Category: Technology

  • Google adds contact photos to conversation threads in messages

    Google has added a contact’s profile picture to the highest of conversations in messages for Android, following bigger modifications to “RCS” branding and skim receipt icons in current weeks.

    Messages have at all times allowed customers to open Google Contacts by tapping an individual’s title in the app bar — the corporate is now emphasising that shortcut by displaying their profile photos as nicely, in accordance to 9to5Google.

    It is identical picture that seems in the principle record of conversations when tapping on the area in group conversations opens that element web page.

    Google.

    Google.IANS

    This design is in line with different apps, with Facebook Messenger and Telegram displaying avatars in the identical left place, whigrouple iMessage shows it in the centre, the report stated.

    Moreover, the magnifying glass icon has been eliminated as a part of this variation, and “Search” has been added to the overflow menu.

    In January, Google rolled out end-to-end encryption in group chats for messages app customers enrolled in the beta programme.

    Google Messages

    With this characteristic, one-on-one texts despatched utilizing messages by Google might be encrypted so they’re non-public and safe and may solely be seen by the sender and recipient.

    The Google messages app already consists of end-to-end encryption when messaging somebody who additionally has the RCS (Rich Communication Services) chat options enabled, nonetheless, this has to date been restricted to messages between two events and never group chats.

    (With inputs from IANS)

  • 1st-gen iPhone sold for $55K at auction; not the first time

    A first-generation seal-packed iPhone was sold for $54,904 (round Rs 45 lakh) at public sale.

    The machine initially value $599 when it was first launched in 2007, so it is a surcharge of greater than $54,000, experiences MacRumors.

    A former Apple worker, who purchased the authentic iPhone when it was launched, positioned it for sale on RR Auction.

    original iPhone

    Former Apple Computer Inc. Chief Executive Officer Steve Jobs holds the new iPhone in San Francisco, California January 9, 2007.REUTERS/Kimberly White

    An “undiscovered” Apple-1 laptop was additionally sold by RR Auction for an undisclosed sum, together with different Apple merchandise and memorabilia that fetched excessive costs.

    About $4,000 was paid for Apple CEO Tim Cook-signed iPhone 11, $12,500 was spent on Steve Jobs-annotated technical manuals, and a Steve Jobs enterprise card sold for $6,188, the report stated.

    First-gen iPhone

    First-gen iPhoneApple

    Last month, it was reported {that a} first-generation iPhone had sold for a record-breaking worth of $63,356 (approx Rs 52,00,000) at an public sale, the highest sale ever recorded for an authentic 2007 iPhone.

    Meanwhile, in August final 12 months, an unopened first-generation 2007 iPhone in a sealed field had been sold for $35,000 (almost Rs 28 lakh) in an public sale in the US.

    (With inputs from IANS)

  • Five lakh food delivery persons must get legal status, benefits of industrial workers

    Call them companions or self-employed or entrepreneurs however in an actual sense, the food delivery persons are workers and need to be introduced below the organised community, say consultants.

    They additionally stated the aggregator firms ought to quickly desist from discovering legal loopholes and produce the delivery persons below the organised community.

    “There are about 5 lakh food delivery persons in India. For each two persons on the street, there are an equal quantity of persons on the backend. While the backend workers is equipped by the staffing firms, the delivery persons are thought-about as ‘companions’ by the food delivery firms,” a high official of a human useful resource (HR) firm advised IANS preferring anonymity.

    Zomato

    ZomatoIANS

    According to him, the businesses kind an organization for about each 20 food delivery persons and funds are made to these firms.

    The food delivery persons get their funds from these “particular objective autos/SPV” as per the deliveries made.

    “There are additionally different circumstances that the food delivery persons need to adjust to – like carrying the corporate supplied T-Shirts whereas on the job, delivering inside a stipulated time, face the danger of being taken off the community for any failures, getting paid by the corporate and others,” V.Prakash, Senior Advocate, specialising in labour issues.

