Friday 27 December 2013

5 simple ways to improve your immune system

The harmattan weather has well and truly arrived, and now is the time when many of us start to struggle with colds and coughs. So what steps can you take to boost your immune system? 
Here’s our top five...

1) Healthy eating
We’re constantly reminded of the importance of diet in relation to weight control, but it’s also very important to the immune system.
It can be tempting to gorge on junk food during the cold winter months, but try instead to focus on getting your five a day of fruit and vegetables, and eating plenty of fibre and lean protein. This provides your body with the right nutrients to combat any illnesses and viruses.

2) Exercising
Making sure you are active on a regular basis is believed to help kick-start your immune system, so try to make time for a spot of exercise; 30 minutes per day is recommended.
Studies show that those who are more active are less likely to suffer from common colds.
Exercising helps to stimulate the production of immune cells in the body, and may also help by encouraging the lungs to expel bacteria out through heavier breathing. Exercise is also a fantastic way to reduce stress, which can be an underlying factor in many illnesses.

3) De-stressing
As previously mentioned, stress can play a large role in wrecking your immune function, so try to ensure that you take time to chill out.
Aside from exercise, you could try having a relaxing bath, listening to some music, or reading a book. In addition, it can be very beneficial to surround yourself with good company and enjoy yourself. In fact, some studies have suggested that laughter can help to boost your immune system.
If you’re feeling under the weather, remember to relax!

4) Plenty of sleeping
Good news; you now have an excuse for grabbing an extra hour or two of sleep! Studies have shown that people who get between 7-9 hours per night are less likely to suffer from illnesses and viruses.
The exact reasoning for the link between sleep and immunity is not entirely clear, but there is certainly evidence to suggest that it can help to improve and maintain your body’s natural defences against illness.
Make sure you get the recommended hours each night, and try to settle into a regular sleep schedule so that your body knows when to shut itself off for the day.
And speaking of routines, you might want to try...

5) Supplementing
Adding immunity booster supplements to your daily regime could be a good way to ensure your body gets all the nutrients it needs to fight illness. Many diets lack certain vitamins and minerals, and so this is an easy way to top up your levels.
A multivitamin that contains vitamin C, zinc, and B vitamins is useful, because these nutrients are proven to boost the function of the immune system.

Monday 23 December 2013

iOS 7 Untethered Jailbreak Now Available

A team of iOS programmers called Evasi0n have jailbroken that latest iPhone/iPod/iPad operating system, iOS 7.0.4. Jailbreaking allows uses to install home-brew software and run unapproved apps from the Cydia software repository.

The jailbreak takes “5 minutes” and works on Windows and OS X. Users at 9to5mac have expressed dismay that this jailbreak came too early – many are worried it won’t work on the next few releases including the major 7.1 that they expect in coming months. Most are reporting that the jailbreak works seamlessly on devices that support iOS 7.x.
Interestingly, this release coincided with fears that the iOS 7 jailbreak had been secretly sold to a third party who would monetize it. Traditionally most jailbreaks have been free but even offering a jailbreak for a brief window on a paid site could be a very lucrative proposition. That is clearly no longer the case.
As with all jailbreaks please remember two words: be prepared. Backup your data and prepare to spend a few hours on a bricked phone if things don’t work correctly. The process has gotten much better over the past few years but there could be bugs. Also remember that this is a jailbreak, not a SIM unlock. This will not allow you to move from carrier to carrier, only install home-brew software.

How to Set Up Email on a New Android Phone

Setting up a brand-new phone can involve numerous aggravations, but if you don't rely on one of the majors like Yahoo and Gmail for email, one of the worst is surely the manual email server configuration. If you use a customized domain name, your Android device's email client is likely to need this extra step.

This could become an even more prevalent problem with the January U.S. launch of the reasonably priced and specified Moto G smartphone, enabling consumers to buy new devices willy-nilly and without contract. Buying such a new device might be easy, but it will likely remain a time-consuming hassle to configure it -- particularly if you're moving operating systems, like Apple iOS or Windows to Android.

In any case, the key is to ignore the Android-device prompts for an automatic setup -- they won't work. Instead, plan to manually enter the data straightaway -- it's faster. Begin by identifying your existing email settings: Open a currently functioning email client and choose the Settings menu. Then copy the settings syntactically character-by-character.

