Facial recognition technology Germany puts to the test

Facial recognition technology Germany puts to the test

More than 200 people registered and stored their photos in the German project, installed at the railway station of Suedkreuz as a means of security and in the anti-terrorist investigations and criminal.

More than 200 people agreed to register their names and store two photographs in the project from the Suedkreuz, where there are security cameras in an entry in one of the escalators
More than 200 people agreed to register their names and store two photographs in the project from the Suedkreuz, where there are security cameras in an entry in one of the escalators

The Train station of Suedkreuz, in Berlin, tested a new face recognition technology to verify the identity of the passengers.

The innovative system installed as a means of security and in the anti-terrorist investigations and criminal, will run for six months in the German station.

Technological progress must not stop in our security services,” said Tuesday the interior minister Thomas de Maiziere said in a statement.

“If the program turns out to be reliable, you should be able to be used for serious crimes and in other places where they have surveillance cameras,” he said.

More than 200 people agreed to register their names and store two photographs in the project from the Suedkreuz, where there are security cameras in an entry in one of the escalators

For his part, the president of the College of Lawyers of Germany, Ulrich Schellenberg, rejected the technological measure and said that “not everything that is feasible from a technological point of view is not necessarily something that we want to have as a society”.

The Train station of Suedkreuz, in Berlin, tested a new face recognition technology to verify the identity of the passengers
The Train station of Suedkreuz, in Berlin, tested a new face recognition technology to verify the identity of the passengers

 

More than 200 people agreed to register their names and store two photographs in the project from the Suedkreuz, where there are security cameras in an entry in one of the escalators

The updates for android

The updates for android

what a user is looking for in a android, is that this is a computer that has a good camera, with a high capacity in its internal memory, and that the cell and its technology is fast, obviously the phone is nice and even, because it does not; that is economic.

Those who know technology, those who understand that, also looking for an android that you upgrade to the latest version of Android.”

Therefore, the brands play with updates, not being clear with consumers. The last to enter Motoerola fu in this controversy, having announced that the Moto G4 and G4 Plus would have Android 8.0 Oreo now seems to have been thrown back and has changed his mind.

At the time of acquiring an android, many have asked that the cell is good, nice and cheap. There are few who request that you upgrade to the latest version of Android
At the time of acquiring an android, many have asked that the cell is good, nice and cheap. There are few who request that you upgrade to the latest version of Android

In general, the marks often update some of their models to the next major version of the system, or at least with the most important. However in the mind of the average user are the two years that Google established as logical to update the terminals.

They were quite the brands that joined to that idea, but since then there have been many changes. For example, Motorola went from being an independent company to be part of Google and now to be part of Lenovo.

Some companies that sell android does not offer updates
Some companies that sell android does not offer updates

It is normal that in the different companies have different ways of addressing the issue of the updates. Another issue at the time of update is that a manufacturer you want but you may not be able to do so. This is what happened to Energy Sistem with some of their models. When sold, announced that there would be major upgrade within a few months, but time passed and cannot be launched

Build your own robot avoids obstacles with MIOIO App Inventor

Build your own robot avoids obstacles with MIOIO App Inventor

One of the most important features that defines MIT App Inventor as a leading platform for developing mobile applications for Android is, in addition to its ease of use and power, the possibility of being able to get the source code of the tool to view, modify and extend it to your liking. The philosophy behind the Open-Source project benefits the users constantly seeing the emergence and evolution of alternative servers that complement the original: App Inventor Ultimate Makeroid Thunkable AppyBuilder,, and the own MIOIO App Inventor.

Build your own robot avoids obstacles with MIOIO App Inventor
Build your own robot avoids obstacles with MIOIO App Inventor

MIOIO App Inventor is a platform that will allow us to develop apps for Android with all the benefits of App Inventor and the ability to handle a custom IOIO card without having to go through a traditional development environment as the Arduino IDE

The card, which has comprehensive set of inputs/outputs, both digital and analog, will allow us to connect all types of sensors, motors, servo motors, external peripherals and even has a USB port, which will allow us through the use of a dongle, your wireless connection with mobile devices.