    “If SPVs are fashioned by the businesses then the company veil must be lifted to see the true face behind it,” he added.

    Lives at risk as delivery agents race against time to avoid penalties

    Lives in danger as delivery brokers race towards time to keep away from penaltiesIANS

    Though stated to be impartial contractors, entrepreneurs, if a food delivery individual, switches off his telephone for a day, he runs the danger of being suspended.

    “The food delivery persons or entrepreneurs-workers need to be introduced below some regulation in order that their pursuits are protected and social safety internet is supplied,” stated the HR firm official.

    According to him, many of the delivery persons get burnt quickly working for 12 hours a day. There are individuals who have come to his firm in search of a special job, even at a decrease pay.

    Many food delivery persons weren’t keen to spend even 5 minutes with IANS speaking about their work as they’ve to finish a sequence of food deliveries.

    The two consultants stated within the US, the food delivery persons are thought-about as workers and the identical scenario needs to be right here as nicely.

    They additionally agreed that the quantity of delivery persons is a consider valuing a food delivery firm however the same valuation isn’t given to the SPVs or to the delivery persons.

    While the delivery persons are paid based mostly on the space and rankings, consultants stated in the long term, there needs to be a mixture of fastened and variable construction.

    “If the food app firms take individuals from the staffing firms, then the minimal wages and social safety measures will kick in and therefore the businesses should not opting that route,” the HR official stated.

    (With inputs from IANS)

  • Whatsapp rolling out ‘Groups in common’ section within search bar on beta

    Meta-owned WhatsApp is rolling out a brand new characteristic for some beta testers on Android and iOS which permits customers to see a listing of teams they’ve in frequent with the contact they’re looking for as an extra characteristic.

    Beta customers will see a brand new ‘Groups in frequent’ section when looking for contacts within the search bar, experiences WABetaInfo. The new characteristic provides customers extra info when looking for contacts within the search bar.

    A WhatsApp logo is seen behind a phone

    A WhatsApp emblem is seen behind a telephone that’s logged on to Facebook in the central Bosnian city of Zenica, February 20, 2014.REUTERS/Dado Ruvic/File Photo

    It is presently accessible for some testers, and is anticipated to be rolled out to extra customers over the approaching days, the report mentioned.

    This characteristic is identical because the one rolled out on WhatsApp Desktop, which permits customers to see the teams they’ve in frequent with their contacts with out opening their chat info to see the listing of teams in frequent.

    WhatsApp. (File Photo: IANS)

    WhatsApp. (File Photo: IANS)IANS

    Meanwhile, final week, it was reported that the messaging platform was rolling out a brand new “approve new contributors” characteristic in group settings for some beta testers on Android and iOS.

    Whatsapp Groups section?

    WhatsApp teams section is a characteristic within the WhatsApp messaging app that permits customers to create and be part of teams with a number of members. In this section, customers can see all of the teams they’re part of and handle them.

    From the teams section, customers can create new teams, search for and be part of present teams, depart teams they not want to be part of, and handle group settings corresponding to altering the group’s identify, profile image, and outline.

    Additionally, the groups section permits customers to see all of the group chats they’ve participated in and shortly entry them for continued conversations. This characteristic is helpful for each private and enterprise communication because it permits for straightforward collaboration and communication with a bunch of individuals.

    (With inputs from IANS)

  • Why AI fails to reproduce human vision

    While computer systems could have the ability to spot a well-recognized face or an oncoming automobile sooner than the human mind, their accuracy is questionable.

    Computers will be taught to course of incoming knowledge, like observing faces and vehicles, utilizing synthetic intelligence (AI) referred to as deep neural networks or deep studying. This sort of machine studying course of makes use of interconnected nodes or neurons in a layered construction that resembles the human mind.

    The key phrase is “resembles” as computer systems, regardless of the facility and promise of deep studying, have but to grasp human calculations and crucially, the communication and connection discovered between the physique and the mind, particularly when it comes to visible recognition, in accordance to a examine led by Marieke Mur, a neuroimaging knowledgeable at Western University in Canada.

