What is my IP
What is my IP

Search results: rate

Results (61)
Approximately 61 results of rate

Telegram incorporates chatbots into Telegram Business accounts
Telegram incorporates chatbots into Telegram Business accounts
03/04/2024

Telegram Business has announced the addition of chatbots among its features aimed at streamlining communication between companies and their clientele. The new automated assistants on this instant messaging application are designed to provide information automatically in response to predictable inquiries. This recent development was announced through the company's official blog, where Telegram also explained that the chatbots also have the option to provide links that direct customers to booking or order tracking. Additionally, these new automated assistants from Telegram Business are also capable of offering welcome messages and absence notifications, useful for informing customers, for example, about holiday closures. Telegram explains that thanks to this new feature of Telegram Business, user companies will be able to enhance their brand presence and foster lasting relationships with their customers by leveraging the power of automation along with personalized communication.

[ ... ]

Google Integrates Gemini AI into Google Ads
Google Integrates Gemini AI into Google Ads
29/01/2024

Google has commenced the integration of Gemini's Artificial Intelligence (AI) into the conversational experience of its Google Ads service. This integration aims to assist marketing professionals in creating more effective advertising campaigns through the generation of specific content. Conversational Experience Empowered by Gemini Initially available for English-speaking advertisers in the United States and the United Kingdom in beta, this expansion will roll out globally in the coming weeks, with plans to include other languages in the near future. By providing the website's URL, the AI generates relevant advertising content, including creative pieces and keywords, facilitating the creation of optimized campaigns. Suggestions for Tailored Images in Captivating Visual Campaigns In an upcoming development, Google Ads' conversational experience will also include the ability to suggest images tailored to the campaign through the use of generative AI and materials from the advertiser's landing page. This feature, scheduled for implementation in the coming months, will provide advertisers with a comprehensive solution for creating visually appealing campaigns. Google has emphasized that all images generated by AI in Google Ads will be clearly identified, thanks to the SynthID technology that places an invisible watermark accompanied by open standard metadata.

[ ... ]

Google incorporates Artificial Intelligence into its search results
Google incorporates Artificial Intelligence into its search results
05/06/2023

During Google's annual developer conference, Google I/O, the company has publicly announced its commitment to Artificial Intelligence to improve its search results. Similarly, Google will introduce the generative AI collaboration tool, Duet AI, in Cloud and Workspace. The objective in this case is to assist in programming and generating personalized content in services like Gmail, Slides, or Meet. Google has opened generative AI support in Vertex AI and has also announced the Text Embeddings API for applications that require semantic understanding of text or images. At the developer conference, Google's Vice President and General Manager of Search, Elizabeth Reid, gave a live demonstration of how they are applying Artificial Intelligence in their search engine. The AI results will be displayed in a box at the top of the page with links to verify the provided information. Below the box, the rest of the results will be listed as usual, although Reid also mentioned that thanks to AI, they will now be more relevant.

[ ... ]

The United States accelerates the digital dollar
The United States accelerates the digital dollar
23/11/2022

After US President Joe Biden ordered this past week to urgently evaluate the creation of the digital dollar, the Federal Reserve Bank  and companies such US Bank, Citi, HSBC and Wells Fargo have announced a pilot prove to test the new currency. The digital Dollar will be issued centrally and its regulated liability network (RLN) will be tested for twelve weeks, during which the participating banks will operate in a simulated way, using tokens that will act as deposits from their clients that will be settled in a central reserve in a shared distributed ledger. This will be use to evaluate its security and operation in financial transactions and agreements. In parallel, China continues to promote the Digital Yuan and the European Central Bank (ECB) is also advancing in the creation of the digital euro, a project that the latest information indicates it cab be already viable in 2025. And while all this is happening, the information that ensures an imminent regulation for cryptocurrencies increases.

[ ... ]

Less than half of Spaniards change their passwords when they separate from their partner
Less than half of Spaniards change their passwords when they separate from their partner
05/10/2022

The email and social network accounts of one in five Spaniards (21%) have been subject to violation by a third party who has changed the passwords without the owner's knowledge or consent, attributing 37% of the victims this  wrong use to their ex-partners.  This data comes from the recent study carried out by Avast and Dynata on the degree of knowledge that Spaniards have of the passwords of their partners or relatives. In this study more than 2,000 Internet users  have participated.  Among the most striking results of this survey is that  the collaborators who say they still know their ex's passwords, 56% of them has admit that they even know, also, their professional email passwords. 24% of those surveyed also claim that their location has been tracked without their consent due to knowing their password.  This behavior, the authors of the study explain, can be considerated as technological abuse, which can be further aggravated by installing spyware or 'stalkwerware' on other people's devices or controlling or harassing someone through home technology.

[ ... ]

Meta uses AI for a new system that generates videos from text descriptions
Meta uses AI for a new system that generates videos from text descriptions
03/10/2022

Meta has presented "Make-A-Video" a new application that, based on Artificial Intelligence, is capable to generate a short video from a text description.  The AI ​​system used is based on imaging technology that learns from paired text and image data and videos without context. From them, the new system is able to create a high-quality video,  converting the provided text into a short clip.  According to the statement issued from Mark Zuckerberg's company, "Make-A-Video" represents an important advance with respect to "Make-A-Scene", the similar system presented by Meta last summer, that generates precise images from descriptions of text and sketches.

[ ... ]

Hungary Proposes Orchestrated Attacks Against Illegal IPTV Platforms
Hungary Proposes Orchestrated Attacks Against Illegal IPTV Platforms
23/09/2022

Television operators in Hungary have come together in an unprecedented common front in the country to combat illegal Internet IPTV platforms.The objective is to put end to the unfair competition from these services and to do it they propose launching denial-of-service (DDoS) attacks against the websites that host them.In order not to incur in the legality, the television stations would entrust these attacks to an organization that would act with legal authorization and under official levels of supervision and control.Upon receiving continuous DDoS attacks, the pirate platforms would be overwhelmed by malicious traffic and the hope of the television stations is that the inconvenience that would be shared by getting their services active again would make them rule out continuing their operations.

[ ... ]

New Wifi technology to accurately count seated people
New Wifi technology to accurately count seated people
27/09/2021

Small natural gestures such crossing your legs, checking your mobile, or scratching your nose are enough to count the number of people sitting in certain space.  A group of researchers from the University of California have developed a system that overcomes the precision problems that the lack of movement during most of the time in seated people caused in this type of counting operations. This new system also allows those seated behind a wall to be counted.  The new technology that is suitable for Wi-Fi devices is based on a mathematical model that, in a similar way to how the queue management theory works, relates the total number of gestures to the number of people sitting in the same space. Accuracy is 96.3, based on tests performed during the study.  In addition, the researchers say, the system offers an accuracy of almost 90%, in the detection of people behind the walls or dividing columns of any space.

[ ... ]

How to set up a digital marketing strategy?
How to set up a digital marketing strategy?
16/06/2021

As our daily life Internet gains prominence in our physical world, companies selling products and services are increasing their online presence. To do so, they resort to strategies and tactics that ensure their omnipresence in both worlds, with the main task of attracting and retaining customers who buy their products. In this race for customers' attention, strategies such as Inbound Marketing and Outbound Marketing have emerged as protagonists and although they are radically different in their forms, both techniques have found in online communication an ideal medium through which to achieve their goals. What is Inbound Marketing? Inbound Marketing is based on attracting customers through non-intrusive techniques that use content related to the needs and interests of our target audience to attract them to our brand and products. Inbound Marketing Strategy In Inbound Marketing, content is the king and the strategy to get the user to approach the brand is to create, through these contents, links with the customer and establish a relationship of trust and support that favors their interest in our products and services, as well as their loyalty. To achieve this attention on the contents, it is basic and essential to optimize the SEO search engine, which makes our website, our contents and brand visible, makes us relevant and also contributes to our authority. To achieve this optimization and positioning, SEO will be in charge of indicating which words are trending in searches related to our content, will improve the structure of the web to allow a correct user experience, will implement a good strategy of referral links or link building and will take care of other aspects such as the integration of CRM tools or user metrics. All this will make it possible for our content to be positioned and that in a totally "natural" way and without any intrusion, all those contents written according to the interests of a certain group of customers, awaken their interest and attract them to our brand. Inbound Marketing Tools Throughout the whole process of customer attraction and loyalty, the Inbound Marketing strategy has a wide variety of tools to achieve its goal: Blogs Landing page Lead Creation Calls to action Intelligent content Workflows, ... What is outbound Marketing? Unlike Inbound Marketing, outbound Marketing is based on a totally traditional commercial approach, in which the product or service being sold is the only protagonist of the communication. Outbound Marketing Strategy To reach the public, outbound strategies use invasive methods that address broad audiences, without a specific target, with the intention of reaching the maximum number of possible interested parties. Outbound Marketing strategies are based on one-way communication, from the brand to the customer. The company shows the value of its products and services and tries to convince the public to buy them. All this operation is implemented without the customer's request, even before he has made a search or has shown previous interest in a specific product or service. Outbound Marketing Tools In Outbound Marketing, since there is no specific target audience segment, the communication reaches many users, although it may not be of interest to any of them. To achieve this massive distribution, companies use resources such as: Pop-ups Advertisements inserted in videos Banners Email campaigns for which companies use powerful email marketing software in Spanish, with multiple integrated tools that allow from automating mass mailings to A/B testing, comprehensive monitoring of the actions of each recipient (open rate, clicks on links,...) or even advanced segmentation based on interactions and / or user behavior detected in previous actions. Newsletter, inbound or outbound marketing? Now that we know the differences between Inbound and Outbound Marketing, we will finish by looking at a very useful and versatile tool that, unlike those previously mentioned is used interchangeably by both strategies. We are referring to the Newsletters. If we look at the Newsletter of Which is my IP, for example, we would be talking about an Inbound strategy, because to receive the electronic newsletter you must first register (by the way, if you have not done so yet, do not miss it and you will receive timely information on news and updates to get the most out of your Internet connection). On the other hand, if we look at newsletters like the ones we have all surely received at some time, in which we are offered, for example, a telephone offer from a company that is not our own, we are dealing with an electronic newsletter included in the marketing plan of an Outbound strategy. At this point, we can only conclude that knowing our priorities as a company, analyzing the degree of knowledge we have about our target and assessing our objectives, we will have all the necessary answers to start working and designing our digital marketing strategy.

