Home Blog Page 387

Mark Zuckerberg’s New Year’s Resolution is to Develop an AI Assistant, Like Jarvis in Iron Man

Zuckerberg's New Year's Resolution

Most of us make delusional New Year’s resolutions that involve quit smoking, deiting, no more be an internet worm like that, but not for Zuckerberg. Facebook CEO, Mark Zuckerberg’s new year’s resolution resolution is lot more different from others.

In 2016, Zuckerberg wants to focus on Artificial Intelligence (AI) and is even thinking of a simple AI to run his home and workplace lik the famous Jarvis character in the Hollywood movie “Iron Man”.

Also Read : Why we are Addicted to Facebook ? – Interesting Survey Results

Earlier today, he wrote on his own Facebook page that his “theme” for 2016 is invention and his goal is “to build a simple AI to run my home and help me with my work.”

Every year, I take on a personal challenge to learn new things and grow outside my work at Facebook. My challenges in…

Posted by Mark Zuckerberg on Sunday, January 3, 2016

Zuckerberg will start the project by exploring existing technology, he wrote. He will then begin teaching the technology to understand his voice so that it will learn to control everything in his home, such as music, lights and temperature.

His plans also include teaching the assistant to let friends into his home by looking at their faces when they ring the doorbell, Zuckerberg wrote. The assistant will visualize data to support Zuckerberg at work, he wrote.

“This should be a fun intellectual challenge to code this for myself,” Zuckerberg wrote. “I’m looking forward to sharing what I learn over the course of the year.”

Also Read : After Facebook, Twitter & Yahoo, Now Microsoft will also Notify Users State Sponsored Hacking Attacks

Zuckerberg’s New Year’s Resolution in Past Years

In 2015, while the rest of us halfheartedly plodded away on treadmills at unimpressive speeds for two weeks or so before giving up, Zuckerberg vowed to read a book every other week, essentially inviting everyone on Facebook to be in his book club. And he did it.

In 2014, while many were trying to pack healthy lunches instead of throwing down a noontime Baconator on the regular, Zuckerberg challenged himself to write one thank-you note every day. And he did it. (He admitted it wasn’t easy, though.)

In 2013, while John and Jane Everyman tried to give up their vices and wound up consoling themselves by taking up new ones, Mark Zuckerberg swore to expand his real-life social network bymeeting someone new every day. In person. This was a challenge for him because Zuck is a self-proclaimed awkward dude. But he did it.

In 2011? You may have vowed to do more community service. Zuck pledged that he would only eat meat that he butchered himself. If that’s not hardcore, I don’t know what is.

Oh yeah, and then there was that time in 2010 when he blew everyone away by casually learning Mandarin. I don’t remember what my resolution was that year, but I’m nearly positive it had nothing to do with Mandarin and everything to do with Doritos. Oh, and I didn’t keep it.

Also Read : Mark Zuckerberg Quit His Job At Facebook Because Of This Bug

So tell us what’s your New Year’s Resolution ? We like to hear from you in comments!

This Weird Trick will Speed Up iPhone in Less than 30 seconds

speed up iPhone

We always wonder how to speed up iPhone in our hand, but majority of us can’t find one working trick to do that job. There are various reasons your iPhone might seem slow at times, especially the older models that are running newer versions of Apple’s iOS platform. Recently Apple was sued by some users over iOS 9 performance on older iPhones.

One problem users are facing in their iPhone is with Apple’s App Store in terms of browsing speeds and downloads, and good news is their is a quick fix that could help you to speed up your iPhone in less than 30 seconds.

Also Read : It’s Now Legal To Jailbreak Your iPhone, Android Smartphone, Tablet Or Smart TV

Developer Zachary Drayer recently explained this weird trick on his Twitter account, to fix problem facing with App Store app on your iOS device like getting slower or not showing app updates correctly.

Weird Trick to Speed Up iPhone

So now the trick, here’s what you do to speed up your iPhone App Store app :

 First, go into the App Store

 Then, tap one of the buttons at the bottom 10 times – it doesn’t matter which (Featured, Top Charts, Explore, Search, Updates) – remember tap the same button 10 times quickly in succession.

