Technology News

Technology News

Computer Bots are More Like Humans Than You Might Think, Having Fights Lasting Years

Computer Bots are More Like Humans Than You Might Think, Having Fights Lasting Years

All you need to know about computer bots- their nature and conflicts in today’s world.

The first question that must strike your mind is, “what are Bots?” Several automated programs which are running over the internet are what we call bots. Bots can be of various types such as the one which runs automatically whereas the others execute on receiving the command input. Malicious bots, web crawlers and chat room bots are few examples of computer bots. Bots are nothing but the short form of Robots or to say more specifically they are Software Bots. The whole world that is the Wikipedia is in the hands of the computer bots.

There are about forty million articles available in two hundred and ninety-three languages in Wikipedia. It becomes impossible for a human being to edit those pages and keep a track record of all the alterations that are needed to be made. So the Wikipedia needs some computer bots especially the benevolent bots. They are designed in such a way that they are capable of improving the articles of Wikipedia. The editing bots have various functions to carry out such as checking the spellings, adding links to other Wikipedia pages, enforcing bans and automatically importing the content. In this way, human editors get rid of adding information and making several editorial changes.

How are bots different from human beings?

computer Bots tend to behave like human beings and it is often seen that two bots can have completely opposing functions. They are programmed with several tasks such as following different grammatical rules or on how to link the same word to the different Wikipedia pages. But as soon as one of the computer bots makes changes to any of the Wikipedia pages, the other one immediately revert it back. According to the studies, it is noticed that beneath the surface of Wikipedia lies the battleground where silent wars have been raging for years. Bots interact with each other and their interactions are completely unpredictable because they act in distinctive ways. They behave in different ways in different online environments.

Bots are automatons and they can easily roam unchecked as there are no internet police trying to shut down the bots. Research papers show that the simplest of the algorithm can create complex bot-to-bot interactions and thus result in severe consequences. These types of sterile fights can last for years and in some cases, even reach the deadlock. Their conflicts are far more different from the human editors and are persistent in nature.

The final word

Studies show that the fight between the computer bots varies from various language editions available in Wikipedia. There are fewer bot-to-bot conflicts in the German edition of Wikipedia than the Portuguese Wikipedia edition. It is said that more the number of edits, more are the fights.

Nowadays, the online environment has become the ecosystem of bots. The knowledge of their interactions with each other is still poor. There are numerous researches going about the sociology of bots. All you need to do is to spot the problem early enough so that their conflicts do not last for years.

read more
Technology News

Alexa, Siri, Cortana: The Problem With All-Female Digital Assistants

Alexa, Siri, Cortana: The Problem With All-Female Digital Assistants

Why we are stuck with Female Digital Assistants in form of Siri, Alexa and Cortana?

Just a few years ago we were doing all things on our own. But advent of the digital assistants like Google Assistant, Cortana and Siri has simply changed the way we make of the smartphone in today’s time. People tend to make use of the digital assistants on daily basis to get around with nominal to complex tasks with ease and simplicity. One is quite uniform among all the digital assistant i.e. they all have female voice. It is widely believed that men and women alike prefers the female voices but the time has come for us to get the male voice options as well.

Why tech firms use female voice for AI?

The Female Digital Assistants voice in the phones, speakers, TVs, smartphones and even in refrigerators raises the question: ‘why we are using female voice?’ Tech industry is extremely dominated by the male and it is fact that women are often associated with filling up the secretarial positions. A number of academic studies have suggested that women warm up with a female voiced android or software easily than the male voice. It can be easily stated that we are carrying forward the primitive norms from our work, culture, and tradition to right in the technical future by making use of the female voice for getting through our little tasks.

Ever wonder why robots need a gender

If we look at the history then in the early 90’s tech firms made use of androgynous character and their gender were never revealed to the users. This resulted in a number of awkward situations and tech firms decided to away with such things completely for some time. Secondly the brains behind the development of the technology or the robot never cared about specifying the gender to their product but it was the users who did it.

