Wednesday, 3 February 2021

8 horror movies to enjoy as a couple

 

You have no idea what to watch from horror movies? Check out our list of suggestions!
Nothing better than enjoying the weekend to stick to the crush and watch many horror movies. Do you know the best part of that list? Everyone has it on Netflix 😉

1. 1408

A writer specializing in unmasking paranormal phenomena decides to stay in room 1408 of a hotel famous for being haunted. Throughout history strange things start to happen. Prepare the goodies and the blanket.

2. Emily Rose's Exorcism




Emily Rose's Exorcism is one of the best exorcism films ever produced. It has strong scenes and is based on real events, which makes the story even more frightening. This is better to see accompanied, we do not want anyone to lose sleep at night, huh! đŸ™‚

3. The Others



The film takes place at the end of the Second World War, where a woman and her two children live alone in a mansion that, curiously, always remains closed. The story starts to get tense when some employees arrive at the house. This is one of those movies that when you're done, you're like, "Wow!" Super worth it 😉

4. Psychosis





For those who enjoy old horror, Alfred Hitchcock's films are always good requests. Psychosis is the most famous and equally scary. If you haven't watched it yet, you're missing out!

5. The Call


This is one of those that everyone has seen, but that always makes the list of favorites. After all, who doesn't remember Samara, who attacks her victims with a cassette tape? It is worth playing with the crush that after watching, you will only have 7 days to turn this thing into something serious;). Countdown…

6. Horror in Amityville


Another horrifying horror based on real events. The film tells the story of a couple who move to the famous home in Amityville, where a massacre took place. If you want to make the atmosphere even more frightening, research this case on Google before watching it, it is chilling. AH! It is better to watch accompanied, preferably close together.

7. The Woman in Black





The story is about a lawyer who needs to analyze the documentation of a mansion and discovers that the house is haunted by a woman in black. The main character is played by Daniel Radcliffe, our eternal Harry Potter.

8. The Entity





A crime story writer moves into a house where a murder took place, but he doesn't tell anyone about it. 
While investigating the site, he finds a box with home videos containing several clues about attacks that have been going on since the 1960s. This is a good one to watch on a rainy night, with lots of popcorn and comforters.


Labels:

Tuesday, 2 February 2021

Did you know ? In Japan you can buy a holographic girlfriend

 

The Eastern world never tires of surprising us with situations that seem strange to us who live in the West. One of the most recent is the possibility of acquiring a kind of holographic girlfriend in Japan.

The curious creation is from a company called Gatebox. In practice, the device has the same functions as a virtual assistant, such as Google Assistant .

However, the device comes in the form of a dome and inside it a hologram takes care of giving life to “Boku no Yome”, a term that in direct translation would be something like “my girl”.


A holographic girlfriend to call your own

The “virtual girlfriend”, of course, has a name. Her name is Hikari Azuma. Her duties go far beyond simply keeping company for the most lonely. Integrated with your smartphone and other electronics in the house, it can control the lights in the home, activate and deactivate alarms or even items such as refrigerators, ovens and vacuum cleaners.

The device is shaped like a Bluetooh speaker, but with the difference that in the central part there is a glass box that serves as a “stage” for your holographic girlfriend to interact with you.

The interesting detail, however, is due to the personality implanted in the assistant, so that she can behave as if she were her partner.

For example, Hikari Azuma does not forget birthday dates, including the full months that you are "together". So, don't be surprised if you get home a happy message of “congratulations on our day”.

Another way for her to interact is by sending messages to her cell phone asking what time you get home.

Curious service is not cheap

Curiosities aside, at the end of the day it is as if you bought a set-top box like Google Home for your home, but with the charm of having a holography to personify the virtual assistant.

However, this type of company has a price, which can be considered salty for many people.

The model is currently on sale only in Japan and has a suggested price of 150,000 yen - the equivalent of almost  $ 5,500, excluding taxes. In addition, the service is used for the payment of a monthly subscription, the value of which is around  $ 60 per month.

Even now available for sale, for now Hikari Azuma works with a demo version of software, which may cause some of its functions to not be performed perfectly. The company has already promised that the final version of the software should be ready in December, before the Christmas period.

