Monday, September 9, 2019

Which search engines give you additional layers of privacy?


Which search engines give you additional layers of privacy?


With concerns rising about what data is collected when using the internet, many popular browsers now offer a private browser option in addition to a non-private one. The most well-known being InPrivate on Internet Explorer and Incognito mode on Google Chrome.

While these private browsers can enhance your privacy on the internet there are a range of other browsers available that enable you to conduct even more private searches by hiding more of your data that can be collected when using search engines.

Firstly, it is important to understand that when you are scouring the web without a private browser, your search engine keeps a record of what you are looking at (your history), saves cookies from the websites you visit, and stores form data it can autocomplete later, such as your billing address. It also saves other information, such as a history of files you’ve downloaded, passwords you’ve chosen to save, and bits of web pages to speed page load times in the future (also known as the cache).

This can be problematic if more than one person uses the computer. For example, if someone else comes across a webpage with a password automatically stored, they could access sensitive personal data, or private browsing history.

When using a private browser, the search engine doesn’t store any browsing history, cookies that remember information about you – plus form data and websites are prevented from tracking your visits. This is beneficial in situations such as booking airline flights, as if you repeatedly view the same flight without a private browser, cookies have been known to elevate the price. It also prevents personalized adverts being targeted at you as a company’s algorithm is prevented from collecting data about what products you are most interested in.

However, it is important to understand that using a private browser does not always guarantee total privacy. Your activity may still be visible to the Internet Service Provider (ISP), – the organization that provides the Internet connection. This is the case with Google Chrome, Internet Explorer, Safari Private Browsing and Mozilla Firefox Private Browsing. The website you want to go on may not know you were there, but your search engine will. Additionally, these browsers also retain any files you download even after you close the window, as well as anything you bookmark.

If you would like to use a browser that has an even higher level of privacy, there are some less well-known search engines that provide additional layers of privacy. We have taken a closer look at four options:

Swisscows

Swisscows is a Switzerland based private search engine that launched in 2014 and sources its results from Bing. The website has its own servers and when using Swisscows neither your IP address is recorded nor is the browser you are using (Internet Explorer, Safari, Firefox, Chrome, etc.). Additionally, no search history is saved, the search engine does not record any statistics on its visitors and does not use geo-targeting, as the browser does not know your location. Swisscows positions itself as a family friendly search engine and filters all pornographic and violent results from searches.

MetaGer

MetaGer is a search engine based in Germany, which started in 1996 and gets its results from Bing and Yahoo. The browser is run by a non-profit foundation called SUMA-EV (Association for Free Access to Knowledge). When searching using MetaGer, search requests become anonymous using a proxy server (a gateway between you and the internet) and your IP address is shortened so as not to reveal your full digital fingerprint. Every search result shows the source it came from and gives you the option to open a tab privately using the ‘open anonymously’ link. MetaGer does keep some logs on their own servers but this data is kept no longer than 96 hours and is automatically erased after this time. The search engine does not use any cookies or tracking methods; however, user agent info is passed along to their search partners, which reveals what system you are using e.g. Safari on an iPhone.

Startpage

Startpage is a private search engine based in the Netherlands and collects its results from Google. Although Google is a non-private browser, Startpage pays Google to use its results but then remove all trackers and logs to give users anonymity. Startpage don’t collect or share your personal information because there is none on their servers, meaning you can’t be profiled, and your information can’t be shared with any third parties. Using its proxy “Anonymous View” feature on each result means that your IP address will be hidden, and the website will have no trace you visited the page. Additionally, you can also select the server region you want to use, for example US servers or EU servers, due to GDPR servers in the EU tend to have more stringent rules on privacy.

Qwant

Qwant is a French based search engine, which launched in July 2013 and gathers its results from Bing. Qwant has its own servers, does not put any cookies on your browser, does not store your history and does not do any data profiling. This is because Qwant completely anonymizes your IP address from your search query meaning, two people searching for “trip to Mexico” in Paris and in California will get the exact same result. However, it does keep local storage data, which saves your language preferences. The browser is now one of the most popular in France with over 10 million searches a day.

We hope this helps you when making decisions about which search engine is right for you or inspires you to try a new one. If you would like more information on similar topics you can read these previous posts:

What is the difference between 4G and 5G ?

What is the difference between 4G and 5G?  



The fourth generation of mobile connectivity started to make waves in the late 2000s. 4G made mobile internet speeds up to 500 times faster than 3G and allowed support for HD TV on mobile, high–quality video calls, and fast mobile browsing. The development of 4G was a massive feat for mobile technology, especially for the evolution of smartphones and tablets.