Microsoft Office's Outlook on the PC lets you leave the settings dialogs on-screen while you fiddle with the phone, but the settings can be copied from iPhones or other software clients too; look for the Settings button on the iPhone and drill down for email settings.

Outlook 2013

Step 1: Open Outlook 2013 and choose the File tab. Then click or touch the Account Settings button and again, click or touch the resulting drop-down button.

Step 2: In the resulting Change Account dialog box, double-click on the listed email account that you want to use on your phone. The account type, incoming and outgoing servers, and incoming logon information will be listed.

Step 3: Choose the More Settings button on the dialog and then the Outgoing Server tab in order to see if the outgoing mail server is different from the incoming mail server listed in the previous step. Keep Outlook open.
Tip: Some, but not all, outgoing email servers use settings different from those of the incoming server.

Step 4: Find the email setup area on your new Android 4.0 ("Ice Cream Sandwich") device by choosing Settings in the app drawer and then Accounts and Sync; then Add Account and then Email.
Tip: The newest Android operating system -- Android 4.4 "Kit Kat" -- sets up similarly.

Step 5: Follow the syntax precisely to enter server data, obtained in the earlier steps, into the Android device's email setup menu. Use the Next prompt button to progress forward through screens.
Tip: Check the server syntax, password and User ID if the Android device can't connect to the server. Required ports can be found in Outlook's More Settings. Look for the Advanced tab and copy the port numbers listed there.
Pay attention to outgoing server-required SSL encryption, which will be listed in that Outlook tab too. Outgoing encryption is more prevalent than incoming.

Step 6: On the last screen in the series of Android email setup prompts, choose the Android device's email account options such as inbox-checking frequency, default sending account, notification and syncing.

Sunday 15 December 2013

Start Menu to return in Windows 8.2 codenamed Threshold

windows-threshold-start-menuIt appears as though Microsoft may have some big changes planned for the next version of Windows. Not only could the Start Menu return, but users may also have the option of running Modern apps in windows on the desktop.
Microsoft already introduced a few features in Windows 8.1 aimed at placating users who weren’t all that thrilled about the touch-first, tiled Start Screen. The Start Button once again has a permanent home on the Taskbar, and you can optionally bypass the Start Screen and boot directly to the desktop.
Now, that the Start Menu will indeed be making a return and being a feature that ships with the next Windows iteration. With the Button permanently affixed and boot to desktop as an option, there’s no reason not to give users access to a “classic” mode.
Bringing the Menu back could also be necessary to win over IT administrators, many of whom felt the dramatic changes to the interface in Windows 8 would cause their users confusion and hurt productivity.
Even users of a classic Windows desktop may still want to run brand new apps that were built for the Modern interface. Even you’ll be able to launch them on the desktop, too, windowed alongside your legacy apps.

How Windows will know that you want to do that remains to be seen. One possibility is that you’ll be able to right-click any tile on the Start Screen and pin it to your desktop or taskbar. Launch the Facebook app from your taskbar, and it loads in a window. Launch it from the Start Screen and you’re presented with the immersive view.
This will arrive with the next version of Windows, which Microsoft has codenamed Threshold. The retail product, however, will almost certainly be labeled like Windows 8.1 was, whatever the version number turns out to be.
Judging by the short gap between Windows 8 and 8.1 and the number of new features that were introduced, it’s possible that all this could happen by Windows 8.2 — which may not be that far off.

A Cybersecurity Strategy for Citizens

A Cybersecurity Strategy for CitizensIndividuals must hone a "sixth sense" that helps them detect, anticipate and plan for danger in advance, whether it is online or off. In essence, the sixth sense is another one of our human senses that we already possess but may not know we have. People innately know when something is wrong, dangerous or just "off," and in those situations it is imperative to take action rather than brush it off.
The era of Big Data has scary implications for both personal privacy and national security and puts our society at significant risk. The impact of a cyberattack on a large financial institution or a security breach at a government's secure data house, for example, would have dire consequences. As a result, cybersecurity is one of the greatest challenges facing the world today.
Compounding the problem is that we currently operate with an outdated legal and policy framework that governs how data is collected, stored, shared and used. This weakness further exposes our nation to more breaches of security, leaks of top-secret information and divulgence of vital data from healthcare, manufacturing, commerce and even government agencies. These are issues that our government has to eventually focus on and change.
In the meantime, it's only natural to wonder: Should Big Data and cyberspace as a whole be compromised or ultimately attacked, what will we do then? What happens if the grid goes down and we have to rely on our manual capabilities?
Rather than taking panic-driven action when a cyberattack occurs or dwelling on the fact that an attack may happen, we should collectively focus on prevention and being properly prepared. The safety and security of our families, neighborhoods, cities and nation begin with each one of us, and there are a few things we can do.