The platform and its new components

The access as we can get free of charge through their official web site using the traditional authentication of Google.Build your own robot avoids obstacles with MIOIO App Inventor

The platform and its new components
The platform and its new components

Once inside, we draw the attention, apart from its similarity with App Inventor, are the new new components that incorporates to control the card; it is quite simple to use and very intuitive

The robot avoids obstacles with MIOIO App Inventor
To prove it, we have built a complete robot with two wheels crazy managed by an Android app that will allow us to effectively control the power of two engines for its displacement and the possibility that avoid the obstacles in an automated manner using an ultrasonic sensor.

Iphone up its first ten years

Iphone up its first ten years

the company of the Apple is preparing to launch not one, but three versions of the iPhone. The iPhone 8 and iPhone 8 Plus would be. the equivalent to the versions 7s and 7s Plus, that is to say, improved models of the iPhone 7, launched last year

The world celebrates along with apple, the ten years of iphone
The world celebrates along with apple, the ten years of iphone

It would be the iPhone X, which would change the appearance of the previous model and extend the screen giving up frames and step to the start button, that would be integrated into the screen, a OLED display which would allow a sharper image than that of the current.

According to reports of Ming-Chi Kuo, an analyst at KGI Securities which for many is the best analyst of all things Apple in the world, this iPhone would come in three colors: black, gold and silver.

As the extended display leaves no room for the fingerprint reader, this resource would be replaced by Face ID, which would use the facial recognition for access to the device. Other sources claim that the iPhone X would incorporate wireless charging capabilities and that your RAM memory would increase to 3 gigas.

this iPhone would come in three colors: black, gold and silver
this iPhone would come in three colors: black, gold and silver

These updates, it is clear, would not be cheap: the cost of the new device could begin in the $1,000.

The expected announcement will be held at the Teatro Steve Jobs, with capacity for 1,000 people and that is located in the brand new Apple Park, the new headquarters of the company.

It is hoped that the ads also included a new version of the Apple Watch, perhaps an improved Apple TV (with the ability to play 4K) and the confirmation of the new operating system iOS 11, among which there are new wallpapers and emojis animated capable of emulating the expressions of the user.

According to the ‘Wall Street Journal’, the manufacture of the new device is facing problems and that is why there may be delays in the effective date of departure to the market

Today we will study how to create a mobile application

The applications are according to their functionality

we have here then that its basic functionality should be: Think of this as a hierarchy, opens on the big issues and clicking one and you will have a set of new lists. Your e-mail on the iPhone is a good example of this. Without a doubt is easy to construction and design and a good option for companies looking for a “simple” application that displays basic information.

we have here then that its basic functionality should
we have here then that its basic functionality should

Database with custom functionality: Imagine that you have a full amount of content that you want to use. An example would be to have hundreds of breeds of dogs that want to organize and display in a different way. This can be done beyond the basic table format, the development becomes more complex.

To create app designed to games we have that the range of complexity in this type of App is very wide, you can start with something very simple to reach the 3D or the incorporation of user experience through the physical movement of the device. Everything is possible in the Game Center.

Improvements or modifications of the device hardware
Improvements or modifications of the device hardware

Improvements or modifications of the device hardware: This means that when you create the app is taken with certain phone functions, such as the alarm, the camera or flash, to make it better. For example, the camera app that adds filters to the images you take with your phone.

Fully dynamic applications: Similar to database applications, these apps are based solely on the external information – Twitter, Weather Channel, Flipboard.

Personalized services: These applications are designed to allow users to content in a specific way. Examples are Pages, Adobe Ideas and Numbers

Everything else: Sure there are thousands of applications that are completely unique, but the above list could cover 95% of what is available today.

According to the technology development:

native applications: They are those that are developed with the software that provides each operating system called Software Development Kit or SDK. The native apps are designed and programd specifically for each platform, Android, iOS or Windows Phone, in the language used by the SDK. Among its features is that is updated frequently and is the user who downloads the latest version.