[ ... ]

49% of consumers are willing to favor brands that explain data usage in AI interactions
49% of consumers are willing to favor brands that explain data usage in AI interactions
17/04/2024

Artificial intelligence (AI) has become a fundamental tool for companies striving to provide personalized and efficient customer interactions. However, a new report reveals that the lack of transparency in data usage by brands is affecting consumer trust. According to Twilio's fifth 'State of Consumer Engagement Report', based on a global survey including over 4,750 B2C executives and 6,300 consumers across 18 countries, 49% of consumers would trust a brand more if it disclosed how it uses data from AI-driven interactions.   The report also highlights that, although 91% of brands claim to be transparent with their customers about AI usage, only 48% of consumers agree.  In this context, data protection emerges as a priority for consumers, with six out of ten indicating it's the best way for brands to earn their trust. This data security concern is shared by, the 40% businesses globally that considerate important to find a balance between security and customer experience as one of their most pressing challenges. AI-driven customer experience for brands AI-driven personalization is a key strategy to enhance customer relations. The report points out that companies adopting personalization experience a significant increase in consumer spending, averaging 54% more compared to those that don't. AI not only helps bridge the customer experience gap but also provides additional benefits, such as better data-driven decision-making and increased customer satisfaction. However, the report highlights that many companies face difficulties in activating customer data. Globally, only 16% of brands fully agree that they have the necessary data to understand their customers.

[ ... ]

Ip Location, the tool to know my ip location
Ip Location, the tool to know my ip location

If you need to check what location your internet provider is sharing with the websites you visit, with our IP locator you can instantly geolocate your IP address or any other that you enter manually. To geographically locate the IP address, you only need to be connected to the internet. If you use VPN software or connect through a proxy to locate IP address you can also use our tool. None of the data generated by the IP locator is stored in our system. @Mapa@ How can I hide my IP address so that it cannot be traced? To anonymously browse the Internet and avoid being located through the IP of your connection, there are two basic ways to do it. The first is to hide IP so that no one will be able to track our presence on the network or access our browsing data and the second is to change IP and browse through another IP address whenever we need to. Why do I need to locate my IP geographically? Locating your IP geographically is the best way to find out what data our ISP shares about the location of our connection. Depending on this location. a website whose URL is ".com" will change to "/es" if we connect from Spain, for example, and some tasks related to the sending of forms will be simplified, as they will be automatically pre-filled with some data such as your country or city, depending on your geolocation IP. As users with a geolocation IP tool such as the one we offer in Cuál es mi IP, we can manually enter an IP address and find out, for example, from where we have received a fraudulent email, if we have had access before, of course, to the IP address involved Can anyone find out my home address with an IP geolocation tool? By using a tool to locate an IP address, you can trace the IP and geolocate it through coordinates on the map, but the specific postal address is never provided. This is because our IP address is not ours, but rather our Internet Service Provider's (ISP's). So what data can they find out about me with IP geolocation? When locating the IP geographically. the only information about us that is provided is the country and city from which we are connecting, since the GPS coordinates of altitude and latitude that are shown correspond, in reality, to those of the headquarters of the company that is offering us the Internet connection service. The reason behind this is that all data related to the actual geographic address of the device used to access the Internet, i.e. our router, is not public and belongs to our ISP, which can only disclose it by court order. Why are companies interested in locating my IP address geographically? Information is power and for a company to know from where its potential customers connect is an important advantage to design marketing strategies aimed at the customer profile of a particular geographical area or country. In addition, in terms of anti-fraud, e-commerce companies can improve card payment security by identifying payment attempts from suspicious IP addresses. What is an IP address? An IP address is a special numerical combination assigned to an internet-connected device to be identified on the network. All intelligent devices need an IP address to access the Internet and interact on the network. Each device connected to the Internet has its own an individual IP address. When we access the Internet, the servers recognize our device through its IP address, allowing the two-way communication with the recipient. As we are identified with our IP address, the rest of devices can order a return response, without mistake the sender. Making a simile, an IP address would be the address that we use to write on the back of an envelope. This information identifies us as issuers and also as recipients of the return answer. To make possible this data exchange, the IP protocol was established as a set of universal rules for all the Internet operations. That means that all devices connected to Internet or to a home network, "speak" the same language and they are able to communicate each with the others. There are two types of IP address, the external IP and the local IP: • The external IP or public IP is the numerical combination address assigned to us by our Internet service provider (ISP). This public IP identifies us as Internet users when we are connected. If you want to find the IP of your computer, your tablet or your Smartphone, you can find out this immediately by accessing the home page of “What is my IP” or using our speed test service that, in addition to this information, will inform you about the quality of your Internet connection. • The local IP address or internal IP is the one the router assign to all the devices connected to him and identifies each of these devices, individually, in the home network.  How to locate an IP address?  If you want to know how to find out where an IP address is from, you should know that it is not always easy to find out the IP origin of a connection, because there are different systems to hide the IP. Some users use these systems for security reasons or to simulate, for example, their IP location in another place and thus have access to Internet services not enabled in the place where they are located. Now, if the user does not use any resource to mask the IP, find out the IP of the computer or any other device connected, for example, to our website, it is as simple as use IP geolocation services such the one offered in “What is my IP?” and you will immediately find out the IP origin of any computer that you are interested in track. Knowing the IP location of our clients is an advantage when we are designing, for example, our marketing strategies and a good tool, also, to improve network security, as it allows us to locate suspicious IP addresses. In addition, with the IP geolocation service you can also verify the location that your Internet provider shares about you. It should be clarified that this location provided by IP geolocation services is never the specific address of our home or where we are located. The data actually are from the operator node in our area that is offering us the connection service to the internet network Therefore, the geolocation information will be the country and city from where the connection is made, but not the address where the user is located, because this specific tracking of the user address is protected by law and this data can only be provided by court order.

[ ... ]

PrivateVPN
PrivateVPN
PrivateVPN

When it comes to cybersecurity, we have many powerful VPN providers to choose from. PrivateVPN is undoubtedly one of the most important. In recent years, it has shown an impressive rate of growth and user loyalty. PrivateVPN, headquartered in Sweden, offers the highest levels of online security and privacy, stable connections from anywhere in the world, and a guaranteed 24/7 uninterrupted VPN service. And best of all, all of its services are more than reasonably priced.

[ ... ]

Antennas
Antennas

Find here the perfect antenna to improve your wireless network coverage, attract Wi-Fi signals to your devices or connect to an outdoor network. In this section, you will also find converters, indoor TV antennas for DTT, and outdoor antennas adapted to the new UHF standard with integrated 4G/5G filters.

[ ... ]

Zyxel
Zyxel
Zyxel

Founded in 1988, Zyxel is a Chinese company dedicated to the production of all kinds of electronic network devices for a wide range of connectivity systems. At Zyxel, a good network connection is not enough, it is just the beginning. A good network connection must include fast and agile bandwidth which operates smoothly, cleanly and without incidents. Currently, apart from solutions and devices for home and small businesses, Zyxel has customers all over the world that are Internet service providers, who use its technology to provide coverage to their customers.

[ ... ]

Digital insurance with AI sets the trend in the Insurtech market
Digital insurance with AI sets the trend in the Insurtech market
12/04/2024

Digital insurance, connected and driven by generative Artificial Intelligence (AI), is making a milestone in the Insurtech market, according to a report prepared by the technology consultancy NTT Data. The report, 'Insurtech Global Outlook 2024,' delves into the three waves of innovation that are reshaping the insurance sector and also offers recommendations derived from its main findings. NTT Data experts detail that, after reaching record investment figures in previous years, the sector experienced an adjustment in 2023, reflecting both the bursting of a bubble and a strategic adaptation to new global economic and political realities. Three waves of innovation in digital insurance The NTT Data report identifies "three waves of innovation" in the insurance industry: digital insurance, connected insurance, and generative insurance. The first ones, they explain, mark the entry of Insurtech companies into the market, while connected insurance leads the shift towards proactive prevention strategies and personalized approaches for the client. The latter, generative insurance linked to AI, they add, are helping insurance companies to generate high-impact models in society, while also complying with ethical regulations.  In fact, according to this work, cybersecurity and AI emerge as fundamental pillars for the transformation of the sector. The report highlights, for example, an investment of 640 million dollars in cybersecurity, with a growth in the number of transactions and an increasing focus on protection against cyber risks. In addition, artificial intelligence, with investments of over 50 billion dollars, is consolidating, according to the NTT Data report, as a disruptive force, paving the way for revolutionary solutions and business models.

[ ... ]

Phone Companies in Spain
Phone Companies in Spain

Know the details of the best rates, offers and services of the telephone operators in Spain. We will explain what type of contracts they offer, what is the fastest fiber they have, what permanence each company requires and what are the additional services that you can contract with them. We promptly update all the information so that you are up to date with the news in rates and services and can, thus, decide which telephone operator best suits your needs. Here you will find information on both conventional telephone companies and virtual mobile operators and also regional operators.

[ ... ]

A new FakeUpdates campaign targeting WordPress sites has been detected
A new FakeUpdates campaign targeting WordPress sites has been detected
20/03/2024

Over the past few weeks, a new wave of the FakeUpdates malware, also known as SocGholish, has been detected, aimed at WordPress websites. The objective is to lure users into downloading remote access trojans, allowing attackers to take control of their systems. Since its emergence in 2017, FakeUpdates has been one of the most recurring malicious software in the cyber threat landscape. It has previously been associated with cybercriminal groups like Evil Corp, who monetize its use by selling access to infected systems. In this new campaign, cybercriminals are using JavaScript to target WordPress web pages, compromising compromised administrator accounts to introduce altered versions of WordPress plugins. These adulterated versions deceive users into downloading remote access trojans, granting attackers full control over infected devices. What is the most popular type of malware? In addition to the FakeUpdates attack, the threat index from Check Point Research, whose researchers have warned about this new attack, reveals around 200 suspicious content websites directed by ransomware groups. They utilize double extortion tactics to pressure victims into paying immediate ransoms. These attacks have impacted many companies, with the Lockbit3 ransomware being the most utilized by cybercriminals, followed by Play and 8base. The most exploited vulnerabilities by malicious actors include 'Web Servers Malicious URL Directory Traversal,' 'Command Injection Over HTTP,' and 'Zyxel ZyWALL Command Injection,' affecting numerous companies worldwide and allowing attackers to access and manipulate files or execute commands on compromised systems. In Spain, despite a 7% decrease in malware attacks in February, the most sought-after malware includes FakeUpdates, Qbot, and Pandora. In the case of FakeUpdates, it has affected 11.9% of companies in Spain. Mobile Malware In the realm of mobile devices, Anubis remains the most utilized malware in Spain, followed by AhMyth and Hiddad, all designed to compromise the security and privacy of Android device users by collecting confidential information and executing malicious actions.

