Business

Wednesday 17 July 2013

Looking for a job? Smartphone apps to help you

| |
0 comments
Finding a job is not easy but a range of smartphone and web apps are designed to customize employment searches and even provide information on the competition. 

Free apps such as SimplyHired, Indeed, and Monster, for iPhone and Android devices, provide job opportunities through a keyword search, and web-based apps, including TwitJobSearch and TweetMyJobs, will scour Twitter for opportunities and send job alerts through the social network. 

A new free iPhone app called TheLadders takes a different approach and sends a list of job opportunities to users based on their employment profile and career goals. 

"One of the big frustrations for job hunters is that they go online to apply for a job and they don't hear back. It's a black hole," said Alex Douzet, chief executive and co-founder of TheLadders, headquartered in New York. 

TheLadders uses algorithms to pick out the 50 best jobs for a user based on location, current title, preferences, seniority, areas of expertise, industry and salary goals. 

"By doing this what we're creating is a new job discovery mechanism that ... actually matches you to opportunities that are relevant to your profile," he explained. 

Job seekers browse opportunities by tapping on a listing to reveal information about the position, company and requirements. Premium users, who pay $25, can also see how they compare to other unnamed applicants who use the app in terms of salary and education. 

When a user deletes a job opening it helps the algorithm learn the user's preferences. By indicating they "like" a potential job, the user's profile is sent to the recruiter. 

Last week Nokia released a new job app for Windows phones called JobLens. It uses augmented reality, which overlays information on the real world as viewed through the device's camera, to show users job openings in their neighborhoods. 

"Knowing proximity to a job is critical in assessing whether it's the right opportunity," said Bryan Biniak, vice president and general manager of global partner and app development at Nokia. 

"We're all trying to find the right work-life balance, and minimizing your commute is an important consideration. Augmented reality gives job seekers this insight," he added. 

JobLens aggregates job postings from popular job search sites including LinkedIn and Indeed. It also connects with social networks to display any personal connections to the company. 

TheLadders' Douzet advises job hunters to be focused, realistic and to apply early because after 72 hours of a job being posted on TheLadders, the chances of hearing back from a recruiter drop by 50 per cent.
Read More

HP launches laptop-cum-tablets, SlateBook x2 and Split x2

| |
0 comments
Hewlett-Packard India has announced a slew of products including notebooks, detachables and All-in-One PCs. HP SlateBook x2 sports a removable screen that also turns into a tablet. By releasing the magnetic hinge, users can move between the two form factors -— tablet and notebook PC. 

Powered by Android and Microsoft Windows 8 operating systems, respectively, these versatile two-in-one devices give people the flexibility to create, consume and share content in more places, claims the company. HP SlateBook x2 runs on Android Jelly Bean 4.2.2 and comes with dual battery system, one battery in the base and other in the tablet to enable users to easily switch from notebook to tablet and back. The SlateBook x2 is priced at Rs 39,990. 

HP Split x2 is a two-in-one detachable PC running on Windows 8 operating system and is powered by Intel Core processor. Just like SlateBook x2, it too sports a removable screen that turns into a tablet. The hard disk in the base expands storage capacity while dual batteries are intended to help on the go users. 

Split x2 also comes with a 2-megapixel HP TrueVision Full HD webcam and the HP ClickPad. It is priced at Rs 64,990. 

The company also launched ENVY Rove20 mobile All-in-One PC, which the company claims is its first mobile All-in-One PC. ENVY Rove20 mobile, which unshakcles desktop PC from the desk, comes with a built-in battery and advanced touch technology. 

The All-in-One PC can easily move from upright to completely horizontal, has a 10-point touch enabled 20-inch diagonal IPS widescreen HD+ (1600 x 900) LED backlit display. It is powered by fourth-generation Intel Core processors and sports a price tag of Rs 69,990. 

Fourth new addition to the company's portfolio is HP Pavilion 11 TouchSmart Notebook with 11.6-inch diagonal capacitive touchscreen. Pavilion 11 TouchSmart Notebook run on Windows 8 operating system and is powered by quad-core processor. 

The notebook's has a two-tone look that features Ano silver lid finish and a midnight black metal interior. Price of the notbeook is Rs 31,990. 

Making another addition to its ultrabook range, HP has launched ENVY TouchSmart 14 Ultrabook that offers up to nine hours of battery life. 

Other features include dual speakers, subwoofer and graphics from NVIDIA. The ultrabook with 2GB of video memory is priced at Rs 64,990. 

The company has also launched multi-OS devices. HP Slate21 All-in-One runs on Android Jelly Bean 4.2 and sports a 21.5-inch Full HD(2) diagonal reclining IPS touchscreen with wide-viewing angles. It comes pre-installed with an HP TrueVision HD Webcam and Wireless Direct (3) and runs on Tegra 4 quad-core NVIDIA processor. 

HP Slate21 All-in-One is priced at Rs 24,990. 

The company also added HP Pavilion TouchSmart 20 and HP Pavilion TouchSmart 23 to its All-in-One range.
Read More

Google eyes television over Internet: Reports

| |
0 comments
US Internet giant Google is scrambling to deliver pay television online and has met with some content providers on licensing, The Wall Street Journal has reported.
"If the Web giant goes ahead with the idea, it would join several other companies planning to offer services that deliver cable TV-style packages of channels over broadband connections," the Journal reported.

"Intel Corp and Sony Corp are both working on similar offerings, while Apple Inc has pitched various TV licensing ideas to media companies in the past couple of years," the report said.

Google's effort, if successful, has the potential to seriously undermine the current pay-cable television "ecosystem," it added.
Read More

Yahoo CEO: Q2 most productive quarter in history

| |
0 comments
Yahoo! said Tuesday its second-quarter profit rose sharply from a year ago, but revenues lagged, offering a mixed picture for chief executive Marissa Mayer's turnaround efforts.
Net profit rose 46 percent from a year ago to $331 million, slightly better than expected, but revenues excluding payments to partners fell one percent to $1.07 billion, the Internet giant said.

"I'm encouraged by Yahoo!'s performance in the second quarter. Our business saw continued stability, and we launched more products than ever before, introducing a significant new product almost every week," said Mayer.

Mayer cited the company's new Yahoo! News, the new Yahoo! Sports app, the redesigned Yahoo! search, the new Flickr, the new Yahoo! Mail for tablet, the Yahoo! Weather app, and the company's new Yahoo! app with Summly.

"This quarter drove tremendous improvements in our product line and our users responded with increased usage and engagement," she said.

She said the quarter was "one of the most productive in the history of Yahoo!"

The company's strategy is based on "people and products, then traffic and revenue," she said, and that traffic is now growing again.

Mayer was hired from Google a year ago to help turn around the Internet pioneer, which had seen its fortunes fade.

Since then, Yahoo! has been on a buying spree, and has also sold shares in China's Alibaba to boost its cash.

Its most publicized deal was a billion-dollar acquisition of the blogging platform Tumblr, expected to help bring a younger audience to Yahoo!.

For its key advertising segments, however, Yahoo! saw its display revenues excluding partner payments fall 11 percent to $423 million, while search ad revenue on the same basis fell five percent to $385 million in the quarter.

"Fortunately for the still-new CEO Marissa Mayer, Yahoo! is currently not being judged on its revenue growth as the company is shrinking some efforts to focus on better earnings opportunities elsewhere," said Jon Ogg at 247 Wall Street.

"Yahoo! showed that it made nine acquisitions to strengthen its products, content, technology, and people."

Shares in Yahoo! fell 2.2 percent to $26.29 in after hours trade.

In a negative for Yahoo!, the company downgraded its outlook for revenues for the third quarter and the full year.

According to the research firm eMarketer, Yahoo! has failed to keep face with rivals in advertising.

Despite seeing growth, Yahoo's share of global digital ad spending is expected to decline to 3.1 percent in 2013 from 3.37 percent last year, eMarketer said. Google and Facebook are grabbing a larger share of that market.
Read More

Lenovo’s 7-inch tablet with calling @ Rs 8,990

| |
0 comments
 Lenovo has started taking orders for its IdeaTab A1000 tablet in India on its official website. The Chinese manufacturer has placed this device in the budget segment and has priced it at Rs 8,990. It will compete against the likes of Acer Iconia B1, Asus MemoPad and Micromax Funbook Talk in the market.

