DD
MM
YYYY

PAGES

DD
MM
YYYY

spot_img

PAGES

Home Blog Page 7504

Six Ways To Protect Your Computer And Smartphone From Hackers, Worms, Viruses

0

Security has gotten very sophisticated. It is not easy these days to stay offline. We are always connected when we are using our computers. What that means we are exposed to many  potential online threats like virus, worms and even hackers. Security is no more a part-time job from your IT guys, your data lives on the web and cloud and it is important to stay vigilant yourself.

According to FBI and many security companies,  these are ways you can secure your computer and smartphone:

  • Keep your firewall on: Firewalls protect your computer from hackers  who try to gain access to crash it or steal information. Software firewalls are widely recommended and come prepackaged
  • Install or update your antivirus software:  Antivirus software is designed to prevent malware from embedding on your computer. If it detects malicious codes, like a virus or worm, it works to disarm or remove it before it can do serious damage
  • Install or Update Your Antispyware Technology: Spyware is just what it sounds like—software that is surreptitiously installed on your computer to let others peer into your activities on the computer. Some spyware collects information about you without your consent or produces unwanted pop-up ads on your web browser. Some operating systems offer free spyware protection, and inexpensive software is readily available for download on the Internet or at your local computer store. Be wary of ads on the Internet offering downloadable antispyware—in some cases these products may be fake and may actually contain spyware or other malicious code. It’s like buying groceries—shop where you trust.
  • Keep your operating system updated: Computer operating systems are periodically updated to stay in tune with technology requirements and to fix security holes. Be sure to install the updates
  • Be careful on what you download: Carelessly downloading email attachments can circumvent even the most vigilant antivirus software. Never open an email attachment from someone you don’t know and be wary of forwarded attachments even from people you do know.
  • Turn Off Your Computer: With the growth of high-speed Internet connections, many opt to leave their computers on and ready for action. The downside is that being “always on” renders computers more susceptible. Beyond firewall protection, which is designed to fend off unwanted attacks, turning the computer off effectively severs an attacker’s connection—be it spyware or a botnet that employs your computer’s resources to reach out to other unwitting users.

Please sign-up for a Cybersecurity Certificate course in Facyber to deepen your cybersecurity and digital forensics capabilities.

Noise Sources And Reduction Techniques In Nanometer CMOS

0

When wires are routed tightly together as is evident in nanometer CMOS technologies, different undesirable effects occur. One is capacitive property formed on the wires resulting from storing charges in the metal interface with oxide. Another is inductive noise resulting from induced voltage on a signal line due to changing magnetic field created when a signal switching causes current to flow through a loop.

By changing signal level and causing oscillatory transitions which could cause overshoot or undershoot, these effects affect circuit performance. These effects are classified as interconnect noise because they emanate from interconnection wires used to link circuit elements on-chip. This noise has resistive, inductive and capacitive components.

Interconnect noise is a huge problem to ultra deep submicron circuit designers because of unwanted variations in signals that degrade system performances. This noise could manifest in many forms: delay, signal integrity degradation etc. When two signal lines are routed together, a capacitance exists between the lines. When one of the signals switch, it induces a change (glitch) on the other one. This relationship could change the second signal or possibly cause a delay in the transmission. Layout engineers work hard to ensure that these effects are reduced in chips for high performance and reliability.

Over the years, the metal pitch has followed the trend of process improvement, which involves reduction of the transistor size to pack more units in a die. Unfortunately, the interconnect thickness has not followed the trend resulting to higher resistance per unit length. The effect of this is increase in delay as technology scales. Two major factors contributed to this: capacitance effects which have increased due to much nearer routing on-chip and resistance increases due to wire reduction. These combined factors pose limitation on system operating frequency.

There exist four main sources of interconnect noise in CMOS technologies: interconnect cross-capacitance, power supply, and mutual inductance and thermal noise sources. Interconnect cross-capacitance noise results from charge injected on a victim net due to switching on an aggressor net through a capacitance between them. Power supply noise is the spurious signal that appears on local voltage driver, which subsequently changes the signal value at the receiver.

Mutual inductance noise results when a voltage is induced on a signal line as a result of a changing magnetic field created when a signal switching causes current to flow through a loop. Finally, thermal noise emanates from joule heating along signal and power paths in circuits when current flows.

