The rumour fits with the fact that the little table hasn't been updated in a long time


The iPad Mini's days may be numbered.

The little tablet – which was first introduced in 2012 – will not be updated and will eventually be killed off, according to reports.

It's thought to have come under threat as a result of Apple's bigger phones as well as lighter and thinner iPads, which have left the small tablet struggling to justify itself.

It also comes after Apple has left the iPad Mini without updates for an unusually long time. It now offers only one version of the – at this point fairly old – tablet, and sells a bigger version of the same tablet that is actually less expensive.

All of that appeared to point to the discontinuation of the iPad Mini. It will not be updated again and over time it will be phased out and discontinued, according to the report in BGR which cited a source close to Apple.

The report didn't give any details of when the discontinuation might happen or whether there would be any price drops in the future.

Analysts have long predicted that the smaller tablet could be on its way out. But there have also been rumours that Apple has been working on a smaller version of its iPad Pro – which is currently offered in two bigger sizes – that would include the Smart Connector and Apple Pencil support from the bigger models.

Apple is expected to reveal the first major updates to the iPad line at this summer's WWDC, which could include new models that pack in a bigger screen but get rid of the bezels that go around the side.


The new filters are incredibly easy to use


Instagram might just have destroyed Snapchat.

The Facebook-owned app has been taking parts of Snapchat's interface for months – most notably stories, which were once the hallmark of Snapchat but are now Instagram's most prominent feature. But the addition of face filters might be the killer blow: it takes Snapchat's most prominent feature away from it, and gives Instagram perhaps the only feature that it was lacking on its close rival.

Instagram didn't mention Snapchat at all in its announcement. But the example filters that were included in it were all almost identical to Snapchat's, and the app has been engaged in copying its closest competitors' biggest features for months.

Those include flower crowns, for instance, which are slightly different from but noticeably similar to Snapchat's. And they also include bunny ears and noses – markedly similar to the dog face filter that is famous on Snapchat.

At the moment, Instagram has added only eight of those filters – far less than Snapchat – but suggested that it would be adding many more.

They're used by opening up the camera and clicking on the face icon in the bottom right hand corner, next to the option to switch between the rear- and front-facing cameras. (That's a far more simple and easy to discover process than on Snapchat, which requires you to hold down on your own face.)

Some of the filters work with two people, like on Snapchat. And they also work on Instagram's Boomerang app, and can be sent either through Direct Messages or added to your story.

The news came just days after Snapchat reported heavy losses and rocked Wall Street. Some speculated that Instagram's use of the stories format and the loss of other features had been part of those disastrous results, which lost Snapchat's founders hundreds of millions of dollars.


Chip design giant ARM has teamed up with US researchers on a project to develop chips that can be implanted in the human brain.

The chips are designed to help people with brain and spinal injuries, and will sit inside the skull.

The aim is to develop a system that not only allows people to carry out tasks, but to receive sensory feedback.

But it will be some time before we start to see the benefits of the 10-year project.

ARM is providing the processors for the implants being developed at the Center for Sensorimotor Neural Engineering (CSNE), at the University of Washington.

The researchers have already developed an early version of the technology.

"They have some early prototype devices," ARM's director of healthcare technologies, Peter Ferguson, told the BBC.

"The challenge is power consumption and the heat that generates. They needed something ultra-small, ultra-low power."

'Far vision'
The first stage is to design a "system on a chip" that can transmit signals from the brain to a stimulator implanted in the spinal cord, allowing those with spinal or neurological conditions to control their movements.

A team including researchers at Case Western Reserve University in Cleveland, Ohio, recently became the first to restore brain-controlled hand and arm motion in a person with complete paralysis.

But CSNE also wants the device to be able to receive information sent back in the other direction, providing sensory information to the brain.

"Not only are they trying to read the signals from the brain, but to feed something back into it", Mr Ferguson explained.

This would allow people to gauge how tightly they are holding an object, or get a sense of its temperature, for example.

Research suggests that this feedback may also help the brain rewire itself, which could help the recovery of people with certain conditions - such as those who have suffered a stroke.

