Technology Education
53 views | +0 today
Follow
 
Scooped by Daniel
onto Technology Education
Scoop.it!

Este escalofriante salto en wingsuit pone los pelos de punta

Este escalofriante salto en wingsuit pone los pelos de punta | Technology Education | Scoop.it
En una era donde podemos cruzar el cielo a velocidad supersónicas o meter un elefante en un avión los wingsuit son lo más parecido que el hombre a estado nunca de volar. A pesar de lo que pueda parecer, volar con ellos no es excesivamente complicado y solamente requiere unas condiciones climatológicas adecuadas y entender mínimamente cómo es el funcionamiento de las corrientes da aire.http://es.gizmodo.com/este-es-probablemente-el-salto-base-mas-arriesgado-qu-1486373659
more...
No comment yet.
Your new post is loading...
Your new post is loading...
Rescooped by Daniel from Tech Latest
Scoop.it!

How to Recover Lost Data From SSD

How to Recover Lost Data From SSD | Technology Education | Scoop.it

A lot of people are looking for methods for SSD data recovery, but most of them failed finding one. Now, we’ll work this out. 


SSD is the acronym of Solid State Disk, also known as Solid State Drive. Despite that the first solid state disk drive was developed by Storage Tek in 1970, it was not until the year of 1989 that we finally witness the birth of the first solid state disk in the world. 


 After about 20 years of development, the manufacturing technology has become gradually mature and the SSD has been applied to all walks of life. Though SSD has a high cost, it is gradually spread to the DIY market. More and more computer users choose to replace their old hard drive, which is relatively small in capacity, with a new SSD, whose capacity is relatively large.


SSD (Solid State Drive) is a kind of hard drive which is made by solid state electronic memory chip array. And it consists of control unit and storage unit (FLASH chip and DRAM chip). SSD is exactly the same with common hard drive in the specification and definition of interface, function, usage and product shape and size. The most obvious difference between SSD and the old fashioned hard drive lies in hard drive technology.


Via Jenne, Peter Azzopardi
more...
Jenne's comment, July 1, 2016 5:24 AM
thank you very much, Mariano. :)
Jenne's comment, July 17, 2016 9:34 PM
thank you very much, Peter. :)
Jenne's comment, July 17, 2016 9:34 PM
Thank you very much Anna. :)
Rescooped by Daniel from Open Source Hardware News
Scoop.it!

Top 50 Internet of Things Applications - Ranking | Libelium

Top 50 Internet of Things Applications - Ranking | Libelium | Technology Education | Scoop.it
More than 50 billion devices will be connected to the Internet by 2020, but this new connectivity revolution has already started. Libelium publishes a compilation of 50 cutting edge Internet of Things applications grouped by vertical markets.

Via Jinbuhm Kim
more...
No comment yet.
Rescooped by Daniel from the entity haute couture
Scoop.it!

Can Your Car Really Be Hacked? - "e" magazine | "e" magazine

Can Your Car Really Be Hacked? - "e" magazine | "e" magazine | Technology Education | Scoop.it
The Chevy Corvette, hacked via a simple text message. (Photo: Yahoo UK) Lately it feels like everybody has figured out how to hack a car. Over the last month, two teams of security researchers have shown the world how they managed to “drive” a 2014 Jeep Cherokee via the Internet and hack into a Tesla Model S, respectively.  Another team showed how they controlled the wipers and cut the brakes on a Corvetteusing a dongle plugged into the car’s on-board diagnostics II (OBD2) port. Could a hacker half a world away take control of your car? Will your old clunker suddenly start driving down the road by itself or — worse — develop a mind of its own as you’re hurtling down the highway at 65 mph? While the headlines may make you want to drive your car into a lake and bury the keys in the backyard, the reality is not as dire as it seems. Here are the facts of the matter. How hard is it to hack a car? Very. The teams of researchers working on each hack — yes, it took teams — spent months

Via the entity
more...
No comment yet.
Rescooped by Daniel from Hospitality Digital Marketing & Beyond
Scoop.it!

Uber Hires Hackers Behind Jeep Takeover to Work With Security Team

Uber Hires Hackers Behind Jeep Takeover to Work With Security Team | Technology Education | Scoop.it
Uber Technologies Inc. has hired the two computer-security engineers who hacked into a Jeep Cherokee, gaining control of the car’s steering, brakes and eng

Via Alexandre Guapyassu
more...
No comment yet.
Rescooped by Daniel from SME Cyber Security
Scoop.it!

1 Billion Android users can be hacked with a text

1 Billion Android users can be hacked with a text | Technology Education | Scoop.it
Nearly 950 Million people who are using android as their daily gear are at risk . This is claimed to be one of the most dangerous bug used by hackers

Via Roger Smith
more...
Roger Smith's curator insight, July 29, 2015 7:21 PM

This is a problem are you a target?