1. Build Community and Spread the Word

We can use social media, for example, to teach the masses about safety and security measures, and give them tools that will benefit the greater good. Social media affords the opportunity for all of us to contribute to the world in meaningful ways as it relates to security, do real work for real audiences for real purposes, find great teachers and collaborators from around the world, and become great teachers in our own right. We can share the benefits of what it means to have a good security system in our homes.
For example, when you comment on an article regarding a criminal event in a local neighborhood online newspaper, you can share what security measures you use yourself, such as a particular brand of steel security door or a particular brand of motion sensor flood lights. That not only helps other readers protect their own homes, but it creates an online community as well.
We can also discuss ways our families can approach certain public venues and events, like theme parks and concerts, with strategies to stay safe while out in the world. Such discussions don't have to take place through social media, of course; person-to-person works just as well. If you're standing in line at a grocery store or at a community protection meeting, for instance, that can be a perfect opportunity to share security tips and communicate with neighbors.
If you don't already know, find out who your neighbors are so you can look out for each other.

2. Practice 'Sixth Sense Security'

I also believe it is essential to teach people to recognize and sound the proverbial alarm when something doesn't feel "right" so that we feel empowered to act on it. I call this "Sixth Sense Security." It's not a tech-enabled tool, but it gives us an important opportunity to raise awareness about safety, security and survival measures at the individual level so we are well prepared before an attack happens.
Individuals must hone a "sixth sense" that helps them detect, anticipate and plan for danger in advance, whether it is online or off. In essence, the sixth sense is another one of our human senses that we already possess but may not know we have. People innately know when something is wrong, dangerous or just "off," and in those situations it is imperative to take action rather than brush it off.
For example, when your sixth sense is trying to get your attention, if you take enough time to notice, there will always be something amiss, wrong or not quite right -- in other words, you will always get some kind of a "red flag," like noticing a suspicious bag sitting unattended or a person in your neighborhood or a public area who appears anxious and paranoid. This is what the sixth sense is.
The world is chock full of distractions and we have busy day-to-day lives. However, just slowing down momentarily as needed and skimming the surface of our environment is a way to use our intuition. By using our sixth sense, we can also help prevent cyberattacks, or at least be prepared for them if they do occur.

3. Live Life Modestly

Last but not least, planning for the possibility of a cyberattack is also a matter of reducing our reliance on the grid as much as possible.
Our dependency upon the Internet is vast, so minimizing our dependence on it isn't easy. What's the best approach? I could answer this with another question: How did the pioneers do it? We should think like them, and go back to a time when we were not so dependent on the luxury of on-demand energy in all of its forms. We should have contingency plans that include both short-term and long-term solutions.
For example, we can buy generators for the short term in case something happens with our electricity; we also can learn to go back to life without excessive amenities, such as luxury cars, computers, cellphones and restaurants. We can even learn to start writing letters again instead of relying solely on email.
I encourage you to make a concerted effort to limit your dependence on this infrastructure and prepare for life without it. In the end, all we can do is begin living our lives moderately at best, but prepare accordingly.

Friday 13 December 2013

Supplements to strengthen your teeth and gums

Healthy teeth and gums are imperative to our overall health. Many factors affect oral health. It is therefore important that we take care of our mouths to help reduce health problems.

National Smile Month

National Smile Month is a campaign by the British Dental Health Foundation that aims to increase awareness of the importance of healthy teeth and gums. It is the largest oral health campaign in the UK. Running from 20th May to 20th June, National Smile Month encourages people to:
  • Brush their teeth twice daily for two minutes with a fluoride toothpaste.
  • Cut down on sugary food and drinks.
  • Make regular visits to the dentist.

The vitamins
There are several beneficial vitamins for the gums and teeth. These can help to promote and maintain oral health and wellbeing.

  • Vitamin A – The healing of inflamed gums can be aided by vitamin A. It helps to maintain the soft tissue of the gums. Food sources of vitamin A include beef, liver, milk, cheese and eggs.
  • Vitamin B – The B vitamins are vital for healthy teeth and gums. A vitamin B deficiency can lead to toothache, oral sensitivity, and receding gums. B vitamins can be found in meat, fish and mushrooms, although the diet often does not provide adequate levels.
  • Vitamin C – Due to its healing qualities, vitamin C is an essential vitamin for gum health. It also helps to maintain healthy teeth and gums by preventing inflammation, and holds antioxidant properties that can promote the formation of healthy connective tissues between the teeth and gums. Vegetables and citrus fruits contain vitamin C. Around 20% of UK adults are deficient in vitamin C.
  • Vitamin D – Another essential vitamin for guarding against gum and teeth problems is vitamin D, which can help to prevent inflammation of the gums. It also aids the absorption of calcium. Deficiency in vitamin D is one of the most common deficiencies in the UK. Exposure to the sun provides a source of vitamin D.
  • Calcium – Calcium is an important element in producing and maintaining healthy teeth. It helps to strengthen and maintain density within the teeth. Calcium can be gained from dairy products, such as milk, yoghurt and cheese. However, these should be consumed in moderation, as they contain saturated fats, too much of which can lead to weight gain.
To combat vitamin deficiencies, a Simply Supplements Multivitamin tablet, containing vitamins A-E can provide the necessary levels. Calcium can be taken alongside this to top up levels of the bone building nutrient.

Top tips for oral health
  • Brush twice a day – Brushing on a regular basis is hugely important for maintaining healthy teeth and gums. It is recommended that you brush for two minutes, twice a day. A quarter of UK adults do not brush twice a day. Brushing only once per day increases the risk of developing tooth decay by 33%. Manual toothbrushes should be replaced every three months.
  • Floss – Using dental floss can help to remove food that can’t be reached by brushing alone. Flossing before you brush can increase the effectiveness of brushing by removing trapped food from between the teeth.
  • Healthy diet – Consuming a healthy diet can help to provide the necessary nutrients to maintain healthy teeth and gums. Fruits and vegetables are rich in essential vitamins, while moderate amounts of dairy can provide tooth-building calcium. Drink plenty of water, as this can help to keep the mouth properly hydrated and remove any excess food lodged between the teeth between meals.
  • Visit the dentist – Many of us hate going, but a regular check up with the dentist can help to identify any underlying teeth problems and disorders, and enable any necessary treatment to be arranged.

What to avoid
  • Smoking – Smoking not only causes an unsightly yellowing of the teeth, but the harmful toxins in cigarettes also increase the risk of problems such as tooth decay and gum disease.
  • Sugary food and drinks – Foods that are high in sugar are bad for the teeth. Sugar causes the bacteria in the mouth to produce acid, which can cause cavities and lead to the enamel eroding from the teeth. Fizzy drinks can also cause a similar problem. Even sugar free drinks contain acidic flavourings and artificial sweeteners that can contribute to teeth problems such as dental erosion.

Avoiding excessive intake of harmful foods and chemicals, and providing the body with the essential vitamins for gums and teeth, is vital for maintaining good oral health.

How to Use Twitter's New Crisis Alerts

Among numerous new features rolled out by Twitter in recent months, two of the most useful are crisis alerts and the ability to preschedule your tweets ahead of time. The latter, for instance, lets you schedule tweets for posting in the future rather than tweeting a bunch of texts all in one go. This is social engagement spread over time, and it's particularly useful when managing marketing campaigns.


Twitter has been rolling out some new features in recent months. Two of the most useful are crisis alerts and the ability to preschedule your tweets for marketing purposes.
Here's how to use these handy new tools.

Crisis Alerts

Several agency emergency managers have been trying for years to figure out ways to alert members of the public about crises and incidents, like natural disasters, that could affect them.
Limited success has been achieved with auto-dialer implementation, which is dependent on phone lines' capacity.

Twitter thinks it may have the best answer, though, and has recently made live a system whereby Twitter users can sign up for Twitter-published government warnings that will be sent directly to individuals' Twitter accounts.

Twitter's crisis alert system was successfully trialed during the Washington, DC, naval yard shooting in September.

Step 1: Sign into your Twitter account by browsing to the Twitter website and entering your login details.

Step 2: Browse to the Twitter Alerts Web page and click on the Participating Organizations link. Browse the list of official groups.

Tip: Groups include national agencies like U.S. Department of Homeland Security, Federal Emergency Management Agency and local public safety agencies such as fire and police departments.

Twitter guidelines prohibit the use of its Alerts service for fundraising and general organization updates.

Step 3: Choose the appropriate agency and click on the blue Activate Alerts from that agency button.

Step 4: Confirm the phone number to which you would like to receive Twitter-originating SMS text alert messages. The default number is the number you signed up to Twitter with. Then press Take me to Twitter on the confirmation page.

Tip: Click on Change my Phone Number if you need to. Enter a mobile phone number if you haven't already.

Now, when an incident unfurls you'll receive an SMS text. If you are using one of the mobile Twitter apps, you'll receive a pushed app notification and an orange bell icon adjacent to the Tweet in the client.

Tip: To turn off alerts as SMS notifications, browse to the Twitter Settings Web page and click on the Mobile tab. Then turn off Twitter alerts.

Prescheduling Tweets

Rather than tweeting a bunch of texts all in one go, you might sometimes want to schedule a tweet for later on. This is social engagement spread over time, and it's particularly useful when managing marketing campaigns.

You don't have to participate in paid Twitter advertising campaigns to take advantage of scheduling.

Step 1: Sign into your Twitter account by browsing to the Twitter Advertising website and entering your login details. The Twitter ads website is distinct from the Twitter site but it uses the same User ID and password.

Step 2: Click on the Get Started button and choose your country and time zone. Ignore any Account Ineligible on-screen message or campaign buttons such as New Promoted Tweets Campaign.
Step 3: Click on the Compose New Tweet icon at the top right corner of the page.

Step 4: Compose the tweet, including text and any image or location. Then select the Scheduling tab. Click on the Custom radio button and choose the date and time that you'd like to schedule. Then click on the blue Tweet button.

Step 5: View the scheduled tweet along with its scheduled time by clicking on View All Tweets on the confirmation page.

At the chosen time, your tweet will post automatically.
Tip: To be successful at marketing with Twitter, you need to engage with your followers. Be careful using scheduling -- you can appear inattentive if followers tweet and you fail to respond.

Attacking the Stain on your Carpet.

Let's face it, we live in a world where accidents happen – the unavoidable collision on the expressway, the mishap of tripping down the stairs and the dreaded grape juice stain on your new white carpet. While some accidents may leave you bruised, carpet stains do not have to be one of them. Here are a few tips to help you with your carpet cleaning.
  1. Avoidance. The best method to cleaning any sort of stain is to prevent it from happening in the first place. Do your best to keep all forms of liquids away from your carpet. Try to keep them on surfaces such as tile or linoleum that are easy to wipe down.
  2. Absorb. If you have accidentally spilled that dark-colored grape juice on your new white carpet, the first thing you should do is place an absorbent towel over the stain and place something heavy on it, such as your body. Preferably, this towel should be white, so that you do not add other dye colors to your stain. This will allow the towel to absorb most of the juice from the carpet so it does not seep into the pad.
  3. Type. You need to know what type of carpet you have. If you have a delicate wool carpet, a harsh cleaner may permanently damage your run while carpet cleaning. However, if you have regular carpet you may be able to clean the stain yourself without causing any damage.
  4. Water. Spray some lukewarm water on fresh stains. Never use hot water as it may help the stain to set in permanently. Also, be careful to avoid soaking the carpet, which may cause your stain to spread and permanently damage a larger area of your carpet.
  5. Absorb. Use another white towel to absorb the water that you have just sprayed onto the stain. Repeat this step a few times during your carpet cleaning. Essentially, you are trying to pick up as much of the stain as possible before you actually clean the stain with a detergent solution.
  6. Detergent. If you have been unable to completely remove the stain by the previous methods of carpet cleaning, it is time to get tough and add some detergent to the stain. There are several different brands of detergent on the market for carpet cleaning, but certain detergents such as non-bleaching laundry detergent will also work. If you are using a commercial carpet cleaning solution, follow the manufacturer's instructions for the best stain removal. If you are using a detergent to make a carpet cleaning solution, add 1/4 teaspoon to 1 liter of lukewarm water and mix thoroughly.
  7. Test. Be sure to test this solution on an inconspicuous spot of your carpet to be sure it is safe and will not cause any damage. It's even better to test it on a piece of carpet scrap, if you have any extra lying around.
  8. Soak. Soak a white cleaning cloth with the prepared solution and lay if over the stain.
  9. Knead. Gently knead the soaked cloth back the forth over the stain, working from the outside to the inside. This should allow the stain to lift and not spread any further. Be careful not to rub the stain vigorously as you may damage the carpet fibers.
  10. Dry. Allow the stain to air dry. Never add heat as this may cause the stain to permanently dry into your carpet.
This method should work on treating most stains, before you pull out the carpet cleaner. If you are ever in doubt, consult a professional carpet cleaner.

Apple Patents Curved Touch Screen And Display

Apple has received a patent for curved touchscreens and displays, according toAppleInsider, which describes a system for making curved touch sensitive glass. The method patented by Apple is designed to create a curved screen surface that remains touch sensitive without deforming or distorting the image the display would produce, and would be able to be used in displays, touch-sensitive mice (like the current Magic Mouse) touch pads and other devices.
Apple’s tech differs from some existing curved glass techniques because often the substrate that adds touch sensitivity to a device is flat, regardless of whether the glass panel that covers it is curved. As a result, touch sensitivity suffers, since sometimes a person’s finger is actually further away from the touch panel than it might appear, or than in a traditional, non-curved device.
The patent includes a method for a screen with variations in the curvature of the surface, too. Specifically, it lays out what looks like a series of bubbles, which you could see used as a means for creating a raised pattern over a software keyboard, for instance. This could be handy in creating touch-sensitive button interfaces on things like displays for controlling things like brightness and volume, or for adding more obvious input methods to something like a touch mouse without swaying from the all-touch design.
Apple hasn’t made any overt moves to create curved glass mobile devices like some of its competitors including LG and Samsung, but it is building up some buzz around screens that don’t conform to normal designs. A Bloomberg report from November even went so far as to suggest the company was working on a curved glass iPhone for release in late 2014, and that it was also building better touch input for future devices. A patent for better touchscreen designs for curved glass devices definitely lines up with those reports.
Curved glass may be a fad, but it’s not yet clear what the merits of such a tech will be in terms of scratching a consumer itch. Still, it’s obviously an area worth watching, given that everyone and their brother seems to be putting at least R&D spend into making those next-gen displays more than just flat.

Facebook Videos Now Auto-Play On Mobile, Expect Video Ads Soon

FB could look a lot more like TV soon. While Vine and Instagram Video are booming, you don’t see many people natively uploading videos to Facebook. But now Facebook is bringing auto-play for native videos to all users after testing the feature in September. And it’s just the beginning of a huge push to put Facebook in motion.
Previously, any video uploaded to Facebook directly or shared to the News Feed from Instagram would appear the same as YouTube videos — locked behind a play button. While the conscious decision to stop scrolling for, open the video player, wait for it to load, and watch might not seem like a big deal, it may have been too much of a time and effort investment for some. If people don’t watch videos, they don’t get likes and comments that encourage friends to upload more, and they might skip uploading them themselves.

But after spotting an auto-play video in my feed yesterday and asking Facebook, the company confirms the new format is now internationally rolled out to most iOS and Android users and will reach all of them soon. Facebook tells me it’s still testing this feature on desktop and doesn’t have schedule for when it will roll out there.
On mobile, auto-play gives natively uploaded Facebook videos and ones shared from Instagram an advantage: you don’t have to think about playing them, they play themselves. At first they’ll play in-line even as you scroll, but with no sound. If you tap them, they expand full-screen and the audio kicks in. Videos uploaded to third-party sites retain the old click-to-play-format.
I’ve found the new design to be quite pleasing. As I wrote when Facebook’s auto-play style was first unveiled, it feels a bit like the moving photos in the Harry Potter newspapers.
If you don’t want to watch, you can scroll by with little disruption. This isn’t Myspace, Vine, or Instagram where auto-play sound is suddenly going to bombard everyone around you. If you’re not sure if you want to watch, you get a little preview. Maybe the thumbnail was dull but motion shows the video is actually exciting. A little animated audio levels icon clues you in to there being sound to be heard, though. You can watch silently if you don’t have headphones or privacy, but if you want the full experience, you can tap and the video plays instantly without a loading delay.
To respect users who don’t want to burn data, Facebook has added a setting that lets you only auto-play videos if you’re on WiFi and not on cellular data. It’s found in your phone’s Facebook settings on iOS and the Facebook app’s settings on Android.

Friday 6 December 2013

Phone with e-ink second screen launched

A smartphone with two screens - one of which uses e-ink technology and is "always on" - has been launched.
The Russian company Yota said the phone would go on sale online immediately in Russia, Austria, France, Spain and Germany.

The Android-powered phone promises to extend battery life by transferring web pages and other applications to the e-ink screen.
Experts said it may prove attractive to users fed up with drained batteries.
The phone has one LCD display, similar to those found on other smartphones, and a second e-ink screen which the company says lets users see the information they want without having to wake up the phone.
"The typical user picks up and activates their smartphone more than 150 times a day," said Yota Devices chief executive Vlad Martynov.
"Why? Because users worry that messages or information they need or want are hidden behind their phone's black screen. This is a huge distraction and can impede meaningful interaction with our friends, families and colleagues."
St Petersburg-based Yota is best known for making modems and router equipment. The dual-screen smartphone, which was first announced in 2012, is the company's first mobile phone.
"The YotaPhone is an ambitious concept and although it will be considered a gimmick by many we believe there is merit in the design," said Ben Wood, a mobile analyst with research firm CCS Insight.
"With many smartphone owners struggling to make the battery on their device last a whole day, the option to have a secondary screen that uses little or no power to capture and display a 'snapshot' of the main screen could be attractive," he added.
Yota plans to launch the phone in 20 other countries by March 2014.
It also features a 1.5GHz dual-core processor and a 12-megapixel rear camera and will cost 499 euros.
Slimmer screens
YotaPhone
E-ink displays are commonly used for e-book readers and consume very little power. They are also easier to read in the sun than their LCD equivalents, but offer a slower refresh rate making them unsuitable for videos or most games.

Mr Wood said that the YotaPhone has some "smart ideas" about how the secondary e-ink screen could be used.
"Some are just nice touches along the lines of displaying a love heart when a text message arrives with the words, 'I love you'. Others are more intriguing, such as using the e-ink display for advertising. This could open up some interesting new business models in future," he said.
E-readers could be slimmer in future after a thinner screen was developed by the company E Ink.

USB Type-C cable plugs to be reversible

USB 3.0 cable connectors
USB cable developers have announced that a forthcoming version of the connector's plug is to be reversible.


It means users of the Universal Serial Bus cables will no longer have to worry which way round the part is facing when plugging it into a device.

The specification is due to be completed by mid-2014, and the first product on the market by 2016.
It will neuter one of the advantages Apple's proprietary lightning cable currently has over the USB system.
The first USB cable were released in the mid-1990s and, until now, could only be plugged into a computer or other device one way round to ensure a data connection.
The Promoter Group, which agrees the design of the standard, is currently made up of representatives from Intel, HP, Microsoft, Renesas Electronics, ST-Ericsson and Texas Instruments.
USB cables
"Consumers are now demanding thinner and sleeker product designs and the USB 3.0 Promoter Group recognises this need," said the group's president Jeff Ravencraft.

Other changes to the current version - USB 3.0 - include:
  • A smaller size, giving the full-size USB Type-C plug similar dimensions to the micro-USB format used by many smartphones and tablets
  • Support for scalable power charging, allowing the cable to offer up to 100 watts
  • Data speed transfers of up to 10 Gbps, double what is possible at the moment
  • A promise that the new design will accommodate further upgrades
"This allows USB to increase performance and continue to deliver ease of use to several evolving product categories for years to come," said Roland Sperlich, from Texas Instruments.
Apple Lightning cable
One industry watcher welcomed news of the update.