4G is now common throughout the world, but things are about to change again. The Internet of Things is now a real possibility and 4G will not be able to manage the huge number of connections that will be on the network. It is expected that there will be more than 20bn connected devices by 2020, all of which will require a connection with great capacity. This is where 5G comes into force.

5G has started to create a hype recently when we saw the first trials of the capabilities of the network taking place. What is more, some of the capabilities of 5G were demonstrated during the 2018 Winter Games in PyeongChang, making the games the most exciting to date for both fans and participants.

So, what makes 5G so different from 4G?

Simply said, 5G is widely believed to be smarter, faster and more efficient than 4G. It promises mobile data speeds that far outstrip the fastest home broadband network currently available to consumers. With speeds of up to 100 gigabits per second, 5G is set to be as much as 100 times faster than 4G.

Low latency is a key differentiator between 4G and 5G. Latency is the time that passes from the moment information is sent from a device until it can be used by the receiver. Reduced latency means that you’d be able to use your mobile device connection as a replacement for your cable modem and Wi-Fi. Additionally, you’d be able to download and upload files quickly and easily, without having to worry about the network or phone suddenly crashing. You’d also be able to watch a 4K video almost straight away without having to experience any buffering time.

5G will be able to fix bandwidth issues. Currently, there are so many different devices connected to 3G and 4G networks, that they don’t have the infrastructure to cope effectively. 5G will be able to handle current devices and emerging technologies such as driverless cars and connected home products.

But it must remember that these scenarios are all still theoretical, and it will take a lot of investment by governments and mobile network operators to make them work. The security aspect of 5G also still needs to be figured out. With a greater number of users and improved services, 5G opens the door to a new level of threat. Governments and mobile operators must ensure they have the correct level of security in place before 5G can be rolled out.

Do you have any questions about the difference between 4G and 5G networks? Did we miss anything out? Let us know by leaving a comment below.

If you are interested in the differences in network coverage of 3G, 4G and 5G you can also read our post about this here.

Wednesday, September 4, 2019

Everything about NASA space station


                      15 Out-of-This-World Facts About the                                                   International Space Station

                                                                                                                                                    Today marks the 16th anniversary of the first space shuttle flight to assemble the International Space Station. Let’s celebrate 16 years of the ISS with 15 things you may not have known about the world’s shared space station.


1. Sixteen nations were involved in the construction of the ISS: The United States, Russia, Canada, Japan, Belgium, Brazil, Denmark, France, Germany, Italy, the Netherlands, Norway, Spain, Sweden, Switzerland, and the United Kingdom. 

2. Sixty-five miles per hour may be a pretty standard speed limit on highways here on Earth, but up in orbit, the ISS travels a whopping 5 miles-per-second. That means the station circles the entire planet once every 90 minutes. 

3. You may think your house or apartment is spacious, but it’s got nothing on the ISS. At about 357.6 feet (or 109 meters) long, the International Space Station gives astronauts plenty of room to stretch out. 

4. Made up of hundreds of major and minor components, the ISS is the largest manned object ever put into space. The ISS has a pressurized volume of 32,333 cubic feet, the same as a Boeing 747. It's four times larger than the Russian space station MIR and five times larger than the U.S. station Skylab.

5. The ISS is the single most expensive object ever built. The cost of the ISS has been estimated at over $120 billion.

6.  There are only two bathrooms on the entire station. The urine of both the crewmembers and laboratory animals is filtered back into the station’s drinking water supply, so at least the astronauts will never get thirsty.

7. Just because you’re in space doesn’t mean you can’t get a virus on your computer. The 52 computers onboard the ISS have been infected by viruses more than once. The first was a worm known as the W32.Gammima.AG, which started spreading by stealing passwords to online video games on Earth. It wasn’t a big deal, though—NASA responded by calling the virus a “nuisance.”

8. The ISS is a veritable hub of space traffic. In June of 2014, four separate international spacecraft were docked there, including the Progress M-21M cargo spacecraft, which departed the station on June 9 after a six-month mission to drop off food, fuel, and supplies. In September, a resupply mission from SpaceX visited the station, and an entire new crew arrived that month as well. The station’s full flight schedule has docking events planned through the summer of 2016.

9. The ISS is probably one of the only places you can actually smell space. A former ISS astronaut has described how a “metallic-ionization-type smell” occurs in the area where the pressure between the station and other docking crafts is equalized.  

10. Currently, the ISS is the third brightest object in the night sky after the moon and Venus. Eagle-eyed stargazers can even spot it if they look closely enough—it looks like a fast-moving airplane. If you can’t find it, NASA has a service called Spot the Station that texts you when and where it will pass over your location. If you want the opposite view (though we’re pretty sure you won’t be able to spot yourself), there is a live video feed pointing towards Earth that runs when the crew is off-duty.

11. Though the plan is to de-orbit the ISS in 2024, the oldest module of the station—the Russian-built and American-financed component called “Zarya,” first launched in 1998—can function until 2028 (as will The Unity, the first entirely American ISS component, which was also launched that year). Once the ISS kicks the bucket, the Russians plan to add their leftover modules to their new station, OPSEK (or Orbital Piloted Assembly and Experiment Complex).

12. Because the human body tends to lose muscle and bone mass in zero gravity environments, all astronauts aboard the ISS must work out at least two hours a day to maintain normal Earth-based bodily health. 

13. The electrical systems on the ISS include 8 miles of wire. That’s longer than the entire perimeter of New York City's Central Park.

14. Astronauts eat three square meals a day on the ISS, but when they sit down for a meal, they don’t sit down at all. There are no chairs around the main eating area. Instead, the astronauts simply stabilize themselves and float. Diners have to be very slow and careful when bringing food to their mouths so it doesn't accidentally float across the station. Also, they can’t just stroll over to the refrigerator and grab a snack—all the food is canned, dehydrated, or packaged so it doesn’t require refrigeration. 

15.  Oxygen in the ISS comes from a process called “electrolysis,” which involves using an electrical current generated from the station’s solar panels to split water molecules into hydrogen and oxygen gas.              

Thursday, August 22, 2019

Ways to access all the websites , which are blocked by the govt.and by wifi provider



by- Pankaj Repswal

 HOW CAN WE ACCESS ALL THE THINGS ON INTERNET WITHOUT USING A PAID VPN? 
   
   → so now, i will tell you that how can we do this 


Actually it is not a process , i am talking here about a browser which is none other than TOR {THE ONION ROUTER}     
      

 ⥤  steps to install it and how to use using the wifi 


 1.   Download the setup of tor by using your mobile wifi on the             official  website (TOR BROWSER).
          

  2. When you open it , then it will look like this
            
 here you have to configure it , if you are using the wifi of 
 college or other wifi provider and as we all know that TOR  
 is censored in India so no one can stop us to use this but we 
 have to use it carefully ,for that i will tell you in the last so
that no one can track you .

3. Now click on , as you shown in the pic , after that you have to 
    request a bridge from tor ,because without this you will not be          able to use this using wifi,  

 4.Click as shown , and request a bridge

5. Now enter  the captcha, submit.




6. Now it is ready to use 
     click on  connect.


After this it will take 1-5 min. when open it using wifi which is not allow the access of tor..............


 á”§á•˜á•—  SO THERE ARE SOME WAYS SO THAT NO ONE WILL             BE  ABLE TO TRACK RATHER THAN YOU                                 ALLOW THEM  TO  ACCESS YOUR LOCATION:



The Onion Router aka TOR is a free software and open network that allows people to improve their privacy and security on the Internet. There is nothing better than Tor when the fear of ongoing large-scale surveillance by NSA haunts those concerned about the privacy of their digital communications. Tor secretly routes your system’s Internet traffic over several places on the Internet, thus hiding the real source of the communication, and securing your personal identity.


Tor itself can’t guarantee your privacy and security if you’re not concerned enough. It’s like carrying an umbrella. You can have it with you but there’s no protection from the rain if you don’t use it correctly. In the same manner, you need to know and understand Tor’s usage tips and guidelines to keep your privacy and security in complete control.


1. Do use Tor
Anyone concerned about online privacy should never trust the people at the back of the Internet such as internet service providers, government agencies, web service providers, etc. Tor network is well known for providing online anonymity, and that’s the biggest reason why you should use it.

Tor can be used for any and all kind of sensitive browsing including, but not limited to, reporting abuse or corruption; serious business activities; inter-state or inter-country communications; publishing anonymous posts; sharing personal secrets with family and friends, etc.


2. Don’t use Windows
Windows is simply not the best choice of platform to use Tor in an attempt to improve one’s Internet privacy because of the security bugs and vulnerabilities present in the system may compromise your privacy, even when using Tor.
That is why you shouldn’t be browsing websites through Tor on Windows systems. You should consider running Tor-configured Linux systems such as Tails and Whonix, or you can set up Tor on any of your favourite Linux distribution.


3. Do Update your System
Tor client is simply a software which runs on top of your operating system. That means Tor is only as safe and secure as the system running the Tor client. You must regularly, or preferably daily, update Tor client, Tor-secured applications (browsers, instant messaging clients, email clients, etc.), and the operating system of your computer.

If an attacker is able to get hold of your computer’s operating system, then even running Tor can’t protect you or your digital communications. Always keep your system up-to-date for Tor usage.

4. Don’t use HTTP Websites
The Onion Router, as the name suggests, is only a traffic router and not a tool to encrypt the network traffic throughout the Internet. That means Tor anonymizes the origin of your network traffic and encrypts everything inside the Tor network, but it doesn’t encrypt your Internet traffic outside the network.
This implies that the exit nodes of the Tor network can read your Internet traffic if it’s in the form of plain unencrypted data. That is why you should always use end-to-end encryption such as SSL or TLS when doing sensitive online communications, and that requires you to use HTTPS websites.

You should also consider using add-ons such as HTTPS Everywhere to automatically switch to HTTPS-mode browsing for supported websites.
5. Do Encrypt your Data Storage
Tor does anonymize your Internet traffic’s origin location but it does nothing in securing your digital data on your computer. Security of your data on your system can only be achieved when the information is encrypted using strong cryptographic algorithms.

LUKS or TrueCrypt can be used to encrypt your data to protect you from various threats. LUKS offers a reasonably safe data protection on Linux systems while TrueCrypt also proves to be handy in protecting your data.

6. Don’t use Tor Browser Bundle
Tor Browser Bundle should not be used to protect one’s online privacy and security. FBI’s recent takedown of Freedom Hosting (an anonymous web-hosting service running as a hidden service on the Tor network) was possible due to vulnerabilities in the Tor Browser Bundle.

That is why you shouldn’t use Tor Browser Bundle for browsing websites anonymously through Tor.

7. Do disable JavaScript, Flash and Java
Tor cannot protect your data with active content such as JavaScript, Adobe Flash, Java, QuickTime, ActiveX controls, VBScripts, etc. because these binary applications run with your user account’s privileges, and may access and share your data.

JavaScript is a powerful browser language which websites can use to track you in ways which is not possible to protect using Tor. Java and Adobe Flash run in virtual machines which may ignore your system’s configured proxy settings, and thus bypass Tor’s protection to share your data directly with the websites.

Moreover, they may also store cookies and site’s data separately from the browser and operating system, which may be hard to detect and delete. By disabling these technologies in your system using Tor, you can achieve a greater level of protection.

8. Don’t use P2P
P2P is unwanted in Tor network because it is simply not built for peer-to-peer file sharing. Exit nodes of the network are set up to block file sharing traffic. You abuse Tor network if you download torrents and it slows down other users’ browsing. Moreover, using Tor with BitTorrent is not secure and is a threat to your online anonymity.

Due to the insecure design of BitTorrent clients, using Tor with them doesn’t make you anonymous because those clients send your IP address directly to the tracker and other peers, thus compromising your anonymity.

9. Do delete Cookies and site’s Local Data
Tor does route your network traffic through many relays in order to protect you from traffic analysis. It hides your real identity from the websites using network packets to prevent them from gathering information about you. But websites may use workarounds such as cookies and local data storage to track your online activities, analyze your Internet usage, and detect your real identity.

That is why, you must always drop cookies and site local data while using Tor to protect your privacy. You can also consider using add-on such as Self-Destructing Cookies to automatically delete cookies.
10. Don’t use your Real Email
You should not use your real email on websites while using Tor. Tor is used to protect online privacy and hide real identity. How can you hide your real identity if you’re giving out your real email on the websites? It’s like going to a mask party but wearing your name tag on your costume.

If you’re really privacy-conscious and don’t want to leave your mark anywhere on the Internet while using Tor, then you must consider a virtual identity which includes no matching information from your original, real-world identity.

11. Don’t use Google
You should not use Google to search the Internet if you care for your privacy. Google is known for collecting information on users’ browsing and search data to facilitate the growth of its ads revenue.

You should consider using alternatives such as Startpage and DuckDuckGo. These services offer search results without logging your IP address and storing cookies on your computer. In simple words, these search engines are anonymity-compliant services, and that is why you should use them while using Tor instead of Google.












































































Tuesday, August 20, 2019

How will 5G network power the future in india ?


How will a 5G network power the future?


The government plans to start trials for next generation cellular tech this year. Is India prepared?


The story so far: On Monday, June 3, Union Communications Minister Ravi Shankar Prasad announced that the government will be holding auction for spectrum, which includes airwaves that will be used to offer 5G or fifth-generation services, in the current calendar year. While some countries such as South Korea and the U.S. have begun rolling out commercial 5G services, India is yet to begin trial for these even as the government is targeting 2020 as the launch year for 5G in the country. However, during his first address after taking charge of the ministry, Mr. Prasad said the government plans to start 5G trials in the next 100 days or by mid-September.

What is 5G?

It is the next generation cellular technology that will provide faster and more reliable communication with ultra low latency. A government panel report points out that with 5G, the peak network data speeds are expected to be in the range of 2-20 Gigabit per second (Gbps). This is in contrast to 4G link speeds in averaging 6-7 Megabit per second (Mbps) in India as compared to 25 Mbps in advanced countries, it added.

Who does it benefit?

With 5G technology, consumers will be able to download data heavy content such as 8K movies and games with better graphics in just a few seconds. But once 5G becomes commercial, users will be required to change their current devices in favour of 5G-enabled ones.
However, it is likely that the primary use of the technology will go beyond delivery of services on personal mobiles devices. 5G is expected to form the backbone of emerging technologies such as the Internet of Things (IoT) and machine to machine communications, thereby supporting a much larger range of applications and services, including driverless vehicles, tele-surgery and real time data analytics. The ultra low latency offered by 5G makes the technology desirable for such use cases. Latency is the amount of time data takes to travel between its source and destination.
A government panel on 5G says the technology will extend the use of wireless technologies — for the first time — across completely new sectors of the economy from industrial to commercial, educational, health care, agricultural, financial and social sectors.
The report also stresses that even after the entry of 5G into the Indian networks, the earlier generation mobile technologies (2G, 3G and 4G) will continue to remain in use and that it may take 10 or more years to phase them out.
It is widely accepted that 5G’s value for India may be even higher than in advanced countries because of the lower levels of investments in physical infrastructure. “5G may offer ‘leapfrog’ opportunities by providing ‘smart infrastructure’ that offers lower cost and faster infrastructure delivery,” as per the government panel. One of the primary applications of 5G will be implementation of sensor-embedded network that will allow real time relay of information across fields such as manufacturing, consumer durables and agriculture. 5G can also help make transport infrastructure more efficient by making it smart. 5G will enable vehicle-to-vehicle and vehicle-to-infrastructure communication, making driverless cars, among other things, a reality.

What will be the economic impact?

5G is expected to create a cumulative economic impact of $1 trillion in India by 2035, according to a report by a government-appointed panel. According to a separate report by telecom gear maker Ericsson, 5G-enabled digitalisation revenue potential in India will be above $27 billion by 2026. Additionally, global telecom industry GSMA has forecast that India will have about 70 million 5G connections by 2025.

When will it be launched?

In April, South Korea and the U.S. became the first countries to commercially launch 5G services. South Korea claimed it was the first to do so, beating the U.S. by a couple of hours, a claim disputed by U.S carriers. China too has handed out commercial 5G licences to its major carriers earlier than expected. Mr. Prasad has promised that trials in India will begin by mid-September. During the first term of the Narendra Modi government, the Central government had set a target of 2020 for the commercial launch of 5G services, largely in line with rest of the world. For the trials to begin, the government needs to allot certain amount of spectrum to telcos.
The government launched a three-year programme that started in March 2018 to advance innovation and research in 5G with a budget of ₹224 crore. Ericsson has also installed a 5G test bed at IIT Delhi for developing applications in the broadband and low latency areas. This will help develop India-specific usage scenarios and applications.

What about spectrum auction?

The government plans to undertake spectrum auction in the current calendar year. In a first step towards preparing for these auctions, the Telecom Regulatory Authority of India (TRAI) had in August last year recommended that entire available spectrum be put to auction in the forthcoming sale. As a result a total of 8,644 MHz of spectrum will be put on sale, making it the largest ever such auction. The total base price of the total airwaves on sale is about ₹4.9 lakh crore.
Spectrum auctions are a major revenue earner for the government. In the last auction, held in October 2016, it fetched the government over ₹65,000 crore. However, 60% of the spectrum remained unsold. For 5G spectrum, i.e. the spectrum in 3300-3600 MHz which will be put out for bids for the first time, the regulator has recommended a pan-India reserve price of about ₹492 crore per MHz for unpaired spectrum.

Are there any apprehensions?

Two of the three private telcos, Bharti Airtel and Vodafone Idea, have, however, expressed apprehensions about the auction this year. They have pointed out that the reserve price of these airwaves is very high. Besides, there are currently no India-specific use cases for deployment of 5G.
Telecom industry body Cellular Operators Association of India (COAI) has also expressed concerns about the financial health of the sector amid intense competition and recent phase of consolidation. Currently, the industry’s cumulative debt is pegged at around ₹7 lakh crore.
Airtel, for example, has hinted that it may not participate in the auctions at the current “exorbitant” prices. Vodafone Idea, which is the country’s largest operator, has requested that the 5G spectrum should not be put on sale before 2020 as there is a need to first develop India-specific use cases.
The COAI has also pointed out that 5G is overpriced by at least 30% to 40% compared to international standards and auction in other markets such as South Korea and the U.S. In previous auctions, the government saw no takers for the 700 MHz spectrum, which is used to offer high speed 4G services and was put on sale for the first time, mainly due to the high reserve price. In its recommendations now, the sectoral regulator has said that the prices be reduced by about 43%. The recommended pan-India reserve price for 700 MHz now is ₹6,538 crore per MHz as opposed to ₹11,500 crore last time. Based on TRAI’s recommendation, the Department of Telecom will work out the final details and timing of the auction.
Besides the spectrum, 5G will require a fundamental change to the core architecture of the communication system. Simply upgrading the existing Long Term Evolution core will not be able to support the various requirements of all 5G use cases. A report on 5G by Deloitte stated that it is anticipated that the industry might require an additional investment of $60-70 billion to seamlessly implement 5G networks. Ernst & Young too estimated a similar amount of investment to implement 5G.

Monday, August 19, 2019

8 Top Technology Trends for 2019

   

     

8 Top Technology Trends for 2019 and the Jobs They’ll Create


↠  BY PANKAJ REPSWAL

Technology is now evolving at such a rapid pace that annual predictions of trends can seem out-of-date before they even go live as a published blog post or article. As technology evolves, it enables even faster change and progress, causing the acceleration of the rate of change, until eventually, it will become exponential.
Technology-based careers don’t change at that same speed, but they do evolve, and the savvy IT professional recognizes that his or her role will not stay the same. The IT worker of the 21st century will constantly be learning, out of necessity if not desire.
What does this mean for you? It means staying current with technology trends. And it means keeping your eyes on the future, to know which skills you’ll need to know and what types of jobs you want to be qualified to do.
Here are eight technology trends you should watch for in 2019, and some of the jobs that will be created by these trends. Because the time to train yourself for one of these emerging jobs is now.


  1. Artificial Intelligence (AI)

    Artificial Intelligence, or AI, has already received a lot of buzz in recent years, but it continues to be a trend to watch because its effects on how we live, work and play are only in the early stages. In addition, other branches of AI have developed, including Machine Learning, which we will go into below. AI refers to computers systems built to mimic human intelligence and perform tasks such as recognition of images, speech or patterns, and decision making. AI can do these tasks faster and more accurately than humans.

    AI has been around since 1956 is already widely used. In fact, five out of six Americans use AI services in one form or another every day, including navigation apps, streaming services, smartphone personal assistants, ride-sharing apps, home personal assistants, and smart home devices. In addition to consumer use, AI is used to schedule trains, assess business risk, predict maintenance, and improve energy efficiency, among many other money-saving tasks.

    AI is one part of what we refer to broadly as automation, and automation is a hot topic because of potential job loss. Experts say automation will eliminate 74 MILLIONS JOBS MORE BY 2030 However, automation is creating jobs as well as eliminating them, especially in the field of AI: Pundits predict that jobs in AI will number 23 million by 2020. Jobs will be created in development, programming, testing, support, and maintenance, to name a few. Artificial Intelligence architect is one such job. Some say it will soon rival data scientist in NEED FOR SKILLED PROFESSIONALS

    To learn more about potential jobs in AI, read about BUILDING A CAREER IN AI or why you should earn an AI certification.
  2. Machine Learning

    Machine Learning is a subset of AI. With Machine Learning, computers are programmed to learn to do something they are not programmed to do: They literally learn by discovering patterns and insights from data. In general, we have two types of learning, supervised and unsupervised.

    While Machine Learning is a subset of AI, we also have subsets within the domain of Machine Learning, including neural networks, natural language processing (NLP), and deep learning. Each of these subsets offers an opportunity for specializing in a career field that will only grow.

    Machine Learning is rapidly being deployed in all kinds of industries, creating a huge demand for skilled professionals. The Machine Learning market is expected to grow to $8.80 BILLION BY 2022. Machine Learning applications are used for data analytics, data mining and pattern recognition. On the consumer end, Machine Learning powers web search results, real-time ads, and network intrusion detection, to name only a few of the many tasks it can do.

    In addition to completing countless tasks on our behalf, it is generating jobs. Machine Learning jobs RANK AMONG THE TOP ENGINEERING JOBS on LinkedIn, with almost 2,000 job listings posted. And these jobs pay well: In 2017, the median salary for a machine learning engineer WAS $102224. Machine Learning jobs include engineers, developers, researchers, and data scientists.
  3. Robotic Process Automation or RPA

    Like AI and Machine Learning, ROBOTIC PROCESS AUTOMATION, or RPA, is another technology that is automating jobs. RPA is the use of software to automate business processes such as interpreting applications, processing transactions, dealing with data, and even replying to emails. RPA automates repetitive tasks that people used to do. These are not just the menial tasks of a low-paid worker: UPTO 45% of the activities we do can be automated, including the work of financial managers, doctors, and CEOs.

    Although Forrester Research estimates RPA automation will threaten the livelihood of 230 MILLION OR MOREknowledge workers or approximately 9 percent of the global workforce, RPA is also creating new jobs while altering existing jobs. McKinsey finds that < 5% of occupations can be totally automated, but about 60 percent can be partially automated.

    For you as the IT professional looking to the future and trying to understand technology trends, RPA offers plenty of CAREER OPPORTUNITIES, including developer, project manager, business analyst, solution architect, and consultant. And these jobs pay well. SimplyHired.com says the average RPA salary is $73,862, but that is the average compiled from salaries for junior-level developers up to senior solution architects, with the top 10 percent earning over $141,000 annually.
  4. Blockchain

     

    Although most people think of blockchain technology in relation to cryptocurrencies such as BITCOIN, blockchain offers security that is useful in many other ways. In the simplest of terms, blockchain can be described as data you can only add to, not take away from or change. Hence the term “chain” because you’re making a chain of data. Not being able to change the previous blocks is what makes it so secure. In addition, blockchains are consensus-driven, as explained in this forbes article, so no one entity can take control of the data. With blockchain, you don’t need a trusted third-party to oversee or validate transactions.

    This heightened security is why blockchain is used for cryptocurrency, and why it can play a significant role in protecting information such as personal medical data. Blockchain could be used to drastically improve the global supply chain,as described here, as well as protect assets such as art and real estate.

    And as the use of blockchain technology increases, so too does the demand for skilled professionals. In that regard, we are already behind. According to Techbrunch, blockchain-related jobs are the second-fastest growing category of jobs, with 14 job openings for every one blockchain developer. A blockchain developer specializes in developing and implementing architecture and solutions using blockchain technology. The average yearly salary of a blockchain developer is $130,000.

    The job of a developer is not the only one available in the blockchain space, however. Employers are also looking for software engineers, consultants and project managers. Jobs are available at financial institutions, but also in retail and healthcare, and soon probably manufacturing as well.
  5. Edge Computing

    Formerly a technology trend to watch, cloud computing has become mainstream, with major players AWS (Amazon Web Services), Microsoft azure and Google Cloud dominating the market. The adoption of cloud computing is still growing, as more and more businesses migrate to a cloud solution. But it’s no longer the emerging technology. Edge is. Move over, cloud computing, and make way for the edge.

    As the quantity of data we’re dealing with continues to increase, we’ve realized the shortcomings of cloud computing in some situations. Edge computing is designed to help solve some of those problems as a way to bypass the latency caused by cloud computing and getting data to a data center for processing. It can exist “on the edge,” if you will, closer to where computing needs to happen. For this reason, edge computing can be used to process time-sensitive data in remote locations with limited or no connectivity to a centralized location. In those situations, edge computing can act like mini datacenters. Edge computing will increase as use the Internet of Things (IoT) devices increases. By 2022, the global edge computing market is accepted to reach at $6.62 billion.
  6. Virtual Reality and Augmented Reality

    Virtual Reality (VR) immerses the user in an environment while Augment Reality (AR) enhances their environment. Although VR has primarily been used for gaming thus far, it has also been used for training, as with Virtual ship, a simulation software used to train U.S. Navy, Army and Coast Guard ship captains. The popular  Pokemon go is an example of AR.

    Both have enormous potential in training, entertainment, education, marketing, and even rehabilitation after an injury. Either could be used to train doctors to do surgery, offer museum-goers a deeper experience, enhance theme parks, or even enhance marketing, as with this Pepsi max bus shelter.

    According to an article at Monster.com, the demand for job candidates with VR knowledge is up 37 percent, but the potential employees are in short supply. That demand will only increase. There are major players in the VR market, like Google, Samsung, and Oculus, but plenty of startups are forming and they will be hiring—or trying to, in light of the shortage. Getting started in VR doesn’t require a lot of specialized knowledge. Basic programming skills and a forward-thinking mindset can land a job, although other employers will be looking for optics as a skill-set and hardware engineers as well.
  7. Cyber Security

    Cybersecurity might not seem like emerging technology, given that it has been around for a while, but it is evolving just as other technologies are. That’s in part because threats are constantly new. The malevolent hackers who are trying to illegally access data are not going to give up any time soon, and they will continue to find ways to get through even the toughest security measures. It’s also in part because new technology is being adapted to enhance security. Three of those advancements are hardware authentication, cloud technology, and deep learning, according to one expert. Another adds data loss prevention and behavioral analytics to the list. As long as we have hackers, we will have cybersecurity as an emerging technology because it will constantly evolve to defend against those hackers.