[ ... ]

WiFi Security: Assessment of threats in wireless networks
WiFi Security: Assessment of threats in wireless networks
08/03/2024

Wifi connectivity has gone from being limited to restricted environments to becoming omnipresent in virtually every aspect of our daily lives. The ability to connect to the Internet from anywhere, be it at home, in a café, at work, in public spaces, or even in-flight, has enhanced the convenience in our daily lives. Moreover, the expansion of Wifi networks and the use of new manufacturing technologies now allow the interconnection of devices, leading to the significant rise of the Internet of Things (IoT) and providing users with more comprehensive control over their digital environments. However, this proliferation of Wifi networks has also given rise to new threats that require careful evaluation and effective security strategies to ensure secure and risk-free Wifi connections for our data and information. Common Wifi security threats include data interception Man-in-the-Middle (MITM) attacks One of the fundamental challenges in Wifi security is preventing MITM attacks, where an intruder inserts themselves into the communication between two parties, compromising the integrity and confidentiality of sensitive data such as passwords and financial information. Spoofing of access points Hackers can create fake Wifi networks that mimic legitimate ones to attract unsuspecting users. Once connected to these malicious networks, our data can be captured by cybercriminals who may sell or misuse it for illicit purposes. Tips for achieving a secure Wifi connection: Strengthen authentication and use security protocols Prioritize strong encryption for networks to protect confidential information transmitted through it. WPA (Wifi Protected Access) encryption uses stronger algorithms than its predecessor, WEP (Wired Equivalent Privacy), making it more difficult for hackers to intercept and decipher data. Advanced security protocols like WPA3 provide individualized data encryption and advanced two-factor authentication (2FA) methods, adding an extra layer of security by requiring additional verification. Device management Properly manage and monitor devices connected to Wifi networks to minimize risks associated with the large number of connected devices in homes and businesses. Regularly update the router firmware and all connected devices to address potential vulnerabilities. Segmentation of the network to separate critical devices from less secure ones also helps mitigate the risk of threat propagation. Secure Router Configuration The router secure configuration is what will ensure the robustness and overall security of a wireless network. The router, being the first point of contact for devices connected to the Internet, acts as the first line of defence against potential attacks. For this reason, it is important to understand that the proper configuration of the router not only guarantees a stable and efficient connection but also establishes a protected environment that safeguards the integrity and privacy of our data. How to configure the router securely? To ensure a correct and secure configuration of the router, it is recommended to: Change the default username and password of the router, as these are easily accessible to attackers. Use strong passwords containing a combination of letters, numbers, and special characters. Disable remote administration to prevent cybercriminals from accessing the router externally. Enable WPA2 or WPA3 encryption instead of the outdated WEP for enhanced network security. Optionally, disable SSID broadcast to make the network less visible and harder to detect by hackers. Keep the router firmware updated to address vulnerabilities and improve overall device security. By following these steps, you will strengthen the security of your wireless network and reduce the chances of experiencing unwanted attacks or intrusions.

[ ... ]

What is Worldcoin and what does scanning the iris involve?
What is Worldcoin and what does scanning the iris involve?
04/03/2024

Worldcoin was introduced in summer of 2023 as a revolutionary project with the mission of creating a 100% secure digital identity, essentially a kind of fortified "digital passport," based on the verification of a unique and non-transferable element inherent to each human being—the iris. According to its developers, World ID will help distinguish human online activity from that generated by machines. In the first phase of the project, the creation of this secure digital identity is planned for 2 billion humans. To make this possible, Worldcoin has called on the global population to scan their iris. In return, Worldcoin compensates participants with a few tokens of its successful cryptocurrency, WLD, which has quadrupled in value within a few weeks of its initial launch. The payment in WLD tokens is not coincidental; it is part of Worldcoin's strategy, aiming to leverage the new digital passports to create a comprehensive ecosystem that provides universal and equitable access to advanced financial services for the entire global population. To achieve this, they encourage "iris sellers" to use the Worldcoin cryptocurrency on its fee-free blockchain, unlike Bitcoin, Ethereum, or other cryptocurrencies that do charge transaction fees. How does Worldcoin work? Worldcoin aims to address the issues of bots, rapid creation of fake identities, and content with artificial intelligence. It is designed, according to its developers, to provide every individual in the world with a unique digital identification. Additionally, Worldcoin promises to ensure the financial inclusion of each person in a fair and equitable ecosystem through a universal basic income. Users receive this income in exchange for allowing their iris to be scanned. To create the secure digital passport with Worldcoin, users must undergo an iris scan, which serves as proof of humanity and a unique identity on the blockchain. This process ensures that the individual on the other side of that identity is a human and not a fake profile created with artificial intelligence. In pursuit of the success of their proposal, the company offers users a small amount of their own Worldcoin tokens in exchange for iris scanning. The initial incentive of receiving free cryptocurrency, in the form of a universal basic income, is emphasized by Worldcoin advocates as the basis for the inclusive and universal nature of their initiative. This approach allows anyone to scan their iris, and the WLD tokens received in return can assist people without access to traditional financial services in starting to save and invest. How to Scan the Iris with Worldcoin? The registration process with Worldcoin involves scanning the iris with an orb, the central hardware device of Worldcoin developed by Tools for Humanity. The orb is spherical and processes all the information. Currently, Worldcoin has installed orbs in different countries, including Spain, where users can scan their iris in exchange for Worldcoins. To do this, it is necessary to download the Worldcoin mobile application, World ID, generate a QR code with it, and display it in front of the orb. The orb, upon recognizing it, will scan the user's iris, while a Worldcoin collaborator remotely oversees the operation. The orb takes less than a minute to perform the scan and validate the subject's identity. In exchange for their iris, the user receives a unique number called "IrisHash" and a cryptographic wallet with Worldcoins. "This digital passport is accepted as proof of unique humanity, which people can use in the digital world without the need to share any other data," assure its developers. What happens with my scanned iris in exchange for Worldcoins? Once the iris scan is completed, and digital identity is granted to the user, Worldcoin assures that the orb quickly eliminates the images unless the user requests their preservation. Only the set of numbers called "IrisHash" is stored for identification, without any additional biometric data. Worldcoin also commits to ensuring that users share only the necessary information they wish to share, providing verification options through linked devices or the additional facial authentication orb for high-security cases. Despite these commitments, the collection of biometric data through iris scanning for the unique proof of humanity continues to raise significant questions regarding privacy and information security. Some countries such as Brazil, France, India, or Kenya have halted Worldcoin's iris scanning. How much do you get paid for scanning your iris? Worldcoin pays 25 WLD for scanning your iris, which, according to the cryptocurrency's exchange rate in February 2024, has translated to an average of between 50 and almost €160 for iris sellers, depending on the value of Worldcoin on the day they scanned their iris. At the beginning of February, the value of each WLD unit was around two euros, and by the end of the month, it had risen to nearly seven euros. What can I spend my WLD on? 'Iris sellers' have the freedom to use their Worldcoins from the moment they receive them. They can exchange the payment for other cryptocurrencies, withdraw them in euros from a specialized ATM, or hold onto the tokens in the hope of an increase in their value. Additionally, WLD payments are already accepted on platforms such as Discord, Shopify, Minecraft, Telegram, Mercado Libre, or Reddit, among other places. Who is behind Worldcoin? Worldcoin bears the stamp of two innovative minds: Sam Altman and Alex Blania. Altman is the CEO of OpenAI and a key figure in artificial intelligence development, leading projects like ChatGPT. Blania, on the other hand, is the co-founder of Tools For Humanity, contributing his experience in creating technological tools for a more equitable economic system to this new and successful cryptocurrency.

[ ... ]

Orange transforms the gaming experience with AI and the 5G+ Stand Alone Network
Orange transforms the gaming experience with AI and the 5G+ Stand Alone Network
29/02/2024

Orange has harnessed the power of Artificial Intelligence (AI) and the advanced architecture of the 5G+ Stand Alone network, leveraging its fragmentation capabilities, to reinvent a Virtual Reality (VR) athletics video game from the 1980s. In this revamped version, users have the opportunity to become exceptionally realistic avatars, competing with other players located in various places. The game employs Artificial Intelligence (AI) to accurately identify the user's anatomy and textures, creating the avatar. This process involves a three-dimensional volumetric scan of the subject, performed with a total of 21 cameras. Based on this detailed information, the avatar is created, allowing the player to participate in thrilling athletics races, competing against virtual opponents physically located in different locations. Fragmentation technology for efficient virtual networks During the game's usage, it leverages the capacity of network fragmentation technology to establish various virtual networks on the same physical infrastructure. This is achieved through efficient resource allocation tailored to the specific needs of the service, considering key aspects such as quality, availability, privacy, and security. In the case of Orange's VR game, it achieves this by prioritizing a fast and secure connection with minimal latency for an enhanced gaming experience. Immersive Now by Orange The presentation of Orange's athletics game took place at the Mobile World Congress in Barcelona, where the orange mobile telecommunications operator also showcased a virtual reproduction of its booth using the Immersive Now 360 platform for entertainment and events.

[ ... ]

What is Bitcoin Halving and how does it affect the cryptocurrency?
What is Bitcoin Halving and how does it affect the cryptocurrency?
25/02/2024

The term "Halving" in the context of Bitcoin refers to a scheduled event in the cryptocurrency protocol, in which the reward for mining blocks is reduced by half. This event occurs approximately every four years and has a significant impact on the supply and demand of Bitcoin. During Halving, the number of new Bitcoins created per block is halved. This implies a decrease in the issuance rate of the cryptocurrency, which in turn can have an effect on the price and volatility of Bitcoin. Many analysts and experts are speculating about the long-term implications of the Halving and its influence on the cryptocurrency markets. Services related to Bitcoin Halving There are various types of services and tools related to Bitcoin Halving that can be beneficial for different actors in the cryptocurrency ecosystem. These services include: 1. Halving analysis and forecast This type of service provides detailed information about the past, present and future of the Bitcoin Halving. Through analysis and forecasting, it helps investors and cryptocurrency enthusiasts make informed decisions on how to position themselves before and after the event. 2. Bitcoin Mining As the reward in Bitcoin decreases, mining this cryptocurrency becomes more challenging. Bitcoin mining services offer solutions and advice to maximize mining efficiency and profitability, even in a low reward environment. 3. Financial advice related to Halving As the issuance rate of Bitcoin slows, investors may need to adapt their investment strategies. Financial advisory services specialized in cryptocurrencies and Bitcoin provide personalized recommendations and analysis to optimize investment performance in this context. 4. Development of tools for cryptocurrencies The Bitcoin Halving may generate changes in the cryptocurrency ecosystem, which may require the creation of new tools and solutions. Companies specialized in software development and applications related to cryptocurrencies can provide development and consulting services to adapt to these new demands. Bitcoin: Reward Reduction and Its Implications on the Cryptocurrency Ecosystem Bitcoin, the most famous and valuable cryptocurrency in the world, has periodically experienced an event known as a "reward reduction" or "Halving", which has significant implications on the cryptocurrency ecosystem. In this article, we will explore in depth what Bitcoin reward reduction is and how it affects both miners and investors. What is Bitcoin reward reduction? Bitcoin reward reduction is a scheduled event integrated into the cryptocurrency protocol. It occurs approximately every four years and consists of a halving of the reward miners receive for validating transactions and adding new blocks to the Bitcoin blockchain. Originally, when Bitcoin was launched in 2009, miners received a reward of 50 Bitcoins for each block mined. However, due to the reward reduction process, this amount has decreased over time. In 2012, it was reduced to 25 Bitcoins per block, in 2016 to 12.5 Bitcoins per block, and in 2020 it was reduced again to 6.25 Bitcoins per block. Implications for Bitcoin miners Bitcoin's reward reduction has a significant impact on mining the cryptocurrency. With each reduction, miners receive fewer Bitcoins for their work, which means less direct monetary reward. This may result in some miners leaving the Bitcoin network, especially those with higher electricity and mining equipment costs. On the other hand, those miners who manage to adapt and remain profitable even with a lower reward are rewarded with a larger share of the Bitcoin supply generated through mining. This concentration of Bitcoins in the hands of fewer miners can have effects on the decentralization and security of the network, since the number of active participants in the transaction validation process is reduced. Implications for investors and the price of Bitcoin Bitcoin's reward reduction also has implications for the price and supply of the cryptocurrency. As the issuance of new Bitcoins decreases, the supply in the market reduces. This may lead to higher relative demand if Bitcoin demand continues to grow or remains stable. In previous reward reduction events, a long-term increase in Bitcoin price has been observed. This is because the decrease in the supply of new Bitcoins can lead to greater perceived scarcity and therefore an increase in their value. However, it is important to note that the price of Bitcoin is highly volatile and can be influenced by a variety of external factors, so a continued increase after reward reduction cannot be guaranteed. Bitcoin's reward reduction is a key event in the life of the cryptocurrency and has implications for both miners and investors. As the number of new Bitcoins generated is halved, miners must adapt to remain profitable and the supply of Bitcoin on the market may decrease. However, this event can also have a positive impact on the price of Bitcoin in the long term. It is important to understand and take these factors into account when evaluating investment potential in Bitcoin and the cryptocurrency market in general. Bitcoin and limited supply: a unique combination Bitcoin has captured the attention of the financial world like no other cryptocurrency. One of its most notable features is its limited supply, meaning that only a finite number of bitcoins will be created in the world. This contrasts with traditional fiat currencies, which can be printed at the discretion of governments. How does Bitcoin limited supply work? Bitcoin was designed to have a total supply of 21 million coins. As new blocks are mined by users and added to the Bitcoin blockchain, new coins are generated and distributed as rewards to miners. However, this reward is halved in an event known as "Halving", which occurs approximately every four years. Halving ensures that the rate of issuance of new bitcoins decreases over time, following a predictable mathematical function. Currently, the reward per mined block is 6.25 bitcoins, but this number is expected to reduce further in the future. This controlled scarcity mechanism is a central part of Bitcoin's monetary policy. Advantages of Bitcoin Limited Supply Bitcoin's limited supply has several significant advantages: Sense of scarcity: The limitation in the supply of Bitcoin makes it a scarce and valuable asset. As it approaches its maximum supply, demand and price are expected to increase. Inflation Protection: Unlike fiat currencies, Bitcoin cannot be inflated or devalued at the discretion of governments. Its limited supply protects it from inflation and makes it a safe store of value. Monetary stability: With carefully controlled supply, Bitcoin offers greater monetary stability compared to national currencies, which can be affected by political and economic decisions. Challenges and debates surrounding the limited supply of Bitcoin Despite the advantages, Bitcoin's limited supply has also generated debates and challenges. Some argue that the scarcity of bitcoins could hinder its mass adoption as an everyday currency. Price volatility is also an issue of concern. Furthermore, the fact that only about 80% of all existing bitcoins have been mined raises questions about how the latest bitcoins will be distributed and how this will affect the network and its sustainability in the future. Bitcoin has revolutionized the financial world with its limited supply and unique monetary policy. Controlled and predictable scarcity is an essential part of its design, providing a solid alternative to traditional fiat currencies. Although limited supply can pose challenges and debates, it also offers significant benefits, such as a sense of scarcity, protection against inflation, and monetary stability. As Bitcoin continues to mature and its supply approaches its maximum limit, its value and relevance in the financial world continues to grow, leaving investors and enthusiasts with great anticipation about its future.

[ ... ]

Chat with RTX by Nvidia: Localized customization of chatbots without Internet
Chat with RTX by Nvidia: Localized customization of chatbots without Internet
19/02/2024

Nvidia introduces an innovative tool in the chatbot realm called Chat with RTX, designed for the personalization of conversational assistants. Powered by generative Artificial Intelligence (AI), Chat with RTX operates locally on computers with GeForce RTX Series 30 graphics cards running Windows 10 or Windows 11. Chat with RTX and the IA revolution for chatbots This decentralized approach eliminates the reliance on an internet connection for chatbot functionality. Unlike many conventional virtual assistants, which require constant cloud connectivity for processing and generating responses, Chat with RTX operates internally on the user's device. According to Nvidia, this feature not only enhances privacy by avoiding the transmission of sensitive data over the network but also provides a quicker and more efficient response. With Chat with RTX, users can create personalized chatbots in the style of ChatGPT, Gemini or Copilot for conversational queries. This format allows the incorporation of YouTube videos, text in different formats, and URLs for contextual queries. Nvidia's tool is optimized to leverage the capabilities of computers running Windows 10 or 11 with a GeForce RTX Series 30 GPU and 8GB of video random access memory (VRAM).

[ ... ]

Arc Search, AI-powered search engine for iOS
Arc Search, AI-powered search engine for iOS
05/02/2024

The Browser Company has introduced its latest innovation to the market, Arc Search, a search engine exclusively designed for iOS devices that integrates artificial intelligence and private browsing functionalities. Arc Search promises seamless and interruption-free navigation, free from annoying ads. Driven by artificial intelligence, this search engine offers, also, advanced features such as the ability to summarize visited web pages and provide search results more efficiently. Additionally, it stands out for its ad blockers, a reading mode that minimizes distractions, and a keyboard designed to initiate searches with just a few taps. In addition to Arc Search, in the spring, The Browser Company will also launch its web browser ARC, based on Chromium, with the ambition to challenge the supremacy of Google Chrome. With these releases, The Browser Company has explained that it aims not only to establish itself as a robust option in the realm of browsers and search engines but also to redefine how users interact with information on their iOS devices.

[ ... ]

Where to watch the Champions League on TV or Streaming?
Where to watch the Champions League on TV or Streaming?
13/06/2023

Find out where you can watch the Champions League so as not to miss a minute of this excellent competition that this year again promises good soccer and maximum excitement. When does the Champions League 2021/2022 start? The UEFA Champions League Group Stage starts in mid-September. The first match day will be played on Tuesday, September 14, and will feature Sevilla, who will face RB Salzburg in the Andalusian capital; Villarreal, who will play at home against Atalanta; and FC Barcelona, who will face Bayern Munich, also at home. The following day, on September 15, the 2021/2022 Champions League will kick off for Atlético de Madrid, who will play against Porto at the Wanda Metropolitano, and also for Real Madrid, who will play their first match against Inter, in Milan. This first Group Stage will have six matchdays in which the 32 teams participating in this edition of the Champions League will face each other in home and away matches that you will be able to follow both on television and streaming. Group stage September 14/15, 2021: first matchday September 28/29, 2021: second matchday October 19/20, 2021: third matchday 2/3 November 2021: fourth matchday November 23/24, 2021: fifth matchday December 7/8, 2021: sixth matchday Once the six matchdays of the group stage have been completed, the competition will continue with the knockout phase, which will determine the two teams that will play in the UEFA Champions League final. Knockout Phase Round of 16: February 15/16/22/23 and March 8/9/15/16/16, 2022 Quarter-finals: 5/6 and 12/13 April 2022 Semifinals: May 26/27 and 3/4, 2022 Where to watch the Champions League on TV? As with LaLiga Santander and Liga SmartBank, Movistar has exclusive rights to the UEFA Champions League in Spain until 2024. However, following an agreement with Orange, Movistar has decided to share the rights with this operator, so that in Spain this season the Champions League can be watched on TV on Movistar and Orange TV. In both cases, the broadcasting of the UEFA Champions League group stage matches as well as those of the knockout phase and the Final will be included. How to watch the Champions League on Orange TV? Although Orange does not have direct rights to the Champions League in Spain, its agreement with Movistar allows its customers to watch live Champions League matches on Orange TV. These broadcasts are exclusively for the operator's customers who have the Orange Love Total package, which includes the UEFA Champions League, Liga Santander, and Liga SmartBank matches, in addition to the UEFA Champions League. How to watch the Champions League on Movistar? To watch the Champions League on Movistar we must be customers of this operator and have contracted the Fusión Selección Champions or Fusión Selección Plus con Fútbol package, which also includes the Liga Santander and Liga SmartBank matches. If our package is Fusión Selección con LaLiga, we will only have access to the Spanish football competition and we will not be able to watch the Champions League matches. The Movistar channel on which the Champions League can be watched is called " Movistar Liga de Campeones". "Movistar Liga de Campeones" is an exclusive TV channel for watching soccer and in addition to the UEFA Champions League, it also provides coverage of the Europa League.The schedules of all broadcasts can be consulted in the Sports section of the Movistar+ menu, for ADSL and Fiber TV customers. Where can I watch the Champions League live on the Internet? Both Movistar and Orange complete their Champions League soccer offer on TV through their online platforms. In both cases, to enjoy soccer on our mobile devices or computer, we must be subscribed to a package that includes the UEFA Champions League (in Movistar, Fusión Selección Champions or Fusión Selección Plus con Fútbol, and in Orange TV, Love Total). If you are a Movistar customer and have one of these packages, you must activate Movistar+ on your devices (formerly Yomvi) and you will have access to watch the Champions League online matches on Movistar as well as other online content and series, at no additional cost from anywhere and on any device. All broadcast schedules can be consulted in the Sports section of the Movistar+ menu on any device. To watch the Champions League online on Orange, you must log in to the Orange TV website to identify yourself as a Love Total member.  Once we have logged in, we will be able to watch live matches of the UEFA Champions League, LaLiga Santander, LaLiga SmartBank, and also watch matches that have already taken place. Where can I watch the Champions League from outside Spain? If you are a Movistar or Orange customer, the best option to watch the Champions League from abroad is through Movistar+ on your devices or the online platform of Orange TV. If you have problems viewing the matches due to a geographical block, the best option, in this case, is to connect to a VPN with a Spanish IP beforehand. If your Internet access provider does not offer this service, here are the best VPN offers to surf safely (both from home and when traveling). In addition, and depending on the country you are in, various television stations and operators have the broadcasting rights to the UEFA Champions League: Europe Albania: Tring, RTSH Armenia: Vivaro Austria: ServusTV, Sky Austria  Azerbaijan: CBC Sport, Saran Belarus: UEFA.tv Belgium: Proximus, RTL, VTM Bosnia and Herzegovina: Arena Sport Bulgaria: A1, bTV Croatia: HRT, Arena Sport Cyprus: CYTA Czech Republic: Nova, Voyo Denmark: NENT Group Estonia: Viaplay Finland: MTV France: Canal+, BeIN Georgia: Adjara, Silknet Germany, DAZN Greece: MEGA, COSMOTE TV Hungary: Sport1, MTVA Iceland: Viaplay, Syn Republic of Ireland: Livescore, Virgin Media, RTE Israel: The Sports Channel  Italy: Amazon, Mediaset, Sky Italia Kazakhstan: QazSport, Q Sport League, Saran Kosovo: Arena Sport, Artmotion Kyrgyzstan: Saran, Q Sport Latvia: Viaplay Lithuania: Viaplay Luxembourg: RTL, Proximus Malta: Melita, PBS Moldova: Setanta, Prime Montenegro: Arena Sport Netherlands: RTL, Ziggo Sport North Macedonia: Makedonski Telekom, Arena Sport, MTV Norway: TV2 Norway Poland: Polsat Portugal:Eleven Romenia: Clever Media, Digisport, Telekom Romania Russia: Match TV  Serbia: Arena Sport Slovakia: Markiza, Voyo Slovenia: Sportklub, Pro Plus Spain: Telefonica, Orange TV Sweden: Telia Switzerland: blue+, CH Media Tajikistan: Varzish TV, Saran Turkey: EXXEN Turkmenistan: Saran Ukraine: Megogo UK: BT Sport Uzbekistan: MTRK Africa and Middle East Nigeria: SuperSport South Africa: SuperSport Middle East and North Africa (Algeria, Bahrain, Chad, Djibouti, Egypt, Iran, Iraq, Jordan, Kuwait, Lebanon, Libya, Morocco, Oman, Qatar, Saudi Arabia, Sudan, Syria, Tunisia, United Arab Emirates, Yemen): beIN Sub-Saharian Africa: Canal+, SuperSport America Bolivia: Televideo Brazil: SBT, Turner Canada: DAZN Caribbean: Flow Sports, Sportsmax Central America: ESPN Costa Rica: Teletica Dominican Republic: Televideo Ecuador: Televideo El Salvador:Canal Dos Guatemala: Televideo Haití: Canal+ Honduras: Televicentro South America (except Brazil): ESPN Mexico: Turner Panama: TVN, Medcom Paraguay: Televideo Peru: Televideo United States: CBS, TUDN Deportes Venezuela: La Tele Tuya  Asia and Pacífic Australia: STAN Brunei: beIn Cambodia: beIn China PR: PPTV, Tencent, iQIYI, Alibaba Hong Kong SAR: beIn India and Indian subcontinent: Sony Indonesia: SCTV Japan: Wowow Republic of Korea: SPO TV Laos: beIn Macau SAR: TDM Malaysia: beIn Mongolia: SPS Myanmar: TBA New Zealand: Spark Pacific Islands: Digicel Philipines: Tap TV Singapore: beIn Taiwan/Chines Taipei: Elta Thailand: beIn Vietnam: FPT Moreover, if you are one of those who can't miss a single live match, you should know that the Sport24 platform has the rights to broadcast Champions League matches on airplanes and cruise ships. Where to watch the final match of the Champions League 2021/2022? The 2021/2022 Champions League final will be held at the Gazprom Arena in St. Petersburg, Russia, on May 28, 2022. Like the rest of the competition, you can watch the Champions League final on TV through Movistar-Movistar Liga de Campeones dial 50 and Orange TV. Where to watch the Champions League 2021/2022 final on the Internet? In addition to television, you can also watch the Champions League final online. In this case, you must also be a Movistar or Orange customer and connect to Movistar+ on devices (former Yomvi) in the first case or to the online platform of Orange TV, if you are an Orange customer to enjoy the match in which the best European soccer team 2021/2022 will be proclaimed. How can I watch LaLiga soccer matches from abroad? If you have already contracted a television service with the LaLiga package and due to a geographic blocking of your television provider and your connection you have problems viewing the matches, the best option, in this case, will be to use a VPN that assigns you an associated IP that is not blocked. If your Internet access provider does not offer this service, below are the best VPN offers to surf safely from anywhere.