"When you think about people with spinal cord injuries, the ability to use technology to bridge the spinal cord to get muscles groups to move again and more - that's the far vision," Mr Ferguson said.

In the meantime, he said, the technology could be used to help treat stroke patients, those with Parkinson's, and possibly Alzheimer's.

ARM Holdings, which is based in Cambridge, was sold to Japanese firm Softbank last year for £24bn.

In March this year, Softbank was reported to be considering selling a 25% stake in ARM to a Saudi-backed investment group.


A prototype computer with 160TB of memory has been unveiled by Hewlett Packard Enterprises.

Designed to work on big data, it could analyse the equivalent of 160 million books at the same time, HPE said.

The device, called The Machine, had a Linux-based operating system and prioritised memory rather than processing power, the company said.

HPE said its Memory Driven Computing research project could eventually lead to a "near-limitless" memory pool.

"The secrets to the next great scientific breakthrough, industry-changing innovation or life-altering technology hide in plain sight behind the mountains of data we create every day," said HPE boss Meg Whitman.

"To realise this promise, we can't rely on the technologies of the past, we need a computer built for the big data era."

Japan kicks off AI computer project

IBM's online quantum machine gets faster

Prof Les Carr, of the University of Southampton, told The Machine would be fast but big data faced other challenges.

"The ultimate way to speed things up is to make sure you have all the data present in your computer as close to the processing as possible so this is a different way of trying to speed things up," he said.

"However, we need to make our processing... not just faster but more insightful and business relevant."

"There are many areas in life where quicker is not necessarily better."


Expanded profitability. Enhanced core interest. Less slip-ups. Less anxiety. 

Odds are, you definitely know the various advantages of taking breaks at work. Yet, let's be honest—a number of regardless us battle to step away. At the point when your inbox keeps topping off and your schedule is miles long, it's unquestionably testing to remind yourself to press delay once in a while. 

Thus, we keep pushing through. We chug our way through those undertakings and guarantee ourselves that tomorrow is the day when we'll strike a superior adjust—just to experience a similar schedule once more. 

Luckily, there's a superior way. I too have dependably battled with compelling myself to make a stride back when my workload is heaped high. In any case, when I actualized these three procedures, guaranteeing that I enjoyed a reprieve from time to time turned into a mess simpler. 

1. Search for Natural Pauses 

The main thing I did was give careful consideration to the regular musicality of my normal workday. Were there sure circumstances when I felt more languid and unfocused? Were there times when I felt especially profitable? 

I scribbled down my perceptions on a sheet of paper so I could utilize those notes to incorporate breaks with my workday—without them thoroughly disturbing my force. 

2. Adhere to a Schedule 

Working with those notes, I moved onto this progression. I'm exceptionally plan arranged, so I knew I would need to actually plan stops in my workday like I would a meeting or another dedication. 

Presently, I endeavor to take a short 15-minute interruption around 10 AM and another around 2:30 PM—which are both circumstances when I'm feeling to some degree fluffy and unmotivated. 

Obviously, if that time moves around and I'm smack touch amidst a venture or a telephone call, I change. In any case, I do in any case intend to make a stride back around that time window every last day. 

Try not to feel like an inflexible calendar will function admirably for you? That is not by any means the only way you can incorporate breaks with your day. You can likewise execute something like the Pomodoro Technique to guarantee you're not working continually while never surfacing for oxygen. 

3. Take Off for Lunch 

I used to have lunch at my work area consistently, with the goal that I could control my way through my avocado toast and my inbox at the same time. It sounded good to me—additional time spent working would measure up to more errands expert, isn't that so? 

Be that as it may, I've found that it really benefits me to abandon my work area for lunch—it resembles setting a reset catch amidst my day. Besides, it's an absolutely regular and inconspicuous time for me to make a stride back. 

Along these lines, have your lunch in the lounge or cafeteria. Or, then again, if the climate is pleasant, head outside. It's the ideal chance to ensure you take a truly necessary breather. 

You realize that breaks are beneficial for you. In any case, really executing them as a component of your workday can be a test. Utilize these three tips, and you'll be significantly more liable to step away once in a while.

Work in a private venture? At that point you're an objective for ransomware 

"We believe it's vital to talk about cybersecurity for little and medium-sized organizations," said Eugene Kaspersky, inviting visitors to Malta. Yes, that Kaspersky of security merchant acclaim. While he wasn't quite Malta, his words were spread all around the inn where grouped columnists, experts and analysts were collected to "spare the world".



Talking toward the begin of this cybersecurity meeting, group chief of Kaspersky Lab Research and Analysis, Marco Preuss, uncovered that the organization had ceased more than 80,000 ransomware dangers for Android gadgets alone amid the second quarter of 2016. By and large, over all stages and gadgets, Kaspersky has seen ransomware assaults ascend by 450%, from 131,000 in 2014/2015 to 718,000 in a similar period amid 2015/2016. 

Be that as it may, as a private venture, why would it be a good idea for you to mind? Odds are that, as an individual, you have your photo and music accumulations in air-gapped chronicles, or in the cloud – right? Furthermore, your business does likewise with mission-basic information – right? 

In this way, how about we take a gander at the reasons why you ought to mind. Number one is you're getting excessively sure. Of course, some sort of physical media far from your advanced area is a smart thought, however cloud stores and NAS gadgets have been known to be gotten by the more patient ransomware; these utilization sharp crypto schedules to scramble numerous layers of your reinforcements before pronouncing their nearness. In any case, how about we concur, on an individual level in any event, that you're practically sorted; so why ought to your business mind? 

Basically in light of the fact that in the event that you maintain a private company then you're in the focus of an expanding number of ransomware players. Kaspersky Lab's IT Security Risks review for 2016 cases that a little more than 40% of SMBs succumbed to ransomware in the previous 12 months. Nearly 34% of those private companies paid the payoff to recapture access to their information – and, most worryingly, 20% couldn't recuperate the information even once the payment was paid. While I'm astonished that such a large number of would hack up in any case, I'm less amazed about the one in five who ended up the brook in any case. I've seen a portion of the ransomware code and a considerable measure of it is inadequately assembled. 

Here's the thing. A unique bit of code is taken and after that messed around with by individuals who don't generally comprehend what they're doing, not to mention monitoring how crypto functions; what they comprehend is profiting. That implies making variations by evolving stuff, and more regularly than you may envision, this likewise implies fouling things up. 

Truth be told, that is an exceptionally basic purpose behind the information being lost once the payoff has been paid. Most offenders are sufficiently cunning to comprehend that on the off chance that they take the cash and run that the word will spread and no one will pay up. Amid a current excursion to Helsinki with Finnish IT security equip F-Secure, I saw cases of how some ransomware players have client administration and IT bolster set up that would disgrace numerous a genuine organization. 

Anyway, the fact is that as an independent venture you're an objective – and that is just that. Year on year, again as indicated by Kaspersky, ransomware assaults on business climbed almost six times over from 27,000 to 158,000. It's a sharp play by the criminal endeavors behind the most sorted out of ransomware assaults, as an independent company has significant information it can't bear to be without, and has enough cash to pay the payoff (if it's set accurately – and as a rule it isn't doltish, voracious levels of cash), however it doesn't have the assets to commit to devoted IT divisions, not to mention IT security ones. 

The normal ransomware deliver, as indicated by Kaspersky's Sergey Martsynkyan, was about $300 in the course of recent months. Nothing unexpected that an independent venture should seriously think about paying up instead of hazard losing information, and to be sure confronting the fierceness of the Information Commissioner's Office if the Data Protection Act had been broken with client data made up for lost time simultaneously. Avoidance stays superior to cure, however, which implies having great debacle recuperation arranges set up whatever the span of your association. Having a reinforcement procedure that really works, by which I mean business-basic information chronicled to no less than two spots (one in the cloud and coincidental site, confined from the system), ought not be discretionary. 

No More Ransom! 

I'd additionally suggest each independent venture investigates the No More Ransom venture (nomoreransom.org), which was assembled in the late spring of 2016. The establishing accomplices of Europol European Cybercrime Center (EC3) and the Dutch National Police, alongside Kaspersky Lab and Intel Security, have made a really decent showing with regards to, frankly. Sufficient for 13 other law-implementation offices, including the UK's National Crime Agency, to now be ready. 

It's an awesome case of how the IT security division and law authorization together can disturb cybercrime. On account of ransomware, the most ideal approach to upset the crooks is to take their payoffs away, so No More Ransom works to help casualties to recover their information without paying a penny. It likewise perceives the energy of instruction, educating end-clients how ransomware works, and how they can abstain from being casualty. 

Should you be sufficiently unfortunate to have fallen casualty as of now, the venture can help work out precisely what ransomware has hit you. It will uncover the genuine crypto being utilized to bolt up your information, and after that decide whether an answer has been found that can be utilized to open it once more. With law requirement and private security sellers working firmly together, caught servers can be swung over to the coding specialists, who can then make decoding programming to open the scrambled information. It's these apparatuses that are then made accessible to clients. 

At present, there are only a modest bunch of unscrambling apparatuses accessible, yet the number is developing and will keep on doing so. At this moment there are unscrambling devices for Wildfire, Chimera, Teslacrypt, Shade, CoinVault, Rannoh and Rakhni. The quantity of ransomware dangers secured is more prominent, since some of these decryptors will work over various dangers. 

In this way, for instance, the Rannoh decryptor will unscramble documents that have been scrambled by Marsjoke (otherwise known as Polyglot), Autolt, Fury, Crybola, Cryakl, CryptXXX 1 and 2, and in addition Rannoh itself. In the initial two months alone, the venture helped 2,500 casualties to open their information without paying a payoff. It's evaluated that cybercriminals have been denied of £625,000 as an immediate outcome.


To a great many people, Artificial Intelligence (AI) presumably implies science fiction films with robots and PCs performing unfathomable human undertakings. While this is mostly valid, what AI really conveys to the table is empowering machines to do keen assignments. As the difficulties confronted by worldwide leaders soar, there is a critical need to impel organizations and social orders forward utilizing the most present day innovation. With the world changing at an extraordinary speed, organizations need to redo and rebuild how machines and people function. What's more, AI is meeting those objectives. As per Forrester, Cognitive innovations, for example, robots, counterfeit consciousness (AI), machine learning, and robotization will supplant 7% of US employments by 2025. 


The Changing Dynamics 

The assembling part is portrayed by a situation loaded with vulnerabilities and developing elements. With regularly developing business sector instability, makers need to always advance, adjust and react to changes in the snappiest time, without hampering the nature of items, and in any event conceivable cost. The effectiveness of an assembling framework nearly relies on upon how well shop floor forms react to changes. Basic shop floor capacities, for example, generation booking and support must be to a great degree responsiveness, and their mix is the thing that will bring about an ideal and vigorous basic leadership condition. 

AI in Manufacturing 

AI discovers application in a large group of enterprises including gaming, managing an account, retail, business, and government, and is gradually getting to be plainly inescapable in the assembling division, encouraging the computerization of ventures. AI-driven machines are clearing a simpler way to the future by giving a large group of advantages - offering new open doors, enhancing creation efficiencies, and conveying machine connection nearer to human association. The Fourth Industrial Revolution is being driven by the mechanization of information based work; by making better approaches to robotize undertakings, we can rebuild the way people and machines live and collaborate, to make a superior, more grounded computerized economy. 

AI conquers numerous inalienable difficulties that have been tormenting the business: from shortage of mastery, to choice many-sided quality, joining issues, and data over-burden. Receiving AI on the shop floor empowers organizations to totally change their procedures. We should take a gander at what AI is assisting the assembling area with achieving: 

• Process Automation: The utilization of AI and robots is especially engaging in mechanical assembling as they alter large scale manufacturing. Robots can do monotonous undertakings, streamlining the creation show, expanding limit, building robotization arrangements killing human mistake and conveying more elevated amounts of value affirmation. 

• Round-the-clock Production: While people are compelled to work in 3 movements to guarantee persistent generation, robots can empower a relentless, all day, every day creation line. Organizations can enlarge their generation capacities and take care of the developing demand of clients around the world. 

• Safer Working Conditions: With a few setbacks occurring on the shop floor, a move towards AI implies less individuals are need to complete unsafe and excessively arduous work. As robots supplant people and perform ordinary and unsafe undertakings, the quantity of working environment setbacks will fall the whole way across. 

• New Opportunities for Humans: As AI assumes control over the shopfloor and mechanizes exhausting and unremarkable human undertakings, specialists will get the chance to concentrate on perplexing and creative assignments. While AI deals with modest work, people can concentrate on driving development and guiding their business to more up to date statures. 

• Reduced Operating Expenditure: Although bringing AI onto the shopfloor would require a huge capital speculation, the ROI is considerably higher. As insightful machines begin dealing with everyday exercises, organizations can appreciate essentially bring down overhead. 

Benefits 

AI and mechanical mechanization have advanced impressively as of late. Improvement in machine learning systems, progresses in sensors and the development of processing force have made another era of robots. AI causes empowers machines to gather and concentrate information, perceive designs, and learn and adjust to new circumstances or situations through machine insight, learning and discourse acknowledgment. Utilizing AI, makers can: 

• Make quicker, information driven choices 

• Enable better creation results 

• Improve prepare productivity 

• Lower operational expenses 

• Enable more prominent adaptability 

• And encourage item development 

Enhancing Business Outcomes 

The key driver of the Fourth Industrial Revolution is the speed at which it is going on. With innovation now readily available, organizations (and even enterprises) can scale up with the squint of the eye, eventually changing the way we experience our every day lives (and in a small amount of the time). Utilizing AI, industry pioneers and innovation pioneers can make the correct stages and arrangements, eventually enhancing business results and driving achievement in today's perpetually developing computerized economy.


A massive cyber-attack using tools believed to have been stolen from the US National Security Agency (NSA) has struck organisations around the world.

Cyber-security firm Avast said it had seen 75,000 cases of the ransomware - known as WannaCry and variants of that name - around the world.

There are reports of infections in 99 countries, including Russia and China.

Among the worst hit was the National Health Service (NHS) in England and Scotland.

The BBC understands about 40 NHS organisations and some medical practices were hit, with operations and appointments cancelled.

Who has been hit by the NHS cyber attack?

How did the cyber-attack unfold?

The malware spread quickly on Friday, with medical staff in the UK reportedly seeing computers go down "one by one".

NHS staff shared screenshots of the WannaCry programme, which demanded a payment of $300 (£230) in virtual currency Bitcoin to unlock the files for each computer.

Throughout the day other, mainly European countries, reported infections.

A number of large Spanish firms - including telecoms giant Telefonica, power firm Iberdrola and utility provider Gas Natural - were hit, with reports that staff at the firms were told to turn off their computers.

People tweeted photos of affected computers including a local railway ticket machine in Germany and a university computer lab in Italy.

Portugal Telecom, the delivery company FedEx and a Swedish local authority were also affected.

Some reports said Russia had seen more infections than any other single country. Domestic banks, the interior and health ministries, the state-owned Russian railway firm and the second largest mobile phone network were all reported to have been hit.

Russia's interior ministry said 1,000 of its computers had been infected but the virus was swiftly dealt with and no sensitive data was compromised.

China has not officially commented on any attacks it may have suffered, but comments on social media said a university computer lab had been compromised.

How does the malware work and who is behind it?

The infections seem to be deployed via a worm - a program that spreads by itself between computers.

Most other malicious programmes rely on humans to spread by tricking them into clicking on an attachment harbouring the attack code.

By contrast, once WannaCry is inside an organisation it will hunt down vulnerable machines and infect them too.

This perhaps explains why its impact is so public - because large numbers of machines at each victim organisation are being compromised, the BBC's technology reporter Chris Baraniuk says.

Some experts say the attack may have been built to exploit a weakness in Microsoft systems that had been identified by the NSA and given the name EternalBlue.

The NSA tools were stolen by a group of hackers known as The Shadow Brokers, who then attempted to sell the encrypted cache in an online auction.

They then made the tools freely available, releasing a password for the encryption in April saying it was a "protest" about US President Donald Trump.

At the time, some cyber-security experts said some of the malware was real, but old.

A patch for the vulnerability was released by Microsoft in March, which would have automatically protected those computers with Windows Update enabled.

Microsoft said on Friday it would roll out the update to users of older operating systems "that no longer receive mainstream support", such Windows XP, Windows 8 and Windows Server 2003.

This means the NHS - which largely still uses Windows XP - can now protect itself from this attack at no extra cost, reports the BBC's North America technology reporter Dave Lee.

'Accidental hero' temporarily halts its spread

A UK-based cyber-security researcher, tweeting as @MalwareTechBlog, said he had accidentally managed to temporarily halt the spread of the virus.

He was quoted as saying that he noticed that the virus was searching for a web address that had not been registered. He bought the domain name for around $10 and found that by registering it, he triggered a "kill switch" that stopped the worm's spread.

But, he warned it was likely to be only a temporary fix.

"So long as the domain isn't removed, this particular strain will no longer cause harm, but patch your systems ASAP as they will try again," he tweeted.

Vikram Thakur, a research manager with security software maker Symantec, told Reuters news agency that there had been a noticeable slow down in the spread of the virus.

"The numbers are extremely low and coming down fast," he said, but warned that could change if the original coding for the virus is changed.


Davey Winder looks at the three biggest enterprise cyber threats and how to protect against them...

The cyber threatscape is a dynamic and rapid environment where individual threats hit the victim, the headlines and the waste-bin of history in quick succession. Some threats, however, are the hardy perennials of the security world. So how do you deal with those?

Malware

Malware is short for malicious software, and long on threat durability. Last year enterprise organisations downloaded a piece of known malware every 81 seconds. Malware itself is constantly mutating, with some reports suggesting as many as 12 million new variants were produced every month last year.

To frame that rate of growth in some contextual perspective, more 'new' malware was seen across the last two years than the entire previous decade in total. Luckily, malware (which includes the ransomware epidemic) is amongst the easier of threats to mitigate as it almost invariably requires action to install.

Phishing, or some form of social engineering, remains the primary attack vector with payload by way of an infected attachment or malicious link. User education by way of awareness training and phishing simulation exercises should be a threat mitigating priority, along with application whitelisting, patch management strategy and a behavioural exploit prevention solution.

Distributed Denial of Service (DDoS)

Although malware remains at the top of hacker tools to disrupt network traffic and take websites down, enterprise-targeted DDoS attacks are hot on the heels of such strikes. In fact, the two often run side-by-side to cause as much disruption as possible to an organisation.

The problem with DDoS attacks is that they cause a huge amount of damage to a business and can bring an entire website down, even if the organisation thinks it has the capacity to deal with a digital battering ram. Consumers are largely kept out of the loop, only experiencing the results of the attack – essentially, not being able to use a website rather than finding themselves directly targeted.

The motivation behind such attacks varies. Sometimes the attacker wants to take a political stand against the business in question, while other criminals might want to cripple the company financially. There's also the possibility of holding the firm to ransom, although it's less common than the other reasons behind DDoS attacks.

Whatever the reason hackers decide to launch a DDoS attack on a company, the overall motivation is to cause business disruption, affect customer churn and increase the cost of operating. Added to that, criminals sometimes use DDoS attacks to take the focus away from another attack on the network, so the onslaught could end up costing more than it originally appeared.

Business can protect against DDoS attacks using layered defences including 'scrubbing' networks, which entails passing it through high-capacity networks using scrubbing filters that clean the traffic, or by using web application firewalls that stop attacks from infiltrating the network.

Shadow IT

At number three on our list of cyber threats to the enterprise is something way too many people don't properly understand: shadow IT.

Although the term itself is becoming more commonplace, it tends to be wrongly dismissed as being synonymous with the Bring Your Own Device (BYOD) mobile technology phenomena. The real threat, however, comes to the organisation through rogue services that employees (and management up to and including the C-suite are often amongst them) use to increase productivity but which are completely unauthorised.

By flying under the organisational radar these services, which can range from cloud storage provision through to social media tools, are also off the security map. