Category Technology

What is unique about BurnNote.com?

Do you need to share sensitive/confidential information with a friend or colleague yet you’re nervous about leaving a trace of the conversation on the net? If that’s the case, you should give Burn Note a try. Burn Note lets you send messages over email without leaving a long-term record of the contents. After you write a note, a private link is generated, which you can send to your recipient. Once the recipient reads the note, Burn Note automatically ‘burns’ the note from its server and removes any trace of it from phones and computers. You can allow/disallow a recipient from copying a text, set how the message will be displayed, set a timer after which the note will be burned/deleted from the Internet or even add a password if you’re feeling particularly paranoid.

Not a million options here, that’s the beauty of the system. If you want to customize things a bit however, feel free. Just note, even if you leave everything at their defaults, all notes will be deleted after 72hours opened or not. To check the copies of notes you sent, click on your username and select Notes. To check the copies of notes you sent, click on your username and select Notes. It will you show the email address and the time at which the Note was sent to a specific person.

Credit : Groovy post

Picture Credit : Google 

What is CTX’s Brookstone Virtual Keyboard?

CTX’s Brookstone Virtual Keyboard turns any flat surface into a touchscreen QWERTY keypad, all the while fitting nicely inside a small keychain. The smallest (1.5″) and most affordable (US$100) virtual keyboard to date, it projects a laser outline of a full-sized QWERTY keyboard in front of it, while an optical sensor tracks a user’s finger movements as they type. A Bluetooth connection lets it sync wirelessly to most smart devices, and a lithium ion battery holds enough power for two hours of typing and can be recharged through USB. Aside from portability, the keyboard is also much more sanitary than a physical one that accumulates dust and grime the more it’s used.

You can connect this keyboard to your smart-phones, iPhones, iPad, tablets, desktop, Pcs, etc. It usually works on those mobile devices which have at least Android version 3.1. You can use this keyboard both in the office and at home. Brookstone is a red laser projection virtual keyboard.

This projection keyboard is specially designed for the people who face difficulty in typing on mobile touchPad. These keyboards are also connected to your desktops via Bluetooth. You can use the keyboards during traveling or when you have no space to spare on your laptop. These virtual keyboards usually work right on smooth and flat surfaces.

Picture Credit : Google 

Where nuclear power is used to generate electricity in Europe?

An important world record in the field of nuclear science is held by Britain, where the world’s first atomic power station was built in 1956 at Calder Hall.

Since then, the generation of electric power by atomic or nuclear reactors has become increasingly important in Europe, where over 10 percent of total generating capacity is now nuclear. This is a higher proportion than in any other continent.

The leading European nuclear country in terms of nuclear power stations is France, which generates about a third of its electricity from nuclear fuels. Then come Germany, Britain, Sweden, Finland, Spain, Switzerland, Belgium, Bulgaria, Italy, Czechoslovakia, Yugoslavia and The Netherlands.

British nuclear power stations use a variety of different kinds of reactors, including an experimental fast breeder reactor at Dounreay. This is a kind of reactor that produces more fuel than it consumes and it could in theory generate immense amounts of power in the future.

However the technological problems involved have proved extremely difficult to solve and it is now doubtful whether the fast breeder will ever fulfil its early promise. Although nuclear power stations have to date worked well and safely throughout Europe, there is a mounting problem of radioactive waste disposal.                                                                                                                                                                                                          

 

Picture Credit : Google

How computers are used in industry?

The electronic computer is used in many fields of activity and is extremely valuable in doing complicated work accurately and quickly. It has removed much of the drudgery from such routine tasks as telephone se wonderful machines work? We can see in the simple example of checking the stocks held by a warehouse.

In large scale industries it costs a great deal of money to keep a large number of goods in store. Nevertheless a company must always know how many goods it has at a given time in case it runs out of any item. So there must always be a reserve level below which stocks must not go. When that level is reached the company orders more goods to be delivered.

One way of keeping a check is to use a punched-card system. Each article which is delivered to the warehouse has its own card punched with required information which may relate to style, colour, price, size or other relevant details, and this is fed into computer.

When the article is sold and leaves the warehouse the computer is fed with this information too. At any time the computer can show exactly how many of those articles are in stock and if the stocks have to be replenished. The computer does this job with great speed and accuracy and can give an account of exactly how many articles of many different types are in stock.

The initial effect of computers is as an efficient means of performing complicated or routine tasks. In the long term, however, they will make new and different activities possible for instance, education and many occupations will be greatly affected as methods of storing and retrieving vast quantities of information are further developed.

 

Picture Credit : Google

How to do Safety check in Google Chrome?

Chrome comes with a built-in tool to check for enhanced protection. Head over to Chrome Settings, and click on the Safety Check button on the left sidebar. Alternatively, you can go to chrome://settings/safetyCheck to access the safety check page directly. The Safety Check tool will then verify that Chrome is up-to-date, cross-check whether all your stored passwords are complex and not leaked in any data breaches, and confirm that Safe Browsing is set up properly. It will even check if you are protected from any potentially malicious extensions. Run it once in a while.

With this check Chrome will check all your stored passwords are complex and not leaked in the previous data breaches. In order to do this check, you have to login with your Google account. It helps Google to send the passwords in encrypted manner and check the database to match if the password is in the previous data breaches.

The result of the safe browsing section depends on the level of protection you have enabled on your browser. By default, Chrome will use the standard protection and hence you will see a message like “Standard protection is on. For even more security, use enhanced protection.”

 

Picture Credit : Google

What is deepfake app?

Deepfake generally refers to images on videos in which the face and/or voice of a person, usually a public figure has been manipulated using artificial intelligence software to generate visual and audio content with a high potential to deceive. Deepfakes are a source of concern because they are created to be intentionally misleading, such as by making it look like a politician said something they didn’t, or making it appear like a celebrity was in a video they weren’t in.

Everyone from academic and industrial researchers to amateur enthusiasts, visual effects studios and porn producers. Governments might be dabbling in the technology, too, as part of their online strategies to discredit and disrupt extremist groups, or make contact with targeted individuals, for example.

It is hard to make a good deepfake on a standard computer. Most are created on high-end desktops with powerful graphics cards or better still with computing power in the cloud. This reduces the processing time from days and weeks to hours. But it takes expertise, too, not least to touch up completed videos to reduce flicker and other visual defects. That said, plenty of tools are now available to help people make deepfakes. Several companies will make them for you and do all the processing in the cloud. There’s even a mobile phone app, Zao, that lets users add their faces to a list of TV and movie characters on which the system has trained.

 

Picture Credit : Google