HTC 10 in a red camel color

HTC 10, this year’s flagship from China has seen a new page in the color of red camel. With the launch of a non-exclusive color scheme, the manufacturer by the end of October reduces the price of its flagship by 15 percent.

HTC 10 is the best of the hitherto offered smartphones HTC. Based on the solutions used in other premium flagships, such as the HTC One M8 and M9, the HTC 10 is a striking rendition of a harmonious metal enclosure available in distinctive red and graphite colors, silver and gold.

HTC 10 is equipped with one of the best cameras on the market. This device has the world’s first fully stabilized f / 1.8 aperture f / 1.8 lens in both the main and front camera. The camera on the HTC 10 also features faster laser autofocus on the main camera and a wider angle lens, a flashlight in the front display of the UltraSelfie.

The HTC 10 has the latest Qualcomm Snapdragon processor with improved 4G LTE support. The phone also comes with a RapidCharger 3.0 charger so the battery can be charged to 50% in just half an hour.…

Even a dozen or so meteors per hour

Lydds are meteorites, derived from the fragments of the Thatcher Comet C / 1861 G1 – the maximum swarm fell this year on nights from 21 to 22 and 22 to 23 April.

The quality of observation will depend, of course, on the weather and the degree of cloudiness. It will also help remoteness from light sources, but with pure skies we can expect beautiful spectacles of up to a dozen “falling stars” per hour. Vigilance is recommended from 23 hours until morning.

“This year we expect the largest number of hours between 12 and 23 of our time on April 22. The most probable moment is however the hour 20. The Radiant Lyrids, or the place where their meteors appear to be, lie on the fringes of the constellations of Luther and Hercules. It is only in the second half of the night and it is best to watch Lydda, “quoted by Dr hab.…

Forced Windows Installations 10? Microsoft says it’s a mistake

Microsoft recently boasted a number of Windows 10 installations that exceeded 100 million. This success is somewhat forced, because the American concern not only distributes its software for free but also uses unclean tricks that cause the software to install on our computers automatically.

A few weeks ago it came to light that the latest Microsoft operating system, which is Windows 10, automatically gets onto the disks of our computers, completely without the user’s knowledge. This can still be a pain, but lately we are hearing that the platform also forces automatic installation.

Arstechnica editors who have looked at the issue have discovered that the optional system update feature is enabled by default, which should not be the case, as it depends on whether the user chooses to install the optional patches. The advantage is that the system installer requires our intervention so it will not install new windows yourself. However, you may miss messages and then a new system will appear on the disk.…

Washington DC Airport Facial Recognition Technology

US plane passengers will soon have to agree to a further restriction of their privacy. At the Dulles airport in Washington DC, the border guards are testing a brand new face detection system that will provide better detection of the criminals sought.

American media has announced the launch of several months of tests of the new facial recognition system that is taking place at Dulles Airport, Washington. Border guards will photograph all passengers and then compare photos taken with photos in passports. In this way, the border guards will be better able to detect criminals and those with no flights.

As you may have guessed, the new idea aroused great concern from privacy advocates who feared that the new method of checking passengers could severely restrict it. However, the border guards ensure that they will not directly connect the photos with people (as it intends to verify the identity of the passengers) and also promises to delete all photos after the experiment ends.

Experts, however, rightly point out that there is no guarantee that the program will respect privacy as provided by border guards. All the more so, the earlier actions of American government agencies show that the concept of privacy in their dictionaries practically does not exist.…

Biocomputers with DNA-based processors

Writers of the science fiction genre, have for years been feeding us a vision of computers based on biological components. It turns out that the vision of such equipment can soon be realized in the real world.

Two independent groups of scientists have succeeded in constructing the first biological equivalent of a transistor, an integral part of modern electronics. This will make it easier to design devices based on biological cells, such as biosensors, that could be used to detect contaminated water.

Drew Endy of Stanford, Calif., And colleagues designed a transistor-like device that controls the movement of RNA polymerase along the DNA strand, just as electrical transistors control the flow of current in the circuit.

Different enzymes, depending on the sequence of logical gates, allow you to initiate or pause the flow of the polymerase. It is also possible to increase the flow, which is one of the essential functions of a transistor that provides power to other components integrated into the circuit. A similar device was also designed by MIT Timothy Lu.

According to Paul Freemont of Imperial College London, this type of device may in future be key components of live-cell technology. For example, bacterial cells are well suited for the detection of pathogens and chemicals, so they can be used to produce cheap biosensors.

In principle, the possibilities of this technology are limited only by our imagination and in the future technology can be used to produce live bridges or buildings that would grow from natural materials controlled by biological circuits.…

More accurate control of passengers at airports

The most burdensome procedure for passengers at airports is to check luggage during which our items are being carried in bags and suitcases. Qylur has, however, developed a device that will avoid this unattractive spectacle and provide similar luggage control efficiencies.

Qylur has developed a device called the Qylatron Entry Experience Solution, which acts as a luggage scanner. The device consists of five chambers of average microwave size. The passenger walks up to him and then applies his ticket to the door of one of the chambers for scanning.