The company stressed that at the moment it focuses its efforts on new features and on improving the holographic girlfriend's artificial intelligence. This product is not expected to be sold outside Japan at any time.

Labels:

What is mesh network ? Discover the technology that will revolutionize your home Wi-Fi

 

Do you know what mesh network is? It is a technology capable of improving the quality of the internet signal in all rooms of your home, even those that are furthest from the point of origin of Wi-Fi. However, how is this possible?

This technique is not exactly a novelty and has long been used in large companies. However, home routers did not have anything like it. One of the pioneering experiments in this regard was carried out by Google with its Google WiFi. The device is only marketed in the United States.

In this article, we will understand how mesh networks work and why they represent the future of quality internet in your home.


Inside a mesh network

We can consider a mesh network as a “network of nodes”. Unlike traditional systems, in this case there is not a single router connected to the internet, but several.

Together, they work to carry the same signal to various points in the environment. Making a comparison, it would be as if you have several signal repeaters in your home.

The main advantage here is that there is no loss of signal quality due to the fact that one of these nodes is further away from the main router. On the contrary. In theory, the more nodes there are in the environment, the more intense the signal can get.

Everything will depend on how many routers compatible with this technology you link to the same network.

The difference is in the software

If mesh networks work similarly to what signal repeaters do, why can't they reproduce this technology? The answer is simple: the main differential is in the system.

Each router compatible with mesh networks has special software installed that is responsible for managing the signal distribution.

The idea is to create a smart way to manage the signal. For example, if a task that requires a larger band is being performed in a more distant room, the system takes care of directing a larger part of the signal there.

Thus, all routers help each other, always ensuring maximum efficiency in tasks anywhere in the house.

The connection, therefore, will always remain stable within the range predetermined by the main router. All of this is done automatically, without the user having to take any action.

However, it is still possible to customize the configuration to maintain certain environments with more intense signals permanently.

Cost-effective is better

Anyone who thinks that this new technology might be more expensive is mistaken. When we try to do something similar on a common network, we need more powerful routers and repeaters.

The problem is that they can prove to be inefficient in larger areas. In other words: it is expensive and may not work as you would like.

In the case of mesh networks, the scalability of the idea is simpler and the cost is slightly lower. In return, you are sure that the system will work. Everything will depend on the range you need.

The bigger it is, the more nodes are needed. If on the one hand more routers can make the bill more expensive, on the other hand the unit cost per piece decreases as the quantity increases.

Mesh networks lead the way safely

As already mentioned, the system used is the great advantage of mesh networks. In addition to automating many functions, it is also more configuration friendly. That way, it downloads updates automatically and changing the password often becomes no longer a seven-headed bug.

Finally, it is important to mention that these devices today are less targeted by hackers and eavesdroppers. That's because the software is less vulnerable, which makes the task of the bad guys much more difficult.

Labels:

What is SSID ? Understand how this feature can help protect your router

 

Do you know what SSID is? It is an acronym for " service set identifier " - something like " service set identifier ". This simple information is nothing more than the name of your network and modifying it can make the connection between your devices and the Wi-Fi network more secure.

In other words, choosing the name of your Wi-Fi network can be crucial to its security. An accessible or flashy name can end up attracting the presence of the most curious while a more measured or secure choice can result in a network of little interest to eavesdroppers.


What do you need to know about the SSID?

First, be aware that Wi-Fi network names can be up to 32 characters long. In addition, they are of the “ case sensitive â€ type, that is, they distinguish between upper and lower case letters. For this reason, a network called “minharede” is different from another called “MinhaRede”. So pay close attention when choosing the name for yours.

You can also use special characters when creating network names, but they are not considered convenient, as older devices may have problems reading. All routers offer a default name for the networks, but it is convenient that you change them on your first login.

The connection can be public or private. In establishments with a large circulation of people and offering free Wi-Fi, it may not be necessary to enter a password. In private connections, like your home or office, it is important to define a strong name and create a strong password to ensure protection.

How to hide an SSID

To facilitate identification, the SSID of your network is always displayed in a visible way, so that all devices in the vicinity can find it. However, one form of protection is to turn off the display of the SSID. That way, those who want to connect to the network will have to know, necessarily, login and password - and not just the password as usual.