Furthermore during the development process of any new technology or android researchers tend to refer such things as ‘it’ while the users prefers using the term ‘he’ or ‘she’ while referring to it. An example can help in illustrating this point where the Google has simply gives the name Digital Assistants to its AI but the distinctively feminine voice of the AI has led to people referring to it as she.

Scarcity of Gender neutral voice

It has also been found people are less likely to accept a genderless voice and even more disturbing thing is that getting ‘genderless voice’ is extremely hard. Naunce Communications has made a name for itself by providing voices to the companies for their speech interfaces and Digital Assistants. They provide this for large variety of products which includes the cars, TVs, smartphone and a number of other products better left unsaid.

Quite interestingly they also doesn’t have any stock for gender neutral voice which means we have to stick with the feminine voice for AI or digital assistants in future. Or in case some tech firm makes a bold move and brings ludicrous male voice to its AI for a change.

read more
GadgetsTechnology News

Self Destruct Gadgets Made not so Mission Impossible

Self Destruct Gadgets Made not so Mission Impossible

Self Destruct  Option will Become a Stable Feature on Electronic Gadgets Soon

Mission Impossible movies have made the self destruction options quite popular in the modern age but we still don’t have that luxury. Soon we will have such gadgets like laptops and smartphones which can self destruct on its own but this technology will only be made available to corporate employees and government officials. The new self destruct mechanisms possess the ability to destroy the electronic gadgets within 10 seconds by receiving the wireless commands triggered by the sensors.

Arabian researchers had made the impossible possible

This technology has been developed by a team of researchers at King Abdullah University of Science & Technology (KAUST) in Saudi Arabia. It works swiftly and can effectively work across a variety of common semiconductor technology which is usually used in the most electronic devices. Researchers have stated that first customers are expected to be those who are in need of data protection such as the intelligence communities, hedge funds, social security administration, large corporations and all those who handles massive data.

How This Self Destruct Technology Works?

The self destruct mechanism developed by the team works on making the expandable polymer found in the modern electronics to their own benefit. When this polymer is heated over 80 degrees Celsius then it tends to expand to seven times more than its original volume. The trigger mechanism introduced in this technology helps in the polymer expansion which comes right from the heather electrodes drawing power from the battery of either Smartphone or laptop. They are making study available for the wider audience by publishing it in the upcoming issue of the journal called Advanced Materials Technologies.

The Testing Scenarios Conducted for Self Destruct

The researchers at KRAUT have tested this self-destruct mechanism for variety for scenarios where the self destruct can be triggered remotely. In the first testing a GPS sensor was utilized to trigger the device in case they move more than 50 meters away from their starting point. In the second testing researchers made use of the light sensor to automatically trigger the self destruct mechanism. This mechanism will helpful in such scenario where a top secret device is moved out of the box and placed under the light. The third scenario made use of the pressure sensor to cause the self destruction of the device in case it meets with any kind of unwanted force. This means if anyone tries to get into the device by forcefully opening the casing then device can be triggered to explode in order to safeguard it from being compromised.

In the fourth scenario researchers tested the compromising of the device or self-destruct functionality to its core. It was ensured that no one else expect the rightful person is able to trigger the self-destruct command making use of a smartphone app. Researchers has found the right way to ensure that this functionality only worked when a particular password is entered into the chip for destroying the device on demand. Very soon we will living in exciting times where espionage and intelligence will look just like the movies in real life.

read more
Technology News

Study Claims Tilted Device Could Pinpoint Pin Number for Hackers

Study Claims Tilted Device Could Pinpoint Pin Number for Hackers

Study Suggests That Tilted Devices Can Easily Reveal The Pin Number To The Hackers

In modern day smartphones the pin number has become the basic feature which helps in keeping device safe from the unwanted access. Pin number based safety lock feature has become so advanced that even government agencies can’t get into the device without inserting the exact combination into the device. A team of researchers has found that hackers can easily steal the mobile user’s pin number by looking at the way device tends to tilt when they type their codes on it.