    Artificial intelligence (AI)

    Artificial intelligence (AI)IAN

    “While promising, deep neural networks are removed from being good computational fashions of human vision,” mentioned Mur.

    Previous research have proven that deep studying can not completely reproduce human visible recognition, however few have tried to set up which features of human vision deep studying fails to emulate.

    The staff used a non-invasive medical check known as magnetoencephalography (MEG) that measures the magnetic fields produced by a mind’s electrical currents. Using MEG knowledge acquired from human observers throughout object viewing, Mur and her staff detected one key level of failure.

    They discovered that readily nameable components of objects, reminiscent of “eye,” “wheel,” and “face,” can account for variance in human neural dynamics over and above what deep learning can ship.

    “These findings counsel that deep neural networks and people could partially depend on totally different object options for visible recognition and supply tips for mannequin enchancment,” mentioned Mur.

    The examine reveals deep neural networks can not totally account for neural responses measured in human observers whereas people are viewing images of objects, together with faces and animals, and has main implications for using deep studying fashions in real-world settings, reminiscent of self-driving automobiles.

    Watch this human orchestra play music composed by artificial intelligence neural networks

    Human orchestra play music composed by synthetic intelligence neural networks.

    “This discovery supplies clues about what neural networks are failing to perceive in photographs, specifically visible options which might be indicative of ecologically related object classes reminiscent of faces and animals,” mentioned Mur.

    “We counsel that neural networks will be improved as fashions of the mind by giving them a extra human-like studying expertise, like a coaching regime that extra strongly emphasises behavioural pressures that people are subjected to throughout improvement.”

    For instance, it is crucial for people to shortly determine whether or not an object is an approaching animal or not, and if that’s the case, to predict its subsequent consequential transfer. Integrating these pressures throughout coaching could profit the flexibility of deep studying approaches to mannequin human vision.

    The work is printed in The Journal of Neuroscience.

    (With inputs from IANS)

  • Apple’s foldable iPhone may protect itself from drops

    Tech big Apple is reportedly engaged on a brand new expertise that may allow iPhones and iPads with versatile screens to sense drops and mechanically fold up on the way in which to the bottom to minimise harm.

    The info got here from the tech big’s new patent software named ‘Self-Retracting Display Device And Techniques For Protecting Screen Using Drop Detection’, stories AppleInsider.

    According to the tech big, the show itself can determine to interrupt away, no matter how the system folds on the hinge or whether or not a display screen may be eliminated from a base chassis.

    iphone pro 15

    iphone professional 15IANS

    The show can detach or fold in a means that protects the display screen rather than a probably fragile hinge.

    Mobile devices with foldable and rollable shows can use a sensor to detect vertical acceleration (e.g., acceleration with respect to the bottom) to find out if the cell system has been dropped,” the patent software stated.

    “If the sensor detects that the cell system has been dropped… the foldable system can retract no less than partially to afford safety from the delicate show from putting the bottom,” it added.

    iPhone 14, 14 Plus in Yellow

    iPhone 14, 14 Plus in YellowApple

    This signifies that there are then two choices — retracting the display screen or releasing it.

    “(For instance, the method) can embrace activating a launch mechanism for a hinged connection between a primary show and a second show of the digital system when the vertical acceleration exceeds a predetermined threshold,” Apple stated within the software, “whereby the activating reduces an angle between the primary show and the second show beneath a threshold angle.”

    (With inputs from IANS)

  • Cybercriminals use 3 new novel tactics in phishing in Jan: Report

    Cybercriminals used three new novel tactics equivalent to misuse of net translation, image-only emails, and the insertion of particular characters in phishing assaults throughout January 2023, a new report has proven.

    While the general quantity of assaults utilizing these tactics is at present low (every tactic accounts for lower than 1 per cent of tried phishing assaults), they’re widespread, affecting between 11 per cent and 15 per cent of organisations, usually with a number of assaults, in line with IT safety agency Barracuda Networks.