Unveiled at the Mobile World Congress in February this year, Lenovo IdeaTabA1000 has a 7-inch TFT screen with 1024x600p resolution. It runs on Android 4.1 (Jelly Bean) operating system and is powered by a dual-core 1.2GHz Mediatek processor. It also has 4GB internal storage, 1GB RAM and microSD support of up to 32GB.

For connectivity, Lenovo IdeaTabA1000 has features like Wi-Fi, Bluetooth 3.0, microUSB and can be used for voice calling. It has a VGA camera in front for video calling and a 3,500mAh battery.

Lenovo also offers IdeaTabA2107 and IdeaTab 3000 in the Indian market. Other tablets in the country with voice calling functionality include Asus FonePad and Samsung Galaxy Tab 2, though these are priced higher than the new Lenovo device.
Read More

Review Kindle Fire HD 8.9: A tablet for readers

| |
0 comments
Do you know Amazon sells an Android tablet? Unless you are someone who keeps an eye on the world of technology, probably not. This is because Amazon, which launched its first tablet Kindle Fire in 2011, wasn't selling anything other than Kindle -- aka the world's most popular e-book reader -- in India until last month. 

There is a reason for that. Amazon's Android tablets are a bit different. They are not like Samsung's Galaxy Tab or Google's Nexus tablets. The focus of the Kindle Fire tablets - there are two at the moment - is not Android or even the usual tablet experience. The focus is on how these tablets can connect to the content ecosystem Amazon has and help a user get the book, movie or song that he wants and when he wants. 

Without the Amazon's content store, Kindle Fire tablets are virtually useless. So, Amazon put in place an ecosystem (sort of, we will detail it in the following paragraph) in India and started selling the Fire in the last week of June. 

Now that they are here, the question is should you buy them? We have been using Kindle Fire HD 8.9, the flagship Amazon tablet for the last few weeks. To cut a long story short, we can tell you that this is not a tablet for everyone. But for some, this could be a very good device to carry around. 

Simple to use, designed for Amazon
Before we talk about who should buy Kindle Fire and who shouldn't, lets take a look at Fire HD 8.9. 

As the model name suggests, this tablet has a screen size of 8.9 inches and sports a FullHD resolution (1200 x 1920 pixels). In terms of screen size, it is quite close to the full-size iPad that has a 9.1-inch display. However, in terms of design, Fire is an entirely different beast. It has a shell made of plastic unlike the aluminum one that iPad uses. 

The build quality, however, is impeccable and better than what you get with the likes of Nexus 7 and Galaxy Tabs. The back cover has a soft rubber coating, which makes gripping the tablet easier and pleasant. There is also a thin metal strip that runs horizontally across the tablet's back cover, just below the area where you are likely to hold the device while using it in landscape mode. On both sides of the strip there are vents for speakers, which sound loud and clear while playing music or movies. 

The tablet doesn't have a rear camera. The whole design is very minimalistic. The power and volume buttons, placed on the right side of the device, sit flush with shell of the tablet and can be barely distinguished. The back cover can't be removed and there are no ports for a SIM card or microSD cards. The tablet only supports Wi-Fi. 

The tablet is powered by a dual-core processor running at 1.5GHz, has 1GB RAM and 16GB storage. There is 1.3MP front camera for video calls. The screen, which as we noted earlier, carries the HD moniker. It shows pleasant and saturated colours, has great viewing angles and is bright enough to be used in well-lit conditions with ease. 

But in the world of super-high resolution iPads and quad-core Android tablets, hardware is hardly the big story with Fire HD 8.9. 

The real story is the software. Though Fire HD 8.9 is powered by Android, it is unlike any other Android tablet. Amazon has completely customized the user interface on the device. There is no usual home screen, no usual multitasking, no Play store and no widgets. This is good. And bad. It all depends on what you want from your tablet. 

When you power on the device and unlock the screen, you are greeted with a carousel instead of a home screen. This carousel shows you the stuff that is important to you and its content changes the way you use the device. For example, when you use the email app, it will appear in the carousel. Or when you watch a film, it will also appear in the carousel. When they are too many items for your comfort, you can set some as your favourites and quickly access them by clicking on a small star button that appears on the bottom of the screen. 

The idea is that instead of apps, it's the content that matters. Hence, a user should see the content on the screen when he powers on the device. 

The drop-down bar where notifications appear in Android has also been changed. When you swipe down from the top bar, you get access to quick settings. Option to toggle Wi-Fi and change volume or brightness are present. Clicking on 'more' open the Settings app from where a user can access advanced settings. 

Above the carousel, there is a scrollable bar that allows a user to quickly jump into a particular category of content. For example, if you want to access your movies you can tap on the relevant tab. 

The Amazon store is omnipresent. Currently, to Indian users it serves apps and e-books. There is no Android Play store on the device. But most of the popular apps, including games, are available in Amazon app store. Also, if you can manage to get a valid APK file of an Android app, you can manually install it on the Fire tablet by copying it from your computer to the device using USB connection and accessing it through a file explorer, which can be downloaded from Amazon app store. Digital movies and songs, which Indian users can not yet purchase and download from Amazon store, can be copied from your computer to the tablet if you have them. 

As we said earlier, the operating system in Fire HD 8.9 doesn't offer any multitasking. Instead, users navigate between apps by using the onscreen home button or the back button. The overall performance of the device is fast and there is no noticeable lag. But it's not always buttery smooth like the way Nexus 7 or iPad 4 are. Games like Temple Run play fine on the device. For browsing, users can utilize Amazon's Silk browser which offers tabbed browsing. In our use, however, we didn't find the browser to be as good as Chrome, which is available on other Android tablets. 

The battery life of the device is above average. When fully charged, the tablet lasts for around 9 to 10 hours of use. 

Case for Kindle Fire HD 8.9
Fire HD 8.9 is a tablet primarily meant for consuming content. Due to its fantastic screen, watching films on it is a great experience. Though, you will have to make sure that the movies are in MP4 format because formats like AVI and WMV don't always go well with this tablet. 

Access to tens of thousands of books, including classics that are free, means it is also a tablet that is great for those who love to read. 

But we feel the biggest reason to pick up Fire HD 8.9 over any other Android tablet is the way it simplifies the user experience. For non-tech savvy users, this tablet provides an easy way to buy, access and enjoy the content without putting the software or technology in the way. 

Case against Kindle Fire HD 8.9
The biggest strength of Fire HD 8.9 is also its biggest weakness. It's not as versatile as an Android tablet, or even as an iPad 4 and iPad Mini that have access to some fantastic apps and games. Web browsing is better on Android tablets and iPad. Both Android tablets and iPad can do more at the same time. An Android tablet, especially with its widgets, seamless multitasking and a better notification system, feels more complete device compared to Fire HD 8.9, especially if you like to customize your device. 

Fire 8.9 HD vs Nexus 7 vs iPad Mini
Kindle Fire HD 8.9 sells for Rs 21,999. The 3G version of Nexus 7 has been priced at Rs 21,999. And the iPad Mini (Wi-Fi only) sells for Rs 21,900. Of these three, if you need the best tablet experience but are willing to compromise on connectivity, choose iPad Mini. Its only noticeable drawbacks are lack of 3G connectivity and a screen, which is not as sharp or good as that of Kindle Fire HD 8.9. 

If you want a tablet that should have internet connectivity while you are travelling and are willing to compromise on the screen size, Nexus 7 is fantastic deal. In fact, we consider it to be the most versatile and value for money device among the three tablets here even though quality of apps is slightly better on the iPad Mini. Both iPad Mini and Nexus 7 can also be used to buy or rent movies - and in the case of iPad Mini, songs - from iTunes and Play store, respectively. 

Pick Fire HD 8.9 if you are not very comfortable with software in tablets and want a simple and easy-to-use device that can allow you access to thousands of books, magazines and games. The fact that it has the best screen among the three tablets also means it offers best movie watching experience if you are willing to copy movies from your computer to the device. In a way, Fire HD 8.9 may not be a tablet on which you can do office work while travelling but it can be a perfect gift for your dad.
Read More

Microsoft: Received 400 requests for data from India

| |
0 comments
Microsoft received over 400 requests from India last year for inquiries regarding criminal activity, affecting nearly 600 different accounts, according to the American tech giant. 

Microsoft provided no content data in response to these requests, the company said. 

However, Microsoft did provide non-content data 88.5 per cent of the time, 10.5 per cent of the time Microsoft could not find any data for the account specified, and one per cent of the time Microsoft rejected the request for not meeting legal requirements. 

The American tech giant received as many as 418 requests from Indian law enforcement agencies in 2012 which were inquiries regarding criminal activity and in all affected 594 different accounts or IDs. 

On information related to Skype, the Indian government made 53 requests to Microsoft, which in all were related to 101 accounts. 

However, requests made by the Indian government in both the email and Skype categories are far less than that of other countries. 

Curiously in the email requests, the list is topped by Turkey with 11,434 requests affecting 14,077 accounts; while the US made 11,073 requests affecting 24,565 accounts. 

These countries were followed by Britain (9225 requests affecting 14,301 accounts), France (8603 requests affecting 17,973 accounts) and Germany (8419 requests affecting 13226 accounts). 

The information comes amid global concern over snooping claims against the US by Edward Snowden, a former CIA contractor. 

Snowden has leaked to the media details of the secret American programme on tapping into the phone details of American nationals and intrusion into private emails of foreign nationals.
Read More

Universities in US vulnerable to cyberattacks

| |
0 comments
America's research universities, among the most open and robust centers of information exchange in the world, are increasingly coming under cyberattack, most of it thought to be from China, with millions of hacking attempts weekly. Campuses are being forced to tighten security, constrict their culture of openness and try to determine what has been stolen. 

University officials concede that some of the hacking attempts have succeeded. But they have declined to reveal specifics, other than those involving the theft of personal data like Social Security numbers. They acknowledge that they often do not learn of break-ins until much later, if ever, and that even after discovering the breaches they may not be able to tell what was taken. 

Universities and their professors are awarded thousands of patents each year, some with vast potential value, in fields as disparate as prescription drugs, computer chips, fuel cells, aircraft and medical devices. 

"The attacks are increasing exponentially, and so is the sophistication, and I think it's outpaced our ability to respond," said Rodney J. Petersen, who heads the cybersecurity program at Educause, a nonprofit alliance of schools and technology companies. "So everyone's investing a lot more resources in detecting this, so we learn of even more incidents we wouldn't have known about before." 

Tracy B. Mitrano, the director of information technology policy at Cornell University, said that detection was "probably our greatest area of concern, that the hackers' ability to detect vulnerabilities and penetrate them without being detected has increased sharply." 

Like many of her counterparts, she said that while the largest number of attacks appeared to have originated in China, hackers have become adept at bouncing their work around the world. Officials do not know whether the hackers are private or governmental. A request for comment from the Chinese Embassy in Washington was not immediately answered. 

Analysts can track where communications come from — a region, a service provider, sometimes even a user's specific Internet address. But hackers often route their penetration attempts through multiple computers, even multiple countries, and the targeted organizations rarely go to the effort and expense — often fruitless — of trying to trace the origins. American government officials, security experts and university and corporate officials nonetheless say that China is clearly the leading source of efforts to steal information, but attributing individual attacks to specific people, groups or places is rare. 

The increased threat of hacking has forced many universities to rethink the basic structure of their computer networks and their open style, though officials say they are resisting the temptation to create a fortress with high digital walls. 

"A university environment is very different from a corporation or a government agency, because of the kind of openness and free flow of information you're trying to promote," said David J. Shaw, the chief information security officer at Purdue University. "The researchers want to collaborate with others, inside and outside the university, and to share their discoveries." 

Some universities no longer allow their professors to take laptops to certain countries, and that should be a standard practice, said James A. Lewis, a senior fellow at the Center for Strategic and International Studies, a policy group in Washington. "There are some countries, including China, where the minute you connect to a network, everything will be copied, or something will be planted on your computer in hopes that you'll take that computer back home and connect to your home network, and then they're in there," he said. "Academics aren't used to thinking that way." 

Bill Mellon of the University of Wisconsin said that when he set out to overhaul computer security recently, he was stunned by the sheer volume of hacking attempts. 

"We get 90,000 to 100,000 attempts per day, from China alone, to penetrate our system," said Mr. Mellon, the associate dean for research policy. "There are also a lot from Russia, and recently a lot from Vietnam, but it's primarily China." 

Other universities report a similar number of attacks and say the figure is doubling every few years. What worries them most is the growing sophistication of the assault. 

For corporations, cyberattacks have become a major concern, as they find evidence of persistent hacking by well-organized groups around the world — often suspected of being state-sponsored — that are looking to steal information that has commercial, political or national security value. The New York Times disclosed in January that hackers with possible links to the Chinese military had penetrated its computer systems, apparently looking for the sources of material embarrassing to China's leaders. 

This kind of industrial espionage has become a sticking point in United States-China relations, with the Obama administration complaining of organized cybertheft of trade secrets, and Chinese officials pointing to revelations of American spying. 

Like major corporations, universities develop intellectual property that can turn into valuable products like prescription drugs or computer chips. But university systems are harder to secure, with thousands of students and staff members logging in with their own computers. 

Mr. Shaw, of Purdue, said that he and many of his counterparts had accepted that the external shells of their systems must remain somewhat porous. The most sensitive data can be housed in the equivalent of smaller vaults that are harder to access and harder to move within, use data encryption, and sometimes are not even connected to the larger campus network, particularly when the work involves dangerous pathogens or research that could turn into weapons systems. 

"It's sort of the opposite of the corporate structure," which is often tougher to enter but easier to navigate, said Paul Rivers, manager of system and network security at the University of California, Berkeley. "We treat the overall Berkeley network as just as hostile as the Internet outside." 

Berkeley's cybersecurity budget, already in the millions of dollars, has doubled since last year, responding to what Larry Conrad, the associate vice chancellor and chief information officer, said were "millions of attempted break-ins every single week." 

Mr. Shaw, who arrived at Purdue last year, said, "I've had no resistance to any increased investment in security that I've advocated so far." Mr. Mellon, at Wisconsin, said his university was spending more than $1 million to upgrade computer security in just one program, which works with infectious diseases. 

Along with increased spending has come an array of policy changes, often after consultation with the FBI. Every research university contacted said it was in frequent contact with the bureau, which has programs specifically to advise universities on safeguarding data. The FBI did not respond to requests to discuss those efforts. 

Not all of the potential threats are digital. In April, a researcher from China who was working at the University of Wisconsin's medical school was arrested and charged with trying to steal a cancer-fighting compound and related data. 

Last year, Mr. Mellon said, Wisconsin began telling faculty members not to take their laptops and cellphones abroad, for fear of hacking. Most universities have not gone that far, but many say they have become more vigilant about urging professors to follow federal rules that prohibit taking some kinds of sensitive data out of the country, or have imposed their own restrictions, tighter than the government's. Still others require that employees returning from abroad have their computers scrubbed by professionals. 

That kind of precaution has been standard for some corporations and government agencies for a few years, but it is newer to academia. 

Information officers say they have also learned the hard way that when a software publisher like Oracle or Microsoft announces that it has discovered a security vulnerability and has developed a "patch" to correct it, systems need to apply the patch right away. As soon as such a hole is disclosed, hacker groups begin designing programs to take advantage of it, hoping to release new attacks before people and organizations get around to installing the patch. 

"The time between when a vulnerability is announced and when we see attempts to exploit it has become extremely small," said Mr. Conrad, of Berkeley. "It's days. Sometimes hours."
Read More

Now, human pee to charge cellphones

| |
0 comments
Pee power! In a world first, UK scientists claim to have developed a novel method to charge mobile phones - using human urine. 

Scientists working at the Bristol Robotics Laboratory have described the "breakthrough" finding of charging cell phones using urine as the power source to generate electricity. 

"We are very excited as this is a world first, no-one has harnessed power from urine to do this so it's an exciting discovery. Using the ultimate waste product as a source of power to produce electricity is about as eco as it gets," Dr Ioannis Ieropoulos from University of the West of England (UWE), Bristol, an expert at harnessing power from unusual sources using microbial fuel cells, said. 

"One product that we can be sure of an unending supply is our own urine. By harnessing this power as urine passes through a cascade of microbial fuel cells (MFCs), we have managed to charge a mobile phone. The beauty of this fuel source is that we are not relying on the erratic nature of the wind or the Sun, we are actually re-using waste to create energy," said Ieropoulos. 

He said so far the microbial fuel power stack that scientists have developed generates enough power to enable SMS messaging, web browsing and to make a brief phone call. 

"Making a call on a mobile phone takes up the most energy but we will get to the place where we can charge a battery for longer periods. The concept has been tested and it works - it's now for us to develop and refine the process so that we can develop MFCs to fully charge a battery," he said. 

The Microbial Fuel Cell (MFC) is an energy converter, which turns organic matter directly into electricity, via the metabolism of live microorganisms, researchers said. 

Essentially, the electricity is a by-product of the microbes' natural life cycle, so the more they eat things like urine, the more energy they generate and for longer periods of time; so it's beneficial to keep doing it, they said. 

The electricity output from MFCs is relatively small and so far we have only been able to store and accumulate these low levels of energy into capacitors or super-capacitors, for short charge/discharge cycles. 

This is the first time we have been able to directly charge the battery of a device such as a mobile phone and it is indeed a breakthrough, researchers said. 

Scientists believe that the technology has the future potential to be installed into domestic bathrooms to harness the urine and produce sufficient electricity to power showers, lighting or razors as well as mobile phones. 

The study was reported in the Royal Society of, 'Chemistry Journal of Physical Chemistry Chemical Physics'.
Read More

‘Cyberattacks on stock exchanges put markets at risk

| |
0 comments
Around half of the world's securities exchanges were the target ofcyberattacks last year, according to a paper based on a survey of 46 exchanges.

The prevalence of attacks along with the interconnected nature of the markets creates the potential for widespread impact, said the joint staff working paper by the International Organization of Securities Commissions' (IOSCO) research department and the World Federation of Exchanges Office. (Link to the report:)

"There could be systemic impacts ... from cyber attacks in the securities markets, especially considering that our financial system is relying more and more on technological infrastructure," the report's author, Rohini Tendulkar of the IOSCO Research Department, said in an interview.

Among the exchanges surveyed, 53 per cent said they experienced a cyber attack last year. The most common forms were Denial of Service attacks, which seek to disrupt websites and other computer systems by overwhelming the targeted organizations' networks with computer traffic, and viruses.

Other forms of cybercrimes reported by the exchanges included laptop theft, website scanning, data theft, and insider information theft. None of the exchanges reported financial theft as part of the attacks.

"Cybercrime also appears to be increasing in terms of sophistication and complexity, widening the potential for infiltration and large-scale damage," the report said, adding that a major attack could result in widespread public mistrust and a retreat from the markets.

In Britain, worries over hacking and other cyberattacks have pushed aside the euro zone crisis as the top risk for that country's banks, a senior Bank of England official said last month.

In the United States, exchange operators Nasdaq OMX Group

and BATS Global Markets said in February of last year that they were targeted with denial of service attacks. In October 2011, NYSE Euronext's New York Stock Exchange's website was inaccessible for 30 minutes, according to an Internet monitoring company, but the exchange said there was no interruption of service.

And in 2010, hackers who infiltrated Nasdaq's computer systems installed malicious software that allowed them to spy on the directors of publicly held companies, Reuters reported.

There is limited data on the costs of cyber-crime to securities markets, but the paper said a number of studies have looked at the costs of cybercrime to society as a whole, with estimates ranging between $388 billion to $1 trillion.

The exchanges in the survey said the direct and indirect cost of cyberattacks cost them each less than $1 million last year.

A spokeswoman for BATS said on Tuesday the exchange operator invests heavily in proactive security technology, and has made some significant hires on the security side, though for competitive and security issues, she could not give more details.

Nasdaq and NYSE declined to comment.

The lack of widely available insurance against cybercrime adds to the risk, as nearly four in five exchanges would have to bear the costs of a major attack themselves, the survey found.

The 58-page report said the survey of exchanges was the first of a series of surveys on cybercrime across different types of securities market actors.
Read More

Business

Tech

chikita

new amazon

tech business

Powered by Blogger.