tag:blogger.com,1999:blog-73132485314681710792024-02-20T04:04:31.182-08:00Roger Samara Canada | Computer TechnicianRoger Samara is a Computer Technician with 10 years of experience.He is master of Computer's world and he is passionate about his work & new technologies introducing in Computer's world.Roger Samarahttp://www.blogger.com/profile/00546007119424295915noreply@blogger.comBlogger42125tag:blogger.com,1999:blog-7313248531468171079.post-49382730145525692512019-10-16T04:10:00.002-07:002019-10-16T04:10:49.126-07:00Roger Samara | ThioJoe | 15 Computer Tips and Tricks<div dir="ltr" style="text-align: left;" trbidi="on">
<b><a href="https://medium.com/@rogersamara/roger-samara-thiojoe-15-computer-tips-and-tricks-8224c38d8361" target="_blank">Roger Samara</a></b> | ThioJoe | Montreal, Canada | Here we have a list of 15 simple and easy computer tips and tricks you might not have ever known about. Anything from Windows tips to general computer tricks, everyone should find something that is useful.<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<iframe width="320" height="266" class="YOUTUBE-iframe-video" data-thumbnail-src="https://i.ytimg.com/vi/WXpZD5uYfOo/0.jpg" src="https://www.youtube.com/embed/WXpZD5uYfOo?feature=player_embedded" frameborder="0" allowfullscreen></iframe></div>
<br />
<br /></div>
Roger Samarahttp://www.blogger.com/profile/00546007119424295915noreply@blogger.com2tag:blogger.com,1999:blog-7313248531468171079.post-69577283441285874742019-07-05T02:17:00.001-07:002019-07-05T02:17:54.989-07:00Roger Samara | What Is the Technology Behind a Touch Screen?<iframe allowfullscreen="" frameborder="0" height="270" src="https://www.youtube.com/embed/WdIkRAOxdlE" width="480"></iframe><br /><br />
<br /><br />
<div class="hj hk eq bh hl b hm hn ho hp hq hr hs ht hu hv hw" data-selectable-paragraph="" style="background-color: white; box-sizing: inherit; color: rgba(0, 0, 0, 0.84); font-family: medium-content-serif-font, Georgia, Cambria, "Times New Roman", Times, serif; font-size: 21px; letter-spacing: -0.004em; line-height: 1.58; margin-bottom: -0.46em; margin-top: 2em;">Have you ever wondered just how the touch screen on your cell phone, tablet, LED television, or any other device actually works? It is amazing to think that we can now issue commands to our devices with the touch of our hand and while this technology might seem new, it has actually been around since the 1960's.</div><figure class="hx hy hz ia ib dh ic y z paragraph-image" style="background-color: white; box-sizing: inherit; clear: both; color: rgba(0, 0, 0, 0.8); font-family: medium-content-sans-serif-font, -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Oxygen, Ubuntu, Cantarell, "Open Sans", "Helvetica Neue", sans-serif; margin: 56px auto 0px; max-width: 640px;"><div class="if n cu ig" style="background-color: rgba(0, 0, 0, 0.05); box-sizing: inherit; margin: auto; position: relative;"><div class="ih n" style="box-sizing: inherit; padding-bottom: 426px;"><div class="ch id ep p q eo ab gz v ie" style="box-sizing: inherit; height: 426px; left: 0px; opacity: 0; overflow: hidden; position: absolute; top: 0px; transform: translateZ(0px); transition: opacity 100ms ease 400ms; width: 640px; will-change: transform;"><img class="ep p q eo ab ii ij" height="426" src="https://miro.medium.com/max/30/0*6tI4_DcLTeo-VfAv.jpg?q=20" style="box-sizing: inherit; filter: blur(20px); height: 426px; left: 0px; position: absolute; top: 0px; transform: scale(1.1); vertical-align: middle; width: 640px;" width="640" /></div><img class="ir is ep p q eo ab" height="426" src="https://miro.medium.com/max/640/0*6tI4_DcLTeo-VfAv.jpg" style="box-sizing: inherit; height: 426px; left: 0px; opacity: 1; position: absolute; top: 0px; transition: opacity 400ms ease 0ms; vertical-align: middle; width: 640px;" width="640" /></div></div></figure><div class="hj hk eq bh hl b hm hn ho hp hq hr hs ht hu hv hw" data-selectable-paragraph="" style="background-color: white; box-sizing: inherit; color: rgba(0, 0, 0, 0.84); font-family: medium-content-serif-font, Georgia, Cambria, "Times New Roman", Times, serif; font-size: 21px; letter-spacing: -0.004em; line-height: 1.58; margin-bottom: -0.46em; margin-top: 2em;">In fact, the technology behind the touch screen can actually traced right back to the 1940’s but it was only two decades later that it actually became feasible to use on a large scale.</div><div class="hj hk eq bh hl b hm hn ho hp hq hr hs ht hu hv hw" data-selectable-paragraph="" style="background-color: white; box-sizing: inherit; color: rgba(0, 0, 0, 0.84); font-family: medium-content-serif-font, Georgia, Cambria, "Times New Roman", Times, serif; font-size: 21px; letter-spacing: -0.004em; line-height: 1.58; margin-bottom: -0.46em; margin-top: 2em;">ATMs have been using technology since 1965 which is when E.A. Johnson invented the first finger-driven touch screen that actually used the same capacitive touch mechanism that is still used in cell phones and other devices to this day.</div><div class="hj hk eq bh hl b hm hn ho hp hq hr hs ht hu hv hw" data-selectable-paragraph="" style="background-color: white; box-sizing: inherit; color: rgba(0, 0, 0, 0.84); font-family: medium-content-serif-font, Georgia, Cambria, "Times New Roman", Times, serif; font-size: 21px; letter-spacing: -0.004em; line-height: 1.58; margin-bottom: -0.46em; margin-top: 2em;">According to <a class="aq cc ik il im in" href="https://www.behance.net/rogersamara" style="-webkit-tap-highlight-color: transparent; background-image: url("data:image/svg+xml; background-position: 0px calc(1em + 1px); background-repeat: repeat-x; background-size: 1px 1px; box-sizing: inherit; http: //www.w3.org/2000/svg\"><line x1=\"0\" y1=\"0\" x2=\"1\" y2=\"1\" stroke=\"rgba(0, 0, 0, 0.84)\" /></svg>"); text-decoration-line: none;"><span class="hl io" style="box-sizing: inherit; font-weight: 700;">Roger Samara</span></a>, there are other types of touch screen technology such as resistive touch or multi touch technology, capacitive touch technology is the one that is preferred for mass produced consumer products.</div><div class="hj hk eq bh hl b hm hn ho hp hq hr hs ht hu hv hw" data-selectable-paragraph="" style="background-color: white; box-sizing: inherit; color: rgba(0, 0, 0, 0.84); font-family: medium-content-serif-font, Georgia, Cambria, "Times New Roman", Times, serif; font-size: 21px; letter-spacing: -0.004em; line-height: 1.58; margin-bottom: -0.46em; margin-top: 2em;">Today, a capacitive touch screen works through the use of an ITO touch film that is attached to the screen. This touch film is basically a semiconductor that has been printed out using semiconductor manufacturing methods such as roll to roll processing which uses a roll to roll evaporator system to create an electronic device on a flexible plastic.</div>Roger Samarahttp://www.blogger.com/profile/00546007119424295915noreply@blogger.com0tag:blogger.com,1999:blog-7313248531468171079.post-17554489993076839022019-04-22T04:45:00.002-07:002019-04-22T04:45:17.160-07:00Roger Samara - Electric Cars to Rule the Roads within 5 Years<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "calibri" , "sans-serif"; font-size: 12pt; line-height: 18.4px;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi80q8yfwz1nmT-PwQhgOwAN0vUiNDopksPg7iWWX7kcE4pIqLBKla_3X7HNzaoflanPKwS9NufeXfRjvT6q4rj3GV4dJ7YVzLhma6qKR_KZ5NDhyphenhyphen1I3ClkhyphenhyphenJ5dsCtj4no1isPFzrsA0k/s1600/electric-car-Roger-Samara-1024x682.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="682" data-original-width="1024" height="425" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi80q8yfwz1nmT-PwQhgOwAN0vUiNDopksPg7iWWX7kcE4pIqLBKla_3X7HNzaoflanPKwS9NufeXfRjvT6q4rj3GV4dJ7YVzLhma6qKR_KZ5NDhyphenhyphen1I3ClkhyphenhyphenJ5dsCtj4no1isPFzrsA0k/s640/electric-car-Roger-Samara-1024x682.jpeg" width="640" /></a></div>
<span style="font-family: "calibri" , "sans-serif"; font-size: 12pt; line-height: 18.4px;"><br /></span>
<span style="font-family: "calibri" , "sans-serif"; font-size: 12pt; line-height: 18.4px;">Plug-in or Electric Vehicles have shown a tremendous rise on roads from the last year. Needless to say, if someone needs to buy a new car he will prefer an electric one over fuel in the modern era.</span><b><span style="font-family: "calibri" , "sans-serif"; font-size: 14pt; line-height: 21.4667px;"> </span></b><span style="font-family: "calibri" , "sans-serif"; font-size: 12pt; line-height: 18.4px;">A study proved that people worldwide shows strong support for more electric cars than fuel vehicles. While claiming for the reason of more sale of electric cars, environment-friendly is one of them. </span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: calibri, sans-serif; font-size: 12pt;"><br /></span>
<span style="font-family: calibri, sans-serif; font-size: 12pt;">We have listed some of the reasons suggested by</span><span style="font-family: calibri, sans-serif; font-size: 12pt;"> </span><b style="font-family: calibri, sans-serif; font-size: 12pt;"><a href="https://www.saatchiart.com/rogersamara" target="_blank">Roger Samara</a></b><span style="font-family: calibri, sans-serif; font-size: 12pt;">.</span></div>
<h4 style="text-align: left;">
<b><span style="font-family: "calibri" , "sans-serif"; font-size: 14pt; line-height: 21.4667px;">Performance</span></b></h4>
<h4 style="text-align: justify;">
<span style="font-weight: normal;">In terms of performance, electric cars have proven to be excellent as compared to fuel cars, it is generally said by users. As electric is able to produce 100% torque from zero to full speed while in fuel torque increases as RPM rises. Due to this energy, the vehicle is derived forward rather than losing its energy in friction or heat. Ultimately, the performance criteria of electric vehicles can beat any comparably powered ICE vehicle.</span></h4>
<div class="MsoNormal">
<div style="text-align: justify;">
<b style="text-align: left;"><span style="font-family: "calibri" , "sans-serif"; font-size: 14pt; line-height: 21.4667px;">More Efficiency</span></b></div>
<div style="text-align: justify;">
<b style="text-align: left;"><span style="font-family: "calibri" , "sans-serif"; font-size: 14pt; line-height: 21.4667px;"><br /></span></b></div>
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhH7_87W2XeNR2FuVSP5xysI_Zcjf72AOpV01sFk-Wf4hb5O-Vj1jUtCl0WTrj4uOCpssDvfsGxtSmSa0QBHEO5KkUN4DgEqAonvxUsaoyKPDwzmcgQolCmiXNjRioHDtpgDVHvcNc7qXI/s1600/More+Efficiency.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img alt="Efficiency" border="0" data-original-height="400" data-original-width="700" height="363" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhH7_87W2XeNR2FuVSP5xysI_Zcjf72AOpV01sFk-Wf4hb5O-Vj1jUtCl0WTrj4uOCpssDvfsGxtSmSa0QBHEO5KkUN4DgEqAonvxUsaoyKPDwzmcgQolCmiXNjRioHDtpgDVHvcNc7qXI/s640/More+Efficiency.png" title="Efficiency" width="640" /></a></div>
<div>
<b><span style="font-family: "calibri" , "sans-serif"; font-size: 14pt; line-height: 21.4667px;"><br /></span></b></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "calibri" , "sans-serif"; font-size: 12pt; line-height: 18.4px;">A plug-in vehicle can travel 240 miles on similar energy of two US gallons of gas, which makes it highly efficient as per <b><a href="https://muckrack.com/rogersamara" target="_blank">new technology</a></b>. A study revealed that electric car has shown four times more efficient as compared to the ICEs. Also, Plug-in vehicles can cost almost half or less to be operated as gas-powered vehicles efficiently. Moreover, EV has a much simpler and more efficient motor along with less working parts. EVs are also silent in nature, i.e produces very less sound from diesel engines.<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<h4 style="text-align: left;">
<b><span style="font-family: "calibri" , "sans-serif"; font-size: 14pt; line-height: 21.4667px;">Maintenance</span></b></h4>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbjIcIYegD3BluSEBKLm2dQbOrg-phkGeDoNLq-Zf2jUYxqsfxLxpfpV_Y1-AIZgLfKPqigiiG1Slw4ErofULQ2iJFPJIfaA1qLIpJvqRFoRZ9O7QnvoHbGtdWd9TuADrc4GKjZe2y0ws/s1600/Maintenance.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img alt="Maintenance" border="0" data-original-height="437" data-original-width="635" height="440" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbjIcIYegD3BluSEBKLm2dQbOrg-phkGeDoNLq-Zf2jUYxqsfxLxpfpV_Y1-AIZgLfKPqigiiG1Slw4ErofULQ2iJFPJIfaA1qLIpJvqRFoRZ9O7QnvoHbGtdWd9TuADrc4GKjZe2y0ws/s640/Maintenance.jpg" title="Maintenance" width="640" /></a></div>
<div>
<b><span style="font-family: "calibri" , "sans-serif"; font-size: 14pt; line-height: 21.4667px;"><br /></span></b></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "calibri" , "sans-serif"; font-size: 12pt; line-height: 18.4px;">When talking about the maintenance part of an Electric vehicle, it is much effortless and also inexpensive. As EV constitute a single moving part in an electric motor and do not utilize oil, it costs much less to maintain. Moreover, It uses a solar panel to charge and its batteries are utilized to power or as a backup source. Plug-in vehicles require regular maintenance for windshield wipers along its tires and not much.</span><b><span style="font-family: "calibri" , "sans-serif"; font-size: 14pt; line-height: 21.4667px;"><o:p></o:p></span></b></div>
<div class="MsoNormal">
<br /></div>
<h4 style="text-align: left;">
<b><span style="font-family: "calibri" , "sans-serif"; font-size: 14pt; line-height: 21.4667px;">Reliability</span></b></h4>
<div class="MsoNormal">
<span style="font-family: calibri, sans-serif; font-size: 12pt; text-align: justify;">Just because of Electric vehicles simplicity and smooth working it stand more reliable than any internal combustion or diesel engines. For instance, we cannot change or pull if an airplane engine fails, Electric vehicles win in that case. They are much simpler than we expect, with less of working parts than a piston engine. One can simply rely on</span><span style="font-family: calibri, sans-serif; font-size: 12pt; text-align: justify;"> </span><b style="font-family: calibri, sans-serif; font-size: 12pt; text-align: justify;">Electric cars </b><span style="font-family: calibri, sans-serif; font-size: 12pt; text-align: justify;">just because it has no complex working and also they are user-friendly.</span><br />
<span style="font-family: calibri, sans-serif; font-size: 12pt; text-align: justify;"><br /></span></div>
<div class="MsoNormal">
<b><span style="font-family: "calibri" , "sans-serif"; font-size: 14pt; line-height: 21.4667px;">Environment</span></b></div>
<div class="MsoNormal">
<span style="font-family: calibri, sans-serif; font-size: 12pt; text-align: justify;">No doubt, Electric vehicles hold a big part of Green energy revolution trend, and its values have continued to rise. On testing, they are known to emit 85% fewer emissions as compared to the diesel or internal combustion engine. Due to which electricity generation has proved to be cleaner as electric vehicles are getting more efficient. While considering the environment factor electric vehicles can easily take up the place from other engines.</span></div>
<div class="MsoNormal">
<br /></div>
<h4 style="text-align: left;">
<b><span style="font-family: "calibri" , "sans-serif"; font-size: 14pt; line-height: 21.4667px;">The Wrap Up</span></b></h4>
<h4 style="text-align: justify;">
<span style="font-weight: normal;">In the upcoming years, we hope Electric Cars will rule the roads. Knowing that they are much reliable, eco-friendly, have high performance and are efficient.<span style="font-family: calibri, sans-serif; font-size: 12pt; text-align: justify;"> </span><span style="font-family: calibri, sans-serif; font-size: 12pt; text-align: justify;">Roger Samara</span><span style="font-family: calibri, sans-serif; font-size: 12pt; text-align: justify;"> </span><span style="font-family: calibri, sans-serif; font-size: 12pt; text-align: justify;">says Electric Vehicles will soon become a primary source of transport on our roads. What is your opinion? Do share with us!</span></span></h4>
<div class="MsoNormal">
<div class="separator" style="clear: both; text-align: center;">
</div>
<div style="text-align: justify;">
<br /></div>
</div>
<div class="MsoNormal">
<b><span style="font-family: "calibri" , "sans-serif"; font-size: 12pt; line-height: 18.4px;">We Hope You Liked It! Don’t Forget To Comment Below!<o:p></o:p></span></b></div>
<div class="MsoNormal">
<br /></div>
<br />
<div class="MsoNormal">
<b><span style="font-family: "calibri" , "sans-serif"; font-size: 12pt; line-height: 18.4px;">Source By: </span></b><a href="https://www.allperfectstories.com/electric-cars-rule-the-roads-5-years/">https://www.allperfectstories.com/electric-cars-rule-the-roads-5-years/</a></div>
</div>