    “With cyberattack rising rampantly in India in latest occasions, cybercriminals proceed to develop their phishing approaches to entice unwary recipients and keep away from being noticed and blocked. To defend your organisation, one wants the newest AI-enhanced e-mail safety that may successfully examine the context, topic, sender, and extra to find out whether or not a benign-looking e-mail is in reality a well-disguised assault,” mentioned Parag Khurana, Country Manager, Barracuda Networks India.

    Fraudsters get creative, come up with newer ways to dupe people.

    Fraudsters get artistic, provide you with newer methods to dupe individuals.IANS

    First tactic:

    The first tactic entails utilizing Google Translate net hyperlinks.

    The attackers use poorly-formed HTML pages or a non-supported language to stop Google from translating the webpage. Google responds by offering a hyperlink to the unique URL stating that it can not translate the underlying web site.

    The attackers embed that URL hyperlink in an e-mail, and if a recipient clicks on it, they’re taken to a pretend however authentic-looking web site that’s in reality, a phishing web site managed by the attackers.

    Second tactic:

    The second tactic entails utilizing Image-based assaults by spammers, and the researchers have discovered that attackers at the moment are more and more utilizing photographs, with none textual content, in their phishing assaults.

    These photographs, which may be pretend types equivalent to invoices, embrace a hyperlink or a callback cellphone quantity that, when adopted up, results in phishing.

    As these assaults don’t embrace any textual content, conventional e-mail safety can wrestle to detect them, mentioned the report.

    Data exhibits that round one-in-10 (11 per cent) organisations had been focused with this sort of phishing e-mail in January 2023, every receiving on common round two such emails through the month.

    Third tactic:

    The third tactic entails utilizing particular characters by hackers, equivalent to zero-width Unicode code factors, punctuation, non-Latin script, or areas, to evade detection.

    This tactic can be used in “typo-squatting” net handle assaults, which mimic the real web site however with a slight misspelling.

    However, when used in a phishing e-mail, the particular characters will not be seen to the recipient.

    Such assaults will also be tough to detect as a result of particular characters can be utilized for authentic functions, equivalent to in e-mail signatures, the report talked about.

    (*3*)

    IANS

    In January 2023, greater than one-in-seven (15 per cent) organisations obtained phishing emails that use particular characters in this manner, every receiving on common round 4 such emails through the month.

    (With inputs from IANS)

  • Russian hackers hit Indian Health Ministry’s website: Cyber-security firm

    Cyber-security researchers from CloudSEK have claimed {that a} Russian hacker group focused the Indian Health Ministry web site and infiltrated its Health Management Information System (HMIS).

    The pro-Russian hacker group referred to as Phoenix allegedly compromised the HMIS Portal and had entry to the info of workers and chief physicians of all of the hospitals within the nation, claimed the AI-driven cybersecurity firm.

    According to CloudSEK’s contextual AI digital danger platform XVigil, “the motive behind this goal was the sanctions imposed towards the Russian Federation the place Indian authorities determined to not violate the sanctions in addition to adjust to the worth ceiling for Russian oil authorised by G7 nations”.

    “This determination resulted in a number of polls on the telegram channel of the Russian Hacktivist Phoenix asking the followers for his or her votes,” it added.

    Cyber attack

    Cyber assaultIANS

    According to safety researchers, the Russian risk actors might promote exfiltrated license paperwork and private identifiable data (PII) on cybercrime boards and conduct doc fraud utilizing PII and license paperwork.

    Active since January 2022, the Russian hacktivist group Phoenix was noticed utilizing social engineering methods to lure the victims in a phishing rip-off thereafter stealing the passwords and having access to its victims’ financial institution or e-payment accounts.

    “The group has performed a collection of DDoS assaults towards a number of entities prior to now,” mentioned the report.

    cyber attack

    Reuters

    Phoenix has additionally engaged in {hardware} hacking, unlocking misplaced or stolen iPhones and reselling them in Kiev and Kharkiv via a community of managed shops.