The team of researchers comprising of computer scientists from Newcastle University has been successful in guessing the four digit pin number with 70% accuracy. They made use of the gyroscope built right in the modern day smartphones to judge the pin codes. It took just five attempts to correctly guess the pin which will allow them to unlock the device.

How This Pin Number Hack Works?

The theoretical hack essentially works by taking advantage of a loophole found in the way modern web browsers  tends to share data from the smartphone with websites. Most of the websites now a days asks for a number of information from the user’s smartphone which includes even the location. This requires user’s permission but it helps website in providing the geographical based services or content to the users in the end. Sometimes malicious websites even collects quite awkward and benign data like the device orientation and this thing isn’t notified to the users.

Most of the website and mobile apps don’t require asking for permission in order to access to data related to sensor data. And malicious programs can be designed to covertly listen to the sensor data which can be used in later stages to discover highly sensitive information about the user which includes timing, physical activities as well as the touch actions on the display screen.

So researchers have identified 25 different sensors which are usually present in most of the smart devices and it helps in getting different information about the device as well as its users. In their testing they found that each touch action performed by user whether it is clicking, holding, tapping or scrolling resulted in a unique orientation and motion trace. When such activity is carried on a webpage then it helps in understanding on what part of the page they are clicking upon and exactly what is being typed.  This is how they were able to decipher the exact pin number by carefully analyzing the way smartphone is being titled or held by the user.

Leading Web Browsers Informed

Researchers have already informed Google and Apple about the risks associated with the modern web browsers and the smartphones. They had also published a similar finding way back in 2015 wherein they established that fact the tool for reporting the battery status to the websites can be compromised. Due to their diligence this feature was completely removed by the year 2016 and it helped in bringing a safe web browsing experience for the users.

read more
Technology News

Black Holes on an Electronic Chip

Black Holes on an Electronic Chip

We Can Open Black Holes On An Electronic Chip, Scary?

The technological advancement stems from the need as the innovativeness of the inventors. Sometime people stumble upon great discovery when they are working on something completely different. A professor has taken the world by surprise by proposing a way which will lead to stimulation of black holes right on an electronic chip. So far we are not able to develop black on the earth in order to boost our study and knowledge about these.

This professor named Rembert Duine has worked together colleagues all the way from Chile to publish the underlying research in the Physical Preview Letters. Theoretically speaking all the right ingredients which are required to summon a black hole is present in the modern scientific labs. Scientists will be able to generate black within a time-span of two or more years from now to create black-holes in lab conditions.

No More Looking Into The Space For Black holes

The event horizon problem associated with the black hole in the space makes them extremely difficult to study. First of all they are dense which ensures that nothing escapes its gravitational pull once anything enters into its no return point. Researchers have made some progress in dealing with the problem associated with the event horizon phenomenon when they develop the same in the lab conditions. They were able to create such of no return which specifically deals with the spin waves and even helps in navigating through the fluctuations that are found in the magnetic materials.

A lot of science into action to make this theory works which includes the simple knowledge that the once we pass the electric current through the material then the electrons tends to drag the waves along with it. Like if we make use of a wires which is think at one end and thin at another and the when we pass the electricity then the electrons are likely to flow faster on thin end.

Points of no return have never been investigated in the electronic chips and they are less likely to originate as well. Therefore opting for chips to build the black holes appears as the right and sensible choice though currently in theory. Secondly having black holes on the chips will help in studying the effects of Hawking radiation in higher temperatures with quite ease and grace.

The Quantum Computers

The hawking radiation is caused by the particles which remain in pair and they happen to be quantum mechanically entangled. Researchers have proposed that they will be making use of the entanglement found in the electronic devices in order to create black holes right on the chip in upcoming days. In the quantum computers and even the quantum technologies the entanglement acts as the key ingredient and scientists has found right way to work for their own advantage. Creating black holes on chips will allow them to study it in greater details without any threat getting the whole world swallowed in the process which is held as a common misconception among the masses.

read more
Technology News

How Long will I be Able to Avoid the Cloud?

