Technology News

Technology News

Learning to Think Like a Computer

Learning to Think Like a Computer

Turning People Smarter by Making Theme Think Like a Computer

Can we think just like the computer and become smarter in the process? This isn’t a farfetched theory rather it has already been put to use to train the younger generation in becoming more sync with the computational knowledge and learning for the further advancement of the human race.

Simple and easy to use and learn programs has started emerging all across the world which helps in younger people get acquainted with the core computational procedures and study without being extremely complex or mind boggling.

Some of the researchers are making use of the cooking in order to get around all-important concept in the field of the computer science, which is ‘abstraction’.

It is worth noting that concealing the layers of information helps in getting through the intersection of things without the need of knowing and understanding everything related to the large picture. Abstraction helps in doing away with the complicated system required to understand the intricate working of any computer application, program or software and it also helps in enhancing the knowledge of the users without getting down to extreme basics.

To be truthful the computational thinking has just started captivating the educators which includes not just the kindergarten teacher but also the ones in the colleges. It brings a chance of learning a new language and orientations which eventually leads to tackling problems in real life scenarios with better judgment and understanding.

Thinking like a computer isn’t a new thing

It would come as surprise that the computational thinking isn’t a new think. I was first pioneered by an artificial intelligence and MIT professor named Seymour Papert who came up with this term way back in 1980. He brought forward the idea of how children can make use of the computers to learn new thinks. However the computational thinking was made popular by the Jeanette M. Wing who was in charge of the basic research at Microsoft.

Existing children programs

A children program has been initiated at the Eliot Pearson Children’s School wherein actual blocks are used. The wooden blocks have been created by a child development & computer science professor going by the name of Marina Umaschi Bers. These wooden blocks comes with instruction like spin, forward and shake which are actually used in order to program small robots. These small robots has small and wheeled cards which comes with built in scanners and the sequence or instruction stated on the blocks helps in forming the robot. So the children starts with the green block which acts as begin command and finishes with the red block.

The steps taken by the Dr. Bers has been appreciated by all as her children based activities helps in making children familiar with the basic computing at a very young age. Her approach will help the next generation of human kind in consciously or unconsciously absorbing the computation thinking skills and abilities and it will result in getting highly intelligent digital beings.

read more
Technology News

Elon Musk’s Space X makes history by launching a ‘flight-proven’ rocket

Elon Musk’s Space X makes history by launching a ‘flight-proven’ rocket
Space X rocket launches are mainly associated with misfires and failures but this new age space company is certainly learning from its mistakes at an astounding pace. Space X has launched it test rocket from the Florida’s Kennedy Space Center just a few days ago quietly without much fanfare or anticipation on global scale. The Flacon 9 rocket has been able to achieve what other rockets failed to do in the past for it. Space X is calling it a “flight-proven” rocket which brings a unique feature into the play for the upcoming space rocket development.
Falcon 9 can be reused?Traditional rockets are meant for just one thing and that is to take the payload into the orbit and the job is done. Each rocket takes millions of dollars to develop and millions of hours to ensure it is working in right conditions. However reusing any rocket at the moment isn’t possible as they are designed for one way trip to the space.Space X Falcon 9 is simply works in the opposite direction it can be reused. After the launch during the early morning hours Falcon flew into the orbit, placed the payload and landed vertically back gain for next trip. This is a major landmark in the history of space exploration or rocket development wherein a rocket has been developed by the mankind which can be used again and again burning blowing away.Earlier failed attempts

Success doesn’t come without some failures in the way. Space X aim of developing this kind of rockets met with a number of failures in the past wherein rocket booster tends to explode while landing back from the space.

However Space X has stated success quite a number of times with Falcon 9 when it was able to land the rocket on a landing pat at Cape Canaveral in December 2015. Just a few months later this feat was achieved again and that also at sea. Elon Musk the founder of Space X grew quite emotional at the latest successful launch and landing of the Falcon 9 and he went on to say this is an incredible milestone in the history of space.

The achievement of Falcon 9

The Falcon 9 rocket performed some incredible aerial acrobatics after the launch then turned around and flew back to Earth. It was guided by the highly sophisticated computer algorithms along with GPS navigation to ensure it find its path through the clouds and make its touch down with immense precision.

The goal of Space X in developing the Falcon X rocket is to lower the cost of the spaceflight and ensure that this technology is made accessible to wider range of space firms. And at last it will help in reaching the Mars in the long run.

Elon Musk has once said that the first stages of rocket which are usually discarded into the sea after giving it the initial power to escape the Earth gravity is just like throwing away an aircraft after every use. Falcon 9 is the answer for that.

read more
Technology News

New Quantum Device Could Make Contactless Payment More Secure

New Quantum Device Could Make Contactless Payment More Secure

The world stands on innovation and technology. Currently, the world is witnessing a revolution in the digital era. It has been able to bridge the gap between the impossible things which we never imagined also. Day in day out, we are stunned by the discoveries in terms of technology and modern gadgets. Recent report from the Oxford University that a prototype Quantum Device has been designed to make payment by using quantum technology.

The Prototype Quantum Device

The Quantum Device sends some sort of secret keys from a cell to a terminal of payment in the form of encrypted manner. The transaction both contactless and wireless. It would enhance the security especially in the UK which is always in the news for theft from this type of transactions. With the collaboration of Nokia and Bay Photonics, the researchers in Oxford University have been able to device a system which helps in transmitting quantum signals maintaining the security of the data.

The Quantum Technology

The Quantum Device uses a very innovative way of transaction. It takes into consideration the light particles to send the encrypted information. This  Quantum Device will also maintain the security and thus prevent it from hacking. It uses super-fast movable mirrors and fast LEDs to cover a distance of more than 0.5 metres. The speed is normally 30 kb per second to send a secret pin code. The Quantum Device is made up of a number of overlapping lights which consists of LEDs. They have a different polarisation as well as a polarisation angel. The polarised LEDs are the main source to detect the security of the medium.


The hackers are always ready to bug your device or system in one way or the other. They are always advanced in technology and coding to break into the system of sophisticated devices. However, the team from Oxford University has devised an interesting Quantum Device to keep the hackers away from this transaction device. The key is the quantum which is pretty long and the hackers would be unable to crack the signal. Moreover, the key pattern is also not fixed which would make the task more difficult. One thing that needs to be ensured that the signal reaches its destination in the proper manner.


The research team experimented a lot before coming up with the prototype Quantum Device . They previously analysed on a hand held prototype which was made from a collection of off the shelf materials. In this development, Nokia helped a lot in decreasing the size of the device. They are still worried about the security but with few more tests and experiments round the corner, they are confident that the device would be huge successful in earning the people’s trust. The technology is unique and even if the hackers try to break into the signal, the signal gets altered and it becomes unusable. So, we need to wait before it breaks into the digital market and make a statement among the efficient hackers.

read more
Technology News

How Chip Designers Are Breaking Moore’s Law

How Chip Designers Are Breaking Moore’s Law

Chip Designers Break the Moore’s Law by Developing Small Chip

It is widely known that the microprocessors are getting smaller, faster and extremely power efficient with each passing year. But it thus has certain limitation which comes when size is brought down and overcoming such isn’t a small feat. Two of the semiconductor manufacturing giant has made some announcement which is completely unrelated but signifies a major development in the same field of work.

Intel first announced that they had acquired an Israel based start-up called Mobileye which deals with manufacturing the chips & software for the self-driving cars. While in another announcement NVidia revealed that it has developed a latest generation of system which will help in speeding up the machine learning or to be more precise the artificial intelligence.

Driven by specialized computing

Both the semiconductor company are working towards a new way while developing the microprocessor which helps in getting work done more efficiently than ever before. Both of these latest products will be driven by a specialized computing wherein specific software tasks will be embedded right into the physical chips rather than depending on the chip to get all the work done on a CPU.

For a long time this kind of entity has remained available on variety of technology in different from but this this is first time both the semiconductor company is working towards a simple yet noble solution.

The need of smarter microprocessor

The reason behind this development is pretty simple. CPU’s are not getting faster at the pace which they were showing in the past. Therefore they are unable to deal with highly efficient microprocessor in a more effective and productive fashion. This shows that long held Moore’s Law is dying quite unexpectedly.

Moore’s Law has stated a long time ago that the after every two years or so the transistors present in the chip will double itself. This led to the common misconception that the computing device will become faster at the same becoming smaller in size and certainly they will be power efficient.

For quite some time this theory worked like a charm and the results led to its wide acceptance but the recent development is putting it in a tricky spot. Moore Law is certainly coming to its early demise as the theory on which it is based is going out of the equation.

Daniel Reed who chairs the computational science and bioinformatics at the University of Iowa has opined that the Moore is not coming to standstill rather it ageing and eventually it will die at the end but it will be for the good of the humankind as we will have much better computational capability in near future.

Apart from Intel a number of other chip manufacturing are pushing billions of dollars in the research work which helping in finding new innovative, cost effective and robust ways of developing efficient chips, processors and semiconductors. Device performance will get improved with these improvements which is a good sign.

read more
Technology News

Computer Bots are More Like Humans Than You Might Think, Having Fights Lasting Years

Computer Bots are More Like Humans Than You Might Think, Having Fights Lasting Years

All you need to know about computer bots- their nature and conflicts in today’s world.

The first question that must strike your mind is, “what are Bots?” Several automated programs which are running over the internet are what we call bots. Bots can be of various types such as the one which runs automatically whereas the others execute on receiving the command input. Malicious bots, web crawlers and chat room bots are few examples of computer bots. Bots are nothing but the short form of Robots or to say more specifically they are Software Bots. The whole world that is the Wikipedia is in the hands of the computer bots.

There are about forty million articles available in two hundred and ninety-three languages in Wikipedia. It becomes impossible for a human being to edit those pages and keep a track record of all the alterations that are needed to be made. So the Wikipedia needs some computer bots especially the benevolent bots. They are designed in such a way that they are capable of improving the articles of Wikipedia. The editing bots have various functions to carry out such as checking the spellings, adding links to other Wikipedia pages, enforcing bans and automatically importing the content. In this way, human editors get rid of adding information and making several editorial changes.

How are bots different from human beings?

computer Bots tend to behave like human beings and it is often seen that two bots can have completely opposing functions. They are programmed with several tasks such as following different grammatical rules or on how to link the same word to the different Wikipedia pages. But as soon as one of the computer bots makes changes to any of the Wikipedia pages, the other one immediately revert it back. According to the studies, it is noticed that beneath the surface of Wikipedia lies the battleground where silent wars have been raging for years. Bots interact with each other and their interactions are completely unpredictable because they act in distinctive ways. They behave in different ways in different online environments.

Bots are automatons and they can easily roam unchecked as there are no internet police trying to shut down the bots. Research papers show that the simplest of the algorithm can create complex bot-to-bot interactions and thus result in severe consequences. These types of sterile fights can last for years and in some cases, even reach the deadlock. Their conflicts are far more different from the human editors and are persistent in nature.

The final word

Studies show that the fight between the computer bots varies from various language editions available in Wikipedia. There are fewer bot-to-bot conflicts in the German edition of Wikipedia than the Portuguese Wikipedia edition. It is said that more the number of edits, more are the fights.

Nowadays, the online environment has become the ecosystem of bots. The knowledge of their interactions with each other is still poor. There are numerous researches going about the sociology of bots. All you need to do is to spot the problem early enough so that their conflicts do not last for years.

read more
Technology News

Alexa, Siri, Cortana: The Problem With All-Female Digital Assistants

Alexa, Siri, Cortana: The Problem With All-Female Digital Assistants

Why we are stuck with Female Digital Assistants in form of Siri, Alexa and Cortana?

Just a few years ago we were doing all things on our own. But advent of the digital assistants like Google Assistant, Cortana and Siri has simply changed the way we make of the smartphone in today’s time. People tend to make use of the digital assistants on daily basis to get around with nominal to complex tasks with ease and simplicity. One is quite uniform among all the digital assistant i.e. they all have female voice. It is widely believed that men and women alike prefers the female voices but the time has come for us to get the male voice options as well.

Why tech firms use female voice for AI?

The Female Digital Assistants voice in the phones, speakers, TVs, smartphones and even in refrigerators raises the question: ‘why we are using female voice?’ Tech industry is extremely dominated by the male and it is fact that women are often associated with filling up the secretarial positions. A number of academic studies have suggested that women warm up with a female voiced android or software easily than the male voice. It can be easily stated that we are carrying forward the primitive norms from our work, culture, and tradition to right in the technical future by making use of the female voice for getting through our little tasks.

Ever wonder why robots need a gender

If we look at the history then in the early 90’s tech firms made use of androgynous character and their gender were never revealed to the users. This resulted in a number of awkward situations and tech firms decided to away with such things completely for some time. Secondly the brains behind the development of the technology or the robot never cared about specifying the gender to their product but it was the users who did it.

Furthermore during the development process of any new technology or android researchers tend to refer such things as ‘it’ while the users prefers using the term ‘he’ or ‘she’ while referring to it. An example can help in illustrating this point where the Google has simply gives the name Digital Assistants to its AI but the distinctively feminine voice of the AI has led to people referring to it as she.

Scarcity of Gender neutral voice

It has also been found people are less likely to accept a genderless voice and even more disturbing thing is that getting ‘genderless voice’ is extremely hard. Naunce Communications has made a name for itself by providing voices to the companies for their speech interfaces and Digital Assistants. They provide this for large variety of products which includes the cars, TVs, smartphone and a number of other products better left unsaid.

Quite interestingly they also doesn’t have any stock for gender neutral voice which means we have to stick with the feminine voice for AI or digital assistants in future. Or in case some tech firm makes a bold move and brings ludicrous male voice to its AI for a change.

read more
GadgetsTechnology News

Self Destruct Gadgets Made not so Mission Impossible

Self Destruct Gadgets Made not so Mission Impossible

Self Destruct  Option will Become a Stable Feature on Electronic Gadgets Soon

Mission Impossible movies have made the self destruction options quite popular in the modern age but we still don’t have that luxury. Soon we will have such gadgets like laptops and smartphones which can self destruct on its own but this technology will only be made available to corporate employees and government officials. The new self destruct mechanisms possess the ability to destroy the electronic gadgets within 10 seconds by receiving the wireless commands triggered by the sensors.

Arabian researchers had made the impossible possible

This technology has been developed by a team of researchers at King Abdullah University of Science & Technology (KAUST) in Saudi Arabia. It works swiftly and can effectively work across a variety of common semiconductor technology which is usually used in the most electronic devices. Researchers have stated that first customers are expected to be those who are in need of data protection such as the intelligence communities, hedge funds, social security administration, large corporations and all those who handles massive data.

How This Self Destruct Technology Works?

The self destruct mechanism developed by the team works on making the expandable polymer found in the modern electronics to their own benefit. When this polymer is heated over 80 degrees Celsius then it tends to expand to seven times more than its original volume. The trigger mechanism introduced in this technology helps in the polymer expansion which comes right from the heather electrodes drawing power from the battery of either Smartphone or laptop. They are making study available for the wider audience by publishing it in the upcoming issue of the journal called Advanced Materials Technologies.

The Testing Scenarios Conducted for Self Destruct

The researchers at KRAUT have tested this self-destruct mechanism for variety for scenarios where the self destruct can be triggered remotely. In the first testing a GPS sensor was utilized to trigger the device in case they move more than 50 meters away from their starting point. In the second testing researchers made use of the light sensor to automatically trigger the self destruct mechanism. This mechanism will helpful in such scenario where a top secret device is moved out of the box and placed under the light. The third scenario made use of the pressure sensor to cause the self destruction of the device in case it meets with any kind of unwanted force. This means if anyone tries to get into the device by forcefully opening the casing then device can be triggered to explode in order to safeguard it from being compromised.

In the fourth scenario researchers tested the compromising of the device or self-destruct functionality to its core. It was ensured that no one else expect the rightful person is able to trigger the self-destruct command making use of a smartphone app. Researchers has found the right way to ensure that this functionality only worked when a particular password is entered into the chip for destroying the device on demand. Very soon we will living in exciting times where espionage and intelligence will look just like the movies in real life.

read more
Technology News

Study Claims Tilted Device Could Pinpoint Pin Number for Hackers

Study Claims Tilted Device Could Pinpoint Pin Number for Hackers

Study Suggests That Tilted Devices Can Easily Reveal The Pin Number To The Hackers

In modern day smartphones the pin number has become the basic feature which helps in keeping device safe from the unwanted access. Pin number based safety lock feature has become so advanced that even government agencies can’t get into the device without inserting the exact combination into the device. A team of researchers has found that hackers can easily steal the mobile user’s pin number by looking at the way device tends to tilt when they type their codes on it.

The team of researchers comprising of computer scientists from Newcastle University has been successful in guessing the four digit pin number with 70% accuracy. They made use of the gyroscope built right in the modern day smartphones to judge the pin codes. It took just five attempts to correctly guess the pin which will allow them to unlock the device.

How This Pin Number Hack Works?

The theoretical hack essentially works by taking advantage of a loophole found in the way modern web browsers  tends to share data from the smartphone with websites. Most of the websites now a days asks for a number of information from the user’s smartphone which includes even the location. This requires user’s permission but it helps website in providing the geographical based services or content to the users in the end. Sometimes malicious websites even collects quite awkward and benign data like the device orientation and this thing isn’t notified to the users.

Most of the website and mobile apps don’t require asking for permission in order to access to data related to sensor data. And malicious programs can be designed to covertly listen to the sensor data which can be used in later stages to discover highly sensitive information about the user which includes timing, physical activities as well as the touch actions on the display screen.

So researchers have identified 25 different sensors which are usually present in most of the smart devices and it helps in getting different information about the device as well as its users. In their testing they found that each touch action performed by user whether it is clicking, holding, tapping or scrolling resulted in a unique orientation and motion trace. When such activity is carried on a webpage then it helps in understanding on what part of the page they are clicking upon and exactly what is being typed.  This is how they were able to decipher the exact pin number by carefully analyzing the way smartphone is being titled or held by the user.

Leading Web Browsers Informed

Researchers have already informed Google and Apple about the risks associated with the modern web browsers and the smartphones. They had also published a similar finding way back in 2015 wherein they established that fact the tool for reporting the battery status to the websites can be compromised. Due to their diligence this feature was completely removed by the year 2016 and it helped in bringing a safe web browsing experience for the users.

read more
Technology News

Black Holes on an Electronic Chip

Black Holes on an Electronic Chip

We Can Open Black Holes On An Electronic Chip, Scary?

The technological advancement stems from the need as the innovativeness of the inventors. Sometime people stumble upon great discovery when they are working on something completely different. A professor has taken the world by surprise by proposing a way which will lead to stimulation of black holes right on an electronic chip. So far we are not able to develop black on the earth in order to boost our study and knowledge about these.

This professor named Rembert Duine has worked together colleagues all the way from Chile to publish the underlying research in the Physical Preview Letters. Theoretically speaking all the right ingredients which are required to summon a black hole is present in the modern scientific labs. Scientists will be able to generate black within a time-span of two or more years from now to create black-holes in lab conditions.

No More Looking Into The Space For Black holes

The event horizon problem associated with the black hole in the space makes them extremely difficult to study. First of all they are dense which ensures that nothing escapes its gravitational pull once anything enters into its no return point. Researchers have made some progress in dealing with the problem associated with the event horizon phenomenon when they develop the same in the lab conditions. They were able to create such of no return which specifically deals with the spin waves and even helps in navigating through the fluctuations that are found in the magnetic materials.

A lot of science into action to make this theory works which includes the simple knowledge that the once we pass the electric current through the material then the electrons tends to drag the waves along with it. Like if we make use of a wires which is think at one end and thin at another and the when we pass the electricity then the electrons are likely to flow faster on thin end.

Points of no return have never been investigated in the electronic chips and they are less likely to originate as well. Therefore opting for chips to build the black holes appears as the right and sensible choice though currently in theory. Secondly having black holes on the chips will help in studying the effects of Hawking radiation in higher temperatures with quite ease and grace.

The Quantum Computers

The hawking radiation is caused by the particles which remain in pair and they happen to be quantum mechanically entangled. Researchers have proposed that they will be making use of the entanglement found in the electronic devices in order to create black holes right on the chip in upcoming days. In the quantum computers and even the quantum technologies the entanglement acts as the key ingredient and scientists has found right way to work for their own advantage. Creating black holes on chips will allow them to study it in greater details without any threat getting the whole world swallowed in the process which is held as a common misconception among the masses.

read more
Technology News

How Long will I be Able to Avoid the Cloud?

How Long will I be Able to Avoid the Cloud?

Avoiding Cloud in this digital age is becoming almost impossible

The cloud platform has emerged just a few years ago and became a close part of our everyday life without us noticing it. It has been possible due to a number of factors which includes the adoption of this platform by the major commercial and governmental agencies along with the rampant multiplication of computing devices along with the immense growth in the smartphone sales. All these major trends stated here has somewhat influenced each other but only helped in the advancement of the cloud culture in the modern society.

We are advancing towards a highly digital age where everything is online and connected. This move started with the first online shopping service which was brought in 1978 and currently we have billions of users shopping online. Currently we have innumerable of websites, applications and email service which are cloud based. Most of these entities make use of the giant cloud server farms to provide a robust service to the end users. Some of the major cloud server provider includes Microsoft Azure, Amazon Web Services or AWS and the Google Cloud Platform.

Cheapness led to popularity and adoption of Cloud

During the early days the computers were so expensive that only governments and large corporation were able to afford them. When microprocessor started powering the computer devices in 1970 then it became cheaper with each passing year. Computers became popular for a variety of work which included writing, accounting, playing music, watching movies or videos, games, sending emails and much more. Today computers help us in shopping, connecting with others as well as connecting or interacting with variety of other devices.

Cloud one drive

Computers aren’t the only device we stick to in our life today. We also have smart TVs, home security systems, electricity meters, fitness bands, smartphones, digital radios and highly intelligent digital assistants. Our world is getting smarter and our devices are filled with data which can’t be used in a cohesive fashion without the use of a cloud platform which helps in accessing all together without any hassle.

The war of different ecosystems

Just a few years ago the PC markets were raging with the battle between the Mac OS, Linux and Windows with Microsoft having a giant share of 95%. But within a span of last five years the battle ground has shifted from the OS to whole ecosystem and companies are actively working at bringing their people on their ecosystem of connected devices. The major ecosystem we have to choose from includes the Apple, Google and Microsoft where Apple is gaining the edge while Microsoft competes at the last position.

Each of the ecosystems popularized by the associated firm bridges the gap between a range of different devices, applications as well as service. In order to make most of all users are required to get an account linked with their email address. Currently company’s still allows users to make use of rivals email service but very soon this will be removed as it is been expected.

read more
1 16 17 18 19
Page 18 of 19