    The Russian Hactivist group has earlier attacked hospitals primarily based in Japan and the UK, together with a US-based healthcare organisation serving the US army, mentioned the report.

    Late final yr, the All India Institute of Medical Sciences (AIIMS) in Delhi grew to become the sufferer of an enormous ransomware assault the place Chinese involvement was suspected.

    Sensitive information of at the least 40 million sufferers, together with political leaders and different VIPs, have been doubtlessly compromised within the hacking.

    The attack was analysed by the Indian Computer Emergency Response Team (CERT-In) and was discovered to have been brought on by improper community segmentation.

    Another prime hospital within the nationwide capital, the Safdarjung Hospital, was additionally hit by cyber-criminals.

    However, the hacking assault on the Safdarjung Hospital was not as extreme because the AIIMS-Delhi confronted and the possibilities of information leak have been much less as main a part of hospital work runs on guide mode.

    (With inputs from IANS)

  • Musk confused how non-profit OpenAI became $30 bn profit-making firm

    As Microsoft-owned OpenAI rakes in huge moolah after its ChatGPT AI conversational chatbot, Elon Musk on Thursday once more raised questions over how a non-profit has grow to be a $30 billion maximum-profit firm for Satya Nadella-run tech large.

    Musk had donated $100 million to OpenAI. He stepped down from OpenAI’s board of administrators in 2018 and not owns a stake within the firm.

    Elon Musk

    Elon MuskIANS

    “I’m nonetheless confused as to how a non-profit to which I donated $100 million in some way became a $30 billion market cap for-profit. If that is authorized, why does not everybody do it?” he quipped.

    He has additionally paused OpenAI entry to Twitter database.

    OpenAI was based as a non-profit synthetic intelligence analysis firm in 2015.

    Its analysis director was Ilya Sutskever, one of many world specialists in machine studying and CTO was Greg Brockman, previously the CTO of Stripe.

    OpenAI’s co-chairs had been Sam Altman and Musk.

    The Twitter CEO in February this yr additionally raised the identical query, saying OpenAI was created as an open supply (which is why I named it “Open” AI), a non-profit firm to function a counterweight to Google.

    “But now it has grow to be a closed-source, maximum-profit firm successfully managed by Microsoft. Not what I meant in any respect,” he posted, criticising Microsoft for making income by way of OpenAI.

    ChatGPT

    ChatGPTIANS

    The AI chatbot ChatGPT, developed by OpenAI which is now a Microsoft firm, has grow to be a rage and the tech large has infused $10 billion into it to make it extra helpful for throughout industries.

    (With inputs from IANS)

  • Choose Expert Sources for IoT Tracking Devices for Supply Chain Digitalization

    IoT

    The introduction of Internet of Things (IoT) expertise into the provision chain has been a game-changer for many companies. It has enabled improved visibility and accuracy, in addition to price financial savings and effectivity beneficial properties. With so many accessible choices, selecting the best supply for cargo IoT monitoring units takes a variety of consideration. Understand the advantages of direct manufacturing sources with design capabilities like Eelink that transcend inventory fashions. Your firm deserves probably the most correct, real-time, related digitalization choices accessible right this moment.

    Why Supply Chain Digitalization Matters

    All fashionable enterprise operations depend on digitalization, and that’s no totally different for product producers, transportation corporations, and logistics teams. Today’s international financial system is quick paced and extremely aggressive. Customer calls for improve on a regular basis and continuously evolve as expectations rise. This implies that corporations should stay agile and responsive in the event that they need to succeed of their business or area of interest. By digitalizing your complete provide chain, they will achieve very important knowledge they should make the choices that result in earnings. These metrics are key drivers of enterprise progress.

    A major advantage of utilizing digital IoT trackers is improved transparency. When everybody with a stake in the long run outcomes of the provision chain actions is aware of important info, it makes the entire course of smoother, faster, and extra worthwhile. The capability to observe merchandise or different cargo at any second anyplace around the globe permits for optimization that was extraordinary with paper data and no digital system oversight. The finish aim is achieved: aggressive benefits over different gamers within the business.