Web Applications: web applications or webapps have as a basis for programming the HTML, JavaScript and CSS, all very common tools for web developers. Unlike the native, do not need to be installed because it is displayed as a normal web using the browser

Today we bring you some applications for children to learn while playing

Today we bring you some applications for children to learn while playing

We are in modern times, where technology is a tool created to foster the knowledge; therefore, from the smallest we can apply the technology for children to learn from the game and from its most maternal

Today we bring you some applications for children to learn while playing
Today we bring you some applications for children to learn while playing

Children are interested from a very early age and although it is not recommended to use technological devices for containment, it is important to note that the key is in moderation and not in a total ban.

It is recommended that children to have access to the technology under strict supervision and for a limited time.

At those times when they begin to explore and enjoy the benefits of the technology, it is important that parents have to hand tools with which children can learn by playing.

The use of new technologies and digital facilities have to be in an area of entertainment to become channels of training in education and best practices that contribute to the knowledge of big and small.

Mobile devices are the best ally for learning, in this case, the reading, because they stimulate the reading, encouraging children and young people the remembrance, Creativity, Partnership, interaction and fun

There are many applications for free download through the game, teach and reinforce some of the gaps that children and young people can present in the classroom.

There are very good to put into practice with the children. One of them is the application of Mind Games: In this application, the student will do exercises of memory, reasoning, concentration, spatial intelligence, speed and calculation.Today we bring you some applications for children to learn while playing

There are very good to put into practice with the children.
There are very good to put into practice with the children.

Another application is how much you know: In this application, the student will solve math activities and logic. In addition, you will be able to answer questions of geography, history, language spanish and english

The most important thing is that the technology in itself, learning for all, for kids, big and for the general user.

Today we will explain how to create a secure password

Today we will explain how to create a secure password

Every precaution is little to prevent us from stealing the account in social networks, email, and other services and applications. At present, the cyber attacks to steal the access data of users are on the rise, so creating a secure password is of vital importance to prevent hackers from accessing our profile.

Many internet users create strong passwords that combine numbers, letters, punctuation marks and other symbols. However, at the time of the truth this type of keys are difficult to remember, among many online accounts that we have today; so users just reusing the same codes.

Avoid including names of people, pets, places where you have lived, sports teams
Avoid including names of people, pets, places where you have lived, sports teams

A few months ago, the National Institute of Standards and Technology of United States, launched a new recommendations to create strong clues based on studies and case studies, and now a study carried out by a team of researchers from different universities in the us provides us with other tips for creating strong passwords according to science.

These scientists have analyzed how different approaches to cracking of passwords to better understand which is the method followed by the attackers to guess the keys. Criminals use computer programs that allow them to make millions or even billions of assumptions in a few hours, which allows them to end descifrandolas.

The process can begin testing with the most popular words in the dictionary, by adding a number or symbol, the first letter capitalized, and so on. Once they have made with the password, attackers can try to reinsert it in order to gain access to other user accounts, as many people reuse their credentials.

Taking this into account, at the time of choosing a key deposit box, users have to focus not on difficult to guess for a human, but it is difficult to understand for a machine. To achieve this, the researchers leave the following recommendations to create a strong password:

Uses keys that contain at least 12 characters and mix two or three different types of the same (lowercase letters, uppercase letters, digits and symbols) in places little predictable (not to the beginning or end).

Avoid including names of people, pets, places where you have lived, sports teams, dates of birth or things that you like. Do not use nor common phrases or lyrics of songs.

Avoid common patterns or easily distinguishable (abc, 123, etc.), or patterns of keyboard (QWERTY, 1qazxsw2, etc.).

A good way to create a secure password is to compose a prayer that nobody has said it before
A good way to create a secure password is to compose a prayer that nobody has said it before

A good way to create a secure password is to compose a prayer that nobody has said it before, and use the first or the second letter of each word as your password, mixing it with other types of characters. So you can remember it easily and it will be very difficult to decipher it for a machine.

No reutilices never passwords.