Rescooped by Daniel from SME Cyber Security
Scoop.it!

Google's next Android OS is Marshmallow

Google's next Android OS is Marshmallow | Technology Education | Scoop.it
SDK released for developers.

Via Roger Smith
more...
Roger Smith's curator insight, August 18, 2015 12:24 AM

Oh Dear, does that mean its going to be soft and squishy

Rescooped by Daniel from Tech Latest
Scoop.it!

The Asus VivoStick is a $129 PC-on-a-stick that runs Windows 10

The Asus VivoStick is a $129 PC-on-a-stick that runs Windows 10 | Technology Education | Scoop.it
Behold the latest HDMI stick that instantly transforms into a full-fledged Windows PC when plugged into a TV or compatible monitor. The Asus VivoStick is Asus' answer for Intel's Compute Stick;...

Via Peter Azzopardi
more...
Peter Azzopardi's curator insight, September 3, 2015 3:51 PM

it's a PC you can carry in your pocket. Priced at $129, the tiny device includes 2GB of RAM, 32GB of storage, plus two USB ports and a headphone jack ...

sarah sugden's curator insight, March 9, 2016 3:59 AM

it's a PC you can carry in your pocket. Priced at $129, the tiny device includes 2GB of RAM, 32GB of storage, plus two USB ports and a headphone jack ...

Rescooped by Daniel from SME Cyber Security
Scoop.it!

Cyberattacks Cost Businesses $400 Billion a Year

Cyberattacks Cost Businesses $400 Billion a Year | Technology Education | Scoop.it
A new report also finds that companies will spend $170 billion on cybersecurity measures in 2020.

Via Roger Smith
more...
Roger Smith's curator insight, September 9, 2015 7:25 PM

Some people think this is highly underestimated.

Rescooped by Daniel from Tech Latest
Scoop.it!

Why Windows 10 is the most secure Windows ever

Why Windows 10 is the most secure Windows ever | Technology Education | Scoop.it
With Device Guard and Credential Guard, Windows enjoys unprecedented protection from malware and advanced persistent threats

Via Peter Azzopardi
more...
Peter Azzopardi's curator insight, September 22, 2015 5:45 PM

Using hardware-based virtualization to extend whitelisting and protecting credentials was a “brilliant move” by Microsoft, said Chester Wisniewski, senior security strategist for Sophos Canada, an antivirus company.

Scooped by Daniel
Scoop.it!

TGI Friday's Dumb Mistletoe Drone Cut Somebody's Face Open

TGI Friday's Dumb Mistletoe Drone Cut Somebody's Face Open | Technology Education | Scoop.it
When TGI Friday's announced a promotion involving mistletoe-toting drones flying around inside its restaurants, the idea seemed both dumb and unoriginal. Now, that the restaurant's gimmicky marketing campaign has shed blood in Brooklyn, it just seems dangerous. And TGI Friday's isn't even taking the blame!
more...
No comment yet.
Scooped by Daniel
Scoop.it!

Our E-Waste Problem Is Ridiculous, and Gadget Makers Aren't Helping | WIRED

Our E-Waste Problem Is Ridiculous, and Gadget Makers Aren't Helping | WIRED | Technology Education | Scoop.it
As we ditch more and more of our electronics each year, recycling is a growing issue, and manufacturers need to take that into account with product design.
more...
No comment yet.
Scooped by Daniel
Scoop.it!

Este escalofriante salto en wingsuit pone los pelos de punta

Este escalofriante salto en wingsuit pone los pelos de punta | Technology Education | Scoop.it
En una era donde podemos cruzar el cielo a velocidad supersónicas o meter un elefante en un avión los wingsuit son lo más parecido que el hombre a estado nunca de volar. A pesar de lo que pueda parecer, volar con ellos no es excesivamente complicado y solamente requiere unas condiciones climatológicas adecuadas y entender mínimamente cómo es el funcionamiento de las corrientes da aire.http://es.gizmodo.com/este-es-probablemente-el-salto-base-mas-arriesgado-qu-1486373659
more...
No comment yet.
Scooped by Daniel
Scoop.it!

New method could lead to cheap, spray-on solar power for flexible surfaces

New method could lead to cheap, spray-on solar power for flexible surfaces | Technology Education | Scoop.it
The SprayLD system developed by University of Toronto researchers is capable of blasting colloidal quantum dots onto films and plastic, a new method for spraying solar cells onto flexible surfaces...
more...
No comment yet.
Rescooped by Daniel from Surfing the Broadband Bit Stream
Scoop.it!