    Unique Solutions for Diverse Companies

    The greatest IoT tracking device for supply chain digitalization affords a singular mixture of real-time knowledge evaluation and geo-location capabilities that permit companies to handle their provide chains with better precision than ever earlier than. These cater to numerous enterprise wants. Any group that ships any sort or materials, product, tools, or maintains a fleet of automobiles can profit. The capability to digitally monitor and gather key metrics depends upon the standard of the units themselves, nonetheless, and that traces again to the producer’s capabilities.

    From healthcare and prescribed drugs to meals and beverage, these units might be personalized with specialised sensors and software program to observe every thing from temperature fluctuations to cargo velocity. This degree of specificity not solely helps companies keep optimum circumstances for their merchandise but in addition ensures compliance with business laws. The high required sensors measure, report, and transmit details about GPS location, temperature, humidity, shock, gentle publicity, movement, and extra.

    Top Qualities of an IoT Device Manufacturer

    The advantages of IoT monitoring units for provide chain oversight are apparent. However, your organization representatives nonetheless must know the best way to supply one of the best with out overpaying or having issues down the street. Expertise issues and that solely comes from a tool vendor who can also be a producer who designs and absolutely engineers the merchandise they promote.

    Innovation

    The second an IoT system provider stops innovating is the second they fail to fulfill the wants of this rising market. They should sustain with rising applied sciences and continuously attempt to enhance their very own merchandise as international provide chain wants shift.

    Reliability

    Supply chain monitoring that works solely a part of the time delivers no usable outcomes. The whole goal is a steady move of information that permits corporations to enhance their operations and select higher provide chain strategies. Reliable IoT units are rugged, moisture-proof, and have lengthy battery life.

    Flexibility

    All kinds of units swimsuit several types of corporations, however flexibility to supply precisely what a person buyer wants is much more vital. An IoT tracker provider who affords customized sensors and design choices transcends expectations and is best outfitted to satisfy the wants of each buyer.

    Accuracy

    How can a enterprise optimize their processes if they can’t belief the info collected or transmitted by the IoT units they embrace in cargo containers? The easy reply is that they can’t. A talented producer should stand behind the accuracy of each sensor and transmission and continuously attempt to ship one of the best outcomes to the purchasers they serve.

    Connectivity

    Not each enterprise connects to IoT units in the identical manner. If a producer limits the choices, it makes it very tough for the companies who depend on them to seek out actual advantages. The greatest provide chain trackers provide a number of choices that swimsuit a worldwide viewers. These can embrace WiFi, 4G LTE, Bluetooth, and BLE, and older 2G connections. These harken again to the significance of flexibility. Not each location around the globe has the identical choices, and companies want the flexibility to gather and entry knowledge when and the place they should.

    Cybersecurity issues have an effect on the more and more digital provide chain world nowadays. Even the only and least costly cargo tracker should come outfitted with the newest and greatest safety features to forestall undesirable and unauthorized entry to the collected knowledge. Imagine if thieves may monitor the exact location of pricey shipments of products. Choose a model that gives onboard safety you may rely on.

    Scalability

    With the improved effectivity and velocity of your complete provide chain course of developed after utilizing IoT units for knowledge assortment, an organization’s wants could improve. The greatest provider of those monitoring units can scale their choices for you whenever you want it. This goes past holding a list of inventory merchandise. If your model wants customized units or multi-product options, the suitable producer can ship immediately.

    At a time when provide chain disruptions are commonplace, corporations are turning in direction of modern options like provide chain monitoring units to mitigate dangers and improve visibility throughout their operations. When your group chooses to supply these units from respected, modern, and versatile producers like Eelink instantly, you realize the result will enhance your individual enterprise operations. Digitalization of delivery and logistics solely works if the IoT units you select function as supposed.