"I don't think consumers buy devices based on the type of plug, so in terms of driving adoption of a certain type of smartphone, tablet or PC it doesn't make a great deal of difference," said Ian Fogg, from consultants IHS.
"Where I think it is important is the convenience of using the devices, and increasingly USB is used not just to connect and share data, but as a way of charging our machines.
"Anything that makes it easier and more convenient to charge is a good thing as it's something we all have to do very frequently."

8 Security Habits Putting Businesses at Risk

Security breaches are detrimental to any business. In addition to the financial costs involved, a tarnished reputation is difficult to overcome — and customer trust is undoubtedly tough to regain once personal information has been compromised. 
To prevent breaches, security measures must meet all sorts of regulations, such as those set forth by federal and state laws and by industry organizations. For instance, all businesses need to comply with Payment Card Industry (PCI) standards to securely accept credit card payments and keep their customers' information safe. Privacy guidelines also govern emails, personal data and other types of information that must remain secure.
Nonetheless, no small business is perfect. Due to a lack of time and resources, it seems impossible to keep up with all the latest threats and industry regulations, let alone manage the massive amounts of data a small business generates. From making small blunders to defying company policies, small business owners and employees put their company and their customers' information at risk every day.
Top security mistakes that leave small businesses vulnerable to breaches and compliance audits. Included below are several tips to help keep small businesses and their customers' information secure. 

1. Ignoring blind spots

In small businesses, technical expertise is generally not deep. Rather, the folks in charge of protecting data are often performing other job functions in the company. If your staff lacks expertise in a given area, it is important to invest in regular security-health checks with subject matter experts to ensure each solution you have in place continues to remain optimally configured and operating at peak performance. 

2. Thinking your size makes you immune

Many small companies believe their size means they are immune to break-ins, IP theft or other issues; they may feel only bigger organizations will be targeted. This leads to a piecemeal security portfolio put together with cheap point solutions, freeware and no way to consolidate the information. Don't think it won't happen to you; always make precautions and take threats seriously. 

3. Not checking your work

Just as a writer's work is reviewed by an editor, your work may benefit from a second perspective. In one instance, an administrator at an oil and gas company manually input a policy that included a typo. This left a huge hole, which was open and susceptible to attack. Having your work reviewed by a second set of eyes, be it from a colleague or a consultant, can help avoid simple errors and help protect your business. 

4. Viewing compliance as a "checkbox"

PCI, the Health Insurance Portability and Accountability Act (HIPAA), the Federal Information Security Management Act (FISMA) and other regulations are not just points to cross off your list. To get out ahead of audit findings, implement industry best practices such as those set forth by the Center for Internet Security (CIS), the SANS Institute or even Microsoft Hardening Guidelines. Nothing ruins your week like tracking down lost data or a root cause, so embrace a security mindset and view it as a responsibility, not a chore. 

5. Not enforcing an employee security policy

Few small businesses enforce security policies on their employees. In any business, employees are likely storing customer data, whether they are aware of it or not. A stolen laptop, lost smartphone or even a prying eye can lead to the wrong people obtaining your IP or customer data without your knowledge. Create a policy, if you do not have one currently, and enforce it on all employees. 

6. Ignoring staff education

Whether your staff comes to you with a strong security background or is forced to "learn on the fly," a lack of training can lead to avoidable incidents. No matter their prior knowledge, make sure your IT staff receives training about the products they work with, and be sure to provide time and financial resources to help keep them up to date. Personnel training can provide a large return on investment (ROI) and help avoid incidents that could damage your business and reputation.

7. Using the same passwords again and again

Every company, small or large, should strive to have some guidelines and standard operating procedures around the use — and reuse — of passwords. In order to mitigate the risk of successful password guessing and cracking in their environment, employees should be aware of the issues that may stem from the use and reuse of weak passwords. Put a password manager such as Last Pass, Keepass or Roboform in place to generate random passwords for each new account that is created and to keep track of each password.  Change passwords for critical resources every 90-180 days, and enforce rules of complexity such as a minimum number of characters and alphanumeric requirements. 

8. Letting just anyone on your network

Clients, vendors and other visitors may request access, but allowing non-secured personal or third-party computers to connect to your local area network (LAN) can be a big mistake. Make sure any and every computer on your network is secure; you never know if a client's laptop is carrying a virus.