[ ... ]

European companies are facing million-euro losses due to connectivity issues
European companies are facing million-euro losses due to connectivity issues
12/06/2023

A study by Cradlepoint reveals that European businesses could be losing milions of euros every week as a result of connectivity problems. According to the State of Connectivity in Europe report, conducted in collaboration with Censuswide, 74% of companies experience at least 2 hours of connectivity loss each week. One hour of downtime can be valued at 332,600 euros, according to Statista. These connectivity issues have also generated additional operating costs for 47% of the surveyed companies, and 33% have missed out on business opportunities due to these problems. Furthermore, the education sector is affected, as 80% of respondents state that poor connectivity hinders the development of skills necessary to thrive in a modern economy. The study also highlights that 21% of European companies have lost talent due to connectivity issues. The findings also conclude that improving connectivity is considered crucial for 90.5% of the surveyed companies, as it would help them better manage potential economic, social, and political challenges and increase their resilience to future disruptions.

[ ... ]

Google Lens will read and translate doctors' handwriting on prescriptions
Google Lens will read and translate doctors' handwriting on prescriptions
23/12/2022

Google has announced a new feature in Google Lens... and it's not a simple feature! As it has been explained by the company, they are working on a new functionality that will allow Google Lens to "decipher" the handwriting of medical prescriptions, which are often confusing not only for patients, also for pharmacists. To do this, they are already working on assistive technology that will allow take a photograph of the recipe or uploading an image from the photo library, and then Google Lens will process the image and generate a note with the medications. The result as Google has alert, should be taken as assistance and any decision should be made only based on the result. The announcement of this new function of Google Lens was made at the annual conference that Google has held in India, where there are more registered users of Google Lens in the world.

[ ... ]

Europe will have its own satellites constellation to guarantee secure communications
Europe will have its own satellites constellation to guarantee secure communications
13/12/2022

With the sights set on 2027, the EU has closed a provisional agreement about the regulation of secure connectivity throughout its territory, which will include the deployment of a constellation of satellites that will ensure communications, especially in the event of cyberattacks or natural disasters that affect critical infrastructure. The plan, linked with the 'Global Gateway' strategy from the UE, that will allow the provision of affordable Internet access throughout Europe, will provide, also, secure connectivity in geographical areas of strategic interest, such  the Arctic region and Africa, and  services to protect the critical infrastructures of the Member states, too. The objective, according to the EU, is to ensure improvements in people's daily lives, identifying reliable and secure communications as the cornerstone of the EU's strategic autonomy.

[ ... ]

The European Commission spends  €400,000 on its own metaverse and only attracts six people to the inauguration
The European Commission spends €400,000 on its own metaverse and only attracts six people to the inauguration
05/12/2022

Absolute failure.  The inagurated  of the new metaverse from the European Commission that was presented a few days ago with a virtual party, only attract six persons. According to the specialized journalist Vicen Chadwick from Devex, the European Commission has invested €387,000 in the project to develop a virtual world, designed to attract the attention of young people and create a shared space on the Internet in which they can become aware of those thinghs that EU does on the world stage, and reflect on the problems that affect a globalized world. Also, this metaverse is designed to promote actions of the European Union related to health, education, climate and other topics of interest for youngest, such the Erasmus scholarships. The inauguration of the space, however, went completely unnoticed by the target audience and the few persons who entered the party, such as the journalists from Gizmodo, assure that the metaverse of the European Commission has many shortcomings.

[ ... ]

Proton Mail improves email tracking protecti
Proton Mail improves email tracking protecti
02/12/2022

Privacy continues to be one of the areas that concentrate most attention and efforts from IT companies  and Protron Mail, Proton's end-to-end encrypted mail service, developed by CERN engineers, after learning about mass surveillance of US security agencies, has announced a new level of protection in this regard. Proton will reinforce the protections against the tracking of 'emails' with the aim of offering users a highly privacy service and neutralizing any gap that may have been opened since the creation of this service nearly a decade ago. Proton Mail guarantees their clients, an encryption system that no one except the sender and receiver can access the message. The new version, which will be included by default in iPhone and iPad, also implements new functions that will allow you to schedule the sending of messages, set reminders to answer  important emails, and postpone emails that can wait. Proton is also working on the possibility of replying to messages without having to open the text composer and is also finalizing the details of a faster new version for Android

[ ... ]

Qualcomm's new and most powerful chip, Snapdragon 8 Gen 2, ready
Qualcomm's new and most powerful chip, Snapdragon 8 Gen 2, ready
25/11/2022

Qualcomm has just introduced its new Snapdragon 8 Gen 2 processor, the most advanced mobile processor with a 35% faster CPU.  The Snapdragon 8 Gen 2 is made up of 8 cores and not only presents notable improvements in artificial intelligence processing, also incorporates support for gaming technologies such as ray tracing, ensures a download speed of 10 Gbps and  supports, video playback up to 8k.  Qualcomm's new processor has become the first mobile platform to support INT4 and the most advanced 5G platform to date, supporting Wi-Fi 7 technology that doubles the bandwidth and speed of previous standards. According to information from Qualcomm, the new Snapdragon 8 Gen 2 will be available for high-end mobiles from OnePlus, Sony, Xiaomi or Motorola, among other brands, which will already begin to integrate it into their terminals from the end of this year.

[ ... ]

Google announces the closure of Street View
Google announces the closure of Street View
03/11/2022

The independent Google Street View application will stop working next March, as Google has reported. They also has confirmed that the service will remain active within Google Maps.  At this moment, Street View works in parallel as an independent App in the Google and Apple stores and also as an integrated functionality of Google Maps, a duplication that is no longer considered necessary and for these reason  it will disappear as an application next year, on march 21th.  Street View allows users to explore, through real images, towns and cities of more than 65 countries, providing them  panoramic views at ground level, and the possibility to choose which segments of the road they want to explore.  The images that Google uses for this service are taken by vehicles, cars and tricycles, equipped with up to nine cameras. This vehicles just  move around the world, taking the photos and generating three-dimensional data that are used on top of the images, in this case from Satellite, of each place.

[ ... ]

Google Maps introduces new search opcions of ecological routes
Google Maps introduces new search opcions of ecological routes
21/09/2022

Google will incorporate in Google Maps , new ecological routes that will be able to guarantee a lower impact from vehicles on the environment and, also, minimize fuel consumption.This new functionality of more sustainable itineraries will be implemented in Europe during next weeks, after having been successfully tested in the United States and Canada, where, according to Google in a statement sent to Europa Press, they have contributed to avoiding more than half a million tons of carbon emissions, in only one year.To suggest the best ecological route, Google Maps will ask the user about the type of engine of the vehicle that is going to use and then will show the driver all his available itinerary options and an accurate estimate of the consumption efficiency of the vehicle.Additionally, the package of new Google Maps features also incorporates the option to activate the display of charging points for electric vehicles; new bike routes, and Live View option, to supervise streets in real time.