How Long will I be Able to Avoid the Cloud?

Avoiding Cloud in this digital age is becoming almost impossible

The cloud platform has emerged just a few years ago and became a close part of our everyday life without us noticing it. It has been possible due to a number of factors which includes the adoption of this platform by the major commercial and governmental agencies along with the rampant multiplication of computing devices along with the immense growth in the smartphone sales. All these major trends stated here has somewhat influenced each other but only helped in the advancement of the cloud culture in the modern society.

We are advancing towards a highly digital age where everything is online and connected. This move started with the first online shopping service which was brought in 1978 and currently we have billions of users shopping online. Currently we have innumerable of websites, applications and email service which are cloud based. Most of these entities make use of the giant cloud server farms to provide a robust service to the end users. Some of the major cloud server provider includes Microsoft Azure, Amazon Web Services or AWS and the Google Cloud Platform.

Cheapness led to popularity and adoption of Cloud

During the early days the computers were so expensive that only governments and large corporation were able to afford them. When microprocessor started powering the computer devices in 1970 then it became cheaper with each passing year. Computers became popular for a variety of work which included writing, accounting, playing music, watching movies or videos, games, sending emails and much more. Today computers help us in shopping, connecting with others as well as connecting or interacting with variety of other devices.

Cloud one drive

Computers aren’t the only device we stick to in our life today. We also have smart TVs, home security systems, electricity meters, fitness bands, smartphones, digital radios and highly intelligent digital assistants. Our world is getting smarter and our devices are filled with data which can’t be used in a cohesive fashion without the use of a cloud platform which helps in accessing all together without any hassle.

The war of different ecosystems

Just a few years ago the PC markets were raging with the battle between the Mac OS, Linux and Windows with Microsoft having a giant share of 95%. But within a span of last five years the battle ground has shifted from the OS to whole ecosystem and companies are actively working at bringing their people on their ecosystem of connected devices. The major ecosystem we have to choose from includes the Apple, Google and Microsoft where Apple is gaining the edge while Microsoft competes at the last position.

Each of the ecosystems popularized by the associated firm bridges the gap between a range of different devices, applications as well as service. In order to make most of all users are required to get an account linked with their email address. Currently company’s still allows users to make use of rivals email service but very soon this will be removed as it is been expected.

read more
Technology News

Semiconductor Eyed for Next Generation ‘Power Electronics’

Semiconductor Eyed for Next Generation ‘Power Electronics’

Semiconductor Aimed For the Next-Generation ‘power electronics’

The civilization has crossed a long way since the life of caves and entered into the most modern digital life; courtesy, the massive growth in the science and technology segment, which have registered some notable breakthroughs that made our life easier and comfortable. The scientific research is being done and still ongoing on almost every span or issues of our life, where engineering research and development is an important part of the collective development of the society. The electronic engineering segment or its researches and developments is a bit younger than other streams, such as; civil, mechanical or electrical engineering, but it has already established the prominence and importance in the social upliftment. Semiconductors, transistors etc. are playing roles in the manufacturing of some of the most useful instruments or product, which are quite important in our daily life, as well as, in various sectors like, business, trading, manufacturing. The advent of computer technology and the internet have opened up the new horizon for further developments in the power electronics engineering division, where lots of manufacturers are busy in working with power electronics devices and components to a great extent.

Issues to be noted

Some researchers have already demonstrated the extreme performance potential of the experimental transistor that is made by a semiconductor, which is called the beta gallium oxide. This experimental transistor is able to bring some new super-efficient switches, which could be applied in some important areas, such as; military ships, aircraft and most importantly in various power grids.