Now the app screen will go blank for a few seconds before resetting.

Also Read : Did you Know, Apple Has Over 800 Engineers Working on the iPhone Camera

Speed up iPhone

…and that’s it! You’ve now successfully reset your App Store’s cache, emptying out the temporary storage that can cause your phone to act sluggish or cause your apps to fail to update.

This tap 10 times trick worked in stores, like iTunes, iBooks, and the App Store. It also worked in the Apple Watch app, however not in Podcasts, Music, Game Center, iMessage or Phone.

Also Read : LG, Samsung to Supply OLED Display to Apple iPhone 7, Says Report

Did you try the above trick to speed up your iPhone, then tell us its worked for you. We love to hear from your comments !

Now Nintendo 3DS XL can Run Windows 95

Nintendo 3DS XL can Run Windows 95

Earlier this week, we heard PlayStation 4 hacked to run Linux. And now again a hacker made a console to run one of the oldest Windows OS. This time its Nintendo 3DS. Yes, don’t be surprised – Nintendo 3DS is now a PC.

In a post to a Game Boy forum, a user named Shutterbug2000 demonstrates Windows 95 running on a new Nintendo 3DS XL using an x86 emulator, DOSbox emulation – which runs on top of MS-DOS as a sort of graphical shell.

Also Read : This is what Edward Snowden said About Tor Project

“Back a while ago, I tried compiling the dosbox from libretro, and using retroarch to emulate dosbox. Yet, every time, it froze on a rainbow glitchy mess. So, I gave up for a while. Until tonight,” — wrote Shutterbug2000 in the forum post. “So, I tried it on my n3ds, and it just worked. So, I think the o3ds just isn’t powerful enough to run dosbox, or there’s not enough ram. So, that’s how this all got started. At it’s core, this is just libretro/retroarch dosbox. But I figured, hey, everyone want’s Windows on their 3DS, right?”

Nintendo 3DS , Now a PC

Shutterbug2000 uploaded a YouTube video that shows a Nintendo 3DS displaying the cloudy Windows 95 boot screen and running Scandisk, but that ends before the desktop appears.

Also Read : After Facebook, Twitter & Yahoo, Now Microsoft will also Notify Users State Sponsored Hacking Attacks

https://youtu.be/nu3_X6HcVrI

The incomplete video led some readers to question the method’s veracity, so Shutterbug2000 uploaded the code needed for other users to run Windows 95 on their own 3DS units. Other posters verified that it worked for them as well.

Nintendo 3DS XL can run Windows 95, but it’s unclear just what you’ll be able to do in the OS. The entire experience is a bit laggy, Shutterbug2000 notes, and it’s doubtful that you can connect to the Internet in any capacity via your 3DS-based Windows 95. Mapping keyboard buttons to the small number of buttons on a Nintendo 3DS presents challenges, too.

Also Read : Microsoft Probably has your Disk Encryption Key in its Server, Here’s How to Take it Back

Did you try to run Windows 95 in your Nintendo 3DS using the code provided by Shutterbug2000 ? Then tell us your experience. We love hear from your comments !

Knightscope Developed Crime-Fighting Robots

Knightscope Developed Crime-Fighting Robots

The robots might one day rise up and take over, but a Palo Alto startup called Knightscope has developed a fleet of crime-fighting robots it hopes to keep us safe.

Knightscope’s K5 security bots resemble a mix between R2D2 and a Dalek from Doctor Who – and the system behind these bots is a bit Orwellian. The K5’s have broadcasting and sophisticated monitoring capabilities to keep public spaces in check as they rove through open areas, halls and corridors for suspicious activity.

Also Read : Researchers Developed First Light-Based Microprocessor Chip to Create More Powerful Computers & Ultrafast Communications

The units upload what they see to a backend security network using 360-degree high-definition and low-light infrared cameras and a built-in microphone can be used to communicate with passersby. An audio event detection system can also pick up on activities like breaking glass and send an alert to the system as well. The robots are being used at a number of tech companies and a mall in Silicon Valley at the moment.