Roger Samarahttp://www.blogger.com/profile/00546007119424295915noreply@blogger.com0tag:blogger.com,1999:blog-7313248531468171079.post-13172006397013303052019-03-31T23:54:00.000-07:002019-03-31T23:55:21.369-07:00Electric Cars to Rule the Roads within 5 Years<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh155tZYwTWJxIw8ruxuVs7FecG5XuAC-TVUhN2HQUDY8blmTQBoBp7AhgZ4y4PmSUaVC2vV37LH4So1vq8OeNXfGj3pUYS53zwEUCVK0gWITlXZ14_sBNCkSwOVLsfL6E_s-yQ9DlhXqo/s1600/ferrari+-+Roger+Samara.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img alt="electric car - Roger Samara" border="0" data-original-height="1067" data-original-width="1600" height="266" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh155tZYwTWJxIw8ruxuVs7FecG5XuAC-TVUhN2HQUDY8blmTQBoBp7AhgZ4y4PmSUaVC2vV37LH4So1vq8OeNXfGj3pUYS53zwEUCVK0gWITlXZ14_sBNCkSwOVLsfL6E_s-yQ9DlhXqo/s400/ferrari+-+Roger+Samara.jpeg" title="electric car - Roger Samara" width="400" /></a></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "calibri" , "sans-serif"; font-size: 12.0pt; line-height: 115%;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "calibri" , "sans-serif"; font-size: 12.0pt; line-height: 115%;">Plug-in or Electric Vehicles have shown a tremendous rise on roads from the last year. Needless to say, if someone needs to buy a new car he will prefer an electric one over fuel in the modern era.</span><b><span style="font-family: "calibri" , "sans-serif"; font-size: 14.0pt; line-height: 115%;"> </span></b><span style="font-family: "calibri" , "sans-serif"; font-size: 12.0pt; line-height: 115%;">A study proved that people worldwide shows strong support for more electric cars than fuel vehicles. While claiming for the reason of more sale of electric cars, environment-friendly is one of them. </span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "calibri" , "sans-serif"; font-size: 12.0pt; line-height: 115%;"><br /></span></div>
<h3 style="text-align: justify;">
<span style="font-family: "calibri" , "sans-serif"; font-size: 12.0pt; line-height: 115%;">We have listed some of the reasons suggested by <b><a href="https://www.saatchiart.com/rogersamara" target="_blank">Roger Samara</a></b>.</span></h3>
<h4 style="text-align: left;">
<b><span style="font-family: "calibri" , "sans-serif"; font-size: 14.0pt; line-height: 115%;">Performance</span></b></h4>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "calibri" , "sans-serif"; font-size: 12.0pt; line-height: 115%;">In terms of performance, electric cars have proven to be excellent as compared to fuel cars, it is generally said by users. As electric is able to produce 100% torque from zero to full speed while in fuel torque increases as RPM rises. Due to this energy, the vehicle is derived forward rather than losing its energy in friction or heat. Ultimately, the performance criteria of electric vehicles can beat any comparably powered ICE vehicle.</span><b><span style="font-family: "calibri" , "sans-serif"; font-size: 14.0pt; line-height: 115%;"><o:p></o:p></span></b></div>
<div class="MsoNormal">
<br /></div>
<h4 style="text-align: left;">
<b><span style="font-family: "calibri" , "sans-serif"; font-size: 14.0pt; line-height: 115%;">More Efficiency</span></b></h4>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhH7_87W2XeNR2FuVSP5xysI_Zcjf72AOpV01sFk-Wf4hb5O-Vj1jUtCl0WTrj4uOCpssDvfsGxtSmSa0QBHEO5KkUN4DgEqAonvxUsaoyKPDwzmcgQolCmiXNjRioHDtpgDVHvcNc7qXI/s1600/More+Efficiency.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img alt="Efficiency" border="0" data-original-height="400" data-original-width="700" height="227" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhH7_87W2XeNR2FuVSP5xysI_Zcjf72AOpV01sFk-Wf4hb5O-Vj1jUtCl0WTrj4uOCpssDvfsGxtSmSa0QBHEO5KkUN4DgEqAonvxUsaoyKPDwzmcgQolCmiXNjRioHDtpgDVHvcNc7qXI/s400/More+Efficiency.png" title="Efficiency" width="400" /></a></div>
<div>
<b><span style="font-family: "calibri" , "sans-serif"; font-size: 14.0pt; line-height: 115%;"><br /></span></b></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "calibri" , "sans-serif"; font-size: 12.0pt; line-height: 115%;">A plug-in vehicle can travel 240 miles on similar energy of two US gallons of gas, which makes it highly efficient as per <b><a href="https://muckrack.com/rogersamara" target="_blank">new technology</a></b>. A study revealed that electric car has shown four times more efficient as compared to the ICEs. Also, Plug-in vehicles can cost almost half or less to be operated as gas-powered vehicles efficiently. Moreover, EV has a much simpler and more efficient motor along with less working parts. EVs are also silent in nature, i.e produces very less sound from diesel engines.<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<h4 style="text-align: left;">
<b><span style="font-family: "calibri" , "sans-serif"; font-size: 14.0pt; line-height: 115%;">Maintenance</span></b></h4>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbjIcIYegD3BluSEBKLm2dQbOrg-phkGeDoNLq-Zf2jUYxqsfxLxpfpV_Y1-AIZgLfKPqigiiG1Slw4ErofULQ2iJFPJIfaA1qLIpJvqRFoRZ9O7QnvoHbGtdWd9TuADrc4GKjZe2y0ws/s1600/Maintenance.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img alt="Maintenance" border="0" data-original-height="437" data-original-width="635" height="275" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbjIcIYegD3BluSEBKLm2dQbOrg-phkGeDoNLq-Zf2jUYxqsfxLxpfpV_Y1-AIZgLfKPqigiiG1Slw4ErofULQ2iJFPJIfaA1qLIpJvqRFoRZ9O7QnvoHbGtdWd9TuADrc4GKjZe2y0ws/s400/Maintenance.jpg" title="Maintenance" width="400" /></a></div>
<div>
<b><span style="font-family: "calibri" , "sans-serif"; font-size: 14.0pt; line-height: 115%;"><br /></span></b></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "calibri" , "sans-serif"; font-size: 12.0pt; line-height: 115%;">When talking about the maintenance part of an Electric vehicle, it is much effortless and also inexpensive. As EV constitute a single moving part in an electric motor and do not utilize oil, it costs much less to maintain. Moreover, It uses a solar panel to charge and its batteries are utilized to power or as a backup source. Plug-in vehicles require regular maintenance for windshield wipers along its tires and not much.</span><b><span style="font-family: "calibri" , "sans-serif"; font-size: 14.0pt; line-height: 115%;"><o:p></o:p></span></b></div>
<div class="MsoNormal">
<br /></div>
<h4 style="text-align: left;">
<b><span style="font-family: "calibri" , "sans-serif"; font-size: 14.0pt; line-height: 115%;">Reliability</span></b></h4>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "calibri" , "sans-serif"; font-size: 12.0pt; line-height: 115%;">Just because of Electric vehicles simplicity and smooth working it stand more reliable than any internal combustion or diesel engines. For instance, we cannot change or pull if an airplane engine fails, Electric vehicles win in that case. They are much simpler than we expect, with less of working parts than a piston engine. One can simply rely on <b>Electric cars </b>just because it has no complex working and also they are user-friendly.<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<h4 style="text-align: left;">
<b><span style="font-family: "calibri" , "sans-serif"; font-size: 14.0pt; line-height: 115%;">Environment</span></b></h4>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "calibri" , "sans-serif"; font-size: 12.0pt; line-height: 115%;">No doubt, Electric vehicles hold a big part of Green energy revolution trend, and its values have continued to rise. On testing, they are known to emit 85% fewer emissions as compared to the diesel or internal combustion engine. Due to which electricity generation has proved to be cleaner as electric vehicles are getting more efficient. While considering the environment factor electric vehicles can easily take up the place from other engines.</span><b><span style="font-family: "calibri" , "sans-serif"; font-size: 14.0pt; line-height: 115%;"><o:p></o:p></span></b></div>
<div class="MsoNormal">
<br /></div>
<h4 style="text-align: left;">
<b><span style="font-family: "calibri" , "sans-serif"; font-size: 14.0pt; line-height: 115%;">The Wrap Up</span></b></h4>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "calibri" , "sans-serif"; font-size: 12.0pt; line-height: 115%;">In the upcoming years, we hope Electric Cars will rule the roads. Knowing that they are much reliable, eco-friendly, have high performance and are efficient. <b>Roger Samara</b> says Electric Vehicles will soon become a primary source of transport on our roads. What is your opinion? Do share with us!<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b><i><span style="font-family: "calibri" , "sans-serif"; font-size: 12.0pt; line-height: 115%;">We Hope You Liked It! Don’t Forget To Comment Below!<o:p></o:p></span></i></b></div>
<div class="MsoNormal">
<br /></div>
<br />
<div class="MsoNormal">
<b><span style="font-family: "calibri" , "sans-serif"; font-size: 12.0pt; line-height: 115%;">Source By: <o:p></o:p></span></b><a href="https://rogersamara.wordpress.com/2019/04/01/will-electric-vehicles-take-over-the-world/">https://rogersamara.wordpress.com/2019/04/01/will-electric-vehicles-take-over-the-world/</a></div>
</div>
Roger Samarahttp://www.blogger.com/profile/00546007119424295915noreply@blogger.com0tag:blogger.com,1999:blog-7313248531468171079.post-46803123438029448992018-12-19T22:36:00.000-08:002018-12-19T22:37:25.576-08:00Basic Things You Should Know About Data Science<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOysZx-VRhSCZ2UZnzHoYK5ZgPTwL3iS81TVvRRhoSTdiQfkwEzTib6DfeUsHr-oGkwi8YzuxsAN_2qrtoqCCkZ13_sFxP9VVXNLAEtmnCjDTIQFk9HWo5j94bjP9QJhbvgq9uNZ6hx9w/s1600/data+science+-+roger+samara.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1067" data-original-width="1600" height="266" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOysZx-VRhSCZ2UZnzHoYK5ZgPTwL3iS81TVvRRhoSTdiQfkwEzTib6DfeUsHr-oGkwi8YzuxsAN_2qrtoqCCkZ13_sFxP9VVXNLAEtmnCjDTIQFk9HWo5j94bjP9QJhbvgq9uNZ6hx9w/s400/data+science+-+roger+samara.jpeg" width="400" /></a></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 150%;"><br /></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 150%;">Around 6 billion and more devices connected to the internet at present, as much as 2.5 million terabytes of data are produced each day. By 2020, a lot more devices are expected to get linked, evaluating an estimate of around 30 million terabytes of data each day.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 150%;"><br /></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 150%;">As a tech lover or an IT professional, this should make you curious to explore more. So, if you’re someone who is curious to know more about Data Science.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 150%;"><br /></span></div>
<h3 style="line-height: 150%; text-align: left;">
<b><span lang="EN-US" style="font-size: 12.0pt; line-height: 150%;">Let’s explore a few basic things about data science with Roger Samara.</span></b></h3>
<h4 style="line-height: 150%;">
<b><span lang="EN-US" style="font-size: 12.0pt; line-height: 150%;">What actually is Data Science all about?</span></b></h4>
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 150%;">It has become a hot topic when it comes to <b><a href="https://www.youtube.com/watch?v=OjkmVDUTDsY" target="_blank">new technology</a></b> and trends in the Information Technology world. This is common with many technologies which individuals start discussing as nonsense without having actual knowledge of what is meant by the technology, what comes within its scope and so on. Therefore it is essential to discuss in a bit of detail. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 150%;"><br /></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 150%;">The confusion arises at the point when you consider data science as part of today's technical scenario. It comes with its numerous components. Every time when people talk about the constituents of data science, they actually talking about big data. At the same time, they are talking about several jobs that form part of Data Science - what really is a role of Data Scientist's what actually is the Data Curator's role, what particularly id the Data Librarian's role and so on. At present scenario when you talk about it as a field within itself, it mainly deals with large chunks of data.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 150%;"><br /></span></div>
<h4 style="line-height: 150%; text-align: left;">
<b><span lang="EN-US" style="font-size: 12.0pt; line-height: 150%;">Hadoop's role when you talk about Data Science</span></b></h4>
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 150%;">It basically alludes to huge information and vast amounts of frameworks which are utilized to grapple with this large data. There are a significant number of structures which are existing, and they happen to have their very own pros and cons. Hadoop is the most far-reaching and mainstream structure. At whatever point you talk about data science, you talk about the various examination, which you have worked on this substantial amount of data - you truly can't escape Hadoop. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 150%;"><br /></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 150%;">Every time when you perform a statistical examination, there is no need to care about Hadoop or any such structure for big data. However, Data Science happens to be an alternate creature. Likewise, Hadoop is created in Java, so it will truly help on the off chance that you comprehend Java too.<o:p></o:p></span></div>
<h4 style="line-height: 150%; text-align: left;">
<b><span lang="EN-US" style="font-size: 12.0pt; line-height: 150%;">What is R in Data Science?</span></b></h4>
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 150%;">R is really a programming language for figures. Avoiding R is not a good idea since when you speak of different algorithms you have to apply over this large range of data in for you to have the capacity to get to the bits of knowledge of this information or essentially to empower certain machine learning algorithms over its highest point, you have to employ the services of R.<o:p></o:p></span></div>
<h4 style="line-height: 150%; text-align: left;">
<b><span lang="EN-US" style="font-size: 12.0pt; line-height: 150%;">What is Apache Mahout?</span></b></h4>
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 150%;">Apache Mahout happens to be a library utilized for machine learning. It has been produced by Apache. Presently, what are the purposes behind getting so much popularity? What decisively are the causes behind it? The genuine sauce is that it specifically incorporates to science. It is truly not just about the sheer volume of information. It is extremely about getting helpful bits of knowledge from a given set of data. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%;">
<br /></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 150%;">Mahout happens to have an immediate vital condition with Hadoop that enables it to utilize Hadoop's capacity of preparing in executing its algorithm on big data. According to <b>Roger Samara</b>, on the off chance that you investigate enormous organizations including Facebook and LinkedIn, you will experience Mahout Implementations.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 150%;"><br /></span></div>
<b><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 12.0pt; line-height: 107%;">Source By: <a href="https://www.allperfectstories.com/know-about-data-science/" target="_blank">Roger Samara</a><br />
<!--[if !supportLineBreakNewLine]--><br />
<!--[endif]--></span></b></div>
Roger Samarahttp://www.blogger.com/profile/00546007119424295915noreply@blogger.com0tag:blogger.com,1999:blog-7313248531468171079.post-4176765634166668792018-07-24T04:07:00.001-07:002018-07-24T04:07:19.984-07:00How Mellanox Technologies Beating Other Computer and Technology Stocks? <div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">The demand
for more computing power, effectiveness and scalability are continually
accelerating in the HPC, cloud, Web 2.0, data analytics, machine learning etc.
In order to address these demands, Mellanox provides the complete solution
emphasis, <b style="mso-bidi-font-weight: normal;"><a href="https://medium.com/@rogersamara" target="_blank">Roger Samara</a></b>.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">The
computer and technology group has a lot of stocks. Still, the investors always
look for the companies that are outperforming their peers. Chances are the
question “Is Mellanox one of these stocks right now” strike in your mind. And
it is necessary to take a glance at the company’s performance in contrast to
the rest of the computer and technology sector in order to get the answer to
your questions.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://vimeo.com/samararoger" target="_blank"><img border="0" data-original-height="954" data-original-width="1430" height="266" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgelJ0So67QUYjUw_o9bmVoUoWJEvUo2XgFnhOx4buXFRdo8PO5s-yPxF-_D53N5Vn2FhiB5-b-LU9te56puCA0rvQpt2FmCJjdl4d5QWI8zkGjHNK5BssRK9mvwBxMubi_Htj_y3cuoqI/s400/computer.jpg" width="400" /></a></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<br /><br />
<br />
<h3 style="text-align: justify;">
<b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="font-size: 14pt; line-height: 107%;">Let’s know about Mellanox
Technologies in detail:</span></b></h3>
<br />
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">Mellanox
Technologies (MLNX) is one of the best among 627 companies in the computer and
technology group. The industry is the top leading dealer of the end to end
InfiniBand and Ethernet smart interrelate solutions or services. These
suppliers increase data center efficacy by providing the uppermost throughput
and lowest latency.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">This
computer and technology group recently sits at #4 within the Zacks Sector Rank.