The container then opens and luggage is placed in it, which is subjected to a thorough X-ray inspection and chemical sensors that check for explosive charges, and over the whole process is watching for contraband. When there is nothing in the bag, it can be picked up on the other side of the machine. If any undesirable objects are detected, an alarm is triggered.

The manufacturer of the scanner ensures that it can check up to 600 passengers per hour, and only four people are required to operate it. One such device is already operating in Paris Disneyland, another has been tested at the World Cup in Brazil, and yet another is at Santa Clara’s Levi’s Stadium in San Francisco.…

Billions of dollars lost in a laptop!

Companies have reported more than $ 2 billion in lost laptops last year! Employees of various companies have lost more than 85,000 laptops – show the latest research “The Billion Dollar Lost Laptop Problem”

Research by the Ponemon Institute, comparing 329 US public and private companies with 1,000 employees. Up to 75 thousand. Employees in more than 12 industries have shown that the total loss of all surveyed companies was $ 2.1 billion, an average of $ 6.4 million per company. The value of losses is enormous. The average value of a lost laptop is $ 49,246. Surprising? This value was calculated on the basis of seven components: the cost of a new computer, problem detection, investigation, data leakage, intellectual property loss, productivity reduction, consultancy and paperwork. It is worth noting that the element with the least effect on the overall cost is the price of new equipment.

According to Check Point security experts, the priority of any business should be an education system and employee engagement in activities that help the entire company take security seriously.

On average, over 12 months, 263 portable computers have disappeared or temporarily disappeared in each business, which together totaled 86,455 laptops (in the large companies surveyed). As much as 43% of laptops were lost outside of the company (work remotely at home or in the office), 33% died in transport or travel, and 12% lost at work. As many as 12% of companies could not tell where their employees or contractors lost computers. Although nearly half (46%) of lost hardware contained confidential data, only 30% of laptops had encrypted disks, 29% of backups, and only 10% of other theft protection.

Most often stolen are computers with the most sensitive and sensitive data (although these computers generally have encrypted disks). In each case, the company managed to recover an average of 12 laptops. The industries with the highest percentage of lost laptops are education and research institutions, health and pharmaceuticals, followed by the public sector. Financial services companies had the smallest loss ratio.…

Android is installed on every PC

Android has long since ceased to be the domain of smartphones and tablets, and more and more often it is found in music players, fridges, cameras, and sometimes also in computers. The system is compatible not only with ARM architecture, but also x86.

This means that Android can be installed on virtually any desktop computer, both desktop and mobile. This can be done through Intel’s x86-based project, which is designed to enable users to move the mobile system to conventional desktop computers. The latest version of software – Android Kit Kat 4.4.2 is currently being tested.

There are already Android-powered laptops, and we’ve seen them at the January CES, but so far there have been hybrids featuring not only two systems, but also the right hardware for the operation of such a computer.

Now, however, the XDA Developers forum members have prepared a special tutorial that allows us to install Android as a second operating system. Performance will not be thrilling then, but we will gain many new opportunities. You will find instructions here (- /?t = 2,703,270).…

Specs and prices have been disclosed

Although Microsoft quite late compared to rivals appeared on the tablet market, but now is trying to catch up with the introduction of another model. The media has just revealed the technical specs and prices of the Surface Pro 3 family of tablets.

The Redmond Giant is aware that the fight on the tablet market is fierce and consumers are attracted not only to affordable prices, but also to the diversity of their offerings. Therefore, after the successful Surface and Surface 2, Microsoft is preparing the latest Surface Pro 3.

There are as many as five hardware configurations of this device that will be available for $ 799 to $ 1949. The cheapest on offer is the Surface Pro 3 featuring a Core i3 processor, 4 GB of RAM and 64 GB of usable memory, for which we will pay $ 799. There will also be two models with Core i5 equipped with 4 and 8 GB RAM, as well as 128 and 256 GB flash memory, which will cost respectively $ 999 and $ 1299.

The most powerful and at the same time the most expensive tablets will be variants with a Core i7 processor and 8 GB RAM, with 256 GB and 512 GB of storage space. For these models you will need to pay as much as $ 1549 and $ 1949.

Surface Pro 3 features new covers and will be available in four color variants. It can not be ruled out that it will receive much larger screens than currently offered models, probably even 12-inches diagonally. The design also changes as a thinner frame is used, and the Windows button moves from the shorter side to the shorter side of the device.

For now, the exact technical specification is not yet known.…

Snowden most popular Twitter user

A few days ago, Edwars Snowden, the world’s most sought after man who revealed the secrets of American intelligence, joined Twitter and almost immediately became one of his most popular users. The analyst did not turn off email alerts, however, and ended up with more than 47 GB of email arriving in his mailbox.

Edward Snowden, a former NSA analyst, is currently the most sought after man in the world. Many people in the US government would like to get it in their hands because of the intelligence they reveal, as well as the programs of surveillance by politicians, journalists and the rest of the world. Snowden is hiding, but he still reveals more evidence of criminal intelligence. Recently he even set up a Twitter account where he hopes to share more revelations.

However, he forgot to turn off email notifications for every interaction associated with his account. Twitter sends an email every time a post is made available, a new follower, etc. Due to the popularity of the analyst, over 47 GB of email ended up in the inbox.…