To make this change, simply access your router's settings. In the same place, you can change the name of the network and also the password. Another option available on routers is to configure the rules of what can and cannot do in terms of names. Therefore, keeping an eye on this step is essential for your safety.

In addition, maintaining a different name for your network avoids a number of problems. Networks with repeated names, for example, within the same area can cause confusion on devices. Names with special characters should also be avoided.

And finally, avoid leaving the default network name that is provided by the router. If in the vicinity someone decides not to tamper with the SSID, then you will have networks with a similar name and the chances of falling into connection problems are great.

Labels:

What is HAMR ? Understand how this technology will allow hard drives with much more storage

 

Increase the storage capacity of the HDs without this means increasing the dimensions of these devices. This is the idea behind HAMR technology, a technique that has been used since 2012 in the industry. But do you know what HAMR is?

First of all you need to know what this novelty represents. For the first time we are reaching capacities comparable to those of large format hard drives, but without changing the size. This measure should reduce costs, especially for companies, which, when purchasing products with a capacity of 16 TB, for example, need to spend more than normal to meet their needs.

What is HAMR?

HAMR is an acronym in English for Heat Assisted Magnetic Recording , which in direct translation into Portuguese would be something like “ Heat Assisted Magnetic Recording â€. Its great merit is that it allows the data density of 1 terabit per square inch on the disk.

In other words, at least in theory, a 3.5-inch hard drive, just like the one you have on your PC, could be able to store up to 60 TB. The 2.5-inch model, present in notebooks, could reach 20 TB. At least for now, in 2018, the first 3.5-inch models with a maximum capacity of 16 TB are now arriving on the market.

The secret of HAMR technology is to work around some of the physical limitations that these devices have. The technique uses laser heating, allowing data written in bits to take up less space. It is the exact opposite of what is being done today to increase storage capacities.

Today, companies have focused on technologies that allow them to “squeeze” information so that it can be possible to store more data. However, in this case there is another problem to be overcome: the smaller the recorded data, the more subject to volatility it is. When we talk about data storage for companies in particular, this possibility can become a nightmare, so that this hypothesis is constantly being put in the background.

HAMR technology has a long development path

The HAMR technology started to be developed in 2010, but the first information about it started to be published in the international press. Since then almost 8 years have passed and only now has it been possible to reach the maximum capacity of 16 TB - which represents just under 30% of its real potential.

The expectation of the industry, throughout its development, is that it would be possible to put this technology on the market in time for it to become compatible with SSDs. In this case, the prediction was correct, as large capacity SSDs are still considered unfeasible from a technical and commercial point of view.

Although the tests carried out so far have proved successful, there is still no date for the first HDs using this technology to be launched commercially. The most optimistic forecasts indicate that by 2020 it will be possible to reach 20 TB. In the meantime, we may have some expectations that 16 TB models will begin to be tested by a greater number of companies starting next year.


Until then, everything that is said in relation to the price of this product will be speculation, but we can say without a doubt that, at first, it will be accessible to few companies.

Although the tests carried out so far have proved successful, there is still no date for the first HDs using this technology to be launched commercially. The most optimistic forecasts indicate that by 2020 it will be possible to reach 20 TB. In the meantime, we may have some expectations that 16 TB models will begin to be tested by a greater number of companies starting next year.

Until then, everything that is said in relation to the price of this product will be speculation, but we can say without a doubt that, at first, it will be accessible to few companies.

Labels:

5 technologies that will make computers faster in the future

 

What technologies will be able to make computers faster in the future? The industry has several answers to that question. For there to be evolution, it is necessary that several items are developed and that is why we invest so much in research.

However, each technology has its own time. While some are expected to appear in stores in 2019, others are still a mystery kept under lock and key in laboratories - and it may take up to a decade for us to have the opportunity to get our hands on them.

In this article, we list 5 technologies that will make computers faster. Which one are you most looking forward to testing?



. Optane technology

Among all the possibilities of technological advances that we will list here, Optane technology, developed by Intel, is the one that is at a more advanced stage, as it is already on the market. According to the company, the performance of products with this technology can be up to 28% higher and access to data can be up to 1400% faster.