The Future of the Internet of Things Will Be 'Notification Hell' Before It Gets Better | Catherine Clifford | Entrepreneur.com

The Future of the Internet of Things Will Be 'Notification Hell' Before It Gets Better | Catherine Clifford | Entrepreneur.com | Technology Education | Scoop.it

Right now, the Internet of Things (IoT) is primarily the realm of futuristic-minded early tech adopters. Think of the pioneers who use Google Glass to snap pictures, Nest to control their home temperature or turn to their smartphone to dim the light bulbs in their bedroom. In a decade, things will look much different.

 

By 2025, the Internet of Things will become more mainstream, having an economic impact between $3.9 trillion and $11.1 trillion per year, according to a recent economic forecast released by consulting firm McKinsey & Company. The upper figure (including the consumer surplus) could account for as much as 11 percent of the world economy, the report states.

That’s a pretty staggering estimate, especially given that today the Internet of Things is still “in the early stages of growth,” according to the McKinsey report. While IoT has a lot of potential, getting it to become a more established industry could be challenging.

Speaking on an IoT panel at the Northside Innovation Festival in Brooklyn, N.Y. earlier this year, director of technology at Ready Set Rocket, Gareth Price, asked the audience who was currently wearing a connected device (smartphones don’t count). A very few hands poked up. “This is like the hottest technology conference in one of the most connected cities in the world and there are maybe three people wearing a device right now,” said Price, proving his point that wearable technology is still the purview of a stark minority in 2015.

One of the primary reasons Internet-connected devices are still so rare is because often, each device requires its own separate operating software. Yet between 40 and 60 percent of the potential value of the IoT industry depends on devices being able to operate on the same software system, according to the McKinsey report.

 

Click headline to read more and access hot links--


Via Chuck Sherwood, Senior Associate, TeleDimensions, Inc
more...
No comment yet.
Rescooped by Daniel from Risk management, regulation and compliance
Scoop.it!

Auto Hacking is a Real Thing

Auto Hacking is a Real Thing | Technology Education | Scoop.it

http://bit.ly/1LHbq0o

 

You’ll probably be shocked to learn that last year, thousands of cars with keyless entry technology were stolen in London, says a report from wired.com.

 

But fact is, the more connected a vehicle is to the cyber world, the more hackable the vehicle is—and the hack could be to steal the vehicle or hurt the owner.

 

Rule: Anything that’s connected, especially via WiFi can be hacked.

 

The article notes that recently, a Jeep Cherokee was hacked with a smartphone via its Internet-connected navigation and entertainment system; the hackers remotely took control of its steering and brakes while it was on a road.

 

But don’t panic yet; it was an experiment conducted by good-guy hackers to demonstrate the vulnerability of a connected vehicle. The flaw was corrected after Chrysler recalled 1.4 million vehicles.

 

But what about getting into keyless-entry vehicles? A device is sold online for $31 that can clone the “key.” The wired.com article notes that BMW, Audi, Mercedes, Saab and Land Rover are among the models at risk.

 

What are your thoughts?

 

http://bit.ly/1LHbq0o


Via Boris Agranovich
more...
No comment yet.
Rescooped by Daniel from @The Convergence of ICT & Distributed Renewable Energy
Scoop.it!

After Jeep Hack, Chrysler Recalls 1.4M Vehicles for Bug Fix | Andy Greenberg | Wired.com

After Jeep Hack, Chrysler Recalls 1.4M Vehicles for Bug Fix | Andy Greenberg | Wired.com | Technology Education | Scoop.it

Welcome to the age of hackable automobiles, when two security researchers can cause a 1.4 million product recall.

On Friday, Chrysler announced that it’s issuing a formal recall for 1.4 million vehicles that may be affected by a hackable software vulnerability in Chrysler’s Uconnect dashboard computers. The vulnerability was first demonstrated to WIRED by security researchers Charlie Miller and Chris Valasek earlier this month when they wirelessly hacked a Jeep I was driving, taking over dashboard functions, steering, transmission and brakes.

 

The recall doesn’t actually require Chrysler owners to bring their cars, trucks and SUVs to a dealer. Instead, they’ll be sent a USB drive with a software update they can install through the port on their vehicle’s dashboard.

Chrysler says it’s also taken steps to block the digital attack Miller and Valasek demonstrated with “network-level security measures”—presumably security tools that detect and block the attack on Sprint’s network, the cellular carrier that connect Chrysler’s vehicles to the Internet.

 

Click headline to read more and access hot links--


Via Chuck Sherwood, Senior Associate, TeleDimensions, Inc
more...
No comment yet.
Rescooped by Daniel from SME Cyber Security
Scoop.it!

Experts: Car Hacking Incident Shows Growing Attack Surface, Need To Build In ... - CRN

Experts: Car Hacking Incident Shows Growing Attack Surface, Need To Build In ... - CRN | Technology Education | Scoop.it
Security experts said the incident highlights the need for more emphasis on developing new technologies with a security-first mindset.

Via Roger Smith
more...
Roger Smith's curator insight, July 26, 2015 8:45 PM

"developing new technologies with a security-first mindset.".   Good luck with that - cost and convenience are all that are driving technology at the present!

Rescooped by Daniel from SME Cyber Security
Scoop.it!

This map shows China's cyber invasion of the US is well underway - Fortune

This map shows China's cyber invasion of the US is well underway - Fortune | Technology Education | Scoop.it
There have reportedly been more than 600 successful attacks in the past five years.

Via Roger Smith
more...
Oksana Borukh's curator insight, August 1, 2015 6:06 AM

Pretty scary stuff, all those trade secrets walking out the digital door.

Frank J. Klein's curator insight, August 1, 2015 1:04 PM

Pretty scary stuff, all those trade secrets walking out the digital door.

Mark E. Deschaine, PhD's curator insight, August 1, 2015 4:27 PM

Pretty scary stuff, all those trade secrets walking out the digital door.

Rescooped by Daniel from SME Cyber Security
Scoop.it!

Internet of Things : Security is getting better, but far from secure - SlashGear

Internet of Things : Security is getting better, but far from secure - SlashGear | Technology Education | Scoop.it
Connected devices are common all around the world today and becoming more and more common. In years past the only things that were typically networked were computers, tablets, and smartphones. That...

Via Roger Smith
more...
Roger Smith's curator insight, August 28, 2015 12:35 AM

Convenience and cost does not equal secure

Rescooped by Daniel from SME Cyber Security
Scoop.it!

How to Spot & Avoid 10 of the Most Insidious Hacking Techniques

How to Spot & Avoid 10 of the Most Insidious Hacking Techniques | Technology Education | Scoop.it
In this ongoing arms race between security specialists and hackers, hackers are still finding new ways to get around our defenses. Attacks used by famous hackers in the past are used as starting points or even inspiration. Oftentimes, security specialists just can't develop new defenses as quickly as hackers develop new attacks. With most of…

Via Roger Smith
more...
Roger Smith's curator insight, September 9, 2015 6:23 PM

Using everyday technology to bypass your security - just another couple of examples

Rescooped by Daniel from SME Cyber Security
Scoop.it!

Malware hits Chinese apps in Apple App Store: cyber security blog - Business Insider

(Reuters) - Some of the most popular Chinese...

Via Roger Smith
more...
Roger Smith's curator insight, September 21, 2015 6:18 PM

Once again the bad guys showing how smart they can be

Scooped by Daniel
Scoop.it!

What It Takes to Build a Snake-Proof Suit

What It Takes to Build a Snake-Proof Suit | Technology Education | Scoop.it
Later tonight, you'll be able to watch a man attempt to become a 25-foot, giant green anaconda's dinner—willingly. And to make sure our human snake snack makes it out alive, scientists spent months designing, testing, and building one incontrovertibly snake-proof suit. Air mask, chainmail, pig's blood and all.
more...
No comment yet.
Scooped by Daniel
Scoop.it!

The Huge, Unseen Operation Behind the Accuracy of Google Maps | WIRED

The Huge, Unseen Operation Behind the Accuracy of Google Maps | WIRED | Technology Education | Scoop.it
The Google Maps team refines their maps and keeps them up to date with a combination of computer vision algorithms and meticulous manual labor
more...
No comment yet.
Scooped by Daniel
Scoop.it!

What's The Strangest Thing You've Done to Get Cell Reception?

What's The Strangest Thing You've Done to Get Cell Reception? | Technology Education | Scoop.it
Finding some signal in areas with poor cell reception is the modern day's version of black magic: stand on one leg, reach into the air arm outstretched, balance something on your nose and maybe you'll get some data.
more...
No comment yet.
Scooped by Daniel
Scoop.it!

35 películas sobre el espacio, condensadas en un vídeo fascinante

35 películas sobre el espacio, condensadas en un vídeo fascinante | Technology Education | Scoop.it
El lanzamiento con éxito de la cápsula Orión nos hace soñar ya con ver el día en el que el hombre ponga sus pies en Marte por primera vez. Mientras llega ese día, tenemos que contentarnos con los avances en exploración espacial y con el cine. El realizador y editor Max Shishkin ha creado un genial tributo al cine espacial con este vídeo que resume 35 películas del género.
more...
No comment yet.