There is also a coupling (crosstalk) capacitance between two conductors. This capacitance introduces noise that degrades the signal integrity. It leads to rise on the spurious pulse on a neighboring wire, if it has a static value or causes delayed transition. Besides mutual capacitance, crosstalk is also determined by the ratio of the mutual to the sum of self and mutual capacitance (to ground).

The spacings between conductors in circuits decrease with technology downscaling. This increases the crosstalk and other sources of interconnection noise as the wires become more compact and closer to one another. This high circuit density contributes to long interconnections which could also increase crosstalk.

Crosstalk is a major source of timing uncertainty in circuits and it is more prevalent than process variations. Because of the presence of the capacitance, switching of the signals could result to lots of problems that could potentially result to functional degradation. For reduction of crosstalk, low permitivity dielectric material and signal de-synchronizations (non simultaneous switching of signals) are used.

Emerging techniques for interconnect noise reduction involve innovations in materials, circuits and layouts. Typical methods used include buffer insertion, wire sizing, wire spacing, shield insertion among. The ITRS 2005 forecasts increasing use of copper metallization and low-k dielectric insulators. The use of Cu over Al improves circuit propagation delay by reducing the interconnect resistance.

With Cu that has lower resistivity than Al, there is a gain on the delay. Further technology scaling continues to introduce more interconnect challenges despite the use of Cu. In the future, optimal techniques to scale interconnect systems with other circuit systems would be needed to reduce the impact of interconnect noise. New circuit and process techniques would be needed. Latch-up prevention and interconnect noise reduction using silicon silicon-on-insulator are expected to increase.

In conclusions, as CMOS technology continues to scale down, leakage currents and interconnection noise will become increasingly large due to the effects of electron tunnelling, short channel effects, coupling capacitance and other factors discussed in the paper.

Managing these factors by developing better circuits and processes would be vital to the continuous success of CMOS technologies in the semiconductor industry. This would require innovative control techniques and architectures in all aspects of CMOS design. Architectural innovation has already lead to renewed industrial interests in asynchronous integrated circuit which using clockless structure mitigate the effects of interconnect noise delays and other parasitics in circuits.

by Ndubuisi Ekekwe

Ways To Build A Professional Online Persona

0

The following are some suggestions on how to build a professional online persona:

Presence: Open at least one social media or blog account.

Specialize: Define an area of interest and build around it. A five-minute online search should reveal what you represent. You need to differentiate yourself and showcase your core skills and unique capabilities to potential hiring managers.

Accuracy: Always remember that once that post goes online, you may not control who sees it. If you lie on your accomplishments, your classmate or co-worker is just an IP address away from challenging it. Make it accurate – always, otherwise, you will destroy your persona.

Comprehensive: While blog should be short, once in a while, develop comprehensive articles in your field and post them online. It could mean expanding a class project you worked on, adding more contents, and fully proving your expertise. Half-baked contents will not take you too far.

Judgment: What you post or share online defines who you are. Your profile defines you – values, interests and reliability. For employers, they want reliable team leaders and you must not offer less in your web personality.

Vertical Integration: Seek to connect with people ahead of you professionally while building a horizontally network.

Generosity: Share and exchange good ideas. Invite people to your network and be generous to promote good ideas from others. Write professional reviews on books, journals and articles. In no distant time, people will reward you.

Policy Matters: If you are working, ensure you adhere to policies on using the company’s name online. There is a threat that you could be a source of data leakage that can hurt competitiveness. Your profile must not be another portrait of your employer – you must be wise to separate both, where necessary.

Continuity: Professional online branding is a continuous work-in-progress that requires constant tune-ups of networks, contents and profiles. It must be constantly nurtured.

How Hadoop will unlock great value in African big data startups

0

We mean it – the hottest area in technology now is data analytic. You can also call the players WANTS, just like Quants in the investment banking field. OK, they also go as Data Scientists. These are guys/fields that focus on crunching the massive data social media and new technologies are churning out minute by minute. Companies want to make sense of them – they truly want because without that capability, they cannot have intelligence on their products, websites and indeed all areas of their operations. Facebook will not improve with having a way to analyze data they get from millions of their users.

