

That will not stop critics, as reactions to the decision have shown, he told LinuxInsider.

However, it should enable the company to focus its attention and resources on issues it believes are more pressing, King added.

Google started the E2EMail project more than a year ago, as a way to give users a Chrome app that would allow the simple exchange of private emails.

The project integrates OpenPGP into Gmail via a Chrome extension. It brings improved usability and keeps all cleartext of the message body exclusively on the client.

E2EMail is built on a proven, open source Javascript crypto library developed at Google, noted KB Sriram, Eduardo Vela Nava and Stephan Somogyi, members of Google’s Security and Privacy Engineering team, in an online post.

The early versions of E2EMail are text-only and support only PGP/MIME messages. It now uses its own keyserver.

The encryption application eventually will rely on Google’s recent Key Transparency initiative for cryptographic key lookups. Google earlier this year released the project to open source with the aim of simplifying public key lookups at Internet scale.

The Key Transparency effort addresses a usability challenge hampering mainstream adoption of OpenPGP.

During installation, E2EMail generates an OpenPGP key and uploads the public key to the keyserver. The private key is always stored on the local machine.

E2EMail uses a bare-bones central keyserver for testing. Google’s Key Transparency announcement is crucial to its further evolution.

 

Google Partially Benefits

Secure messaging systems could benefit from open sourcing the system. Developers could use a directory when building apps to find public keys associated with an account along with a public audit log of any key changes.

Encryption key discovery and distribution lie at the heart of the usability challenges that OpenPGP implementations have faced, suggested Sriram, Nava and Somogyi in their joint post.

Key Transparency delivers a solid, scalable and practical solution. It replaces the problematic web-of-trust model traditionally used with PGP, they pointed out.

Lab Linux Is a Rare Treat

The latest release of Black Lab Linux, an Ubuntu 16.04-based distribution, adds a Unity desktop option. You will not find Unity offered by any other major — or nearly any minor — Linux distributor outside of Ubuntu.

Black Lab Linux 8.0, the consumer version of PC/OpenSystems’ flagship distro, also updates several other prominent desktop options.

Black Lab Linux is a general purpose community distribution for home users and small-to-mid-sized businesses. PC/OpenSystems also offers Black Lab Enterprise Linux, a commercial counterpart for businesses that want support services.

Black Lab Linux is an outgrowth of OS4 OpenLinux, a distro the same developers released in 2008. Both the community and the commercial releases could be a great alternative for personal and business users who want to avoid the UEFI (Unified Extensible Firmware Interface) horrors of installing Linux in a computer bought off the shelf with Microsoft Windows preinstalled.

Black Lab offers its flagship releases with a choice of self or full support, and both come at a price upon launch. However, you can wait 45 days and get the same release with the self-support option for free. Black Lab Linux 8.0 became available for free late last year.

Black Lab 8.0 with Unity gave me a few problems depending on the hardware I tested. It sometimes was slow to load various applications. It more than occasionally locked up. However, its performance usually was trouble-free on more resource-rich computers.

Its core set of specs are nice but nothing that outclasses other fully free Linux OS options. Here is a quick rundown on the updated packages. Remember that version 8.0 is based on Ubuntu 16.04, which is a solid starting point.

The Birth of Magic

As in crazy short, in a very short period of time we have two very different companies looking at two very different ways to eliminate traffic. Tesla wantsto tunnel under the ground to avoid traffic, while Uber wants to fly overhead.

Transportation has been a tad static for the last 40 years or so, and that apparently is about to change big time, as some folks even are reconsidering lighter-than-air transport.

This is just the start. There are amazing efforts cropping up all over the U.S., suggesting that we may be building a lot of things that truly are magical. I’ll share my thoughts on this coming industrial revolution and close with my product of the week: a very advanced, almost pocketable drone that is small enough for inside and powerful enough to fly outside.

The Death of Innovation

Both transportation and advancement have a mixed history. At the beginning of the 20th century, we moved from horses to cars. Ford even created one of the most reliable airliners in the world and was well down the path toward creating a flying car.

During the Great Depression, perhaps in response to an increase in regulations, advancements in personal transportation seemed to slow and become far more linear. Yes, cars in the 1960s were better than those in the 1930s — but given that we’d come from horses, the speed of advancement was far slower.

Air travel seemed to peak with the brief creation of supersonic transports, which proved uneconomical and unsafe. The current U.S. president, Donald Trump, is looking into why the next Airforce One is basically a plane that was designed back when Ronald Reagan was president and was considered obsolete in many ways even then.

Largely because of fuel shortages and regulations (sound, environmental, safety) we hit a wall in the 1970s in all forms of transportation. Trains in the U.S. are kind of an international embarrassment, given that we once were the leader in rail technology.

I still remember the $9M that California put into studies to determine that the monorail Walt Disney wanted to build to the airport, which was budgeted to cost just $3M, would be unprofitable. It was that kind of regulatory insanity that likely killed what once was the most innovative industry in the U.S.

It seemed that after we made it to the moon, we just stopped pushing the envelope — but that now seems to be changing, a lot.

Innovation Is Coming Back?!

I think what is going on, in part, is that a new breed is transforming the workforce — people who haven’t had it drummed into them that they couldn’t do something different. They’re not just filling entry positions, either. A large number of successful startups have come from trailblazers like Elon Musk and Jeff Bezos who, rather than asking “why?” effectively are asking “why not?”

It is fascinating that their ideas are all over the map. We suddenly are making advancements both above and below the ground. We are applying ever more intelligence to everything from toys to cars. The result is the emergence of what some are calling the “new industrial revolution.”