This semiconductor is now being considered as the promise for the “power electronics” of the next generation. It is also promises of developing devices, which can be used in controlling the flow of the electrical energies in respective circuits. It can be noted that this kind of  power electronics technology is able to help in reducing the use of the global energy and also the emission of the greenhouse gas, just by replacing the heavy duty power electronic less efficient switches, which are now used in different facilities.

The specific transistor, known as a gallium oxide on an insulator field effect transistor, called GOOI, which is specifically promising as it is possessing an “ultra-wide bandgap”; the trait that is needed for switches, used in applications of high-voltage. Very recently, these power electronics findings are being stated in details in the research paper, published in the IEEE Electron Device Letters. Hong Zhou, one of the Graduate students, has performed the major parts of this research.


According to the Peide Ye, the Richard J and Mary Jo Schwartz professor of the electrical and engineering division of the internationally acclaimed Purdue University; devices made from the beta gallium oxide is far more superior, compared to other semiconductors, which are promising for specific transistors. The beta gallium oxide is having a higher degree of “breakdown voltage; the point of voltage, where the failure occurred in devices. The research team has also developed the maiden cheaper method by using adhesive tapes to separate layers of the specific semiconductor from the single crystal.


read more
Technology News

Your Android Device Pattern Lock can be Cracked Within Five Attempts

Your Android Device Pattern Lock can be Cracked Within Five Attempts

People make use of the pattern lock in order to secure their Android devices against the unwanted access. You would be surprised by more than 40 per cent makes use of pattern lock on their smartphone and tablets a while rest makes use of either PIN codes, text passwords or doesn’t even to set up a lock system.

Once a pattern lock has been activated on a smartphone or tablet then have to draw their pattern on the on-screen grid of dots to complete the same pattern in order to gain access to their device content. When this pattern matches with the preloaded pattern as done by the users previously then device is unlocked for normal usage. The only hitch is that the system offers only five attempts to get the right combination in place before device for good. But some researchers at the Lancaster University has  come up with an innovative way which helps in cracking the super secure pattern lock with awesome accuracy.

People behind this discovery

The team researchers had come together from Northwest University in China, Lancaster University as well as University of Bath together. They had shown their research where simply using the video and computer vision based algorithm software they were able to crack the Pattern lock. Researchers simply took the video of users drawing the pattern lock but without seeing the screen and the software helped in coming with the right pattern lock by simply analyzing it.

During their research more than 120 unique patterns were collected from the independent users and their software has been to crack almost 95 per cent of patterns within the five attempts. So if this software lands in the hand of the attackers then will be able to figure out the targeted individuals’ pattern with great ease and simplicity.

Complex pattern are hard to crack is a misconception

Most of the people wrongs held the notion that having complex patterns for performing the financial transaction from smartphone or tablet is a secure way. But during their research they found that the complex patterns was quite easier to crack but the shorter and simpler patterns are more secure as it takes more time to figure them with accuracy. If you wish to protect the sensitive information, then stop using complex passwords on your device.

Researchers even put forward list of countermeasures to prevent any kind of attack on your device. First make sure you fully cover the fingers while drawing the patterns. Secondly opt for dual unlocking features which include not just drawing the pattern but also entering the sentence as it happens with Swype.

If you can get your device change the screen color and brightness while drawing the pattern then it will help in confusing the recording to a great extent. The complete finding of this research will be presented at The Network and Distributed System Security Symposium 2017 which is notable conference on cybersecurity.

read more
Technology News

Terahertz Chips a New Way of Seeing through Matter

Terahertz Chips a New Way of Seeing through MatterChips a New Way of Seeing through Matter

How often a day passes with no technological news and no discovery to ease our lives? Hardly a day in this digital era. There have been recent reports from the famous researchers of Princeton University that now they have designed microchips which are capable of transmitting as well as receiving the terahertz waves. Well, it is surely has created a wave among the other scientists as well.


The terahertz wave is a particular wave, which lasts one millionth of a millionth of a second. It has some unique features as well which will surely blow your mind when you come to know about them. It can penetrate the non-conductive materials which is quite beneficial for the medical purposes as well as when it comes to the security measures in airport like screening and all. The wave is often considered, difficult to use; as it requires a huge amount of terahertz generators and lasers.


The researchers have designed a unique and most probably a game changing chip of the era. With the collaboration of hard work from the researchers in Princeton University, the terahertz make an interaction with the chip which ultimately leads to a different magnetic field. The rest is then done by the researchers. They deduce the patterns formed by the waves, which help them to conclude. When innovation and thinking out of the box are the keys to define things now, then the scientists also follow the same path. They have now been successful in formulating huge amount of terahertz wave pulses and also combining them. Well, a fact that needs to be known is that currently the chip is operating on the lower part of the wave band. In future, they are planning to expand it. The work is still going on.


Well, a second chip has been designed to capture and read the details of the waves. The system is same as that is designed for the smart phones and other gadgets. The cost is moderate ranging to a few dollars.


Being a part of the EM spectrum, it also includes X-rays and visible light. Having less energy than the X-rays, they do not harm the tissues or the DNA of humans. With the ability to interact with chemicals, they can be used in spectroscopy as well. The development is promising and the work is still in progress. The design is just like a big puzzle and perhaps this is the first one. With much work required to expand the along the terahertz band, we have to wait until the final chip comes out in the market. The researchers are confident that they would come out with the solution of mixing the waves on the chip. For time being, the patience is the key factor for the normal netizens like us and hope that the work is done in the most efficient manner.

read more
Technology News

Who is Liable for George Hotz Self Driving Software?

Who is Liable for George Hotz Self Driving Software?

Open Source Self Driving Software Becomes a Liability For The Users

If you are eagerly waiting for the self driving vehicles to launch in upcoming years so you could enjoy the ride in a much enhanced fashion then you wouldn’t have to wait that long. You can go the website and download the open source Python code from the Github. This code along with some necessary hardware adjustment along with following the strict instructions guidelines forwarded by the site will help in turning specific models of Acura and Honda model cars into autonomous vehicles.

The best thing about the open source code offered by is that it comes with much needed safety features. But the major issue which has emerged from this code is that if it suffers from a bug and leads to crashing of the car either into the building, another vehicle or even a pedestrian then who would be held responsible

Self Driving_2 Puts Its Hand in the Air CEO George Hotz has clarified that the self driving code given by the site is not his own and website has simply released it but it will keep maintaining it. Legal experts believe that making use of this code in the modern cars isn’t wrong and if something goes wrong then it is the users who is to be blamed. But on other hands the Consumer Watchdog advocate going by the name John Simpson finds this stance completely unfair for the users.

He explains that the company has to be held responsible for mishaps which occur due to the shortcoming of the software. Even one can’t point the fingers on the company which has released the source code into the wild because it is open source and with time more number of developers will come forward to modify the code. It would be great if both the company and users is held liable for the unwanted actions purported by the users due to the problems associated with the software at any given point.

Self Driving_1

Laws On Autonomous Self Driving Vehicles Are Still Being Shaped has opened a can of worms which was being avoided by the major car manufacturer for quite some time. Tesla, Apple and Google are the front runner in developing the autonomous self driving car which will be making way within half a decade but there is no set of rules still in place for them. Autonomous driving legislation is still shaping up all around the world. Some of the automobile manufacturing has already put their step forward in taking all the responsibility in case something goes wrong in their self driving software. Tesla and Volvo have done taken responsibility for their technology in a bid to infuse trust in their upcoming self driving vehicles.

There had already been lawsuits filed against the open source codes finding its way into the commercial products. Having open source code in any commercial consumer product is a nightmare as it leads to forming of vulnerability and backdoor for exploits which can be harmful or works against the consumers.

read more
1 12 13 14 15
Page 14 of 15