HP, EMC, Google, Microsoft, and a host of the tech giants are buying these companies. They are the pinnacle of mathematical finesse and analytical bravado. They crunch meaningless data sets and provide your information that no one ever imagined. The leader of this pack is Cloudera. We also have Informatica. There are many of them and Africa needs to get into this. This is brain work people and we need to connect quick and fast.

What do you need? You need to be very very good in mathematics and statistics. You need to be sound in machine learning and heuristic algorithm development.  If your statistics measures up very well, it is possible you can write these codes and easily be acquired by someone. The barrier of entry is very high because this is not the domain of hackers and lucky-software coders. You need to be very good and know the stuff.

To begin, you need to understand the open source engine that drives most of these companies. That engine is called Hadoop, after the toy elephant of the son of the man, Doug Cutting, that created it. Get to know Hadoop and if you think you are ready, email tekedia@fasmicro.com and let us discuss how this can work out. We have some Nigerians in U.S that want to get into Hadoop (they know the software but do not know the maths section. These are investors; we will connect you). They are looking for partners – first rated statisticians and mathematicians.

Apache Hadoop is a software framework that supports data-intensive distributed applications under a free license. It enables applications to work with thousands of nodes and petabytes of data. Hadoop was inspired by Google’s MapReduce and Google File System (GFS) papers. Hadoop is a top-level Apache project being built and used by a global community of contributors,written in the Java programming language. Yahoo! has been the largest contributor to the project, and uses Hadoop extensively across its businesses. Hadoop was created by Doug Cutting,who named it after his son’s toy elephant.It was originally developed to support distribution for the Nutch search engine project. (wikipedia)

One key way to protect yourself on Android mobile devices in this new year

0

For better or for worse, technology has penetrated on our planet Earth. It has served people in many ways, tinkering with a gadget and exploring its various functions is charming. The advent of smartphones has made the mobile phone experience even better. Smartphones are pet to their owners and accompany them everywhere they move. Using them is a smart experience and the perception that technology has made people dump is nullified.

 

Dangers from exploded applications:

Though their use is heavenly, but smartphones have certain societal pitfalls too. They have globalized the world abruptly and in many easy exquisite ways. Individuals from all strata and age can access it; the wrong is for the kids with tender age. They use it excessively without acknowledging its drawbacks.

The smartphone brings whole world at your virtual doorstep which is not feasible for kids. Interacting with people of all kinds make them vulnerable to prospect threats, all their childhood we teach them not to talk to strangers, but then giving them a smartphone that breaks all the protective shields and expose them to the volatile world is senseless.

 

StealthGenie an ultimate safe guard:

Whether you are a working parent or a house wife or guardian by any relation, you need to have absolute grip over the interactions they make. For that StealthGenie mobile spy software is essential. Kids are smart and a smarter software can only handle them. It is the software intelligence that sneaks into their mobile phones and extract out all the information necessary to be known by the guardian.

If you are worried about the traceability of your software, then the software ensures 100% undetectable functioning and presence. It will bring to you all the secret information that they were trying to hide and all the activities they do behind your back or due to your lack of technological knowledge.

The software is handy and works effectively without complaints or signs of its presence in the target phone. The investigator can easily sneak into any live conversations, while sitting away from the target phone and view all that what is happening on the online interface. The user interface is called the Member Area and it possesses all the relevant information you are thriving to get hands on. Information about the people they call, text, email and chat appears before you and you will be in a position to identify strangers and suspicious persons.

 

Protective shield from all threats:

By marking certain people’s contact numbers or email addresses as important, you can get alerts whenever they are contacted. Supporting the above feature is ‘Reverse Phone Look up’ this feature brings forth all the additional contact and personal information of that person you want to investigate about. Likewise the monitoring software allow the user to even specify words on the online interface, whenever those target words are found in any Email, Chat or SMS message, the user will get notified immediately.

Parents worried about the wandering habit of their children, do not need to mourn over the rebellious nature of their child, Geo Live Location Tracking enables them to see the live movement of their children and even allows drawing and mark boundaries over the Google map provided in the online interface. They can easily view the movement of their child and even gets alerts whenever a certain boundary is trespassed.

This is how the software helps in tackling whimsical children and makes a guardian’s life easy by providing all the surveillance about the kids and their telephonic activities and experimentations with new and old pals and strangers alike.