[ ... ]

The new USB 4 2.0 promise speeds up to 80 Gbps for data transfer
The new USB 4 2.0 promise speeds up to 80 Gbps for data transfer
19/09/2022

Next for his market presentation, the main characteristics of the new generation of USB are already known: USB 4 2.0  promises to double the speed of Thunderbolt 4 and the original USB 4.Although we will have to wait until November to know all their technical characteristics, USB Promoter Groupt has already explained that USB 4 2.0 will offer speeds up to 80 Gbps for data transfer, through a USB-C cable and connector.This significant increase in transfer speed is possible because the new USBs incorporate a new physical layer architecture, capable of supporting. So, the new USB are preparing, for example, to support the transfer of 4K or 8K videos from one computer to another without problems or to offer, also, the maximum gaming experience to gamer users thanks to its ultra-fast speed rate.Intel, meanwhile, is already working on Thunderbolt 5, which everything indicates will also offer speeds of 80 Gbps.

[ ... ]

DuckDuckGo will offer their temporary or disposable mail service  free
DuckDuckGo will offer their temporary or disposable mail service free
14/09/2022

After launching the beta version of the new temporary or disposable mail service, 'Email Protection', DuckDuckGo has announced that once tested it is now available free for all users.  'Email Protection' is presented as a solution to be able to have a second 'e-mail' address to use in subscriptions and pages likely to send ‘spam'.  Available from the DuckDuckGo mobile app and browsers, the service incorporates privacy protections against link tracking and smart encryption against unencrypted links, and features such as direct response.  The accounts that are created through 'Email Protection' as a secondary email will contain the domain @duck.com and among the recommended uses proposed by DuckDuckGo are free trials or registration in services that usually send advertising or spam.

[ ... ]

Metaverses for adults in Horizon Worlds from Meta
Metaverses for adults in Horizon Worlds from Meta
05/08/2022

Meta has announced that it will offer special spaces  in Horizon Worlds for user up of 18 years old. To do this, the company has already begun to contact users who are creating their digital worlds on this platform, who have been asked to classify their content. Otherwise, it will be Meta who does it and regardless of its character, it will classify it as restricted adult content.  All universes containing nudity, alcohol, soft drugs, blood, gambling promotion, etc. they will need to be rated 18+ through the Horizon Worlds settings section, "Build Mode" of the "World" tab.  Meta has also announced that regardless of rating, worlds that contain  explicit sexually content or promote violence or crime will be banned. Content depicting intense real-life violence or attempting to sell, buy, or trade regulated goods such as weapons, tobacco, or alcohol will be also prohibited.

[ ... ]

Google launches ChromeOS Flex to give a second life to outdated computers
Google launches ChromeOS Flex to give a second life to outdated computers
21/07/2022

Google has just introduced ChromeOS Flex, a new version of their cloud-based operating system that will allow "rejuvenating" Windows and Mac computers that have become available. The system must be downloaded directly from the web and can be installed on the computer via USB or the company network. ChromeOS Flex is now ready to give outdated Windows and Mac computers a second life. At the moment, Google has already certified nearly 300 devices compatible with ChromeOS Flex, from leading brands on the market such as Apple, Acer, Dell or Microsoft. Although Google has advanced that not having the certification does not prevent the installation of the operating system on our old computer.  Some of the services offered by this operating system are, the protection against ransomware and malware; background updates; remote management of applications and, of course, the possibility of giving a new life to an outdated computer.  “By installing ChromeOS Flex on an older computer, you're not only getting a great experience, you're also contributing to an important cause. Every year 40 million tons of electronic waste is generated worldwide, which is equivalent to throwing away 800 laptops every second. Updating devices to ChromeOS Flex instead of completely replacing them is one way to reduce this waste.

[ ... ]

Google will retire Hangouts in November
Google will retire Hangouts in November
04/07/2022

From today, all Hangouts users when they open the messaging app, will see a message inviting them to switch to Chat. The reason is that  continuing with its plans to migrate all its users to this tool, Google has confirmed that Hangouts will not  be longer operational this coming November.  As they has explained on its official blog, users who still use Hangouts in Gmail will automatically switch to Chat, The change includes the transfer of conversations, history and contacts.  Those who access Hangouts through the web or the mobile application must carry out this transfer with the help of Takeout, Google's data download tool.

[ ... ]

Firefox enables full protection against 'cookies' by default
Firefox enables full protection against 'cookies' by default
24/06/2022

Mozilla Firefox has enabled by default its total protection against 'cookies' (Total Cookie Protection), which ensures that users are shielded from tracking their Internet activity without sacrificing their browsing experience. As it had been explained by the company, the new functionality creates a 'cookie jar' every time the Internet user visits a web page. Each 'jar' is kept separate, thus limiting 'cookies' to the site where they were generated. In this way, by isolating one container from another, crawlers can only access information on your page, without being able to relate user behavior across multiple sites. Mozilla claims that this solution makes its browser the most secure on the market for Windows, Mac and Linux. Mozilla's Total Cookie Protection function operates whenever a website or third-party content embedded in a page deposits a 'cookie' in the user's browser. This full cookie protection also improves the performance of previous Firefox tools, such as ETP or Enhanced Tracking Protection.

[ ... ]

Meta test end-to-end encryption on calls and messages in their virtual reality glasses
Meta test end-to-end encryption on calls and messages in their virtual reality glasses
30/05/2022

Meta announced some time ago their desire to improve the privacy of their users and the confidentiality of their conversations, and in accordance with this, the company has just presented a new software update, v40, for its Meta Quest 2 virtual reality glasses, which tests the encryption of end-to-end of both calls and Messenger conversations  that can be done  through this device. In addition, this update incorporates a new function in App Unlock, which allows the user to block certain games and 'apps' with a security pattern plan. Another new feature is the secure payment system in 3D Secure, which is presented as an alternative to the Oculus app.  The Meta Quest 2 glasses also receive with this update the possibility of being paired with other keyboards through Bluetooth connectivity, being fully compatible with Apple keyboards.  Finally, among the outstanding novelties of this new v40 update, is the possibility of hearing the same thing from the speakers on the left and right of the viewfinder and even from the headphone jack. In addition, there is the option to adjust the left and right audio channels for those who hear better from one side than the other.

[ ... ]

Samsung launches a microSD card that can record data for 16 years in a row
Samsung launches a microSD card that can record data for 16 years in a row
09/05/2022

The new Samsung Pro Endurance microSD card that multiplies the normal life cycle of memory cards by more than 30 times, is now on sale.  Samsung Pro Endurance can work continuously 140,160 hours or what is the same, 16 years, a period significantly higher than the average life of 5 years of a standard microSD card.  Exclusively designed to cover the needs of video surveillance cameras, the memory card offers enhanced endurance and superior performance for continuous, smooth and reliable capture and playback. “Both consumers and business users can rest assured that our new memory card will ensure continuous recording in high resolution, even under extreme conditions,” said KyuYoung Lee, Vice President of Memory Brand Product Biz, Samsung Electronics Team.  Samsung's new memory card offers read and write speeds of up to 100MB/s and 40MB/s, respectively, and a rated Video Speed ​​Class 10 up to U3 and V30  According with Samsung, this makes this micro SD card ideal for handling large high-resolution files while allowing perfect Full HD and 4K recording and playback.  The new Samsung Pro Endurance microSD is available in four different storage capacities, 32GB, 64GB, 128GB and 256GB.

[ ... ]

DuckDuckGo sees Google's AMP tool as a threat to user privacy
DuckDuckGo sees Google's AMP tool as a threat to user privacy
29/04/2022

After the presentation of Google's Accelerated Mobile Pages (AMP), DuckDuckGo has announced that has begun to protect its customers from this new service that they interpret as interfering with user privacy.  AMP is a tool that, according to Google, enables fast loading of websites on mobile devices and improves their performance. But DuckDuckGo claims that what it really does  AMP is prioritize the display of sites that have adopted it and favor ads from Google on these pages.  This is why, this alternative search engine focused on offering the greatest possible privacy to its users (it doesn't collect information from searches) has decided to introduce protections against AMP technology in their applications and extensions for iOS, Android, Mac, Chrome and Firefox and has announced  that DuckDuckGo will show the original website of the editor instead of the one adapted to AMP.

[ ... ]

Video calling apps listen when the microphone is off, according to a study
Video calling apps listen when the microphone is off, according to a study
25/04/2022

A group of researchers from the University of Wisconsin-Madison (United States) has determined that video conferencing applications can continue accessing audio data even if the user has disabled the microphone.  To demonstrate this, they have studied the most popular video conferencing applications and have analyzed the behavior of the mute button until they has determined that all the applications that they has tested whether the microphone was open or closed, occasionally collected raw data and delivered it to the servers of their services.  In their research they have worked with binary analysis tools to see how the audio was transferred from the application to the audio drivers of the computers and then to the network.  They aslo have created, through machine learning models ( 'machine learning'), a classifier of daily activities that, with 82% accuracy, has determined which activities users were doing while their microphones were, theoretically, silenced. In relation to this, the authors of this work recall that beyond muting the microphone, you can turn off the microphone of a device through the settings menu, a safer option to limit access to confidential information and sensitive data.  All the conclusions of this study will be known next July in the Privacy Improvement Technologies Symposium.

[ ... ]

Island Browser for Business Reaches $1.3 Billion Value
Island Browser for Business Reaches $1.3 Billion Value
06/04/2022

Just some weeks after its launch, Island, the webbrowser focused in enterprise and security, has just reached a $1.3 billion valuation.  Island browser is based on chromium and has been developed by two former Symantec executives, who were looking for an option configured to the web security needs of companies and not conventional users.  The new browser, in addition to limiting the add-ons that many often some people install on company computers and that sometimes cause significant security breaches, incorporates specific tools to prevent this type of actions, protect SaaS applications, identify incidents and prevent data theft.  Depending on the level of security required by each company, Island Browser allows, for example, to download content or not, disable or enable the copy and paste option or deny access to certain domains, among other options. From Island, also insist that their project is based on the utility and not on the consumer, so that the characterization level of Island browser it offers the minimum.

[ ... ]

Recycling containers connected to the mobile to reward the citizen
Recycling containers connected to the mobile to reward the citizen
31/03/2022

The Spanish startup Recircula Solutions has just presented Recysmart to the market, a device that can be installed in any type of urban container and identify the material of the recycled packages. The objective of this development is to promote incentive programs that helps population to recycle.  The device combines a unique mechanical design with AI algorithms based on acoustics, so  the unique and characteristic acoustic signal that a package generates when it's inserted into a container is captured by the sensor, processed and reported in real time to the managers authoritys so  they can remunerate the person who has use the container. To do this, the citizen will have previously identified himself on the device through his mobile or using a physical card.  In Sant Cugat del Vallés (Barcelona) several of these devices have  been installed in various containers in the town. Recircula Solutions will also send several units to Portugal, Austria, France, the United Kingdom and Greece.

