Wed. Aug 21st, 2019

US-Tech

TECH

Day: March 9, 2019

1 min read

Do you still remember China’s plan to make a fake moon? After only being referred to as ‘a satellite that is able to reflect the sun’s light’, now the actual form of the artificial moon is known, namely space solar panels (SSP).

This project is certainly very ambitious. Its potential makes it called the biggest renewable energy source and can meet the electricity needs of all humans according to the National Space Society (NSS). The researchers also assume that the CNS will be very expensive.

However, two years ago, the Chinese government had intended to invest heavily in renewable energy sources, including solar, wind, water and nuclear power, by 2020. Its value is not playful, which is 2.5 trillion yuan, or is now worth Rp. 5,271 trillion, as quoted from CNN, Selaas (3/5/2019).

China Aerospace Science and Technology Corporation, aka the space agency owned by the Bamboo Curtain State government, …

1 min read

The 5G network is in sight. At the Mobile World Congress 2019 arena that just took place in Barcelona, ​​some 5G smartphones have been introduced. Maybe next year, several countries have begun to implement it.

As is known, Huawei is among the most keen to develop 5G technology. In early February, they posted an ad in New Zealand’s top newspaper, claiming that “5G without Huawei is like rugby without New Zealand.” Rugby is synonymous with Australia’s neighboring country.

“We want to show the world that 5G can make the world better, and we take the lead in this,” Huawei, Richard Yu, told reporters at MWC.

In addition to ordinary telecommunications, the 5G network that is claimed to be super speeding is actually what are the benefits? The following is an example according to Huawei in its statement.

1. Telesurgery 5G First

On January 8, a surgeon in Fujian, China, succeeded …

1 min read

Chinese hackers are said to attack 27 universities in the United States and several other countries. What are you looking for from hacking?

In a report issued by a cybersecurity company called iDefense, the hacker was looking for access to the results of maritime military research that was allegedly stored on the servers of these universities.

Hacking groups that infiltrate have many names, such as Temp.Periscope, Mudcarp, and Leviathan. There is no connection from the group to the Chinese government, but because the target is US military data, analysts at iDefense consider the hacker action sponsored by the Chinese government.

The method used by hackers to infiltrate is to send spear phishing emails, which make it visible to be sent by the partner of the university. If the document or e-mail is opened, predictably, the malware inside will act and infiltrate the university’s network.

The university is the target of …

1 min read

Until a year ago, Nintendo was still reluctant to work in the world of virtual reality (VR). In early 2018, for example, the Japanese company assumed that this technology was still not feasible to be distributed in the mainstream way.

Now, they are actually announcing to start the VR sector. Admittedly indeed, their way is fairly anti-mainstream than other players, for example Playstation.

They are now using Labo to apply the VR system to the Switch console. Cardboard equipment can support the VR concept on a hybrid console? It certainly becomes a new idea in providing virtual reality experiences for players.

This VR set is a game package, or what is referred to as Toy-Con, the fourth one owned by Labo. Previously, there was a basic package that contained a remote control, a fishing pole, and so on, then there were robotic equipment, and finally the media for racing

Based …

1 min read

Often netizens use birth dates to be used as online account passwords. Even though it is vulnerable to security.

The solution uses a unique combination. The problem with using unique passwords is hard to remember. As a result we often reset the password because we forget.

“There is still a lot of misinterpretation of the meaning of strong passwords. Many websites now demand complex passwords consisting of

at least eight or more upper and lower case letters, numbers and special characters. This is often the user’s nightmare, “said David Jacoby, security researcher at Kaspersky Lab’s Global Research and Analysis Team (GReAT).

David also shared the steps for making strong and easy to remember passwords.

Step 1: Create your “static row” (password section that doesn’t change)

Think of phrases, song lyrics, excerpts from movies, children’s poems, or similar things that impress you

Take the first letter from the first three to …

1 min read

Future Expertise is one of the Excessive Tech Resolution Suppliers in Pakistan with focus on the cutting edge information technologies leading to effective data administration for organ-isations. There may be solely a market for a tool that’s interconnectable if there are different units available in the market that it will possibly hook up with. These network effect can hamper the adoption of every gadget (if you’re the one particular person with a phone, it’s not much use however for those who’re one in every of millions with the identical, standardised system, the increased marketplace for the standard makes it more reasonably priced and more appealing to others).future technology

Now, to continue on with this thread about future innovations that can save energy, let’s speak about some competing expertise of hydrogen vehicles. It might be unwise to recommend the marketplace for such devices has peaked – Fitbit’s app topped Apple’s App Retailer …

  • Partner links