Actually, the Zacks Sector Rank contemplate 16 different groups. And this is
done by evaluating the average Zacks Rank of every stock within the sector to
measure the strength of each group.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">In fact,
the Zacks Rank emphasis earnings approximations and estimate amendments to find
the stocks with improving earnings outlooks. This system has a long record of
accomplishment and these stocks tend to be on the path to weary the market over
the next one to three months. Mellanox technologies now sporting a Zacks Rank
of #1, says <b>Roger Samara</b>.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">The Zacks
Consensus estimate that MLNX’s full-year incomes have risen 11.03% higher over
the past three months. This indicates that predictor sentiment is improving as
well as the stocks earnings outlook is more optimistic.<o:p></o:p></span></div>
</div>
<br />
<br />
<h4 style="text-align: justify;">
<b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">At the end</span></b></h4>
<br />
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">On the
basis of most current data, Mellanox Technologies has reimbursed 29.21% so far
this year. And in comparison to MLNX, computer and technology corporations have
returned an average of 10.33%. This means that Mellanox Technologies is
overtaking the sector as a whole this year. <o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">Looking
more precisely, MLNX belongs develop, manufacture and sale of interconnected
products. This includes adapter cards, switch systems, cables, modules etc. The
semiconductors industry comprises 33 distinct stocks and presently sits at #100
in the Zacks Industry Rank.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">This group
has mislaid an ordinary of 7.59% so far this year and it means Mellanox
Technologies is performing better in this area. Hence, the stockholders with
the curiosity in Computer and Technology stocks should continue to trail MLNX
suggest <b><a href="https://www.levo.com/roger-samara" target="_blank">Roger Samara</a></b>. The stock will
be considered to continue its unshakable performance.<o:p></o:p></span></div>
</div>
<br /></div>
Roger Samarahttp://www.blogger.com/profile/00546007119424295915noreply@blogger.com0tag:blogger.com,1999:blog-7313248531468171079.post-74531684732857223962018-07-17T21:20:00.004-07:002018-07-17T21:20:43.280-07:00MORS Software Wins the Risk Technology Awards 2018<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
MORS has been awarded as “Bank ALM System of the year 2018” in the risk technology award. This software is a highly scalable solution that encounters a very large portion of ALM requirements in the banking sector. MORS is intentional for ease of use and cost efficiency along with a high level of computerization with low upkeep says, <b><a href="https://medium.com/@rogersamara" target="_blank">Roger Samara</a></b>.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Moreover, the system offers suppleness of configuration and reporting. In fact, a single core system supports a set of operational modules, like balance-sheet administration, liquidity risk management, funds transfer pricing and counterparty credit risk etc. Actually, data management and appeasement are generally automated.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
MORS imports data changes as they befall rather than importing the whole balance sheet at once. For wholesale banking dealings, like wholesale funding transactions, balance-sheet items are introducible in real time to have a substantial effect on the calculation results of key performance indicators, such as net interest income. Banking book dealings are usually introducible once or twice per day. Splitting the import as well as the frequency of data in this way evades load bottlenecks emphasis, Roger Samara.</div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhw8FxyWTH-xvkbxXOnwAtlzW0ntQBIT6NmRWLzpMeaxFYs8n0c0KJgUjtTvZDANyqZBGElNVXbM6O9MlL-i91PUZ7tsUWkbsgB1pZetANsndFoSuvfkknO0fx2iewuO3Sb2_Ju0Hke8_8/s1600/risk+technology.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1200" data-original-width="1600" height="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhw8FxyWTH-xvkbxXOnwAtlzW0ntQBIT6NmRWLzpMeaxFYs8n0c0KJgUjtTvZDANyqZBGElNVXbM6O9MlL-i91PUZ7tsUWkbsgB1pZetANsndFoSuvfkknO0fx2iewuO3Sb2_Ju0Hke8_8/s400/risk+technology.jpg" width="400" /></a></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<br /></div>
<h3 style="text-align: justify;">
Features of MORS software</h3>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
MORS’ real-time competences empower users to encounter internal and regulatory requirements for ad hoc and immediate what-if calculations. It also means the system can offer real-time monitoring and supervision of limit and early-warning levels, usually for interest rate risk and liquidness risk management ratios.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
In order to meet growing demand for interior and external controlling reporting, MORS’ offer rule engines. Using these engines the banks can define norms for new regulatory necessities and then run reports on their basis without upgrading the MORS software. The same rule engines are used for defining interior reporting needs and configuring calculations.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
MORS presently added its Interest Rate Risk Scenario Engine. This makes it easy and fast for banks to complete sophisticated and challenging ALM calculations. The calculations include income-based calculations like earnings-at-risk and value-based calculations like economic value of equity. Along with this, the engine allows banks to do dynamic balance-sheet projections, including dynamic balance-sheet evolution settings. Plus, MORS recently introduces progressive parallel processing competencies and the choice to deploy on Microsoft’s Azure cloud said, <b><a href="https://vimeo.com/samararoger" target="_blank">Roger Samara</a></b>.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<b>Let’s find out what Mika Mustakallio — chief executive of MORS Software says</b></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
According to him, MORS Software is the best Nordic solution provider for capital management, liquidity risk supervision and ALM in banks. It is based on intellectual and influential in-memory analytics. And offer real-time scrutiny and reporting throughout the entire bank, assimilating both capital and banking book sides of the bank.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Financial institutions use MORS in order to monitor, manage and optimize their performance and risk levels within exterior and interior constraints. The supple configurability of MORS software facilitates the informal alteration to any controlling necessities and other metrics. This software meets patrons’ ALM requirements by providing a modern and user-friendly solution. MORS scales from fulfilling particular ALM requirements of Tier 1 banks to the joint treasury and ALM requirements of smaller banks.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Banks emphasis on the overall cost of ownership means they are progressively looking to maximize the profit from any system. This is when the value of MORS is completely understandable, with its cohesive treasury and ALM system able to shelter numerous risks.</div>
<div style="text-align: justify;">
<br /></div>
<h3 style="text-align: justify;">
Bottom Lines</h3>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
The factor that presently driving alteration is the emphasis on user-friendly and flexible systems. Customers do not have time to regularly make software upgrades and improvements. And they need the aptitude to make variations to an ALM system. A lack of litheness in a system can delay firms’ replies to ad-hoc queries and capabilities to meet changing necessities. It is progressively comprehensible that ALM experts will need the aptitude to calculate five diverse rules rather than four.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
The ability to monitor everything in real time makes businesses agile. And from a risk administration perspective, it is essential considering the loss of revenue-producing breaks akin with holding needlessly high buffers. By vigorously handling risk in real time, companies can make better-informed choices.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
MORS Software offers a complete asset-liability management (ALM) system that is scalable, as well as user-friendly, says, <b><a href="https://www.levo.com/roger-samara" target="_blank">Roger Samara</a></b>. The software has won the reward for ALM system of the year following a current move to the cloud and preserving focus on providing clients capabilities for real-time monitoring. Chief executive Mika Mustakallio elucidates the essential trends and technological offerings above that the vendor sees as driving change.<br /><b><br /></b></div>
<div style="text-align: justify;">
<b>Originally Posted: <a href="https://medium.com/@rogersamara/mors-software-wins-the-risk-technology-awards-2018-ff875c8480c7">https://medium.com/@rogersamara/mors-software-wins-the-risk-technology-awards-2018-ff875c8480c7</a></b></div>
</div>
Roger Samarahttp://www.blogger.com/profile/00546007119424295915noreply@blogger.com0tag:blogger.com,1999:blog-7313248531468171079.post-82857687755242578562018-07-13T00:13:00.001-07:002018-07-13T00:13:23.053-07:003 Disruptive FinTech Technologies to Watch in 2018<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
The European Union’s General Data Protection Regulation (GDPR) is predictable to limit the amount of data businesses can use for data mining. However, new research proposes that it will actually be an advantage for the FinTech industry. According to <b><a href="https://www.levo.com/roger-samara" target="_blank">Roger Samara</a></b>, consequences of GDPR is that industries will have access to data from patrons using a translucent opt-in model. The report also highlights three technologies that are predictable to expand the usefulness of big data. Let’s have a look at these technologies which are disruptive to the FinTech market this year:</div>
<br />
<h3 style="text-align: left;">
Data mining in the GDPR Era: </h3>
<br />
<div style="text-align: justify;">
The aim of EU’s General Data Protection regulation is to protect the inhabitant’s personally identifiable information (PII). Actually, GDPR provides transparency around data use and give individuals the right to limit its use.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
The blockchain technology has the potential to support organizations in following with GDPR’s rules. And this technology has taken the corporate world by storm. The electronic discrete ledger technology can create an unassailable record for keeping the history of transactions. As that data or information is permanent, using blockchain technology to manage PII could run afoul of GDPR norms. But when PII data is kept distinct from the blockchain network, the technology becomes part of the solution for GDPR acquiescence.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
As GDPR already in influence, FinTechs are aware that data fissures will have greater consequences than ever. And they have to keep client consent at the forefront of their advertising crusades and approach. Data ruptures won’t just draw media coverage that could cause patrons to leave. But under GDPR, fines can be charged, as high as 4% of total revenue, which is a huge amount.</div>
<div style="text-align: justify;">
<br /></div>
<h3 style="text-align: left;">
GDPR is not just about major breaches</h3>
<br />
<div style="text-align: justify;">
When someone maneuvers his or her right to be forgotten, database records will have to be removed. And if blockchain is part of the particular system, a corporate blockchain administrator will require to confirm that any “on-chain” records become meaningless.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Luckily, there is a modest method for doing that. Data collectors have the opportunity to craft an open approach to consumer data while being suspicious of revealing user trust. Such a method combine transparency and honesty. Hence, the businesses who do not want to face patron backlash should seek to prioritize this.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
It’s not just theoretic. In reality, data mining operations have come under better scrutiny over the past year. For instance, the Facebook/Cambridge analytical disgrace causes a substantial backlash by customers and even harshly down Facebook’s share price. So, the businesses which strategies to execute GDPR restrictions would profit by vending technology for data mining.</div>
<br />
<h3 style="text-align: left;">
Decentralized Apps Will Detonate: </h3>
<br />
<div style="text-align: justify;">
This year will see a substantial growth in the deployment of Decentralised Apps (Dapps). Using blockchain as their fundamental technology, Dapps will create an inventive open-source software ecosystem, both secure and easy to develop for.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
These apps pool resources across several machines worldwide, hitching the power of thousands of idle processors. The consequences are applications which do not belong to a sole entity but are community-driven.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Similar to blockchain technology, Dapps are discrete across many nodes, making them enormously fault-tolerant while also translucent to customers. These apps will be more secure. Actually, the devolution will make hacking and scam less dominant as data kept on the blockchain cannot be changeable at a later date. These features will surely lead financial players and third parties to utilize the technology where safety is paramount.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Although the requirement to use crypto-based tokens as compensation could be a hurdle. And the desire for a safe, recorded series of procedures will drive adoption, with customers enthusiastic to spend for the profit.</div>
<br />
<h3 style="text-align: left;">
Quantum Supremacy: </h3>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
This year will see quantum supremacy, a quantum processor that can carry out tasks that are not practical with a traditional computer. It holds the promise of quickly solving composite algorithms, redefining areas such as FinTech, logistics, research and development etc.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Quantum computing works by utilizing essential particles such as electrons or photons with the notion that either their charge acts as a representation of 0 and/or 1. All these particles are called the quantum bit and how these acts form the foundation of quantum computing.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
As a consequence, quantum computing can solve far more composite problems than present binary computers can handle. Indeed, quantum machines are millions of times more influential than binary machines and have the perspective to affect and dislocate procedures across all industries.</div>
<br />
<h4 style="text-align: left;">
Wrapping Up</h4>
<br />
<div style="text-align: justify;">
These are the top 3 disruptive FinTech technologies that you will watch this year. These technologies offer more safe and responsive applications and exponentially raise computational performance. <b><a href="https://www.crunchbase.com/person/roger-samara" target="_blank">Roger Samara</a></b> has discussed the above technology. He is a computer savvy who is passionate about his work and the latest technological inventions. If you want more updates on technology, then stay in touch.</div>
<div style="text-align: justify;">
<b><br /></b></div>
<div style="text-align: justify;">
<b>Originally Posted: <a href="https://medium.com/roger-samara-computer-services/3-disruptive-fintech-technologies-to-watch-in-2018-10e5c139b846">https://medium.com/roger-samara-computer-services/3-disruptive-fintech-technologies-to-watch-in-2018-10e5c139b846</a></b></div>
</div>
Roger Samarahttp://www.blogger.com/profile/00546007119424295915noreply@blogger.com0tag:blogger.com,1999:blog-7313248531468171079.post-27991258218048620472018-07-06T21:52:00.001-07:002018-07-06T21:54:42.426-07:00Why it is Unproductive to Request Unhackable Technology<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">We have
seen ample of technologies in past few years and even many more are coming on
the way. These mouthwatering technologies have changed the way we live or work
says <b style="mso-bidi-font-weight: normal;"><a href="https://www.crunchbase.com/organization/roger-samara-33c2" target="_blank"><span style="color: #274e13;">Roger Samara</span></a></b>.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">For
instance, drone introduction is looking to disturb local distributions.
Biometric technology could make identity verification and individual security
far more progressive and reliable. Furthermore, self-driving cars could alter
the way people commute. Of course, in a few years, our homes might be
jam-packed with smart devices meant to automate as well as simplify the lives.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">But along
the way, customers and even business persons are obstructing the path toward
development by highlighting the dreads they have of these technologies
intrinsic vulnerabilities. However, it’s counterproductive to use these
vulnerabilities as points of dispute against the validity of the technology or
as hindrances to stop these technologies from becoming more accessible to
patrons.<o:p></o:p></span><br />
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://vimeo.com/samararoger" target="_blank"><img border="0" data-original-height="819" data-original-width="1024" height="318" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqjpSr4vYWcETXhvEBhugKyoAd_94Q-fAVz2D1hGKsjcrInLLaQAw_rEob7D1HxHWM2d1vUDAzW2Eg6-PQ8mZ-mHqacsJreBGDjDkAWi4Lzn8gmtv4to6RLGie43S-c7g4rJMUCTGKX5E/s400/Unhackable+Technology_.jpg" width="400" /></a></div>
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span>
<br />
<h2>
<b><i><span lang="EN-US" style="font-size: 14.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">Why it’s
unproductive to demand perfection</span></i></b></h2>
<div class="MsoNormal">
<b><i><span lang="EN-US" style="font-size: 14.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></i></b></div>
<div class="MsoNormal">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">In reality,
it’s bad to request hack-proof technology? After all, voicing a concern
shouldn’t be low if it means producing a better technology highlights <b><a href="https://www.levo.com/roger-samara" target="_blank"><span style="color: #274e13;">Roger Samara</span></a> </b>– a computer savvy. In
fact, there are some issues with making these demands including:<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<h3>
<b><span lang="EN-US" style="font-size: 14.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">• Limiting Interest in
Innovation</span></b></h3>
<div class="MsoNormal">
<b><span lang="EN-US" style="font-size: 14.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></b></div>
<div class="MsoNormal">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">Pushing for
innovative standards makes it less tempting to invest in the latest technology.