[ ... ]

Chrome flies on Mac
Chrome flies on Mac
16/03/2022

New features introduced in the las version of Chrome browser have made it up to 43% faster on Mac computers, according to Apple's Speedometer browser responsiveness benchmark.  The M99 version of Chrome introduces, as  main change, the use of the “ThinLTO” build optimization technique, which has integrated parts of the base code that are critical for speed, even when they span multiple files or libraries.  This integration, according to the Speedometer comparison, has meant that the new Chrome is generally 7% faster than Safari, and that its graphic performance is up to 15% higher.  In addition, Google ensures that the loading time of web pages has been reduced by 15% on Android, where the introduction of the 'freeze-dried' tab loading process in the browser has also reduced the startup times by 13%.

[ ... ]

US Defense is working on an AI assistant to help pilots react in emergency situations
US Defense is working on an AI assistant to help pilots react in emergency situations
14/02/2022

The US Defense Advanced Research Projects Agency (DARPA) is working on a prototype of artificial intelligence (AI) assistant that will helps pilots solve unforeseen events during flights. This AI assistant would be integrated into an Augmented Reality viewer that would train the pilots in these situations.  "This tool will help teach pilots new tasks, assist in error recognition, improve task completion time, and most importantly, help prevent catastrophic events,"  had said the manager statement senior of the program led by Northrop Grumman, Erin Cherry.  As Cherry has explained, they have focused their work on the development of an intuitive context-adaptive reasoning assistant. With its help, pilots will be able to obtain precise information and orientation of the situation, place and the context through. For this they will have an interface with graphics in augmented reality capable, among of giving indications such as turning off the engine or resuming the march.

[ ... ]

Common front against advertising based on user surveillance
Common front against advertising based on user surveillance
19/01/2022

Facing the forthcoming vote on the EU Digital Services Law, a group of 17 civil organizations and 14 digital companies have demanded the European Parliament prohibit invasive and hostile practices with privacy that take place in digital advertising such as user tracking.  According to his complaint, companies that specialize in monitoring the behavior of Internet users, integrate data from all websites, something that entails a violation of EU data protection regulations. In addition, they remember, these advertising practices make use of "inferred data that reveals vulnerabilities of the users" and, in general, they insist, this data are obtained without the knowledge of the user and beyond their control.  The signatories, including the privacy-focused search engine companies DuckDuckGo and Ecosia, denounce also that these types of practices only favor a few “dominant players” based in the United States, and they specifically cite, among others, Facebook and Google.  As an alternative to these advertising systems, they propose to follow initiatives such the Dutch television channels NPO and Norwegian TV2, which opted for contextual advertising and increased their income from ads.

[ ... ]

Amazon's Fire TV, on wheels
Amazon's Fire TV, on wheels
12/01/2022

Among the first novelties that Amazon will launch this year, the jump to Fire TV cars stands out. It will present a new integrated system that combines the interface of this entertainment center and the Alexa assistant. Fire TV for cars will allow the user to take their favorite content with him, including video games, music, programs and downloads to enjoy when there is no WiFi connectivity. In addition, it will be possible to follow in the car what we started watching at home, and in the screens for the rear seats, choose broadcast the content individually or in all the same. The new Fire TV for cars will be available in new vehicles throughout the year, first in the United States.

[ ... ]

What's new in Google for Android?
What's new in Google for Android?
10/01/2022

Google opens the year with news and has already presented in CES 2022 some of the most importants ones, such the new option for locking and unlocking devices and for the remote control of actions on all devices compatible with their Assistant. This means that from now on, you can unlock and use a Chromebook, mobile or tablet from a Wear OS smartwatch. To be successful, of course, the devices must be close to the clock. It is also available the option of unlocking - opening or start the car - BMW vehicles through a compatible Samsung phone or Pixel and, also, the function of transferring and managing content between devices through an integrated Chromecast that allows users to  send content from the smartphone to televisions and monitors as well  to speakers. Google has also announced the upcoming launch of a new device connection function that will allow, for example, to configure a Chromebook from the mobile phone and access all the saved data,. The new feature will also incorporate 'Fast Pair' pairing with Bluetooth accessories.

[ ... ]

Chromebook computers will notify if someone is spying the screen
Chromebook computers will notify if someone is spying the screen
01/12/2021

Google's new antispyware tool will warn if someone spies the screen. The new tool will have the potential to lock the computer by facial recognition.  Google has everything ready to test its new anti-spying tool, which will be incorporate in the future, Chromebook computers.  This tool, if the user has it activated, will be able to send a warning alert every time it detects that another person is spywaring the screen. The anti-spying function will be activated through its human presence sensor.  The user can activate or deactivate the tool from the settings section.  When the system detects a person spying or looking over the user's shoulder, the computer screen will warn him discreetly, either with a icon  or by dimming the screen. According to the first information released, the sensor would have the potential to lock or unlock the equipment through facial recognition.  In addition, the tool will incorporate additional functions such as an automatic deactivation of the notifications of the conversations that the user is having privately when the "spying" is detected.

[ ... ]

DuckDuckGo introduces a feature to protect Android smartphones from trackers
DuckDuckGo introduces a feature to protect Android smartphones from trackers
26/11/2021

DuckDuckGo goes a step further in terms of security and has just announced a new tool for Android Smartphones that block the tracking of user data. In fact, it is an extension that can be already  tested in its beta version -with a waiting list- and that according to DuckDuckGo was born to stop the theft of information ( according to AndroidRank.org, 96% of the most popular free Android applications contain trackers. A 87% send data to Google, and 68% to Facebook). This free extension is called 'App Tracking Protection' and it is integrated into the search engine's 'app', so it is not necessary to keep it open for it to work. Trackers blocking can be reviewed in real time through DuckDuckGo and it can also detect which networks are tried to keep users personal data to. In addition, one can activate the notifications service to receive summaries of its operation.

[ ... ]

Apple reduces the manufacture of iPads in favor of the iPhone 13
Apple reduces the manufacture of iPads in favor of the iPhone 13
05/11/2021

The global shortage of semiconductors is growing and in light of this situation, Apple has announced that they will reduce its production of iPads to use the chips in the iPhone 13. Apple has also chosen to reduce the production of older iPhones. The strategy, they explain, is to focus on their newest product, the iPhone 13 that arrived to the market at the end of last September, and take advantage of the foreseeable pull, especially in western markets where the sales rate are already beginning to approach to the prepandemic stadium. In a recent interview with the Financial Times, Apple's chief financial officer, Luca Maestri, said that the losses generated by the shortage of chips have been millionaire and Apple has stopped earning 6.000 million dollars.

[ ... ]

Google accepts the challenge of bringing the Internet to all of Africa
Google accepts the challenge of bringing the Internet to all of Africa
29/10/2021

Google has just announced that it's going to invest a billion dollars in improving the internet infrastructure in Africa through the American technology company Alphabet Inc. The project has the ambitious objective of increasing the Internet capacity in Africa 20 times, reducing the average connection price on the continent and increasing the Internet speed five times in this territory, where countries  as Ethiopia or Malawi have an average connection below 0.5 megabits/ second. To complet this objectives, Google hopes to have its Equiano submarine cable ready by the end of this year. This cable has been deployed since 2019 and will connect Europe and Africa, contributing then to a considerable improvement in the current infrastructure of Africa. The “African digital transformation” project as it has been described by Google and Alphabet CEO, Sundar Pichai has a budget of 1 billion dolars, and incorporates a 50 million dolars, 40 million of which for non-profit organizations that works improving the standard of living in Africa, and the remaining 10 million for low-interest loans aimed at tech startups in Ghana, Nigeria, Kenya and South Africa.

[ ... ]

The European Commission is committed to manufacturing chips in Europe to be less dependent on Asia
The European Commission is committed to manufacturing chips in Europe to be less dependent on Asia
15/10/2021

With the chip crisis still on the table, the European Commission is defining a new law to developing the semiconductor industry in Europe, so the local manufacturers can be less dependent on international supply chains.  “We currently depend on chips made mostly by Asia. It's not a question of competitiveness: it's a question of technological sovereignty ”, said Ursula von der Leyen, President of the European Commission. The document revealed by Euractiv, conclude that this new legislation demonstrates “the need to strategically reduce dependencies on third parties” and that its objective is to improve “security of supply”.  The initiative would be part of the new European Commission’s digital policy that would also include, a cyber-resilience law, and also initiatives to promote digital skills among citizens.  At the moment the implementation calendar of these new digital policies of the European Commission has not transcended, but it seams would not be until the third quarter of 2022, when it could be launched.

[ ... ]

USB-C cables will be marketed with power rating logos
USB-C cables will be marketed with power rating logos
05/10/2021

USB type C cables will be marketed with new logos according to their power, has announced USB Implementers Forum (USB-IF). USB-IF has explained that the new logos have been designed to solve cable confusion and to make it easier to decide which cables and chargers to purchase depending on the costumer needs. This type of cable has options from 60W to 240W. The consortium has also presented through the same statement, the logos for USB 4, based on Thunderbolt and with transfer rates of up to 40 Gbps.

[ ... ]

Starlink will finish its satellite Internet tests in October
Starlink will finish its satellite Internet tests in October
21/09/2021

Starlink's beta program, the high-speed Internet service for rural areas without broadband connection, will end its trial period next October. After a year of testing this system, more than 1.800 satellites in orbit and a stable coverage in the United States, Canada, United Kingdom and Spain, Space X is waiting for the approval of the rest of the countries where the company has already registered its trademark to operate - Austria, Australia, Argentina, Brazil, France, Chile, Colombia, Germany, Greece, Ireland, Italy, Mexico, the Netherlands, New Zealand, the Philippines and South Africa – being their goal to offer global satellite internet service in a short time. To take advantage of Starlink in areas without terrestrial Internet coverage you will need a special installation kit, which includes a terminal station, a WiFi 'router' and an antenna to connect to the satellite network. 

[ ... ]

The mining hardware market is booming
The mining hardware market is booming
09/09/2021

There is no doubt about it: cryptocurrency mining is booming. According to a report by Technavio, the mining hardware market is expected to grow by about €2.4 billion between 2020 and 2024. It would grow at an annual rate of more than 7%. So much so that Facebook has already announced that it will launch its own cryptocurrency, a stablecoin pegged to the fiat currency of the country where it operates. It also announced that it will get involved in the NFT industry. Meanwhile, interest in different types of mining tools continues to grow. Day after day, miners join the network. “It began as a niche hobby. Early adopters had to set up rigs on their own and then figure out how to connect them to pools (groups of miners) and earn profit. But since hosting facilities became a thing, anyone can purchase a rig and earn some passive crypto”, explains Josh Metnick, CEO of Navier, a company that hosts different types of miners.

[ ... ]

Macro cyber-attack affects more than 350 companies worldwide
Macro cyber-attack affects more than 350 companies worldwide
07/07/2021

The number of companies that have suffered from the REvil macro cyberattack now exceeds 350 organizations worldwide from which the cybercriminals are demanding 70 million in bitcoins to provide them with a universal decryptor to restore their data. The attack was conducted through the update system of IT services software company Kaseya, which REvil exploited to spread and hide ransomware. The virus was leaked to TI Kaseya resellers and from there has reached all end customers using their software. The official data provided by TI Kaseya sets the number of affected companies at 350, although other sources such as the cybersecurity company ESET talk about more than 1,000, including some Spanish organizations, although no names have been disclosed. It has been made public that one of the companies most affected by the cyberattack has been the Swedish supermarket chain Coop, which has had to close its more than 800 points of sale for a few days due to the impossibility of using its cash registers or charging customers. Based on Sophos threat intelligence, REvil has been active in recent weeks and is currently the dominant ransomware gang involved in Sophos' defensively managed threat response cases. Prior to this latest attack, they were also responsible for the one suffered by meat company JBS, which forced the cancellation of all work shifts at the company's slaughterhouses in the US. JBS paid up to 11 million to restore normal operations. These macro cyber-attacks are in addition to other recent and highly significant ones, such as the one perpetrated by the hacker group DarkSide, which forced the preventive shutdown of the largest oil pipeline network in the United States, Colonial Pipeline, endangering the supply of fuel in a large part of the country, or the one suffered by the SEPE and the Ministry of Labor in Spain a few weeks ago.

[ ... ]

How to keep your Mac safe?
How to keep your Mac safe?
28/06/2021

5 things you should do to protect your Mac How many times have we heard that Mac is a more than secure and unbreakable system? For years, Apple has made its security through obscurity, or in other words, its proprietary software, flagship and brand guarantee. Today, however, just when Mac is no longer a minority option, Steve Jobs' system has become another favorite target for hackers and cybercriminals. The market has responded to this with the development of specific protection tools for Mac, while Apple works on optimizing its system in each version. Knowing what kind of tools exist for Mac and which ones are already included in our computer will help us to stay safe and choose the best strategy that fits our needs and use of the equipment. 1. Use computer security tools Cybersecurity is a universal and necessary practice in all operating systems today. The objective is to ensure protection against attacks and theft by cybercriminals who are looking for personal or confidential information stored on our computers or that enters or leaves them, in order to use it for their own benefit. What is VPN security? Cybersecurity tools help us to minimize our footprint on the Internet and thus increase our privacy and security. In this regard, VPN services for Mac stand out, as they incorporate advanced protection technologies capable of connecting to the Internet through intermediate servers, so that our IP address - our identification on the network - is replaced by the IP address of this secure server, without anyone being able to trace our connection. This type of VPN service also encrypts any information leaving our computer, thus preventing it from being accessed on its journey to its destination. This is essential, for example, when using public Wi-Fi networks to connect to the Internet. 2. Keep the operating system and software up to date As simple as it may seem, one of the best and easiest ways to protect a Mac is to always have the latest version of the operating system installed and to work with updated software downloaded from the Mac App Store. System updates usually include security patches, among other things. How do I update my Mac? Through the System Preferences Panel of our computer we can set that when there are available updates we receive a notice from MacOs warning us of it or that these updates, whether system data files, security updates or official software are installed automatically. To check if we are working with the latest versions available and our Mac is up to date we can do it by checking through this same panel if there are updates available at that time. If we have checked the automatic updates option, Mac will do this task for us routinely. 3. Use secure settings Mac's default security settings can be greatly enhanced by manually configuring the security and privacy terms of our computer. How to change the Privacy and Security preferences on the Mac? By accessing the "Privacy" tab of the "Security and Privacy" option of the Control Panel we will have the option to manage what information we allow our computer to make available to others over the Internet or on a network and what applications we allow access to our data and files. In the same way, but through the "Security" tab, we will be able to incorporate passwords for the access to different tasks and operations of the computer and through the "FileVault" tool we will be able to ensure the encryption, for example, of our personal information or certain documents for which a password will be required to unblock them. 4. Use an Antivirus for Mac There are antivirus programs developed specifically for Mac. Some of them are special for certain threats, although in general most of them offer a wide range of services to help us keep our computers safe. Which is the best antivirus for Mac? The range of antivirus for Mac, free and paid, is nowadays much wider than a few years ago, highlighting among the most complete and advanced, antivirus with malware protection functions in real time, tools against digital identity theft, protection against spyware or advanced detection and removal of blackmail programs. 5. Make regular backups Apple has a native function, Time Machine, which makes backup copies of our hard disk on a separate secondary disk, so that if for any reason we suffer an attack or a breakdown we can recover all the information. Many antiviruses offer a backup service, backup or backup similar but in the cloud, as a preventive measure against writing errors on the disk, theft of devices or even against data hijacking or ransomware.

[ ... ]

What is the value of a Bitcoin?
What is the value of a Bitcoin?
11/06/2021

Since Bitcoin first appeared in 2009, this digital currency not issued by any government or company, nor, under the umbrella of any kind of economic policy, has gained a foothold in the market and has already started to fit into existing legal frameworks. What gives Bitcoin its value? The great value of Bitcoin is that it is a decentralized and global currency, an alternative to fiat currencies (those issued by governments). All transactions with Bitcoins are public and each of these crypto currencies belongs exclusively to its owner, therefore, it is a currency that cannot be intervened by anyone. What can I do with Bitcoins? To date, with this cryptocurrency, it is possible to monetize all kinds of services, in addition to making investments, free or practically free of commissions, which in the medium to long term are proving attractive. This has made Bitcoin an asset in which to invest and an increasingly popular means of payment through which to transfer value from one user to another without losing friction along the way, going through an intermediary or paying a commission. What is the price of a Bitcoin? Like any other good, the price of a Bitcoin varies according to market demand, although the fact that it has been designed to behave as a deflationary asset and that its supply is limited to 21 million coins, facilitates that by the law of supply and demand itself, the Bitcoin exchange rate tends to rise continuously. As of June 9, at the time of writing this article, the Bitcoin value today is 30,007.86 euros, 3.4 times its price a year ago, when the Bitcoin to Euro conversion rate was 8,629.5 Bitcoins for 1 euro. In 2010 Bitcoin price was less than one Euro cent. What does the value of Bitcoin depend on? The value of Bitcoin depends on the trust and acceptance of users to use it, hence why Bitcoin is rising in value some days and not others. As Bitcoin has been implemented as a means of payment in multiple transactions and its popularity has grown, its value has grown in parallel.  Likewise, when there have been news or events that have questioned, for example, the suitability of this crypto currency, its price has fallen. Like any other currency, the price of Bitcoin fluctuates and it is the users themselves who set it at the time of the purchase and sale transaction, which prevents the existence of a single price for Bitcoin, since it is not operated through a single platform as is the case with other currencies. Even so, buying and selling prices of Bitcoins tend to be quite similar. To know how much Bitcoin costs, there are several online platforms, known as "Bitcoin trading platforms" that report live the evolution of the value of the cryptocurrency. Is it safe and profitable to invest in Bitcoin? As with any other asset, investing in Bitcoins is profitable if we know how to do it at the right time. On the other hand, the Blockchain technology on which Bitcoin is based is reliable and difficult to manipulate, with no risk of being counterfeited, although some experts believe that the perfect, 100% inviolable system has not yet been created. In the cryptocurrency segment, convertibility is contemplated, so that Bitcoins can be exchanged for fiat currencies. What can I buy with Bitcoins? Over the last few years, a large number of companies have incorporated Bitcoin as an official method of payment for their goods and services From travel companies to ticket sales platforms for all kinds of shows, through gaming platforms, digital bookstores, software stores or even non-profit organizations already accept this digital currency. That is, Destinia, 13tickets, Gear Best, Shopify, Wordpress, Hostinger, Greenpeace,... among many other companies. eBay is currently considering adding Bitcoin as a method of payment. What is Bitcoin mining and how are Bitcoins generated? The users themselves through a totally decentralized system create Bitcoins. To become a bitcoin creator, computers with high computational capacity are needed to process and verify transactions and quickly solve the complex digital processes of generating the currency. This work is called mining and one of its best attractions is that the system offers "miners" rewards in Bitcoins in exchange for these services, which has made this activity very appealing for certain users. Is it profitable to mine Bitcoins in Spain? Bitcoin mining requires very powerful equipment, with high calculation capacities to solve operations, being nowadays totally inoperative for this operation the PCs of domestic or office use. The investment to mine Bitcoins requires, in addition, to assume the large power consumption required by this more powerful equipment, which makes Spain, at this time due to the high price of KW/h, an uninteresting market for mining Bitcoins. On the contrary, other locations such as China, Iceland, Iran or Georgia, where the Bitcoin mining business is in full expansion, are very interesting.

[ ... ]

What can I do if my computer runs very slow?
What can I do if my computer runs very slow?
22/05/2021

If your computer is running slow, do not despair. The use of a computer like any other machine needs proper maintenance and the performance of our PC can be severely affected by the lack of attention to this task. But, don't worry, if you want your computer to work as it did on the first day, we explain how to get it back. Why is my computer so slow? Computer slowness can be due to hardware, software, connectivity and even tidiness and cleanliness problems! Every computer needs a minimum maintenance so these failures can be avoided and only if we pay this kind of attention we can ensure an always-optimal performance for our computer, prolong its life and work or enjoy our PC, without despairing. I have tried everything, but my computer is still very slow. What can I do? If your computer is slow and you have already tried the typical things like closing secondary tasks, disabling the automatic execution of programs, you have verified that you have free space on the hard disk and restarted the PC, and everything is still the same, it is clear that something is wrong with your machine and you should consider resorting to a professional computer repair service, so that they can fix it. You can search a thousand videos on the Internet, but... do you really know why your computer is slow? Why does your computer start up very slowly? Or why has your computer become slow after a while of working with it? Are you sure that what you want to do will not end up causing another error or, even worse, another more serious problem? Is it necessary to go to a professional Computer Repair Service to fix the slow computer problem? The answer is yes, if what we are looking for is to really fix the problem and prevent it from happening again. You can save a lot of time and money by using a professional computer repair service. The best computer repair services work with specialized technicians who have the necessary knowledge to make a quick and accurate diagnosis that will allow you to give your computer a new lease of life. In addition, professional computer repair services have the right tools and all the licensed software to be able to intervene. What will a Computer Repair Service do to speed up my slow PC?  The first and foremost thing that a professional computer maintenance service can offer you is a maintenance plan for your computer, tailored to your needs. With this alone, you will most likely avoid many problems related to the performance of your machine, including speed problems, right from the start. They will be able to, among other things, repair or replace any part of your computer causing any problem, they will perform a deep search for viruses to eliminate them; and if necessary, they can clean the cooling system of your computer to remove internal dust, one of the most common causes of slow computer performance - dust accumulated in the internal fans can reduce their efficiency and cause overheating of the machine and its mechanical components -. Sometimes we think about replacing the machine when a simple repair and a good maintenance can bring our PC back to life. When was the last time you had your computer serviced?

[ ... ]
Ver este contenido en castellano en Resultados de la búsqueda
Loading...
x