The idea is to ship this technology in SSDs and RAM sticks. In this way, both devices would function as memory accelerators. Best of all, this technology can be used on home machines.

2. Epyc technology

Epyc technology is an alternative from AMD to increase the speed of computers. Epyc processors are geared towards servers and will reach the market in 2019. Using high speed and low latency paths, in practice it is as if each unit worked with two or more CPUs.

The company's promise is that there will be a significant performance gain. At least for now, the cost of production is still high, but the company hopes to reduce unit values ​​as the number of devices delivered increases.

3. Optical circuits

The greater the performance of a machine, the greater the amount of heat it emits. This heat dissipation in the form of heat has always been an issue that manufacturers have had to deal with. After all, you need to find a safe compromise in terms of temperature, even if it means limiting the power.

The solution found was to create circuits that exchange information using light pulses. The idea is similar to what already occurs with optical fibers. In addition to solving the problem of heat generation - and, consequently, energy waste - this form of data exchange can be 10 to 100 times faster than current systems.

4. Quantum computing

Still far from the vast majority of users, quantum computers are already a reality in some laboratories and research centers. The big problem for the development of these machines is that they need to be kept at specific temperatures (for example, -273 degrees Celsius).


For this reason, production costs for machines like this are still high, but the industry has advanced a lot in recent years. Researchers at the University of Michigan, in the United States, and Ratsbona, in Germany, demonstrated last year a technology that allows changing the state of electrons at frequencies that are up to 1 million times faster than current systems.

5. Storage of information in DNA

Can structures similar to human DNA be used to store computational information? The answer is “yes” and this type of technology is at an advanced stage of development. Due to its high density, its applications are practically endless.

To give you an idea, if we stored all the films produced to date in a DNA sequence, it would be possible to compress all of them in a space smaller than a sugar cube. In addition, this structure would have a durability of at least 10,000 years.

Although the possibilities are exciting, there is no prediction of when this technology will be available.

Labels:

What is end-to-end encryption ? Learn why WhatsApp and Telegram use this technology

 

The security of messages exchanged via WhatsApp and Telegram has surfaced in recent weeks due to recent developments in national politics. Many have wondered what end-to-end encryption is in these two applications.

Before we talk a little more about these technologies, we must make it clear that, at first, this is considered one of the safest ways to protect users' data. However, understanding how it works, we can still understand what may have happened to the leaked messages so that you can also take precautions.


What is end-to-end encryption?

End-to-end encryption is also known as end-to-end encryption or E2EE. This is a security feature that aims to protect messages exchanged by two or more people. The secret is to keep the key for reading the message only at the ends of the communication.

That is, when you send a message, a communication key is generated. This key allows only the recipient of the message to be able to read the content. If someone intercepts the messages halfway through, they will not be able to read them, as they will be encrypted.

This feature is proven to be safe. Not even the developers responsible for the apps are able to read the messages - which are temporarily stored on their servers - even though they have direct access to the content. The encryption key will always be missing.

How does encryption work?

Encrypting a message means shuffling it in such a way that it cannot be read by someone who has no means of decrypting it. Making a simplistic analogy, it is as if the letters were exchanged for numbers and, to make the exchanges, it would be necessary to have a template.

In the digital world, encryption is widely used not only in messages, but especially in sensitive data, such as information about credit cards and bank details. The more sophisticated the encryption, the more difficult the mission of those who try to intercept the messages.

There are also two types of encryption: asymmetric and symmetric. End-to-end encryption is of the asymmetric type, that is, only one key (the recipient's) can be applied to retrieve the information. Protocols such as SSL ( Secure Sockets Layer ) and TLS ( Transport Layer Security ) are examples of applications that use this type of technology.

Symmetric type encryption requires that both sides (sender and receiver) have the same key. From a security perspective, this poses a problem, as the key needs to be sent from one person to another - and can be intercepted halfway.

In other words, it would be as if to access a message on WhatsApp you would always need a different password, a password that you would need to receive by means other than the messenger.

The great merit of end-to-end encryption is the fact that it does not require user action, since applications are in charge of automating this function (which also increases security). In addition to Telegram and WhatsApp, services like Skype and Microsoft Outlook also have the same feature.

Labels: