DD
MM
YYYY

PAGES

DD
MM
YYYY

spot_img

PAGES

Home Blog Page 7581

Top 10 Tips When Buying A Mobile Phone Contract in 2017

0

Editor’s Note: This is a guest post.

Buying a new handset is admittedly a happy time – but make sure you’re happy with the details of the deal before completing the purchase.

There are a number of factors to consider with a phone contract and to ensure you get the right mobile and the right contract, here are our Top 10 Tips.

1. The handset

Yes, let’s start with the most obvious aspect of your new contract – the device itself. What mobile or smartphone are you looking for?

To make calls and send text messages? To check Facebook every second of the day? To be in the office even when you’re out of the office? To capture moments in high definition photos and footage?

Once you know what features you’re after, your list should narrow.

2. Your budget

Again, this is nice and obvious but very easy to overlook as you start drooling over the latest high-end gadgets!

How much are you looking to spend each month? And are you willing to pay cash upfront for the handset?

3. Check your current usage

If you have a contract already, it’s helpful to check your average monthly usage. This will highlight how many minutes and texts and how much data you actually need on a regular basis.

After all, you don’t want to pay more for inclusive minutes and data you’ll never use.

4. Options

Rather than a straightforward contract, it may be cheaper for you to buy a SIM free handset and a SIM only deal. Be sure to check all the different options available to you.

5. OS

Which operating system do you want the new device to run on?

Chances are you’re an Apple iOS, BlackBerry, Windows Phone or Android devotee and the decision is simple. If you’re not, it’s a good idea to take a closer look at what the different operating systems offer in terms of features and user friendliness.

6. Length of contract

Contract length varies from 12-months to 24-months, so decide in advance how long you want to be tied in for.

7. Check cashback redemption T&Cs

Cashback by redemption deals are a great way to save money on your phone contract. In essence, you receive money back over the course of your contract.

However, these deals vary so be sure to check how the particular one you’re interested in works and when/how you’ll receive your money back.

8. Worth waiting?

If you have your heart set on a smartphone, be sure to check if a successor is due for release in the near future. If it is, and you’re happy to stick with the current (ie not the very, very latest model), hang fire until the new version is released – and chances are you’ll benefit from reduced contract costs.

9. Current phone

Depending on the type of handset you have currently, you might want to check whether you can sell your mobile – and then put this extra cash towards a new device and/or monthly tariff.

10. Research

The biggest tip we can give you is research and research some more!

There are so many phones out there that it takes time to decide which one is for you, if you’re not manufacturer- or OS-loyal that is.

by Caroline Dalzell 

Caroline Dalzell is a professional writer and editor with over 10 years’ experience of writing for business and pleasure. She writes on various topics, specialising in mobile technology and social media.

Six Ways To Protect Your Computer And Smartphone From Hackers, Worms, Viruses

0

Security has gotten very sophisticated. It is not easy these days to stay offline. We are always connected when we are using our computers. What that means we are exposed to many  potential online threats like virus, worms and even hackers. Security is no more a part-time job from your IT guys, your data lives on the web and cloud and it is important to stay vigilant yourself.

According to FBI and many security companies,  these are ways you can secure your computer and smartphone:

  • Keep your firewall on: Firewalls protect your computer from hackers  who try to gain access to crash it or steal information. Software firewalls are widely recommended and come prepackaged
  • Install or update your antivirus software:  Antivirus software is designed to prevent malware from embedding on your computer. If it detects malicious codes, like a virus or worm, it works to disarm or remove it before it can do serious damage
  • Install or Update Your Antispyware Technology: Spyware is just what it sounds like—software that is surreptitiously installed on your computer to let others peer into your activities on the computer. Some spyware collects information about you without your consent or produces unwanted pop-up ads on your web browser. Some operating systems offer free spyware protection, and inexpensive software is readily available for download on the Internet or at your local computer store. Be wary of ads on the Internet offering downloadable antispyware—in some cases these products may be fake and may actually contain spyware or other malicious code. It’s like buying groceries—shop where you trust.
  • Keep your operating system updated: Computer operating systems are periodically updated to stay in tune with technology requirements and to fix security holes. Be sure to install the updates
  • Be careful on what you download: Carelessly downloading email attachments can circumvent even the most vigilant antivirus software. Never open an email attachment from someone you don’t know and be wary of forwarded attachments even from people you do know.
  • Turn Off Your Computer: With the growth of high-speed Internet connections, many opt to leave their computers on and ready for action. The downside is that being “always on” renders computers more susceptible. Beyond firewall protection, which is designed to fend off unwanted attacks, turning the computer off effectively severs an attacker’s connection—be it spyware or a botnet that employs your computer’s resources to reach out to other unwitting users.

Please sign-up for a Cybersecurity Certificate course in Facyber to deepen your cybersecurity and digital forensics capabilities.

Noise Sources And Reduction Techniques In Nanometer CMOS

0

When wires are routed tightly together as is evident in nanometer CMOS technologies, different undesirable effects occur. One is capacitive property formed on the wires resulting from storing charges in the metal interface with oxide. Another is inductive noise resulting from induced voltage on a signal line due to changing magnetic field created when a signal switching causes current to flow through a loop.

By changing signal level and causing oscillatory transitions which could cause overshoot or undershoot, these effects affect circuit performance. These effects are classified as interconnect noise because they emanate from interconnection wires used to link circuit elements on-chip. This noise has resistive, inductive and capacitive components.

Interconnect noise is a huge problem to ultra deep submicron circuit designers because of unwanted variations in signals that degrade system performances. This noise could manifest in many forms: delay, signal integrity degradation etc. When two signal lines are routed together, a capacitance exists between the lines. When one of the signals switch, it induces a change (glitch) on the other one. This relationship could change the second signal or possibly cause a delay in the transmission. Layout engineers work hard to ensure that these effects are reduced in chips for high performance and reliability.

Over the years, the metal pitch has followed the trend of process improvement, which involves reduction of the transistor size to pack more units in a die. Unfortunately, the interconnect thickness has not followed the trend resulting to higher resistance per unit length. The effect of this is increase in delay as technology scales. Two major factors contributed to this: capacitance effects which have increased due to much nearer routing on-chip and resistance increases due to wire reduction. These combined factors pose limitation on system operating frequency.

There exist four main sources of interconnect noise in CMOS technologies: interconnect cross-capacitance, power supply, and mutual inductance and thermal noise sources. Interconnect cross-capacitance noise results from charge injected on a victim net due to switching on an aggressor net through a capacitance between them. Power supply noise is the spurious signal that appears on local voltage driver, which subsequently changes the signal value at the receiver.

Mutual inductance noise results when a voltage is induced on a signal line as a result of a changing magnetic field created when a signal switching causes current to flow through a loop. Finally, thermal noise emanates from joule heating along signal and power paths in circuits when current flows.

There is also a coupling (crosstalk) capacitance between two conductors. This capacitance introduces noise that degrades the signal integrity. It leads to rise on the spurious pulse on a neighboring wire, if it has a static value or causes delayed transition. Besides mutual capacitance, crosstalk is also determined by the ratio of the mutual to the sum of self and mutual capacitance (to ground).

The spacings between conductors in circuits decrease with technology downscaling. This increases the crosstalk and other sources of interconnection noise as the wires become more compact and closer to one another. This high circuit density contributes to long interconnections which could also increase crosstalk.

Crosstalk is a major source of timing uncertainty in circuits and it is more prevalent than process variations. Because of the presence of the capacitance, switching of the signals could result to lots of problems that could potentially result to functional degradation. For reduction of crosstalk, low permitivity dielectric material and signal de-synchronizations (non simultaneous switching of signals) are used.

Emerging techniques for interconnect noise reduction involve innovations in materials, circuits and layouts. Typical methods used include buffer insertion, wire sizing, wire spacing, shield insertion among. The ITRS 2005 forecasts increasing use of copper metallization and low-k dielectric insulators. The use of Cu over Al improves circuit propagation delay by reducing the interconnect resistance.

With Cu that has lower resistivity than Al, there is a gain on the delay. Further technology scaling continues to introduce more interconnect challenges despite the use of Cu. In the future, optimal techniques to scale interconnect systems with other circuit systems would be needed to reduce the impact of interconnect noise. New circuit and process techniques would be needed. Latch-up prevention and interconnect noise reduction using silicon silicon-on-insulator are expected to increase.

In conclusions, as CMOS technology continues to scale down, leakage currents and interconnection noise will become increasingly large due to the effects of electron tunnelling, short channel effects, coupling capacitance and other factors discussed in the paper.

Managing these factors by developing better circuits and processes would be vital to the continuous success of CMOS technologies in the semiconductor industry. This would require innovative control techniques and architectures in all aspects of CMOS design. Architectural innovation has already lead to renewed industrial interests in asynchronous integrated circuit which using clockless structure mitigate the effects of interconnect noise delays and other parasitics in circuits.

by Ndubuisi Ekekwe

Ways To Build A Professional Online Persona

0

The following are some suggestions on how to build a professional online persona:

Presence: Open at least one social media or blog account.

Specialize: Define an area of interest and build around it. A five-minute online search should reveal what you represent. You need to differentiate yourself and showcase your core skills and unique capabilities to potential hiring managers.

Accuracy: Always remember that once that post goes online, you may not control who sees it. If you lie on your accomplishments, your classmate or co-worker is just an IP address away from challenging it. Make it accurate – always, otherwise, you will destroy your persona.

Comprehensive: While blog should be short, once in a while, develop comprehensive articles in your field and post them online. It could mean expanding a class project you worked on, adding more contents, and fully proving your expertise. Half-baked contents will not take you too far.

Judgment: What you post or share online defines who you are. Your profile defines you – values, interests and reliability. For employers, they want reliable team leaders and you must not offer less in your web personality.

Vertical Integration: Seek to connect with people ahead of you professionally while building a horizontally network.

Generosity: Share and exchange good ideas. Invite people to your network and be generous to promote good ideas from others. Write professional reviews on books, journals and articles. In no distant time, people will reward you.

Policy Matters: If you are working, ensure you adhere to policies on using the company’s name online. There is a threat that you could be a source of data leakage that can hurt competitiveness. Your profile must not be another portrait of your employer – you must be wise to separate both, where necessary.

Continuity: Professional online branding is a continuous work-in-progress that requires constant tune-ups of networks, contents and profiles. It must be constantly nurtured.

How Hadoop will unlock great value in African big data startups

0

We mean it – the hottest area in technology now is data analytic. You can also call the players WANTS, just like Quants in the investment banking field. OK, they also go as Data Scientists. These are guys/fields that focus on crunching the massive data social media and new technologies are churning out minute by minute. Companies want to make sense of them – they truly want because without that capability, they cannot have intelligence on their products, websites and indeed all areas of their operations. Facebook will not improve with having a way to analyze data they get from millions of their users.

HP, EMC, Google, Microsoft, and a host of the tech giants are buying these companies. They are the pinnacle of mathematical finesse and analytical bravado. They crunch meaningless data sets and provide your information that no one ever imagined. The leader of this pack is Cloudera. We also have Informatica. There are many of them and Africa needs to get into this. This is brain work people and we need to connect quick and fast.

What do you need? You need to be very very good in mathematics and statistics. You need to be sound in machine learning and heuristic algorithm development.  If your statistics measures up very well, it is possible you can write these codes and easily be acquired by someone. The barrier of entry is very high because this is not the domain of hackers and lucky-software coders. You need to be very good and know the stuff.

To begin, you need to understand the open source engine that drives most of these companies. That engine is called Hadoop, after the toy elephant of the son of the man, Doug Cutting, that created it. Get to know Hadoop and if you think you are ready, email tekedia@fasmicro.com and let us discuss how this can work out. We have some Nigerians in U.S that want to get into Hadoop (they know the software but do not know the maths section. These are investors; we will connect you). They are looking for partners – first rated statisticians and mathematicians.

Apache Hadoop is a software framework that supports data-intensive distributed applications under a free license. It enables applications to work with thousands of nodes and petabytes of data. Hadoop was inspired by Google’s MapReduce and Google File System (GFS) papers. Hadoop is a top-level Apache project being built and used by a global community of contributors,written in the Java programming language. Yahoo! has been the largest contributor to the project, and uses Hadoop extensively across its businesses. Hadoop was created by Doug Cutting,who named it after his son’s toy elephant.It was originally developed to support distribution for the Nutch search engine project. (wikipedia)