Wednesday, January 14, 2015

Thunderbolt Equipped Monitor – Replacing LED Cinema Display

Thunderbolt
As announced in July 2011, the current 27 inch Thunderbolt of Apple’s display has been debuted as the first Thunderbolt equipped monitor, replacing the outgoing LED Cinema Display.

When the Thunderbolt display offered cutting edge display technology with 2,560 pixel-by-1,440 pixel WQHD IPS screen from the 27 inch iMac which was launched a few months earlier, has now been overtaken by a higher resolution option or products, offering same feature though at a cheaper cost.

Rumours of updated Thunderbolt Display have been going on though Apple recently announced the stunning iMac with 5K Retina display. Speculations are on that the 5K iMac would be used as an external monitor but have been kept aside keeping in mind Thunderbolt’s bandwidth limitation..

The updated DisplayPort 1.3 supports 5K displays and the functions are not available in Thunderbolt 2 besides the original Thunderbolt protocol that was used by the Thunderbolt Display. Apple is aware of the consumers’ need for more advanced technologies, as observed from the Sharp 4K monitor that has been advertised with the top tier Mac Pro desktop.

Higher Screen Tech –Revised Thunderbolt with DisplayPort 1.3

Apple is likely to wait for a 5K or a higher screen tech which could be backed by a next gen revised Thunderbolt with DisplayPort 1.3. Till then, there are few options made available for Mac owners needing the cutting edge of monitor technology or an affordable method of expanding scream real estate.

UltraSharp monitors of Dell are a few of the best dealers with solid technology together with low prices and the 27 inch UltraSharp is the closest analogy to a theoretical 5K Thunderbolt display which has been made by Apple. Dell’s UltraSharp splits into 5,120 pixels by 2,880 pixels at 60 Hz, with the use of dual DisplayPort setup, while one cable saves a DisplayPortinput, it knocks resolution down to 3,840 pixels by 2,160 pixels at 60Hz.

Besides this, the LED backlighting is bright at 350 cd/m2, under the Thunderbolt Display specification, of 375 cd/m2. Moreover Dell sells an X-Rite i1Display Pro colorimeter which on combining with an on-board 12 bit user accessible 3D lookup table provides an option for precise colour control while advanced colorimetric setting has been reserved for expensive commercial displays.

27-Inch ColorPrime – Next Generation Thunderbolt Display 

Users interested in an updated Thunderbolt Display may not have to go further than LG’s commercial class 27MB85R-B that sports a WQHD display together with IPS technology and LG is known to be one of Apple’s LCD panel suppliers for Thunderbolt display and the ColorPrime has identical specification besides an anti-glare coating.

The LG takes pride in two Thunderbolt 3 ports, Dual-Link DVI-D, HDMI, DisplayPort as well as mini DisplayPort connections unlike other monitors in its category. Its ColorPrime feature comprises of Scaler and True Colour Pro software which works in tandem with a calibrator that is included for great accuracy. The 27-inch ColorPrime is the next generation Thunderbolt Display that Apple has not built which can be purchased from B&H Photo for $597.99.

Several leading manufacturers are happy employing DisplayPort or mini DisplayPort technology instead of Thunderbolt which means that their product could not be used as docking stations for other Thunderbolt equipped devices and for this reason, Apple’s Thunderbolt Display seems to be the most suitable option.

Saturday, January 10, 2015

Hackers Recreate Fingerprints Using Public Photos


finger_print
Fingerprints – Means of Ascertaining Identity 

Fingerprints have been used as a means of ascertaining a person’s identity for quite some time since 1900 and for the past 10 years or so; it has begun to get fairly common in the form of digital fingerprint readers. It first showed up on expensive laptops and external peripherals in enterprise settings and recently on smartphones like the latest iPhones and the Galaxy S5.A recent cyber security convention in Hamburg, the `Chaos Computer Club’ demonstrated on how someone’s fingerprint could be used which was done by analysing photographs.

Fingerprints could be developed from smudges on windows and from other smooth surfaces. Earlier forgers used tapes, scanner or some plastic material and glue in order to build a fingerprint which could fool scanners. A member of Chaos Computer Club, a European hacker association, showed the possibility of reproducing someone’s fingerprint and probe into systems that were protected by biometric fingerprint scanners, by using a photo of the finger.

A snap or a photo of a celebrity waving their hand could be sufficient to implement this task. The member of the CCC managed to get hold of the fingerprint of Germany’s defence minister Ursula von der Leyen from a photo which was taken during a press conference, which if the German government would use biometric access control systems, could be a kind of security breach.

Hacker Create Fingerprint from Public Photos

Jan Starbug Krissler, the hacker, portrayed his findings at Chaos Communication Congress recently. With the photo of von der Leyen’s thumb gained from a press conference, somewhere in October, together with some other photos of her thumb from various angles, he managed to rebuild her thumbprint with the use of commercially available software – VeriFinger.

Thereafter he used the thumbprint to develop a real world dummy by printing it out on a mask and exposed the mask to create a negative of the print on a substrate. He then filled the negative with wood glue in order to create a positive fingerprint. On testing it showed that this technique could trick Apple’s TouchID sensor. According to Chaos Computer Club, it states that this is the first time a fingerprint has been deceived so far and the group leader, Starbug has informed that he was capable of creating a thumbprint of Ursula von der Leyen, the German Minister of Defence, from several of her news photos.

Need for Fingerprint Security Systems

Starbugobtained the print of the fingerprint from the photos on the tracing paper and then copied it to a plastic board. Thereafter he covered it in graphite making a dummy print by coating the plastic in wood glue. In one of the demonstration, the dummy print managed to trick Apple’s TouchID – APPL, Tech30 that controls Apple Pay.

A statement made by the group states that there would be no need to steal objects carrying the fingerprints anymore and after this talk, politicians would probably wear gloves henceforth while talking in public. The Club also states that the presentation needs the validity of fingerprint security systems and it would be difficult to do any useful thing with the German Defence Minister’s fingerprints though one could use the hacking method to intrude into a friend’s iPhone.

Friday, January 9, 2015

ADAM iOS-Connected Asthma Monitor


The Automated Device for Asthma Management 

The wearable Automated Device for Asthma Management or ADAM by Health Care Originals, as shown to AppleInsider at CES can count coughs as well as measure respiration, wheeze and heart rate. To undermine effective symptoms monitoring and medication which would lead to poor health condition, a device has been proposed which could continuously monitor asthma symptoms especially coughing which is the most common symptom in asthma patients.

The identified symptoms can then be stored and retrieved later by the patient or the physician for reference, indicating the level of asthma control. It is a unique iOS connected medical device which is focused in providing the users with a solution in managing their asthma condition.Measuring vital signs together with other biological reading, the ADAM is capable of predicting as well as logging asthma attack and also recommends behaviour changes.

In other words it will be featuring inhaler detection with alerts and alert forwards together with symptom tracking as well as trending treatment plans. It is proposed to be launched during the second quarter this year, though the price has not been disclosed yet. ADAM users could also have the facility of receiving medication reminders and the device has potential of HIPAA compliant data storage.

Focused on Preventing Complication with Asthma

The device has been focused on preventing complications with asthma which could tend to get serious if not detected in time. Timely treatment could save a lot of time and trouble to the victim. The ADAM sensor has been designed with its own iOS connected application and HealthKit support is also on its way for the smart wearable accessory.

The ADAM comprises of a consumer electronic mobile platform that runs a custom application which acquires an audio signal from external user worn microphone which is connected to the device analog to digital converter or a microphone input.

To determine the absence or presence of cough sounds, the signal is processed where symptoms are tallied and raw audio waveforms are recorded, making easy access for later review by a physician. Symptoms detection algorithm depends on standard speech recognition as well as machine learning paradigms, consisting of an audio feature extraction step with a Hidden Markov Model - HMM, based Viterbi decoder which has been trained on a huge database with audio examples on various subject. Performance of recognizer is shown in terms of sensitivity as well as the rate of false alarm determined in a cross validation test.

Personal Asthma Monitoring Device 

Mobile technology has made much progress so much so that the hardware needs of personal asthma monitoring devices have been created in existing consumer electronics platforms. Due to the broad install base together with software development kit –SDK, Apple’s iOS device have been the chosen platform, specifically, the 4G iPod.

The present approach is based on proven technology and method in the field of speech recognition, keyword as well as key audio effect detection, content based audio analysis and machine learning, like the other audio systems for cough monitoring which have been reported in literature.

Here the cough detection algorithm presented, processes the audio date in two ways where in the initial stage, the incoming stream of digital audio samples tend to get rearranged in fixed length frames from which set of audio features are computed and the sequence of feature vectors are then passed to HMM Viterbi decoder.

Thursday, January 8, 2015

The Next Version of USB is the Key to Apple's New MacBook


USB_Port
Apple’s all New MacBook Air for 2015

Apple is on its way in preparing an all-new MacBook Air for 2015 and is working towards a thinner and a totally redesigned MacBook. Reports from 9to5Mac claims, that Apple’s next notebook would be a 12-inch MacBook Air, wherein this new design comes with jettisons standards type, like a full sized USB ports, MegSafe connectors and SD slots in favour of a thinner and lighter body together with a higher resolution display.

Sources who have utilised the internal prototype version of the forthcoming computer, have given details with regards to the machine together with their artist renditions of the latest MacBook Air and a first close look at its first major step in mobile Mac computing from the time the Retina MacBook Pro had been launched in 2012.

The revamped MacBook Air will have a 12 inch screen and will be much narrower than the prevailing 11 inch MacBook Air and the bezels surrounding the MacBook Air screen are shrunk for the display panel and keyboard could take up a larger usable area of the laptop. The keyboard has been changed, placing them together utilising less space with a few key changes like the power button for instance, has been moved to the left upper corner area, towards the left of the escape key.

USB Type-C – Smaller/Faster/Reversible Cable

Besides this, the travel on the trackpad has also been removed keeping in mind to have a slim laptop. Users need to be aware that the new MacBook Air would be coming with only two ports, such as a headphone jack and a single USB Type-C port and it is difficult to imagine a MacBook without a Thunderbolt Connection or MagSafe charger, though the new specification of USB supports driving displays together with device charging.

There are two kinds of technology which Apple needs to take up – USB Type-C and a processor which could run well enough in helping to achieve a thin design without a fan. USB Type-C is the most important with a smaller, faster and reversible cable that will make the device thinner in the future. It could also serve as a power cable and display for devices and would need a single small port for all functions on a laptop.

Thin/Light/Small Laptop

The next thing that Apple would need after the USB-C is the processor and laptop developers are planning to launch laptops with Intel’s latest Broadwell processors though the chip continues to run hot enough with a need of a fan, which a 12-inch MacBook could do without it.

Apple could probably use the Intel Core M processor in order to keep it cool making sure that the battery life is appropriate, which the Company is striving to achieve with MacBook for several years now. This would mean that the MacBook would be comparatively thin, light as well as small though may not be a powerful machine.

The Core M will be capable to power the rumoured high res screen and such screens are standard on most mid-range as well as on some low cost laptop this year, but not a hit. On the contrary, it would be a little machine used for browsing, video watching or other purpose which would involve typing.

Expired Domain Search



DomCop
Expired domain search engine at DomCop enables users to locate domains that are based on Page Rank, Domain Authority, Moz Rank, Trust Flow, Majestic Citation, Similar Web Rank, Alexa Rank, SEMRush Rand together with Social Statistics and Traffic Data.

Data is imported from domain auctions; dropped lists or those which are not deleted and provided with relevant details for these domains. Besides this, page rank is validated ensuring that the domains are not scams.

Moreover, they are also checked if they have been banned by Google and metrics are also used from other source such as Moz, Majestic SEO, and SEMRush etc. in validating the domains. Page Rank relates to the value that has been given to a page or domain which portrays its significance to Google and is obtained from incoming links to the domain or page from others across the internet and high page ranks provide more page rank to the domain.

Here the value of the page rank is based on the Google toolbar where most of the users are not aware that the page rank used by Google is not what is shown in the toolbar. At times it could be easy in presenting a fake page rank by directing a domain to a high page rank domain, temporarily and since the same is only updated once after some month, it could not be a reliable source of domain value.

Common Search/Simple Search/Advanced Search 

The domains here are not sold but lists of those available are displayed for purchase either through auction or could be registered through a domain registrar.Most of the domains listed at the site come from several sources such as NameJet, DynaDot, GoDaddy, and SnapNames as well as from different drop lists all over the world.

Viewers could navigate through the search in three ways such as a Common Search which is a pre-built search in locating expired domains that could be very useful for a first timer. The second is a Simple Search which is an easy search for users having few needed parameters and the last is Advanced Search which is for those who would prefer to have the option to search on each single metric

Expiring/Expired/Archived Domains

Scam Domains are several domains which are on auction as well as expired which portray fake page ranks which could be redirected to some high page rank domain. On checking on these, it indicates a fake page rank and buyers ultimately end up buying them. Banned Domains are those which have been banned by Google and can be checked on how many back links it may have.

 The site could also be check on Google – info: website.comand those domains which have been banned can be filtered. Users could buy expired domains that come with great metrics which are listed in three different categories namely: Expiring Domains wherein the domains which are likely to be expiring within 10 days are displayed.

Expired Domains are those domains already expired in the last 10 days and Archived Domains are those that are presently available and have expired for over 10 days back.