Actually, it will take more time and money to invest in a product before you
can start selling it. Also, there is no assurance you will get to a point that
will content customers as well as policymakers. Fact is, some companies like
Amazon will likely continue to follow novel technology no matter what kind of
opposition they face.<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<h3>
<b><span lang="EN-US" style="font-size: 14.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">• Putting the Burden
of Safety on Others</span></b></h3>
<div class="MsoNormal">
<b><span lang="EN-US" style="font-size: 14.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></b></div>
<div class="MsoNormal">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">This
mindset puts the burden of safety on other objects. If you are reluctant to
faith biometrics until the system is unforgeable, you are overlooking your own
accountability for security. For instance, it is not the company’s liability to
make sure every employee select a strong password and modify it frequently
emphasis <b>Roger Samara</b>. It’s not
their responsibility to ensure you are defending your own personal information.<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<h3>
<b><span lang="EN-US" style="font-size: 14.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">• Stirring the
Goalposts</span></b></h3>
<div class="MsoNormal">
<b><span lang="EN-US" style="font-size: 14.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></b></div>
<div class="MsoNormal">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">It is an
informal misconception in which an increasingly more intense series of evidence
is demanded earlier a claim is putative. Demanding progressively high standards
of safety is an illustration of this. Every time a novel technology attains
some milestone for customer defense or confidentiality, it’s not going to be
good enough for a proportion of the populace. This creates a boundless cycle
that can never be destroyed since even meeting impossibly high standards would
outcome in even higher standards being set.<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<h4>
<b><i><span lang="EN-US" style="font-size: 14.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">What we all
should do</span></i></b></h4>
<div class="MsoNormal">
<b><i><span lang="EN-US" style="font-size: 14.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></i></b></div>
<div class="MsoNormal">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">What does
this mean? Should we stop inquiries about new technologies, just to drive
further invention? Of course not! It is crucial that everyone including specialists
and non-experts be shrewd when assessing new technologies.<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">
</span><br />
<div class="MsoNormal">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">But there
is a need to comprehend that all technologies are integrally inadequate and
inherently susceptible. And that every step forward is going to unlock new
opportunities, both good and bad. Hence, <b><a href="https://medium.com/@rogersamara" target="_blank"><span style="color: #274e13;">Roger Samara</span></a></b> suggest it’s good to hold top engineers and businesspersons to high
standards, but not quixotically so.</span></div>
</div>
</div>
Roger Samarahttp://www.blogger.com/profile/00546007119424295915noreply@blogger.com0tag:blogger.com,1999:blog-7313248531468171079.post-21212804426706212532018-07-04T23:10:00.001-07:002018-07-06T21:55:12.402-07:00Top 4 Emerging Technology Trends for 2018<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
Welcome to the world of technology! Where everything is getting advanced and easier especially for the corporate world. Everyone knows that last year was a revolutionary year in terms of technology. According to <b><a href="https://vimeo.com/samararoger" target="_blank"><span style="color: #274e13;">Roger Samara</span></a></b>, this revolution is not going to end here. It is going to evolve in the year 2018 or beyond. At present, various industries are doing strategic planning to adapt these technologies with the motive to lead in the industry. However, what is more, important is to understand the new technology trends and how it can bring changes in the upcoming years. So, let’s check out few emerging technology trends.</div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://www.crunchbase.com/organization/roger-samara-33c2" target="_blank"><img border="0" data-original-height="694" data-original-width="1000" height="277" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibalGvGcl03vMhZN6ZxVdkyGjc159oM6m5FIxiQk10ls9wg519ertXwWPfvDa4KB0440o9lBf56w78FiLHYCKUlVIKAFyulLJs3qzIINQlKkaaOZLGoP2H41ZTl_hkfnvWownKiuNADzQ/s400/technology.jpg" width="400" /></a></div>
<div style="text-align: justify;">
<br /></div>
<h3 style="text-align: justify;">
These trends become the stepping stones for 2018, the technological evolution has led to 5 major trends for 2018,</h3>
<div style="text-align: justify;">
<br /></div>
<h3 style="text-align: justify;">
Intelligent Apps and Analytics</h3>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
A growing trend of AI in applications and services has become inevitable since 2017. AI has been involved in creating intelligent apps to provide human a better lifestyle. Whether it is virtual assistants or task performers, smart apps have the potential to transform the consumption of services. These intelligent apps use Natural Language Processing (NLP) to develop a contextual understanding of user interactions to have smart, human-like conversations.</div>
<div style="text-align: justify;">
<br /></div>
<h3 style="text-align: justify;">
Artificial intelligence</h3>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
A.I. will undoubtedly impact the world that we live in. And we can see the growing interest of businesses in artificial intelligence. Most organizations nowadays are continuously gathering information to build AI strategies to lead in the industry. Further, the usage AI strategies are rapidly moving from understanding user voice to performing human tasks that will soon increase machine-human interaction.</div>
<div style="text-align: justify;">
<br /></div>
<h3 style="text-align: justify;">
Digital Twins</h3>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
In the digital world, digital twins refer to the replica of physical assets. Constantly updated from multiple sources, it uses sensor data to update. With the rise of Internet usage, today digital twins have evolved from being a concept into reality. According to the prediction of experts like <b><a href="https://medium.com/@rogersamara" target="_blank"><span style="color: #274e13;">Roger Samara</span></a></b>, most of the industries will use digital twins by 2021 which ultimately improve the effectiveness of the organization. In the era of internet, technology has evolved in different ways that help different industries including Healthcare, Automotive, Telecommunication, etc.</div>
<div style="text-align: justify;">
<br /></div>
<h3 style="text-align: justify;">
Blockchain</h3>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
The growth of Blockchain is a new revolution in the industries. As it by enables smooth interactions among commercial parties outside the system. Regardless to say, blockchain is more than the virtual currencies. In simple terms, it is a new form of accounting: triple entry, in the comparison of basic or double entry. Double-entry accounting solved the problem of companies going under by forcing them to write down not only money going in and out but also what that money was used for. In a similar way. It tracks who buys assets from whom. For example, in the transaction log of Bitcoin, you can see that you bought or sold Bitcoin and who the other party was. Furthermore, it accomplishes this without the need of a central manager.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<b>Originally Posted: <a href="https://rogersamara.wordpress.com/2018/07/04/top-4-emerging-technology-trends-for-2018/">https://rogersamara.wordpress.com/2018/07/04/top-4-emerging-technology-trends-for-2018/</a></b></div>
</div>
Roger Samarahttp://www.blogger.com/profile/00546007119424295915noreply@blogger.com0Montreal, QC, Canada45.5016889 -73.56725599999998645.145911899999994 -74.212702999999991 45.8574659 -72.921808999999982tag:blogger.com,1999:blog-7313248531468171079.post-11334638732266199512018-06-27T02:55:00.002-07:002018-07-06T21:55:26.510-07:00Smart Home Technology - A Weapon for Domestic Abuse<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">The growing
popularity of smart home technology has given rise to something dangerous i.e.
internet connected abuse. In fact, the technology designed to make the home
life easier is being used as a tool for domestic abuse.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">According
to a report, internet-connected household objects such as lights and
thermostats can be controllable remotely. And some individuals using them as a
mean to harass, monitor or control their victims says <b style="mso-bidi-font-weight: normal;"><a href="https://www.behance.net/rogersamara" target="_blank"><span style="color: #274e13;">Roger Samara</span></a></b>.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<b style="mso-bidi-font-weight: normal;"><i style="mso-bidi-font-style: normal;"><span lang="EN-US" style="font-size: 14.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></i></b></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://www.facebook.com/public/Roger-Samara" target="_blank"><img border="0" data-original-height="1000" data-original-width="1500" height="266" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5uDkx4IzZNrBFecx9ShWtoYyst_XYMYQW76faYZpFabb7lNOrVn14lOx9pbBuXgcSS5qo72ypUNCyGC7SKEPCI5qbGhjRYa1D5I4dCsok7m78DC6cBpRUzrSsp3-OXt8BlGDON24x6f8/s400/smart-home-control.jpg" width="400" /></a></div>
<div class="MsoNormal" style="text-align: justify;">
<b style="mso-bidi-font-weight: normal;"><i style="mso-bidi-font-style: normal;"><span lang="EN-US" style="font-size: 14.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></i></b></div>
<div class="MsoNormal" style="text-align: justify;">
<b style="mso-bidi-font-weight: normal;"><i style="mso-bidi-font-style: normal;"><span lang="EN-US" style="font-size: 14.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></i></b></div>
<h2 style="text-align: justify;">
<b style="mso-bidi-font-weight: normal;"><i style="mso-bidi-font-style: normal;"><span lang="EN-US" style="font-size: 14.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">What is Smart
Home Tech domestic Abuse?</span></i></b></h2>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">Digital
technology is progressively used in domestic and family violence, and so-called
"smart home gadgets" could make it worse. The smart home devices
domestic abuse is the use of smart home devices to stalk, monitor, and threaten
individuals.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">For
instance, if your thermostat kicking up to 100 degrees or music suddenly blast
in the home. These are some of the ways domestic abusers are frightening their
targets. For the domestic abusers, it is actually inexpensive as well as easy
to carry out. In fact, at the moment this has become a common form of domestic
and family ferocity.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<h3 style="text-align: justify;">
<b style="mso-bidi-font-weight: normal;"><i style="mso-bidi-font-style: normal;"><span lang="EN-US" style="font-size: 14.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">Domestic
Abuse via smart home devices affect women more than men</span></i></b></h3>
<div class="MsoNormal" style="text-align: justify;">
<b style="mso-bidi-font-weight: normal;"><i style="mso-bidi-font-style: normal;"><span lang="EN-US" style="font-size: 14.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></i></b></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">The
domestic abusers are utilizing the likes of internet-connected doorbells,
lights, thermostats, speakers, and other smart home devices to harass their
partners. Let’s know how:<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">One lady
says that her air conditioning turns off or on without her controlling. Another
woman reported her front door lock cipher regularly changed emphasis, <b style="mso-bidi-font-weight: normal;">Roger Samara</b>.<span style="mso-spacerun: yes;"> </span>A report also says that doorbell constantly
rang when no one was there. Moreover, one lady tells that she resorted to
towing her smart thermostat out of the wall.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">The people
working at abuse helplines says that they saw an upsurge in the call than last
year regarding individuals who did not have control over their smart home
devices. The callers say that the abusers are controlling them distantly
through the smart home system.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<h3 style="text-align: justify;">
<b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="font-size: 14.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">Bottom Lines</span></b></h3>
<div class="MsoNormal" style="text-align: justify;">
<b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="font-size: 14.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></b></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">Advancement
in technology like smart home tech is both a blessing as well as a curse for
the targets of domestic ferocity. And the lack of knowledge how smart
technology works make the things worse. Fact is, the people who face the
domestic abuse of smart home tech products are unaware of how to deal with this
kind of behavior and how to make it stop.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">Educating
yourself is one of the best ways to make your smart home a safe place to live, suggest
a computer savvy, <b style="mso-bidi-font-weight: normal;"><a href="https://medium.com/@rogersamara" target="_blank"><span style="color: #274e13;">Roger Samara</span></a></b>. And
if someone else set up the smart devices in your home, then begin from scratch.
You should reset all the devices and watch online videos in order to learn how
to set up them on your own.<o:p></o:p></span></div>
<br /></div>
Roger Samarahttp://www.blogger.com/profile/00546007119424295915noreply@blogger.com0tag:blogger.com,1999:blog-7313248531468171079.post-36507249009578873482018-06-19T22:00:00.002-07:002018-07-06T21:55:44.824-07:00Technology – Sword and Shield for Domestic Violence Victims<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">With
developing the recognition that domestic fierceness can be continued using
technology, there has been an upsurge of news stories that emphasis on how
criminals use it to compel and control victim’s, emphasis <b style="mso-bidi-font-weight: normal;">Roger Samara</b>.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">For
example, when a boy stole his ex-girlfriend’s laptop to monitor her social
media messages. Or if a husband installs GPS tracking system in daughter’s toy
in order to know his wife’s whereabouts without her information. However, there
is substantial potential for victims to use technology in order to hold abusers
accountable.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://vimeo.com/samararoger" target="_blank"><img border="0" data-original-height="463" data-original-width="926" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEik3A-PQFxo8QAFVNKB65KFPgpXV_Pyw-_saNsFj-l53Thg5TAs2CaX16oo84oKSdhYYDV-XPloFKwGMKRrWMXWwdDFcd7LbTyY56oBg3iAbqa12kEDyuP4bH4FYb9TBfS-v3AijvNgPeQ/s400/technology.jpg" width="400" /></a></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<br />
<br />
<br />
<h2 style="text-align: justify;">
<b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="font-size: 12pt; line-height: 107%;">Technology -
A sword and shield for the victim?</span></b></h2>
<br />
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">Individuals
facing domestic ferocity can make use of technology as a sword as well as the
shield. Following are some ways technology can protect, empower and improve
victim’s access to justice:<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
</div>
<ul>
<li>The technological advancement gives victims
remote access to services.</li>
<li>Different available apps and online
websites connect victims with service providers or support group.</li>
<li>CCTV cameras and GPS tracking devices can
attentive victims and authorities if an abuser is approaching.</li>
<li>Through available applications, victims can
stay in touch with family and friends.</li>
<li>Victims and police can now record the prevalence
of domestic ferocity emphasis <b style="font-size: 12pt;"><a href="https://rogersamara.blogspot.com/" target="_blank"><span style="color: #274e13;">Roger Samara</span></a>.</b></li>
</ul>
<br />
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">
</span></div>
<br />
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">According
to a recent study of 65 people, 18 victim says they have used technology to
make recordings of their abuser's behavior for numerous purposes. Causes
comprise the gathering of proof to use in court, convincing themselves their
ex-partner is, in fact, abusive and for the purpose of talking to the police
and lawyers. Apps including iMatter, Smartsafe and Aurora are best applications
for contact in an emergency situation.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"></span></div>
<h3 style="text-align: justify;">
<b><i><span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">Government
support for tech solutions</span></i></b></h3>
<div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">The
government seem like leading the way in the utilization of technology to tackle
domestic fierceness. Moreover, it has enthusiastically comprised technology as
part of its personal safety initiative. And this aims to protect children as
well as women from family ferocity in their own residences.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">Strategies
used to help attain this goal include the installation of CCTV cameras in
victim’s home to frighten abusers from breaking defence orders. In fact,
Victoria forces will attire the camera while appearing in family violence
incidents highlights <b>Roger Samara</b>.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"></span></div>
<div class="MsoNormal" style="text-align: justify;">
<b><i><span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">Why is technology
not cure?<o:p></o:p></span></i></b></div>
</div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">It would be
mistaken to trust technology will fix the problem of domestic fierceness. The
axiom “prevention is better than cure” is correct. Fighting victim-blaming
attitudes and teaching directed at the civic are important in averting domestic
violence.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">In fact,
technology has its drawbacks. For instance, CCTV cameras and GPS tracking
devices are prone to technical problems. Due to this reasons, these devices are
not able to send timely alerts to authorities. Hence, these technological
devices give the victim a wrong sense of security.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">Another
problem is that every individual cannot afford or access these safety devices
without government funding. Therefore, whether these technological devices will
help less prosperous victims is a question that requires enquiry.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"></span></div>
<h3 style="text-align: justify;">
<b><span lang="EN-US" style="font-size: 14.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">Bottom Lines</span></b></h3>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">There is a
need to explore more inventive uses of technology in order to tackle the
domestic fierceness. You should research more to scrutinize the efficiency of
technology in averting domestic ferocity both in short term and long term.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;"></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-size: 12.0pt; line-height: 107%; mso-bidi-font-size: 11.0pt;">Though, the
indication to date demonstrates technology has much to offer fatalities of
domestic violence says, <b><a href="https://www.behance.net/rogersamara" target="_blank"><span style="color: #274e13;">Roger Samara</span></a></b>.
Hence, rather than stop using social media, the victims should use their
smartphones or other devices to speak their story to people and get the help
they deserve.</span></div>
<div>
</div>
</div>
Roger Samarahttp://www.blogger.com/profile/00546007119424295915noreply@blogger.com0tag:blogger.com,1999:blog-7313248531468171079.post-62350607548049910002018-06-19T01:50:00.001-07:002018-07-06T21:56:10.203-07:006 Tech Trends to Keep an Eye on in 2018<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
That time of year has arrived — both to look back at the developments that have come before and to look ahead to the advancements that will arrive as the calendar year passes.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
Recently, Gartner released its predictions for tech trends in 2018 and several years beyond. From an increase in visual and voice search to a rise in bot development over mobile, it looks as though the tech darlings of 2017 will only grow in prominence and power.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; font-family: "pt sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<span style="color: #303030;">But what other leaps forward might we expect in 2018? Let’s take a look at the top picks shared by expert </span><a href="https://www.behance.net/rogersamara" rel="noopener" style="border-bottom-color: rgb(197, 197, 197); border-bottom-style: solid; border-width: 0px 0px 1px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;" target="_blank"><span style="border: 0px; box-sizing: border-box; color: #274e13; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Roger Samara</span></a><span style="color: #303030;">:</span></div>
<h2 style="background-color: white; border: 0px; box-sizing: border-box; clear: both; color: #303030; font-family: "PT Sans", sans-serif; font-size: 1.875em; line-height: 1.6em; margin: 0px auto 12px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
1. Geo-targeting</h2>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
Geo-targeting, or the process of delivering specific content to users based on their locations, may seem like a limiting concept. Why focus in on a single region when you can send a blanket message at lower cost? But drilling down into your customer segment in this way can add a sense of personalization that is more likely to bring in new business.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
“<em style="border: 0px; box-sizing: border-box; font-family: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Imagine you’re a chiropractor looking to target people in a specific community who are interested in alternative medicine, meditation, and organic coffee</em>,” says Lathan Fritz, founder of Amerisales and an expert in big data for small businesses. “<em style="border: 0px; box-sizing: border-box; font-family: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Geotargeting allows you to focus on your ideal customer, getting to know them and knowing their interests, and then targeting those interests on their platforms of choice</em>.”</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
The wealth of data on social media and mobile devices has given rise to this highly targeted approach.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
Ads or other content delivered to your smartphone can change as you travel around an area or even the world. In today’s era of total customization, geotargeting is a natural fit, and advertisers and content providers will continue to leverage it in 2018 and beyond.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-size: 1.875em; text-align: justify;">2. Anomaly detection/prediction</span></div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
In manufacturing, a single error in production could be negligible — or it could create massive problems, not just for the equipment and product, but for public relations as well. Quality control has always been with us, but advances in information technology are bringing a new level of sophistication to this critical area.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
Companies such as DataRPM, a Progress Company, and Hortonworks, a big data software company, are collaborating on cognitive systems for detecting anomalies in manufacturing.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
Michael Ger, general manager for automotive and manufacturing solutions at Hortonworks, described the benefits of this collaborative approach, saying, “<em style="border: 0px; box-sizing: border-box; font-family: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">DataRPM’s cognitive anomaly detection and prediction capabilities perfectly complement our offerings, as they help companies make sense of the multi-structured data they collect</em>.”</div>
<h2 style="background-color: white; border: 0px; box-sizing: border-box; clear: both; color: #303030; font-family: "PT Sans", sans-serif; font-size: 1.875em; line-height: 1.6em; margin: 0px auto 12px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
3. <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Customer service automation</span></h2>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
From big-box retailers to tech startups, virtually every company performs some sort of customer service. But thanks to the rise of artificial neural networks, companies are increasingly turning to AI technologies to answer customers’ most common questions.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; font-family: "pt sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<span style="color: #303030;">By 2020, </span><a href="https://www.ibm.com/blogs/watson/2017/10/10-reasons-ai-powered-automated-customer-service-future/" rel="noopener" style="border-bottom-color: rgb(197, 197, 197); border-bottom-style: solid; border-width: 0px 0px 1px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;" target="_blank"><span style="color: #274e13;">IBM predicts</span></a><span style="color: #303030;"> that 85% of all customer interactions will be conducted without a human agent.</span></div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
Leading the charge toward automated customer service is IV.AI, the world’s first artificial intelligence agency. Led by CEO Vince Lynch, IV.AI made waves at this year’s Facebook F8 Developer Conference by announcing that it had used machine learning to automate 96% of international airline Aeromexico’s customer service interactions.</div>
<h2 style="background-color: white; border: 0px; box-sizing: border-box; clear: both; color: #303030; font-family: "PT Sans", sans-serif; font-size: 1.875em; line-height: 1.6em; margin: 0px auto 12px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
4. Augmented reality</h2>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
Expect more apps to take advantage of the iPhone’s latest operating system upgrade, which allows it to overlay additional information on whatever the camera is pointing at. This will be used for far more than the flash-in-the-pan craze of Pokémon GO.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
The potential applications are really endless, but one possibility is a phone-based tour guide that provides facts and additional images relevant to nearby sites, stores, restaurants, and even the night sky as viewed through your screen.</div>
<h2 style="background-color: white; border: 0px; box-sizing: border-box; clear: both; color: #303030; font-family: "PT Sans", sans-serif; font-size: 1.875em; line-height: 1.6em; margin: 0px auto 12px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
5. Deep learning</h2>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
After the upset win of Google DeepMind’s AlphaGo system, which used a deep learning approach against top-ranked Go master Lee Sedol in spring 2016, the tech community has become increasingly familiar with deep learning. This year, expect further popularization of the term due to successes in Google’s driver less car initiative and facial recognition.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
Deep learning succeeds in areas of computer analysis that were previously tough nuts to crack because it does not rely on a brittle set of pre programmed rules for attacking a problem domain. Instead, it uses an approach inspired by the brain’s neural networks to find new ways to solve the most difficult problems.</div>
<h2 style="background-color: white; border: 0px; box-sizing: border-box; clear: both; color: #303030; font-family: "PT Sans", sans-serif; font-size: 1.875em; line-height: 1.6em; margin: 0px auto 12px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
6. Conversational Platforms</h2>
<div style="background-color: white; border: 0px; box-sizing: border-box; font-family: "pt sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<span style="color: #303030;">According to </span><a href="https://vimeo.com/samararoger" rel="noopener" style="border-bottom-color: rgb(197, 197, 197); border-bottom-style: solid; border-width: 0px 0px 1px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;" target="_blank"><span style="border: 0px; box-sizing: border-box; color: #274e13; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Roger Samara</span></a><span style="color: #303030;">, there was a time when any degree of voice recognition by a computer — even a single word — was a big victory. Now Alexa is recognizing songs and musical acts, and Siri is giving you the local weather. But will we see something more like actual conversation</span><em style="border: 0px; box-sizing: border-box; color: #303030; font-family: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"> </em><span style="color: #303030;">in 2018?</span></div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
It’s possible, but that will require conversational platforms to couple word recognition with a robust, adaptive internal model of the conversation topic, as well as provide an application programming interface that allows third-party developers to utilize their methods and features.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
Such platforms will be able to predict what the user is speaking about, what relevant questions to expect, and what answers to deliver.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
Once they become viable, conversational platforms may be able to do much more than respond to simple requests; technologists envision potential applications in law enforcement, education, medicine, and other areas.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
There’s no doubt 2018 is going to be an exciting year. While these predictions may not play out exactly as forecast, it’s just as likely that stunning, unexpected advances will arrive to take their place. However the year turns out, we look forward to using some of the new technologies that will be discussed in retrospect at the end of 2018.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<b>Originally Posted: <a href="https://rogersamara.wordpress.com/2018/01/11/tech-trends-2018/">https://rogersamara.wordpress.com/2018/01/11/tech-trends-2018/</a></b></div>
</div>
Roger Samarahttp://www.blogger.com/profile/00546007119424295915noreply@blogger.com0tag:blogger.com,1999:blog-7313248531468171079.post-38838583413199527072018-06-19T00:48:00.002-07:002018-07-04T23:12:40.876-07:00How Ransomware Attacks Wreck Computer Networks in Several Countries<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
Ransomware phenomenon continues to dominate the threat landscape. It is growing trend from past few years. This malicious software affects sectors including universities, hospitals, law firms, banks, Government, mobile users and various organizations equally worldwide emphasis, <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Roger Samara</span>.</div>
<div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
In fact, Ransomware attacks are happening on a daily basis and still have a high rate of success. Hence, cyber-security professionals are still scrambling to contain a universal Ransomware attack.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
This malware has pretentious tens of thousands of <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><a href="https://vimeo.com/samararoger" target="_blank">computer networks</a></span> in nearly 100 countries, including Russia, U.S., U.K., Ukraine, China, and India. Do you want to know in detail what Ransomware is and how it affects the cyber-security? Let’s have a look!</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://twitter.com/rogersamara1?lang=en" target="_blank"><img border="0" data-original-height="512" data-original-width="768" height="266" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLw5sxzxRmDuvIrdH7zKfXKDQn2wf6WnM60M2qahKNftJf6iMAWrvMWl55qfQEqfpYj_7HwAA0etMwN_2ZoS-7RXF3UwdUKxQH_dYrMrtiZ0CDNzKhycRwFCvBWZZow4W1v67672hulro/s400/computer-networks-roger-samara.jpeg" width="400" /></a></div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<br /></div>
<h2 style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><em style="border: 0px; box-sizing: border-box; font-family: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">What is Ransomware?</em></span></h2>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
Ransomware is a progressively popular and troublesome form of cyber crime. It is a piece of sophisticated malware, once take control over your system, threatens you with harm, generally by disagreeing you access to your files. This malicious software locks down all files on <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">computer networks</span> and asks the victim to pay a ransom in order to regain control over the files.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
A pop-up window show instructions to the victim on how to pay a charge to get the decryption key of their system. Attackers can ask for money ranging from a few hundred dollars to thousands. Furthermore, they ask ransom virtual currency such as bitcoin, so that the cybercriminal identity is not known.</div>
<h3 style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><em style="border: 0px; box-sizing: border-box; font-family: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">How Ransomware Works</em></span></h3>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
There are a number of ways ransomware can take access to the computers. One of the most common vectors is <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><em style="border: 0px; box-sizing: border-box; font-family: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">phishing spam</em></span> means an attachment that comes to the victim in an email. This harmful virus spreads from computer to computer on a network via email attachments masquerading as a file people should trust.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
As you download or open it, the virus can take over your machine says <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><a href="https://www.behance.net/rogersamara" rel="noopener" style="border-bottom-color: rgb(197, 197, 197); border-bottom-style: solid; border-image: initial; border-left-color: initial; border-left-style: initial; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 1px; box-sizing: border-box; color: #1279be; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank">Roger Samara</a></span>– the master of the computer world. <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Moreover, another type of ransomware i.e. NotPetya breaches security holes</span> to affect machines without demanding to trick users.</div>
<h3 style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><em style="border: 0px; box-sizing: border-box; font-family: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">How Ransomware Infection Spreads</em></span></h3>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
Cyber-criminals always try to discover new methods to extract personal data and infect a <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">person’s computer with malware</span>. You are lucky if you are not the victim of a cyber-attack till now. It is necessary to be proactive and keep your machines up to date for maximum protection.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
Actually, cybercriminals look for the easiest way to<span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"> attacks</span> <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">computer networks</span> and use the backdoor to distribute a malicious code. Hence, it is essential to check the ways of spreading ransomware infection that attackers use:</div>
<ul style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; list-style-image: initial; list-style-position: inside; margin: 0px 0px 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<li style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Spam emails that contain malicious links or attachments.</span></li>
<li style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Internet traffic that redirects to malicious websites.</span></li>
<li style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Self-propagation capabilities.</span></li>
<li style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Taking advantage of security exploits in susceptible software.</span></li>
<li style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Malvertising campaigns.</span></li>
</ul>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
The security breaches take place because online criminals are improving their methods day by day by using technical knowledge along with psychological manipulation.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><em style="border: 0px; box-sizing: border-box; font-family: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Who has it affected so far?</em></span></div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
Spain reports the <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">ransomware attack firstly.</span> The largest telecom in Spain hit with a pop-up window <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">asking a $300 ransom in order to get access to files again</span>. And after this approximate 16 hospitals in England’s National Health Service were pretentious. This virus locks <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">doctors and nurses out of patient’s information</span> until they get a ransom.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
The <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">network cyber attacks</span> are being blamed on a piece of malware called WCry, WannaCry or Wana Decryptor. According to a report, it was allegedly spread by the Shadow Brokers which claim to have hack NSA link tea of attackers. Actually, the Shadow Brokers group which is fictional of having ties to Russia, posts windows hacking tools.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
Victims of the bout are reactive with a <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">pop-up window</span> that says them their files are now encoded. And they have to pay $300 in bitcoin in order to unlock files. The message is in the different languages and says:</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
“You can unlock some files for free. If you want to regain the access to all the files, you have to pay. Also, you have only three days to submit payment. After that ransom will get double.”</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Roger Samara</span> also add that the pop-up window contains a countdown clock that intimidates that files will be lost forever in seven days.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
Wana Decryptor abuses a Windows flaw that was a patch in Microsofts Security Bulletin MS17-010. But the computers that are not up to date, the malicious code encodes all the files and then spreads itself. The infection of a <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">single machine</span> ends up conceding the whole <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">company network</span>.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
The malware is both influential as well as insidious. You just walk up to your system and it’s pretentious, even if you did not touch it. All that can happen if your machine is ON and on the network.</div>
<h3 style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><em style="border: 0px; box-sizing: border-box; font-family: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Worldwide reaction to Ransomware Attack</em></span></h3>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
In the United State, the Computer Emergency Readiness Team (CERT) collect numerous reports of ransomware<span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"> attacks</span> <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">computer networks</span> in many countries around the world. However, the agency did not recognize those countries.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Furthermore, the Department of Homeland Security tells that it’s synchronizing</span> with <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">international cyber partners in the wake of prevalent attacks. A member of Senate Armed Services Committee says that:</span></div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
“Ransomware is really a big problem across the world, doctors and staffs are struggling to treat patients without having their digital records or dosages. Also, ambulances are being redirected, and <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">millions of individual’s data are possibly exposed</span>. We will likely look back at this as a crisis moment.”</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
England’s<span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"> NHS says that ransomware hit at least 16 of its organizations</span>. System’s digital office statement says that network cyber-attacks not particularly targets at the NHS. And is affecting organizations from across a range of sectors.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
The ransomware attack also hit the amenities in Scotland. The <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Health Secretary Shona</span> Robison says security experts are taking instant steps to decrease the influence of the ransomware across <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">NHS Scotland</span>.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
IT workers at <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">public health care system</span> say that it is a major problem they have seen in their six years working. As of now, this malicious software has been localized says, <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><a href="https://rogersamara.blogspot.com/" rel="noopener" style="border-bottom-color: rgb(197, 197, 197); border-bottom-style: solid; border-image: initial; border-left-color: initial; border-left-style: initial; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 1px; box-sizing: border-box; color: #1279be; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank">Roger Samara Computer Technician</a></span>. There has been no <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">inside information leak</span> from the <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Russian Interior Ministry’s information resources.</span></div>
<div style="background-color: white; border: 0px; box-sizing: border-box; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
<b style="color: #303030; font-family: "PT Sans", sans-serif; font-size: 16px;">Originally Posted: </b><span style="background-color: transparent; text-align: left;"><span style="color: #303030; font-family: "pt sans" , sans-serif;"><b><a href="https://rogersamara.wordpress.com/2018/05/28/how-ransomware-attacks-wreck-computer-networks-in-several-countries/">https://rogersamara.wordpress.com/2018/05/28/how-ransomware-attacks-wreck-computer-networks-in-several-countries/</a></b></span></span></div>
</div>
</div>
Roger Samarahttp://www.blogger.com/profile/00546007119424295915noreply@blogger.com0tag:blogger.com,1999:blog-7313248531468171079.post-43470744767893629922018-06-12T22:13:00.001-07:002018-07-04T23:13:12.282-07:00Why We Love Technology and You should Too<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="graf graf--p graf-after--h3" id="bd22" name="bd22" style="--baseline-multiplier: 0.17; background-color: white; color: rgba(0, 0, 0, 0.84); font-family: medium-content-serif-font, Georgia, Cambria, "Times New Roman", Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 1.58; margin-top: 10px; text-align: justify;">
Whether personally or professionally, technological innovations have shaped our lives and work as well. Technologies in the recent years have profited people learning styles, techniques and the quality they put onward. In this article, <a class="markup--anchor markup--p-anchor" data-href="https://www.crunchbase.com/organization/roger-samara-33c2" href="https://www.crunchbase.com/organization/roger-samara-33c2" rel="nofollow noopener" style="-webkit-tap-highlight-color: rgba(0, 0, 0, 0.54); background-color: transparent; background-image: linear-gradient(rgba(0, 0, 0, 0.68) 50%, rgba(0, 0, 0, 0) 50%); background-position: 0px 1.07em; background-repeat: repeat-x; background-size: 2px 0.1em; text-decoration-line: none;" target="_blank"><span class="markup--strong markup--p-strong" style="font-weight: 700;">Roger Samara</span></a> — a <span class="markup--strong markup--p-strong" style="font-weight: 700;">computer</span> technician emphasizes the fact.</div>
<div class="graf graf--p graf-after--p" id="ccb6" name="ccb6" style="--baseline-multiplier: 0.17; background-color: white; color: rgba(0, 0, 0, 0.84); font-family: medium-content-serif-font, Georgia, Cambria, "Times New Roman", Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 1.58; margin-top: 29px; text-align: justify;">
These days, numerous technologies are available like cell phones, TABs, PDAs, iPADs and other gadgets along with the existence of the Internet and Wi-Fi signal. These innovations have made the life more effectual and easier. In fact, things can be done in less time. It saves energy and eventually saves cost as well.</div>
<div class="graf graf--p graf-after--p" id="ccb6" name="ccb6" style="--baseline-multiplier: 0.17; background-color: white; color: rgba(0, 0, 0, 0.84); font-family: medium-content-serif-font, Georgia, Cambria, "Times New Roman", Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 1.58; margin-top: 29px; text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://twitter.com/rogersamara1?lang=en" target="_blank"><img border="0" data-original-height="822" data-original-width="1600" height="205" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMMZf0GSn_DL464Bm3P3SdZqjg-TeM8Pz2lAanoGJ7Ae3TAqfht04p7ghdO29z2v2VLxbewZMNrV8-O_cOjQAu7us39RGbPyKjdeGqkyIyK_TwW_RBjPIlaHLUwHOV7K_abYqBNKdz5D8/s400/TECHNOLOGY.jpg" width="400" /></a></div>
<h3 class="graf graf--h3 graf-after--p" id="8144" name="8144" style="--baseline-multiplier: 0.22; background-color: white; color: rgba(0, 0, 0, 0.84); font-family: medium-content-sans-serif-font, "Lucida Grande", "Lucida Sans Unicode", "Lucida Sans", Geneva, Arial, sans-serif; font-size: 34px; letter-spacing: -0.015em; line-height: 1.15; margin: 56px 0px 0px -2.13px; text-align: justify;">
What happens without technologies presence?</h3>
<div class="graf graf--p graf-after--h3" id="9408" name="9408" style="--baseline-multiplier: 0.17; background-color: white; color: rgba(0, 0, 0, 0.84); font-family: medium-content-serif-font, Georgia, Cambria, "Times New Roman", Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 1.58; margin-top: 8px; text-align: justify;">
We would have remained in past worrying over our buddies and youngsters returning home. Maybe we have to wait for long hours for an appointment. Furthermore, we stay with the bulky desktop system in place of easy to bring digital toys. So, we cannot imagine life without <span class="markup--strong markup--p-strong" style="font-weight: 700;">technology</span>. Does that sway you to love technological innovations? Why not? We all do love technologies and you should too.</div>
<h3 class="graf graf--h3 graf-after--p" id="4470" name="4470" style="--baseline-multiplier: 0.22; background-color: white; color: rgba(0, 0, 0, 0.84); font-family: medium-content-sans-serif-font, "Lucida Grande", "Lucida Sans Unicode", "Lucida Sans", Geneva, Arial, sans-serif; font-size: 34px; letter-spacing: -0.015em; line-height: 1.15; margin: 56px 0px 0px -2.13px; text-align: justify;">
Here are some other reasons you should love technological innovations</h3>
<div class="graf graf--p graf-after--h3" id="11b6" name="11b6" style="--baseline-multiplier: 0.17; background-color: white; color: rgba(0, 0, 0, 0.84); font-family: medium-content-serif-font, Georgia, Cambria, "Times New Roman", Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 1.58; margin-top: 8px; text-align: justify;">
Do not you like to watch movies from the comfort of home? Who does not love to work from home as an extra income? We claim you do. Do not you like the warming and cooling frameworks of your home or other inside premises?</div>
<div class="graf graf--p graf-after--p" id="2a87" name="2a87" style="--baseline-multiplier: 0.17; background-color: white; color: rgba(0, 0, 0, 0.84); font-family: medium-content-serif-font, Georgia, Cambria, "Times New Roman", Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 1.58; margin-top: 29px; text-align: justify;">
What about other amenities of contemporary homes, multiplexes and organizations. Have you ever tried for further education? You can learn a lot with modern equipment as well as methods. Looking for these, you definitely fall in love with the technological inventions.</div>
<div class="graf graf--p graf-after--p" id="08fc" name="08fc" style="--baseline-multiplier: 0.17; background-color: white; color: rgba(0, 0, 0, 0.84); font-family: medium-content-serif-font, Georgia, Cambria, "Times New Roman", Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 1.58; margin-top: 29px; text-align: justify;">
However, technologies have some limits. It’s your reaction towards it. You should not stay glued down to flat or digital screens whole day. Otherwise, you will go slump and unhealthy says, <span class="markup--strong markup--p-strong" style="font-weight: 700;"><a href="https://medium.com/@rogersamara" target="_blank">Roger Samara</a></span>. Hence, do exercise and enjoy life in the nature force.</div>
<div class="graf graf--p graf-after--p" id="4666" name="4666" style="--baseline-multiplier: 0.17; background-color: white; color: rgba(0, 0, 0, 0.84); font-family: medium-content-serif-font, Georgia, Cambria, "Times New Roman", Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 1.58; margin-top: 29px; text-align: justify;">
Now again appreciate the benefits of present-day innovations. The technologies make the lifeless demanding as well as agreeable. For instance, Googling and searching on the web have made handling work extends so substantially more straightforward and flatter cruising. Along with this, another aspect Roger is in love with is the being able to pay all the bills anytime essentially anywhere.</div>
<h4 class="graf graf--h4 graf-after--p" id="6ef9" name="6ef9" style="--baseline-multiplier: 0.22; background-color: white; color: rgba(0, 0, 0, 0.84); font-family: medium-content-sans-serif-font, "Lucida Grande", "Lucida Sans Unicode", "Lucida Sans", Geneva, Arial, sans-serif; font-size: 26px; letter-spacing: -0.012em; line-height: 1.22; margin: 30px 0px 0px -1.63px; text-align: justify;">
Bottom Lines</h4>
<div class="graf graf--p graf-after--h4" id="8327" name="8327" style="--baseline-multiplier: 0.17; background-color: white; color: rgba(0, 0, 0, 0.84); font-family: medium-content-serif-font, Georgia, Cambria, "Times New Roman", Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 1.58; margin-top: 6px; text-align: justify;">
Well every individual has been affected by technologies. Can you envision what it would be like to do everything by hands? I’m sure you can’t. There are ample reasons to love technologies. One of the reasons is that it does not distinguish. It considers everybody as equal. Its accessibility and benefits have no favors for gender, religion and creed.</div>
<div class="graf graf--p graf-after--p" id="555c" name="555c" style="--baseline-multiplier: 0.17; background-color: white; color: rgba(0, 0, 0, 0.84); font-family: medium-content-serif-font, Georgia, Cambria, "Times New Roman", Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 1.58; margin-top: 29px; text-align: justify;">
Whether individually or professionally, our everyday life and work are formed by the way we interconnect with one another, to the way we travel from one location to another, to the way we attain and share information. Just imagine what it would be like if we were living in a time in which all the above things do not exist emphasis <a class="markup--anchor markup--p-anchor" data-href="https://www.behance.net/rogersamara" href="https://www.behance.net/rogersamara" rel="nofollow noopener" style="-webkit-tap-highlight-color: rgba(0, 0, 0, 0.54); background-color: transparent; background-image: linear-gradient(rgba(0, 0, 0, 0.68) 50%, rgba(0, 0, 0, 0) 50%); background-position: 0px 1.07em; background-repeat: repeat-x; background-size: 2px 0.1em; text-decoration-line: none;" target="_blank"><span class="markup--strong markup--p-strong" style="font-weight: 700;">Roger Samara</span></a>. Above are just a few reasons to love technologies, there are many more.</div>
<div class="graf graf--p graf-after--p graf--trailing" id="0ed4" name="0ed4" style="--baseline-multiplier: 0.17; background-color: white; color: rgba(0, 0, 0, 0.84); font-family: medium-content-serif-font, Georgia, Cambria, "Times New Roman", Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 1.58; margin-top: 29px;">
<span class="markup--strong markup--p-strong" style="font-weight: 700;">Originally Posted: </span><a class="markup--anchor markup--p-anchor" data-href="https://rogersamara.wordpress.com/2018/06/12/why-we-love-technology-and-you-should-too/" href="https://rogersamara.wordpress.com/2018/06/12/why-we-love-technology-and-you-should-too/" rel="nofollow noopener" style="-webkit-tap-highlight-color: rgba(0, 0, 0, 0.54); background-color: transparent; background-image: linear-gradient(rgba(0, 0, 0, 0.68) 50%, rgba(0, 0, 0, 0) 50%); background-position: 0px 1.07em; background-repeat: repeat-x; background-size: 2px 0.1em; text-decoration-line: none;" target="_blank"><span class="markup--strong markup--p-strong" style="font-weight: 700;">https://rogersamara.wordpress.com/2018/06/12/why-we-love-technology-and-you-should-too/</span></a></div>
</div>
Roger Samarahttp://www.blogger.com/profile/00546007119424295915noreply@blogger.com0tag:blogger.com,1999:blog-7313248531468171079.post-19037813409376715962018-06-06T22:58:00.001-07:002018-06-12T22:00:49.427-07:00Roger Samara | Computer Hardware Linus Tech Tips<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: center;">
<iframe allowfullscreen="" frameborder="0" height="270" src="https://www.youtube.com/embed/00A8EhBN_w0" width="480"></iframe></div>
</div>
Roger Samarahttp://www.blogger.com/profile/00546007119424295915noreply@blogger.com0tag:blogger.com,1999:blog-7313248531468171079.post-6161827138483023242018-06-05T02:14:00.001-07:002018-06-05T02:14:04.524-07:00Roger Samara "Montreal" - Technology Trends<iframe allowfullscreen="" frameborder="0" height="344" src="https://www.youtube.com/embed/OjkmVDUTDsY" width="459"></iframe>Roger Samarahttp://www.blogger.com/profile/00546007119424295915noreply@blogger.com0tag:blogger.com,1999:blog-7313248531468171079.post-21476701632745848452018-02-19T23:55:00.001-08:002018-02-19T23:56:51.998-08:00Roger Samara Fixing Computer Faults<div dir="ltr" style="text-align: left;" trbidi="on">
In this modern era, most of us owns and use PCs, and meanwhile, we <br />
always annoyed individually hardware and software problems of computers.<br />
Here Roger Samara like to share ppt which explains how to repair computer faults easily<br />
<br />
<br />
.<iframe allowfullscreen="" frameborder="0" height="270" src="https://www.youtube.com/embed/G2C83-GjaDE" width="480"></iframe></div>
Roger Samarahttp://www.blogger.com/profile/00546007119424295915noreply@blogger.com0tag:blogger.com,1999:blog-7313248531468171079.post-53800976065036392962018-01-29T21:18:00.000-08:002018-01-29T21:18:52.350-08:00What Is the Technology Behind a Touch Screen?<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
Have you ever wondered just how the touch screen on your cell phone, tablet, LED television, or any other device actually works? It is amazing to think that we can now issue commands to our devices with the touch of our hand and while this technology might seem new, it has actually been around since the 1960's.</div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifMZpw3HqD98kTyNGQzSJ1MmZzKQCRFU2JIYcoNqTYQwJzTOuJz-7z1_q4b1IRRW-_e9YGjsp3tR0ZxwAcMh4cWS3_hoyh-S_IJnSnNahTxTC7z08SNP1xj8thI-fNQUxGI4QIcJ61ljQ/s1600/touchscreen.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img alt="Roger Samara" border="0" data-original-height="1065" data-original-width="1600" height="426" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifMZpw3HqD98kTyNGQzSJ1MmZzKQCRFU2JIYcoNqTYQwJzTOuJz-7z1_q4b1IRRW-_e9YGjsp3tR0ZxwAcMh4cWS3_hoyh-S_IJnSnNahTxTC7z08SNP1xj8thI-fNQUxGI4QIcJ61ljQ/s640/touchscreen.jpg" title="Touch Screen" width="640" /></a></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
In fact, the technology behind the touch screen can actually traced right back to the 1940's but it was only two decades later that it actually became feasible to use on a large scale.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
ATMs have been using technology since 1965 which is when E.A. Johnson invented the first finger-driven touch screen that actually used the same capacitive touch mechanism that is still used in cell phones and other devices to this day.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
According to <b><a href="https://www.behance.net/rogersamara" target="_blank">Roger Samara</a></b>, there are other types of touch screen technology such as resistive touch or multi touch technology, capacitive touch technology is the one that is preferred for mass produced consumer products.</div>
<div style="text-align: justify;">
<br /></div>
<h3 style="text-align: justify;">
How is a Capacitive Touch Screen Made?</h3>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Today, a capacitive touch screen works through the use of an ITO touch film that is attached to the screen. This touch film is basically a semiconductor that has been printed out using semiconductor manufacturing methods such as roll to roll processing which uses a roll to roll evaporator system to create an electronic device on a flexible plastic.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
A roll to roll evaporator system from industry leading manufacturers are able to mass produce ITO touch film that can be used on various devices such as smart phones, LCD or LED screens, tablets, and PC monitors.</div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://www.crunchbase.com/person/roger-samara" target="_blank"><img alt="Roger Samara_Touch Screen" border="0" data-original-height="450" data-original-width="800" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjG0WHA6uFjcEeLfr50JbLBSpQRmgKc8WHNdPeamAK6J4RJGMs3g-DTVDh6crByw_UDUM_TWZiCPswC7FoqVILXyXHjzVpIbRozPDOnRsHm2W5-MJVsWgsUUUyVOFPaGFE_edEXp5PgNFg/s640/touch_screen.jpg" title="" width="640" /></a></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Roll to roll technology is the preferred method over other technologies such as roll to plate and plate to plate technologies due to it offering a continuous process and higher throughput than the others. That ITO touch film is then programmed using software that enables us to give our devices instructions through the use of our fingers on the screen.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
In fact, semiconductor manufacturing processes such as the roll to roll evaporator system are used for many other products too, such as solar panels, cameras, and printers.</div>
<div style="text-align: justify;">
<br /></div>
<h3 style="text-align: justify;">
Summary</h3>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
So now you have a basic idea of where technology came from and the technology that is used to produce the semiconductor film that is used on touch screens today. Without machines that use a roll to roll evaporator system, we would not be able to enjoy the many touch screen devices that are available to us today.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<div>
<b><a href="https://medium.com/roger-samara-computer-services/about-roger-samara-b1f862fe030e" target="_blank">Roger Samara</a></b> is a computer savvy who is passionate about his work & new technologies. He examines user's technical needs and provides them with best solutions.</div>
<div>
<br /></div>
</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<b>Article Source:</b> <b><a href="http://ezinearticles.com/9437083" target="_blank">http://EzineArticles.com/9437083</a></b></div>
</div>
Roger Samarahttp://www.blogger.com/profile/00546007119424295915noreply@blogger.com2tag:blogger.com,1999:blog-7313248531468171079.post-35668003221018632612018-01-14T23:05:00.000-08:002018-01-14T23:08:04.931-08:00How to Protect your Email from Viruses and MalWare<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
Once upon a time, email was considered to be a pretty safe communication medium. For those still using PINE or some other text-only mail client, it still is, says <a href="https://rogersamara.blogspot.com/" target="_blank"><b><span style="color: blue;">Roger Samara</span></b></a>. But for the rest of us, who want to take advantage of all the advanced features of modern email client software, opening an email message can be a scary experience.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Virus writers, who used to spread their virtual “diseases” via infected floppies and network shares, have seized the opportunity posed by email programs that support attached files, HTML messages, and embedded scripts to send viruses and other malicious software (called “malware”) to hundreds or thousands of people with just a few keystrokes. In this article, we will look at how email viruses work and what you can do to protect your computer and network from them.</div>
<div style="text-align: justify;">
<br /></div>
<h3 style="text-align: justify;">
How Email Viruses Work</h3>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
There are a couple of different ways that viruses can invade your computer through your email box. One of the most publicized is through attachments. If you open an executable file that’s attached to a mail message, the program runs and the virus does its dirty work – in some cases not only doing damage on your own machine but also using your address book to mail copies of itself to everyone with whom you correspond. </div>
<div style="text-align: justify;">
<br /></div>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBen2_6J0COKrsCbE3O1qLrkMwiWQQmrzNwDcjbKD0kc-HD-TGOT_nsZsUqO1O0QLj0wp2MtgGl6Xx6qW14OHBSU6ujKV0NVmDNiYtrCFGn1Tdw7o8NDk1YhW8qe6PqlZaCJacvQ4KCyk/s1600/Roger+Samara_email-virus.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img alt="Roger Samara_Email Viruses" border="0" data-original-height="426" data-original-width="640" height="426" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBen2_6J0COKrsCbE3O1qLrkMwiWQQmrzNwDcjbKD0kc-HD-TGOT_nsZsUqO1O0QLj0wp2MtgGl6Xx6qW14OHBSU6ujKV0NVmDNiYtrCFGn1Tdw7o8NDk1YhW8qe6PqlZaCJacvQ4KCyk/s640/Roger+Samara_email-virus.jpg" title="Roger Samara_Email Viruses" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><b>Roger Samara_Email Viruses</b></td></tr>
</tbody></table>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
These infected messages will appear to be from you, even though you weren’t even aware that they were sent. That’s why you should always be wary of mail with attachments, even when it comes from someone you know and trust. Viruses that work this way include the infamous Melissa virus, Klez, and others.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Avoiding attachment viruses would seem to be easy: just don’t open attachments. However, it’s not always that simple. Many of us whose work depends on collaborating with others across the Internet need to exchange attachments. If you do, common sense precautions should prevail. Note the file type before opening an attachment. Executables are most likely to be dangerous, but virus writers use tricks such as appending multiple file extensions to fool you into thinking a file is something it’s not. Because the Windows Explorer and some software programs don’t show common extensions by default, a file named letter.txt.exe will appear to be an innocuous text file when it’s really a program file.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<b>Related: <a href="https://rogersamara.blogspot.com/2017/03/removing-virus-without-using-any-anti.html" target="_blank"><span style="color: blue;">Removing a virus without using any anti-virus software</span></a></b></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Because the problem of viruses in attachments is so prevalent, Microsoft has written recent versions of Outlook (2002 and above) to automatically block executable file types (.exe, .bat, .com, .lnk, .scr, .vbs and many others). This feature is also added to Outlook 2000 when you apply Service Pack 2 or to Outlook 98 when you apply the Outlook Email Security Update. Unfortunately, this creates a situation where the cure may be worse than the disease if you really need to send and receive those types of files. If so, there are several ways to work around this problem.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
The simplest method is to just rename the file with a different extension (for example, rename program.exe to program.txt) and tell the person to whom you’re sending it to rename it to the original name after downloading it.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
In Outlook 2002, you can <a href="http://www.slipstick.com/outlook/esecup/getexe.htm#ol2002">edit the Registry</a> to modify the file types that are blocked. There are several third-party utilities that will let you do the same thing without directly editing the Registry; these include Outlook Permissions Add-in from MRH Technolgoy Group, DetachXP from McDaniel Development and the Xenos Outlook Security Extension. </div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Note that attachment blocking is optional in Outlook Express, and Outlook Web Access does not include attachment blocking. So another way to get your attachments is to use OWA (if you’re in an Exchange environment) or import your messages into OE from Outlook.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Don’t assume that you’re okay if the only attachments you open are document files. Word documents can contain macros (small programs) that can execute malicious commands. These are called macro viruses. You can protect yourself by setting the Macro Security level in Word (accessed via Tools | Options | Security tab) to medium or high. High disables all unsigned macros, and medium prompts you before running a macro, as shown below.</div>
<div style="text-align: justify;">
<br /></div>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKXhV6fwgiPzgXIU15agXSVoIaViS8_dsqXzZuwlxvrSsQyMeMctP9QH5GI-fCzhR0i4ICibRF2CyVyNx4HG6I6okjndcHI7MMRgkaJNcWIg1ps4h3JayjeLgVveo2nia5YIcQFoj8LDM/s1600/roger+samara+security+options.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img alt="Roger Samara: Macro Security" border="0" data-original-height="371" data-original-width="384" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKXhV6fwgiPzgXIU15agXSVoIaViS8_dsqXzZuwlxvrSsQyMeMctP9QH5GI-fCzhR0i4ICibRF2CyVyNx4HG6I6okjndcHI7MMRgkaJNcWIg1ps4h3JayjeLgVveo2nia5YIcQFoj8LDM/s1600/roger+samara+security+options.jpg" title="Roger Samara: Macro Security" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><b>Roger Samara: Macro Security</b></td></tr>
</tbody></table>
<div style="text-align: center;">
<span style="text-align: justify;"><br /></span></div>
<div style="text-align: left;">
<span style="text-align: justify;">You can’t assume your mail is safe just because you don’t get attachments, either. Viruses can also be embedded in the mail message itself. This isn’t possible in a plain text message, but the most popular mail clients today (Outlook, OE, Eudora) support HTML mail so you can use stationery, embed pictures and sound, and so forth. An HTML message can contain scripts (programs) that execute viruses. This is one reason many mailing lists block HTML mail (another is bandwidth usage).</span></div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: justify;">
The latest version of Outlook (2003), now in beta testing, finally allows users to block HTML mail. This is a continuation of a trend that started in Outlook 2002 (XP), when Microsoft started blocking external content (files grabbed from outside servers) in the preview pane. To convert incoming HTML to plain text in Outlook 2000, you can use VBA code. In Outlook 2002, you can use the Rules Wizard’s “run a script” action to call a VBA subroutine to perform this conversion.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Rich text can also be exploited to send unauthorized messages, and even plain text messages can contain URLs that may take you to web sites where scripts run and disseminate viruses.</div>
<div style="text-align: justify;">
Like what you're reading? Get the latest updates and tech guides in your inbox.</div>
<div style="text-align: justify;">
<br /></div>
<h3 style="text-align: justify;">
Protective Measures you can Take</h3>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
According to <b><a href="https://www.crunchbase.com/organization/roger-samara-33c2" target="_blank"><span style="color: blue;">Roger Samara</span></a></b>, most viruses are operating system specific (that is, viruses that run on Windows often don’t affect Linux or Macintosh computers, and vice versa) and many are also specific to certain email clients. The first step in protecting your computer from email viruses is to apply all service packs and security updates, both those for your OS and those for your email software. Because the mail client may interact with the browser when reading HTML mail, you should also apply the latest updates to Internet Explorer.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Your mail client should be configured so that ActiveX and Java scripts won’t run automatically. In Outlook and OE, this is done through the settings for the Restricted Sites security zone (Tools | Options | Security). Choose Custom Level and scroll through the list of options, and set the option button for each ActiveX or scripting setting to either “disable” or “prompt,” as shown in figure below.</div>
<div style="text-align: justify;">
<br /></div>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpENeyJRiBGUZLA3VynZbenO5S-DhUIiz4omgqKyFpLWOMtwlYgybTXuN2QokZgtqUIgkvZp6E4fiVpjBMO6k7gup1jJgU3-D-YzWtN3n6t6n1NEY0b84jCtiSmhnGE9ik4Cg_act67XY/s1600/roger+samara+security+setting.gif" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img alt="Roger Samara_Disabling ActiveX and scripting" border="0" data-original-height="405" data-original-width="353" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpENeyJRiBGUZLA3VynZbenO5S-DhUIiz4omgqKyFpLWOMtwlYgybTXuN2QokZgtqUIgkvZp6E4fiVpjBMO6k7gup1jJgU3-D-YzWtN3n6t6n1NEY0b84jCtiSmhnGE9ik4Cg_act67XY/s320/roger+samara+security+setting.gif" title="Roger Samara_Disabling ActiveX and scripting" width="278" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><b>Roger Samara_Disabling ActiveX and scripting</b></td></tr>
</tbody></table>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
If you use Eudora, in Tools | Options | Viewing Mail, you should disable “allow executables in HTML content.” For Netscape Mail, in Edit | Preferences, Advanced Category, uncheck “enable Javascript for Mail and News.”</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
The next step is to install a good anti-virus or email security program. Although an AV program will help, it may not be enough to protect a mission-critical network. In that case, a more comprehensive “email firewall” such as <a href="http://www.gfisoftware.com/stats/adentry.asp?adv=142&loc=32">GFi MailSecurity for Exchange</a> can check mail content as well as checking for viruses. Remember that new viruses are being created daily, so any virus software will need to have its definition files updated regularly.</div>
<div style="text-align: justify;">
<br /></div>
<h3 style="text-align: justify;">
Summary</h3>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Viruses can destroy data, damage system files that are necessary to run your operating system and applications, and even bring down the entire network through denial of service attacks. If this weren’t enough, these viruses can use your address books to spread themselves further. If you use email, you need to take steps to ensure that you’re protected against viruses, Trojans and other malicious software that can be transmitted via email – without compromising the email features you need to communicate effectively. In this article, we’ve provided an overview of email security issues and pointers to solutions that may be right for your computer and network.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<b>Originally published at: <a href="http://techgenix.com/protecting_email_viruses_malware/" target="_blank">http://techgenix.com</a></b></div>
</div>
Roger Samarahttp://www.blogger.com/profile/00546007119424295915noreply@blogger.com0tag:blogger.com,1999:blog-7313248531468171079.post-62606805232505098312018-01-08T01:02:00.000-08:002018-07-04T23:13:55.548-07:00Monitoring Network Traffic More Efficiently<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
The company intranet is growing constantly at the time. Hence, the network administrators have to handle different type of the traffic that is crisscrossing the networks.</div>
<div style="text-align: justify;">
<br /></div>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJpYv19hxjn6c9S4tweksUuf2Xr1gxchSfVfx7m-7HnTPkeckEIbFREuAeRP7u5dF7eO2ut0axD21bnMzL98HKBB0nLSmRjaUkz2HDssBYYvRL4ZwKB8FL6b8KAxCiNIXEXCPePwDJUdw/s1600/Roger+Samara+-+Data+traffic.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img alt="Roger Samara - Network Traffic" border="0" data-original-height="358" data-original-width="640" height="358" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJpYv19hxjn6c9S4tweksUuf2Xr1gxchSfVfx7m-7HnTPkeckEIbFREuAeRP7u5dF7eO2ut0axD21bnMzL98HKBB0nLSmRjaUkz2HDssBYYvRL4ZwKB8FL6b8KAxCiNIXEXCPePwDJUdw/s640/Roger+Samara+-+Data+traffic.png" title="Roger Samara - Network Traffic" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><b>Roger Samara - Network Traffic</b></td></tr>
</tbody></table>
<div style="text-align: justify;">
<br />
Monitoring and analysis of the network traffic are necessary in order to resolve the networking issues more effectively says, <b><a href="https://twitter.com/rogersamara1" target="_blank"><span style="color: blue;">Roger Samara</span></a></b>. Today's the computers did the traffic analysis. This means they conclude the state of the network at the time when the data packet reaches their destinations.</div>
<div style="text-align: justify;">
<br /></div>
<h3 style="text-align: justify;">
The Network Traffic Monitoring can be done effectively</h3>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Actually, the network scrutiny would be done more efficiently if routers inside the structure can report on their own conditions. Furthermore, this also enables the network operators to address the problem quickly.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Hence, the router industrialists start to equip these networking devices with counters which report the number of data packets router process in given time period. But the number counts are lone so convenient.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Also, this is not practical to give routers a singular purpose monitoring circuit for every new dimension the operators want to make. An alternative to this that these network devices transfer the data packet to the outside servers for composite exploration. But this technique does not work well. This is because, the data center having 1, 00,000 servers may need another 40,000 servers in order to keep up with the deluge of the data packet.</div>
<div style="text-align: justify;">
<br /></div>
<h3 style="text-align: justify;">
Dubbed Marple - New Approach to Monitor the Network Traffic</h3>
<div>
<br /></div>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEOfg5T5k1yiYaLQ1w4acb8pFfTXyfOUWq5JUncHZi0b_hAKoqNHzXBZaFTuzxs6QTyrK3PpNbwWQAXptl_DIoLGuE_WrgPa1mSRz94vNR77ll-VssAAOer-cq6Q-Ak8qkYhzvEUxH3U8/s1600/roger+samara+monitoring+network+traffic.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img alt="Roger Samara - Monitoring Network Traffic" border="0" data-original-height="907" data-original-width="1600" height="362" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEOfg5T5k1yiYaLQ1w4acb8pFfTXyfOUWq5JUncHZi0b_hAKoqNHzXBZaFTuzxs6QTyrK3PpNbwWQAXptl_DIoLGuE_WrgPa1mSRz94vNR77ll-VssAAOer-cq6Q-Ak8qkYhzvEUxH3U8/s640/roger+samara+monitoring+network+traffic.jpg" title="Roger Samara - Monitoring Network Traffic" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><b>Roger Samara - Monitoring Network Traffic</b></td></tr>
</tbody></table>
<div>
<br /></div>
<div style="text-align: justify;">
Some researchers at MIT, barefoot networks, and Cisco networks introduce a new tactic for the network monitoring. The computer savvy <b><a href="https://medium.com/@rogersamara" target="_blank">Roger Samara</a></b> says that this approach endows the flexibility in data collection. Furthermore, it also keeps the circuit intricacy of routers and number of exterior analytical servers low.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
This new system contains programming language which permits the network operators to stipulate a wide range of network monitoring tasks. In fact, the Marple only needs a single traffic scrutiny server for every 40 to 50 application servers.</div>
<div style="text-align: justify;">
<br /></div>
<h4 style="text-align: justify;">
The Idea behind the Marple</h4>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
The main idea behind this new approach is to do possible analysis on the router itself without any network delays. Plus, to send the exterior server summary instead of raw packet data. This will result in saving both the processing time as well as bandwidth.</div>
<div style="text-align: justify;">
<br /></div>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAgMkKWlCgMrFDps0qDZ0E6bNMg6OYpYvylZadnGp5pxl0uxH9n2DwoasT3j_BHyEtPjJki_9kcKMe9MzCtB7npJekAgSo-n9J1aMOJQXw_mEhFZA4xunfQgLzMezlZCSIEgcNO8B8B5w/s1600/Roger+Samara+-+Routing.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img alt="Roger Samara - Router" border="0" data-original-height="703" data-original-width="1440" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAgMkKWlCgMrFDps0qDZ0E6bNMg6OYpYvylZadnGp5pxl0uxH9n2DwoasT3j_BHyEtPjJki_9kcKMe9MzCtB7npJekAgSo-n9J1aMOJQXw_mEhFZA4xunfQgLzMezlZCSIEgcNO8B8B5w/s640/Roger+Samara+-+Routing.png" title="Roger Samara - Router" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><b>Roger Samara - Router</b></td></tr>
</tbody></table>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
In fact, Marple is built to analyze the transmission of every computer transferring data through the router. This is according to <b><a href="https://www.linkedin.com/in/rogersamara" target="_blank"><span style="color: blue;">Roger Samara</span></a></b> that the problem is that this networking device has the memory to store only 64,000 connections.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
This system is able to monitor more transmissions through a variation on caching i.e. a common computer science technique. Here, the Marple kicks off the data for newer data.</div>
<h3 style="text-align: justify;">
<br />Wrapping Up</h3>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
From hundreds to thousands of processors and Ethernet to ATM, the administrators need some tools for monitoring the network traffic. Actually, the main purpose of network traffic monitoring is to count the IP traffic between individual’s local area network and Internet. The Marple system endows the real-time traffic accounting as well as monitoring.</div>
</div>
Roger Samarahttp://www.blogger.com/profile/00546007119424295915noreply@blogger.com0tag:blogger.com,1999:blog-7313248531468171079.post-9937653907720288432018-01-02T21:10:00.000-08:002018-07-04T23:13:40.688-07:00Robotics: A Look at The Future Technology<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
What do you know about the future of the robotics? Well, we can't say anything for sure as technology is evolving at a rapid pace in all areas, such as artificial intelligence and machine learning. According to <a href="https://rogersamara.blogspot.com/" target="_blank"><b><span style="color: blue;">Roger Samara</span></b></a>, one thing is obvious: Robots will have a great role in the life of a common man as well, not to mention that they will be used in the industries as well.</div>
<div style="text-align: justify;">
<br /></div>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><span style="margin-left: auto; margin-right: auto;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijFjnQFECPMrc7_F6aME90Vaqp-XcauQ4oSUxHcerPl81IyIU1Kf8lJtuil25wyUGRuG96xxsGDcpTHzEQS-VnkBg85Q7tYAvs74WbFHahwwImXEuzvHCn8a880ozCittd61SDjXM53ho/s640/Roger+Samara+Robotics.jpg" target="_blank"><img alt="Roger Samara_Robotics" border="0" data-original-height="518" data-original-width="778" height="426" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijFjnQFECPMrc7_F6aME90Vaqp-XcauQ4oSUxHcerPl81IyIU1Kf8lJtuil25wyUGRuG96xxsGDcpTHzEQS-VnkBg85Q7tYAvs74WbFHahwwImXEuzvHCn8a880ozCittd61SDjXM53ho/s640/Roger+Samara+Robotics.jpg" title="Roger Samara_Robotics" width="640" /></a></span></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><b><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijFjnQFECPMrc7_F6aME90Vaqp-XcauQ4oSUxHcerPl81IyIU1Kf8lJtuil25wyUGRuG96xxsGDcpTHzEQS-VnkBg85Q7tYAvs74WbFHahwwImXEuzvHCn8a880ozCittd61SDjXM53ho/s640/Roger+Samara+Robotics.jpg" target="_blank">Roger Samara_Robotics</a></b></td></tr>
</tbody></table>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
A research firm made 10 predictions for robotics that we are going to talk about in this article. The list has some really interesting forecasts that may have a great impact on our society and business.</div>
<div style="text-align: justify;">
<br /></div>
<h4 style="text-align: justify;">
Robots And the future of surgery</h4>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Nowadays, surgeons are using robotics in their surgical operations. As a matter of fact, technological development in AI, navigation, computer vision, MEMS sensor and other technologies have been making the robots consistently better.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Moreover, robotics will speed up the process of innovation, hence disrupting and modifying the paradigm of the future business operations. In addition, robotics can sharpen the competitive edge of a company by improving quality, and increasing productivity. Given below are some predictions that will help you get a glimpse of the future of robotics.</div>
<h4 style="text-align: justify;">
<br /><b>Related:</b> <b><a href="https://rogersamara.blogspot.com/2017/12/roger-samara-5-ways-to-enjoy-virtual.html" target="_blank"><span style="color: blue;">Roger Samara | 5 Ways to Enjoy Virtual Reality</span></a></b></h4>
<div style="text-align: justify;">
<br /></div>
<h3 style="text-align: justify;">
1. Growth of Robotics</h3>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
In 2019, about 30% of the use of robotics in industries will be in the form of a RaaS model of business. This will help businesses cut down on the cost of robot deployment.</div>
<div style="text-align: justify;">
<br /></div>
<h3 style="text-align: justify;">
2. Robotics Officer</h3>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><span style="margin-left: auto; margin-right: auto;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6ugyi-CgxjKGV2I_K9TgA-SiVikUDd109rHTNrNHOcAu8uBsyBHDKoMQ0KsYOcdT4EPIWUOwqTp8v3kgawg8Ug7OzpwoR0P_AOq0rZIP0y0YWVoI3KdB6KubUEuuoHqpkKomDAyoJn9c/s640/Roger+Samara+Robotic+Officer.jpg" target="_blank"><img alt="Roger Samara - Robotics Officer" border="0" data-original-height="461" data-original-width="696" height="422" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6ugyi-CgxjKGV2I_K9TgA-SiVikUDd109rHTNrNHOcAu8uBsyBHDKoMQ0KsYOcdT4EPIWUOwqTp8v3kgawg8Ug7OzpwoR0P_AOq0rZIP0y0YWVoI3KdB6KubUEuuoHqpkKomDAyoJn9c/s640/Roger+Samara+Robotic+Officer.jpg" title="Roger Samara - Robotics Officer" width="640" /></a></span></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><b><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6ugyi-CgxjKGV2I_K9TgA-SiVikUDd109rHTNrNHOcAu8uBsyBHDKoMQ0KsYOcdT4EPIWUOwqTp8v3kgawg8Ug7OzpwoR0P_AOq0rZIP0y0YWVoI3KdB6KubUEuuoHqpkKomDAyoJn9c/s640/Roger+Samara+Robotic+Officer.jpg" target="_blank">Roger Samara - Robotics Officer</a></b></td></tr>
</tbody></table>
<div>
<div style="text-align: center;">
<br /></div>
</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
In 2019, about 30% of the major organizations of the world will use a chief robot officer in order to make their businesses better says, <b><a href="https://www.crunchbase.com/person/roger-samara" target="_blank"><span style="color: blue;">Roger Samara</span></a></b>.</div>
<div style="text-align: justify;">
<br /></div>
<h3 style="text-align: justify;">
3. Evolving Competition</h3>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
In 2020, large organizations will be able to choose from different vendors with the entrance of new players in the multi-billion dollar industry of information and communications in order to increase the deployment of robotics.</div>
<h3 style="text-align: justify;">
<br />4. Talent Race</h3>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
In 2020, the growth of robots will boost the talent race. As a result, about 35% of the jobs related to robotics will be vacant and the mean salary will go up by at least 60%.</div>
<h3 style="text-align: justify;">
<br />5. Regulations</h3>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><span style="margin-left: auto; margin-right: auto;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEja98gPpgOY44l4mNH4d5KP3ytJSLXL1XfXD78oNmpagN1f3Btuh1dnRhJGSzkwHbKePPwA1Vb1cbyt__hoDfJCU-v4xY5cw_qe-_yMSmmN_pm3Upa5xdCRnAZ5sPsQmiQ9GAHbkiW4zXw/s640/Roger+Samara+Robotics+Resolutions.jpg" target="_blank"><img alt="Roger Samara - Robotics Resolutions" border="0" data-original-height="720" data-original-width="1280" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEja98gPpgOY44l4mNH4d5KP3ytJSLXL1XfXD78oNmpagN1f3Btuh1dnRhJGSzkwHbKePPwA1Vb1cbyt__hoDfJCU-v4xY5cw_qe-_yMSmmN_pm3Upa5xdCRnAZ5sPsQmiQ9GAHbkiW4zXw/s640/Roger+Samara+Robotics+Resolutions.jpg" title="Roger Samara - Robotics Resolutions" width="640" /></a></span></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><b>Roger Samara - Robotics Resolutions</b></td></tr>
</tbody></table>
<div>
<div style="text-align: center;">
<br /></div>
</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
In 2019, the governments will introduce new regulations related to robots in order to preserve jobs and resolve privacy, safety and security concerns.</div>
<div style="text-align: justify;">
<br /></div>
<h3 style="text-align: justify;">
6. Software-defined robots</h3>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
In 2020, about 60% of these machines will rely on cloud-based apps in order to introduce new skills, apps and cognitive capabilities. As a result, the world will see a robotic marketplace that will be cloud-based.</div>
<div style="text-align: justify;">
<br /></div>
<h3 style="text-align: justify;">
7. Collaborative robots</h3>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
In 2018, about 30% of the robots will be smart collaborative machines that will be 300% faster than the robots of today. Plus, they will be safely work around humans.</div>
<div style="text-align: justify;">
<br /></div>
<h3 style="text-align: justify;">
8. RoboNet</h3>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
In 2020, about 40% of the commercially available robots will be part of a net of shared intelligence. As a result, the overall operational efficiency of the robots will go up by 200%.</div>
<div style="text-align: justify;">
<br /></div>
<h3 style="text-align: justify;">
9. Automating of operations</h3>
<div>
<br /></div>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><span style="margin-left: auto; margin-right: auto;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6tSVI_MPiL9OtQDXw5-aQdX5uwm2sgreDPRVGFvSKM5x5SFP8FObToyrjCkWFb1KmDlVehhA-lOXvZ8YbqY20OaDj1qx0_jojmeDQ_H17_IdHUxr7c6NG7BwTp4GFHZwX_Fwd0ggSzis/s640/Roger+Samara+Robotics+Automative+Operations.jpg" target="_blank"><img alt="Roger Samara - Automating Operations" border="0" data-original-height="375" data-original-width="500" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6tSVI_MPiL9OtQDXw5-aQdX5uwm2sgreDPRVGFvSKM5x5SFP8FObToyrjCkWFb1KmDlVehhA-lOXvZ8YbqY20OaDj1qx0_jojmeDQ_H17_IdHUxr7c6NG7BwTp4GFHZwX_Fwd0ggSzis/s640/Roger+Samara+Robotics+Automative+Operations.jpg" title="Roger Samara - Automating Operations" width="640" /></a></span></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><b>Roger Samara - Automating Operations</b></td></tr>
</tbody></table>
<div>
<div style="text-align: center;">
<br /></div>
</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Two years from now, around 35% of the big organizations, such as health, logistics, and utilities will use the robots for the purpose of automating operations.</div>
<div style="text-align: justify;">
<br /></div>
<h3 style="text-align: justify;">
10. Ecommerce</h3>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
In 2018, around 45% of the major international e-commerce companies will use robots in their delivery operations and fulfillment warehousing.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
So, hopefully, this will give you a pretty good idea of how the robotics will shape the world in a few years from now.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<b>Article Source: <a href="http://ezinearticles.com/9635097" target="_blank">http://EzineArticles.com/9635097</a></b></div>
</div>
Roger Samarahttp://www.blogger.com/profile/00546007119424295915noreply@blogger.com8tag:blogger.com,1999:blog-7313248531468171079.post-28419302525642129492017-12-28T23:10:00.001-08:002018-07-04T23:14:01.346-07:00Shortcut Keys to Use Microsoft Excel<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
Sometimes, Excel seems too good to be true. All I have to do is enter a formula, and pretty much anything I'd ever need to do <b>manually can be done automatically</b>. Need to merge two sheets with similar data? Excel can do it. Need to do simple math? Excel can do it. Need to combine information in multiple cells? Excel can do it.<br />
<br />
If you encounter a situation where you need to manually update your data, you're probably missing out on a formula that can do it for you. Before spending hours and hours counting cells or copying and pasting data, look for a quick fix on Excel -- <b>you'll likely find one</b>.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<b>Roger Samara </b>is a <b>Computer Technician</b> at Asiatic solution with 10 years of experience. He is <b>master of Computer's</b> world and he is passionate about his work & new technologies introducing in Computer's world. He is fully dedicated to his work. Determine user's technical needs and provide them with appropriate solutions. <b>Install hardware, software and device drivers</b> on standalone computers. Install and configure <b>computer networks including LAN and WAN</b>. Manage network configurations to ensure that all computers on a network can communicate effectively .Test computers peripherals, <b>hardware and software</b> to ensure that they are working appropriately. Upgrade software, patches and operating systems on a continuous basis. Install and configure monitors, keyboards and printers. <b>Troubleshoot hardware and software problems</b>. Act as a technical resource in order to assist users with resolving computer issues. Ensure that all computers are secured effectively by installing and updating antivirus software.<br />
<iframe allowfullscreen="" frameborder="0" height="344" src="https://www.youtube.com/embed/IKX6ihV4fx4" width="459"></iframe></div>
</div>
Roger Samarahttp://www.blogger.com/profile/00546007119424295915noreply@blogger.com0tag:blogger.com,1999:blog-7313248531468171079.post-10473100580991575132017-12-27T22:38:00.000-08:002018-07-04T23:14:11.670-07:005 Ways to Enjoy Virtual Reality<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
Technology is probably one of the best creations human beings have ever made. Not only is technology able to connect people but also gives us exposure to sights, sounds, and feelings that we haven’t experienced in our lifetimes.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
With Virtual Reality, technology now allows us to experience a close to life environment in an imaginary setting. As per Wikipedia, Virtual reality (VR) typically refers to computer technologies that use virtual reality headsets to generate the realistic images, sounds and other sensations that replicate a real environment or create an imaginary setting.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Though VR is still relatively new to the public, there are already a lot of different ways to enjoy VR. Here are some of the virtual settings and activities that you can experience:<br />
<br /></div>
<div style="text-align: justify;">
<h3>
1. Flying</h3>
<div>
<br /></div>
</div>
<div style="text-align: justify;">
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWI1vQNswix1EFFgcNBldhcsN3mvMeRZVQ7Wo8R6V-sIOmbzhP6a5xJrjH3IaJqU91mwmyusQNPggzmwaOz54DXjZMrr2fGUXlRSW2yHGpg0Sdk36xh6bKFk9fQk7yoUbSUMwg27ou_jI/s1600/Roger+Samara+VR+Flying.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img alt="Roger Samara - VR Flying" border="0" data-original-height="600" data-original-width="1066" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWI1vQNswix1EFFgcNBldhcsN3mvMeRZVQ7Wo8R6V-sIOmbzhP6a5xJrjH3IaJqU91mwmyusQNPggzmwaOz54DXjZMrr2fGUXlRSW2yHGpg0Sdk36xh6bKFk9fQk7yoUbSUMwg27ou_jI/s640/Roger+Samara+VR+Flying.jpg" title="Roger Samara - VR Flying" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Roger Samara - VR Flying</td></tr>
</tbody></table>
Ever dreamed of flying? Well, here’s your chance to experience how it feels like. Using VR glasses, you will be able to fly. VR glasses presents to people a very realistic image or video that helps wearers build the momentum and excitement for the whole experience. Aside from that, if you want to experience flying, you may try this new invention made by the researchers of Zurich University’s Interaction Design Program called Birdly. Birdly is a Virtual Reality console that allows a person to lie on a padded, cross-shaped apparatus and gives people the sensation of flying over buildings or across country sides.<br />
<br /></div>
<div style="text-align: justify;">
<h3>
2. Swimming</h3>
<div>
<br /></div>
</div>
<div style="text-align: justify;">
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiD2-THfux3SBtijpp3T-uvqm72KUbDL980Bmsx2OP86UXEwR-8lAwRp11-oHe2Vv4_T3mrzxOrHJLUxYV5m1rXx5capE9vWV9Bw6nfO1ZMyDVQmB52FGSOMNji9tLVmunuT2pEo_8svOc/s1600/Roger+Samara+VR+swimming.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img alt="Roger Samara - VR Swimming" border="0" data-original-height="542" data-original-width="768" height="450" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiD2-THfux3SBtijpp3T-uvqm72KUbDL980Bmsx2OP86UXEwR-8lAwRp11-oHe2Vv4_T3mrzxOrHJLUxYV5m1rXx5capE9vWV9Bw6nfO1ZMyDVQmB52FGSOMNji9tLVmunuT2pEo_8svOc/s640/Roger+Samara+VR+swimming.jpg" title="Roger Samara - VR Swimming" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Roger Samara - VR Swimming</td></tr>
</tbody></table>
In other cases, a VR headset will also let you experience swimming. But it’s more than that. It will also let you feel what it’s like to be swimming under oceans with dozens of fish, sharks, and whales swimming around you. You will definitely feel like being underwater because you will be able to see and hear the beauty and sounds of these sea creatures.<br />
<br /></div>
<div style="text-align: justify;">
<h3>
3. Roller Coaster</h3>
<div>
<br /></div>
</div>
<div style="text-align: justify;">
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgftc9svz855slpFJ3neVy-P0qO1_VyZ6VrgGGvUywvyL6H-T4dEP7wuZpSz16yyUuysAJ0if378SM3vE0xIFH-4LF6qi8iMKN08aSnJsQohNtmjvfnW8vEFYEV6_bFxcBkvaBlvA0a3wI/s1600/Roger+Samara+VR+Roller+Coaster.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img alt="Roger Samara - VR Roller Coaster" border="0" data-original-height="900" data-original-width="1600" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgftc9svz855slpFJ3neVy-P0qO1_VyZ6VrgGGvUywvyL6H-T4dEP7wuZpSz16yyUuysAJ0if378SM3vE0xIFH-4LF6qi8iMKN08aSnJsQohNtmjvfnW8vEFYEV6_bFxcBkvaBlvA0a3wI/s640/Roger+Samara+VR+Roller+Coaster.jpg" title="Roger Samara - VR Roller Coaster" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Roger Samara - VR Roller Coaster</td></tr>
</tbody></table>
If you’re just at home sitting on your couch and have got nothing to do, why not ride a roller coaster? Yes, it’s just that easy when you have your own VR headset! Start feeling the gravity as the coaster twists and turns upside down. There are many VR headsets that have built in games where you can truly experience an extreme roller coaster ride. There is also a simulator called “No Limits 2” which will let you experience roller coasters on a whole new level.<br />
<br /></div>
<div style="text-align: justify;">
<h3>
4. Skydiving</h3>
<div>
<br /></div>
</div>
<div style="text-align: justify;">
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhv7OSn-NRaA3-2rZy9IvF8RTbx4OYzydbpvl9St9J0MOPqsr_AJVCimQMlWS_yp5hvsuJUTUwnqlRT3qDR-ktcYbpHT5RdoOrkZDzhH-vb74hJ_MarDRIAHLARKVLKiWUFhTIAqNaS3so/s1600/Roger+Samara+VR+Skydiving.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img alt="Roger Samara - VR Skydiving" border="0" data-original-height="900" data-original-width="1600" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhv7OSn-NRaA3-2rZy9IvF8RTbx4OYzydbpvl9St9J0MOPqsr_AJVCimQMlWS_yp5hvsuJUTUwnqlRT3qDR-ktcYbpHT5RdoOrkZDzhH-vb74hJ_MarDRIAHLARKVLKiWUFhTIAqNaS3so/s640/Roger+Samara+VR+Skydiving.jpg" title="Roger Samara - VR Skydiving" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Roger Samara - VR Skydiving</td></tr>
</tbody></table>
Skydiving is an extreme sport that some people can only dream of doing because it is really expensive. If you’re looking for a cheaper (and also much safer) way to experience skydiving, then VR is the way. Fly up to high altitudes with “Volo Airsport”, a physics simulator that lets people hang on to their life and experience skydiving.<br />
<br /></div>
<div style="text-align: justify;">
<h3>
5. Flight Zombies</h3>
<div>
<br /></div>
</div>
<div style="text-align: justify;">
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoeozvS8dfWMf9TM8v0FjRTRVJmSE5NDD6F7yU5qQyo1sj4lkgwputqsTaS2_Eur30DWpiSAspgp_WhCOhJ1dg4lIi6gqJOFCAo1HwVlrkWHTNRDBPfTNeliq-XsuAPhCp0Ajv5m_8Q1E/s1600/Roger+Samara+VR+Flight+Zombies.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img alt="Roger Samara - VR Flight Zombies" border="0" data-original-height="640" data-original-width="960" height="426" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoeozvS8dfWMf9TM8v0FjRTRVJmSE5NDD6F7yU5qQyo1sj4lkgwputqsTaS2_Eur30DWpiSAspgp_WhCOhJ1dg4lIi6gqJOFCAo1HwVlrkWHTNRDBPfTNeliq-XsuAPhCp0Ajv5m_8Q1E/s640/Roger+Samara+VR+Flight+Zombies.png" title="Roger Samara - VR Flight Zombies" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Roger Samara - VR Flight Zombies</td></tr>
</tbody></table>
If you are the type of person who is fascinated by the idea of a zombie apocalypse, then VR is your closest way to experience it. So, if you want to experience what it’s like to be in a scene of “The Walking Dead”, download “Zombie Shooter”. It is free on Apple and lets gamers to shoot and kill zombies that are chasing them through the VR headset.<br />
<br />
<b>Source URL: <a href="http://www.biggietips.com/5-ways-to-enjoy-virtual-reality/" target="_blank">http://www.biggietips.com/5-ways-to-enjoy-virtual-reality/</a></b></div>
</div>
Roger Samarahttp://www.blogger.com/profile/00546007119424295915noreply@blogger.com0tag:blogger.com,1999:blog-7313248531468171079.post-67475327855315479762017-12-27T01:40:00.000-08:002018-01-18T20:10:48.135-08:00Simple Guide on Buying Your First PC<div dir="ltr" style="text-align: left;" trbidi="on">
<span style="text-align: justify;">This guide should help you get a better understanding of what all the components of the computer will mean for you and make it easier to decide what you want, need, and which elements to prioritize. That way, you’ll be better equipped to get the right computer for you, and to avoid spending any more money than you must.</span><br />
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen="" class="YOUTUBE-iframe-video" data-thumbnail-src="https://i.ytimg.com/vi/SVeeQSJEZew/0.jpg" frameborder="0" height="300" src="https://www.youtube.com/embed/SVeeQSJEZew?feature=player_embedded" width="400"></iframe></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><span style="margin-left: auto; margin-right: auto;"><a href="https://www.crunchbase.com/person/roger-samara" target="_blank"><img alt="Roger Samara - Computer Buying tips" border="0" data-original-height="900" data-original-width="1600" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgg2n430KUEBEEi9JukhF3Dmmrx17W3M9UnC38KQ7E_5NetSEJvuDWJQEi1_tP7E5q-8NTEGpdZ6ZmLPL8x2OqYjQPTz1iTUgn4N5CvLTCMUTTOyAeMoGDVbAdJ2dCcIPgvvI157D7xZN4/s640/Roger+Samara+Buying+first+PC.jpg" title="Roger Samara - Computer Buying tips" width="640" /></a></span></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><b><a href="https://www.crunchbase.com/person/roger-samara" target="_blank">Roger Samara - Computer Buying tips</a></b></td></tr>
</tbody></table>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div style="text-align: justify;">
<br /></div>
</div>
Roger Samarahttp://www.blogger.com/profile/00546007119424295915noreply@blogger.com0