Also Read : BMW to Show How Gestures will Control Future Cars

Knightscope Developed Crime-Fighting Robots

CEO Stacey Dean Stephens, a former law enforcement agent, came up with the idea to build a predictive network to prevent crime using robots. He and his co-founder William Li have raised close to $12 million in funding so far from Konica Minolta and others to build on the idea.

While Knightscope doesn’t think its robots will replace mall cops or security guards in the near future, the company does see them as assistants to human security teams. The startup currently rents each five-foot, 300-pound K5 unit out for $6.25 per hour (or less than minimum wage). However, teenagers or others tempted to kick or push the robots over may be shocked to find the robots can talk back to them, capture their behavior on film and alert authorities behind the scenes as well.

There’s more to these droids than becoming our future security forces, of course. Stephens invited me to Knightscope HQ for a behind the scenes look at an integrated security network the company is working on. This network is able to monitor and report suspicious activity in real time in public places based on robot observation and could possibly be used to predict and act quickly in tense and violent situations (possibly even mass shootings), according to Stephens.

Also Read : Apple Developing Advanced Display Technology at their New Secret Laboratory in Taiwan

This is what Edward Snowden said About Tor Project

Edward Snowden said About Tor Project

The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor Project helps in enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router.

Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than six thousand relays to conceal a user’s location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user: this includes “visits to Web sites, online posts, instant messages, and other communication forms”.Tor’s use is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored.

Also Read : This New Computer Chip Can Self Destruct In 5 Seconds

What Edward Snowden said about Tor Project

Recently Tor Project interviewed Edward Snowden and comments shows that Snowden is great supporter of Tor. According to Snowden, Tor provides a level of safety, a level of guarantee, to the confidentiality, and in some cases anonymity of human communications. He think this is an incredible thing because it makes us more human. We are at the greatest peace with ourselves when nobody’s watching.

Here is some key excerpts from the Tor interview with Snowden from their official blog:

Tor: What would you say to a non-technical person about why they should support and care about Tor?

Snowden: Tor is a critical technology, not just in terms of privacy protection, but in defense of our publication right — our ability to route around censorship and ensure that when people speak their voices can be heard.

The design of the Tor system is structured in such a way that even if the US Government wanted to subvert it, it couldn’t because it’s a decentralized authority. It’s a volunteer based network. Nobody’s getting paid to run Tor relays — they’re volunteers worldwide. And because of this, it provides a built-in structural defense against abuses and most types of adversaries.

Tor provides a level of safety, a level of guarantee, to the confidentiality, and in some cases anonymity of human communications. I think this is an incredible thing because it makes us more human. We are at the greatest peace with ourselves when nobody’s watching.

Tor: Can you talk about how the world would be different if Tor did not exist?

Snowden: Without Tor, the streets of the Internet become like the streets of a very heavily surveilled city. There are surveillance cameras everywhere, and if the adversary simply takes enough time, they can follow the tapes back and see everything you’ve done.

With Tor, we have private spaces and private lives, where we can choose who we want to associate with and how, without the fear of what that is going to look like if it is abused.

What the Tor network allows is what’s called a mixed routing experience where, due to a voluntary cooperation of peers around the Internet — around the world, across borders, across jurisdictions — you get individuals who are able to share traffic in ways that don’t require them to be able to read the content of it. So you don’t have to trust every participant of the Tor network to know who you are and what you’re looking for.

Tor: Did you know that Tor is run by a non-profit organization?

Snowden: Yes, Tor has been extremely open. Almost everybody who is involved in development has an online presence; they’re involved in online engagement. You can drop into the IRC and talk to these people directly and ask them questions, or criticize them (laughs). It’s a very open and inclusive community, and I think that’s incredibly valuable.

They also have a very rich and well-supported mailing list, which is very helpful for people who want to move beyond being a passive user of Tor and actually start being an active participant in expanding the network, in running a relay node from your home, or even starting to experiment with running an exit, which I think is one of the most interesting parts of the Tor experience.

Also Read : MIT Researchers Developed Untraceable SMS Text Messaging System that’s Even More Secure than Tor

Tor Project

From the interview its clear that first and foremost, the Tor Project isn’t exclusively for cyber criminals. Tor is for everyone who is concerned about privacy. For starters, many Tor users fear their browsing history is possibly being logged. Many sites, including Facebook, sell your browsing history to advertisers. It’s likely those ads on the sides of your social network and email accounts are the product of third-parties buying and analyzing your browsing history without your approval.

It’s common for people to turn to Tor for basic security. Often times Activists and Journalists use the utility to report injustices from enemy territory without being discovered or to better protect their sources.

At times, anonymity is important for safely utilizing basic internet functions. The utility can be an asset for citizens of countries with stringent censorship laws. In some cases, basic information is placed behind a firewall. Tor allows users can anonymously circumvent firewalls and research, say, HIV treatment or access Facebook.

Also Read : Enemies of Internet Freedom – Government Organizations Around the World who Monitor our Online Activities

Are you a Tor user, share your experience with Tor Project ? We’d love to hear from you in the comments!

Google Asked to Remove 558 Million “Pirate” Links from Search Results in 2015

Google Asked to Remove 558 Million Pirate Links from Search Results in 2015

In recent years copyright holders have overloaded Google with DMCA takedown notices, targeting links to pirated content. The majority of these requests are sent by the music and movie industries, targeting thousands of different websites. In recent years the volume of takedown notices has increased spectacularly and this trend continued in 2015.

Google doesn’t report yearly figures, but according to TorrentFreak, about 558 million of URLs are submitted by copyright holders last year, requesting Google to remove from its search results. For the first time ever the number of reported URLs has surpassed half a billion in a 12-month period. This is an increase of 60 percent compared to last year, when the search engine processed 345 million pirate links.

Also Read : Critical Security Flaw in AVG Chrome Extension Exposes Millions of Users Data

The majority of the links are being removed from the search results. However, Google sometimes takes “no action” if they are deemed not to be infringing or if they have been taken down previously.

Google Asked to Remove 558 Million “Pirate” Links

This year most takedown requests were sent for the domains chomikuj.pl, rapidgator.net and uploaded.net, with more than seven million targeted URLs each. The UK Music industry group BPI is the top copyright holder of 2015, good for more than 65 million reported links.

Google Asked to Remove 558 Million Pirate Links
Image Source : TorrentFreak

Looking at the totals for this year we further see that 329,469 different domain names were targeted by 27,035 copyright holders. Interestingly, these staggering numbers are interpreted differently by Google and various copyright holders.

A few weeks ago Google told the U.S. Intellectual Property Enforcement Coordinator that it has taken various measures to help copyright holders, including swift removals.

Also Read : New Study Claims Merely Visiting Piracy Sites can Place a User’s Computer at Risk

“We process more takedown notices, and faster, than any other search engine,” the search giant commented. “We receive notices for a tiny fraction of everything we host and index, which nonetheless amounts to millions of copyright removal requests per week that are processed, on average, in under six hours.”

The company rejects broader actions, such as the removal of entire domain names, as this would prove counterproductive and lead to overbroad censorship.

Many copyright holders, however, don’t share these concerns. Over the years groups such as the MPAA and RIAA have repeatedly argued that clearly infringing sites should be barred from Google’s index. In addition, they want Google to make sure that pirated content stays down.

While Google believes that the billion reported URLs are a sign that the DMCA takedown process is working properly, rightsholders see it as a signal of an unbeatable game of whack-a-mole.

As this stalemate continues we can expect the number of reported pages to continue to rise in the future, adding millions of new URLs on a daily basis. Perhaps there will be a billion reported pirate links in 2016?

Also Read : PlayStation 4 Hacked to Run Linux

PlayStation 4 Hacked to Run Linux

PlayStation 4 Hacked to Run Linux

The PlayStation 4 and Xbox One systems are just PCs, and now hardware hackers have started doing some very cool things with at least one of these systems. Console-hacking group Fail0verflow has cracked the PlayStation 4 and loaded it up with a version of Linux.

This is a big step in the process to get homebrew software running on Sony’s popular console. This also turns the PS4 into a real PC. Sony embraced PC-style architecture for the PS4 after experimenting with exotic chips for its last system. And now that has come full circle to the point where the console is running a desktop computer’s operating system.

But it doesn’t stop with Linux. Fail0verflow also booted up a Game Boy Advance emulator and a modded copy of Pokémon that the group calls the “PlayStation Version.”

Also Read : Researchers from Google Discovered How to Hack a Corporate Network just by Sending an Email

Linux in PlayStation 4

Check out the full demonstration for yourself in the video below:

Also Read : Top High-Profile Hacking Attacks of 2015

The Game Boy emulator is particularly interesting because Fail0verflow actually connected a Game Boy Advance to the PlayStation 4 to serve as the controller. Of course, this is probably not the best way to play your old portable games. But it shows that the hacking group has control of much of the PS4 system.

Getting deep integration with the PS4 means that Fail0verflow has gathered a strong understanding of how the console functions. In the presentation, the group noted that some of the differences between the PS4 and a PC are “crazy” and some are “batshit crazy.” The hackers went on to say that the engineers that work at semiconductor company Marvell Technology Group were “smoking some real good stuff” when they designed the PlayStation 4’s southbridge chip.

Linux on a PlayStation isn’t the craziest thing in the world. Some gamers will remember that the PlayStation 3 launched with a feature called “OtherOS” that enabled anyone to load the system with Linux or other operating systems. Sony eventually removed that, but a community of homebrewers kept it alive on their own. Now, that legacy lives on with the PS4.

Also Read : Microsoft Probably has your Disk Encryption Key in its Server, Here’s How to Take it Back

Father of Debian Linux, Ian Murdock Passed Away

Founder of the Debian GNU/Linux distribution project, Ian Murdock has died at the age of 42. His death, announced in a blog post by Docker CEO Ben Golub, came after an apparent encounter with police and a statement posted on Murdock’s Twitter feed that he was going to commit suicide, though no cause of his death has been given.

Ian Murdock, born in Germany in 1973, founded Debian in 1993 while studying computer science at Purdue University. The distribution gets its name from the combination of his name and that of his then-girlfriend Deborah Lynn. The pair married, and had two children; they divorced in 2007.

Murdock’s Debian Manifesto railed at the poor software maintenance of other Linux distributions of the time—and that of Softlanding Linux System (SLS) in particular, bemoaning the lack of attention developers gave to distributions and what he saw as the big cash grabs being made by would-be commercial Linux developers. He outlined Debian’s modular architecture approach as well as its adherence to free software philosophy.

After earning his Bachelor of Science from Purdue in 1996, Murdock became Chief Technology Officer of the Linux Foundation. In 2003, he brought his experience with Debian to Sun, where he was Vice President of Emerging Platforms. He led Project Indiana, the effort that created the OpenSolaris operating system, which he described in a 2007 interview as “taking the lesson that Linux has brought to the operating system and providing that for Solaris as well.” But three years later, after Sun was acquired by Oracle, the plug was pulled on OpenSolaris in favor of a new proprietary version.

Simon Phipps, who led the open source effort at Sun alongside Murdock and worked (though at separate times from Murdock) at the Open Source Initiative, where Murdock was founding Secretary, told Ars Murdock “was always energetic, enthusiastic, pragmatic and charming. I and my team [at Sun] appreciated his insight and activity as well as enjoying his company. I’ve been contacting them, and we are all devastated by his untimely loss.”

After the Oracle acquisition, Murdock resigned his position at Sun. In 2011, he went back to Indiana to join the cloud software company ExactTarget as its Vice President of Platform and Developer Community. The company was acquired by Salesforce in 2013 and became Salesforce Marketing Cloud. In November, he left the company to join Docker in San Francisco.

On Monday at 2:13 PM Eastern Time, Murdock apparently posted that he was going to kill himself:

Father of Debian Linux, Ian Murdock Passed Away

His Twitter account had since been deleted. However, at that time, some people speculated that Murdock’s account had been hacked and that the tweets were not by him.

Also on Monday, Murdock wrote a string of posts that indicate he had a confrontation with police. Inquiries to the San Francisco Police Department by Ars went unanswered. Public records indicate Murdock was arrested on December 27, and released on bail by the San Francisco County Sheriff’s Department, but no details were available on the charges.

Golub wrote in his post that “Ian’s family has requested that well-wishers and press respect their privacy and direct all inquiries through Docker.”