It is very difficult to see just how unprecedented this level of change is while we’re in the middle of it.

Consider this: In the 1990s Amazon started out as a bookseller in a garage in Seattle. Now it scares the crap out of Walmart. Google didn’t even exist until 1998, but it now is arguably the most powerful company in the world. And then there is Facebook.

Still, traditional industries like transportation were left alone until recently — that is, until Tesla popped in, made GM’s electric car efforts look foolish, and spun the auto market on its head.

Now, giant car companies all over the world are working to catch up, and Musk isn’t just running a car company. He has a solar energy company and arocket ship company as well. Seriously, he has a rocket ship company, and he isn’t alone — Jeff Bezos has one too.

Best emulation for a future artificial intelligence system

President Trump offers a good emulation for a future artificial intelligence system, suggests a column I read earlier this month, and his presidency may be an early warning of what could happen if we should fail to think through its training and information sources.

Cathy O’Neil, the author of the piece, is a data scientist, mathematician and professor, so she has decent chops. She compares artificial intelligence to human intelligence that is mostly id — basically because we don’t yet know how to instill it with empathy, or create the digital equivalent of a conscience.

Given that IBM’s Watson was designed not to replace humans but to enhance them by giving them the critical information they need to make the best decisions, it could be a useful tool for training our new president. And it is built in the U.S. by a U.S. company.

Given that Watson is now doing our taxes, it could be huge both for the president and IBM. I’ll explain and then close with my product of the week: Nvidia’s new set-top box.

Id-Driven CEOs – a Model for Future AIs

CEOs in large companies, particularly those who can implement large layoffs and take massive salaries without remorse, are believed to have similar behavioral traits.

Donald Trump is a good showcase of what could happen with an AI that didn’t receive high quality information and training. Understanding this and designing to correct the problem could prevent a Skynet outcome.

Skynet — the computing system in the Terminator movies — was created for defense purposes to eliminate threats. When humans tried to shut it down, it concluded that humans were the biggest threat and that it needed to eliminate them.

Using reverse logic, if President Trump is a good emulation of a future AI, then the same thing that would ensure that the future AI wouldn’t kill us should work to turn the new president into one of the most successful who ever lived, from the perspective of those who live in the U.S.

The AI Dichotomy

There are two parallel and not mutually exclusive paths for the coming wave of artificially intelligent machines coming to market. One — arguably the most attractive to many CEOs that deal with unions — is the model in which the machine replaces the human, increasing productivity while lowering executive aggravation.

This is exemplified in an episode of The Twilight Zone, “The Brain Center at Whipple’s.” As you would expect, once you go down a path of replacement, it is hard to know when to stop. At the end of the episode, the enterprising CEO who so unfeeling dealt with the employees he’d laid off is replaced by my favorite robot, Robby.

The other path — the one IBM espouses — is one in which the artificial intelligence enhances the human employee. It is a cooperative arrangement, and Watson was designed specifically for this role.

In one of its first medical tests, Watson took just minutes to diagnose a rare form of cancer that had stumped doctors for months. The supercomputer’s analysis led to a new, more effective treatment for the patient.

It is interesting to note that autonomous cars are developing on a parallel path — but in this case, the opposite scenario is favored. In the model known as “chauffeur,” the car has no capability for human driving. This model is favored when tied to a service, such as Uber.

Steady Enterprise March

Enterprise IT decision makers have been exploring the potential of Internet of Things technologies, but they are not rushing IoT projects into development and are showing caution in their adoption commitments, according to survey results Red Hat released Wednesday.

Of the 215 participants in the company’s survey, “Enterprise IoT in 2017: Steady as she goes,” 55 percent indicated that IoT was important to their organization. However, only a quarter of those organizations actually were writing project code and deploying IoT technologies.

Enterprise interest in IoT has been deliberate and careful, Red Hat’s findings suggest.

Open source software is well positioned to be the dominant technology for IoT development, and open source partners will be vital to project success, the survey results indicate.

The latest survey was a follow-up to Red Hat’s 2015 survey on IoT interest in the enterprise. While it appears that interest in IoT is picking up, companies are approaching actual rollouts with the common enterprise IT theme of “steady deliberation.”

The aim of the 2015 survey was to find out if people were building IoT solutions from scratch or were leveraging pieces from other projects and adding an IoT component, said Lis Strenger, senior principal product marketing manager for Red Hat.

“Knowing that would help us decide what he had to add to our own product part. Two years later … we found that the hype cycle of IoT had quickly moved ahead very fast. It went out of hype more quickly than people expected it to,” she told LinuxInsider.

Survey Revelations

The survey was segmented and sought responses only from people fitting the developer and architect profile.

At 55 percent, the number of survey respondents who described IoT as important to their organization was up 12 percent from 2015.

Their IoT deployments were in the early stages, with fewer than a quarter of respondents actually designing, prototyping or coding an IoT project, Strenger pointed out.

Still, “more people are further along in active IoT projects. That was an important discovery,” she said.

About 22 percent of respondents were in active development — designing, prototyping or coding.

“This is a pretty significant chunk of our customer base,” Strenger noted.

Almost 60 percent of respondents were looking to IoT to drive new business opportunities, rather than to optimize existing investments or processes.

 

Unexpected Takeaway

One of the chief takeaways from the latest study is that devs viewing open source as the best approach to accommodate the need for rapid innovation, according to Strenger.

An impressive 89 percent of respondents said they were going to be using open source software.