    As proof of the strong need for cybersecurity professionals, the number of cybersecurity jobs is growing three times fasterthan other tech jobs. However, we’re falling short when it comes to filling those jobs. As a result, it’s predicted that we will have 3.5 million jobs unfilled by 2021.Many cybersecurity jobs pay six-figure incomes, and roles can range from the ethical hacker to security engineer to Chief Security Officer, offering a promising career path for someone who wants to get into and stick with this domain.
  8. Internet of Things

    Although it sounds like a game you’d play on your smartphone, the IOT is the future. Many “things” are now being built with WiFi connectivity, meaning they can be connected to the Internet—and to each other. Hence, the Internet of Things, or IoT. IoT enables devices, home appliances, cars and much more to be connected to and exchange data over the Internet. And we’re only in the beginning stages of IoT: The number of IoT devices reached 8.4 billion in 2017 is and expected to reach 30 billion devices by 2020.

    As consumers, we’re already using and benefitting from IoT. We can lock our doors remotely if we forget to when we leave for work and preheat our ovens on our way home from work, all while tracking our fitness on our Fitbits and hailing a ride with Lyft. But businesses also have much to gain now and in the near future. The IoT can enable better safety, efficiency, and decision making for businesses as data is collected and analyzed. It can enable predictive maintenance, speed up medical care, improve customer service, and offer benefits we haven’t even imagined yet. However, despite this boon in the development and adoption of IoT, experts say not enough IT professionals are getting trained for IoT jobs. Anarticle at itpro.com says we’ll need 200,000 more IT workers that aren’t yet in the pipeline, and that a survey of engineers found 25.7 percent believe inadequate skill levels to be the industry’s biggest obstacle to growth.

    For someone interested in a career in IoT, that means easy entry into the field if you’re motivated, with a range of option to getting started. Skills needed include IoT security, cloud computing knowledge, data analytics, automation, understanding of embedded systems, device knowledge, to name only a few. After all, it’s the Internet of Things, and those things are many and varied, meaning the skills needed are as well.

    Although technologies are emerging and evolving all around us, these eight domains offer promising career potential now and for the foreseeable future. And all eight are suffering from a shortage of skilled workers, meaning the time is right for you to choose one, get trained, and get on board at the early stages of the technology, positioning you for success now and in the future.











Sunday, August 18, 2019

the latest 3 upcoming technologies in the world


1. Google Glass

    AUGMENTED REALITY has already gotten into our life in the forms of simulated experiment and education app, but Google is taking it several steps higher with GOOGLE GLASS . Theoretically, with Google Glass, you are able to view SOCIAL  feeds, text, Google Maps, as well as navigate with GPS and take photos. You will also get the latest updates while you are on the ground.
It’s truly what we called vision, and it’s absolutely possible given the fact that the Google’s co-founder, Sergey Brin has  with skydivers and creatives. Currently the device is only available to some developers with the price tag of $1500, but expect other tech companies trying it out and building an affordable consumer version.






2. Form 1

Just as the term suggests, 3D printing is the technology that could forge your digital design into a solid real-life product. It’s nothing new for the advanced mechanical industry, but a personal 3D printer is definitely a revolutionary idea.
Everybody can create their own physical product based on their custom design, and no approval needed from any giant manufacturer! Even the James Bond’s Aston Martin which was crashed in the movie was a 3D printed product.
Form 1  is one such personal 3D printer which can be yours at just $2799. It may sound like a high price but to have the luxury of getting producing your own prototypes, that’s a reasonable price.
Imagine a future where every individual professional has the capability to mass produce their own creative physical products without limitation. This is the future where personal productivity and creativity are maximized.

3. Oculus Rift

Virtual Reality gaming is here in the form of Oculus rift. This history-defining 3D headset lets you mentally feel that you are actually inside a video game

There are premium products in the market that can do the same, but Rift wants you to enjoy the experience at only $300, and the package even comes as a development kit. This is the beginning of the revolution for next-generation gaming.The timing is perfect as the world is currently bombarded with the virtual reality topic that could also be attributed to Sword Art Online, the anime series featuring the characters playing games in an entirely virtual world. While we’re getting there, it could take a few more years to reach that level of realism. Oculus Rift is our first step.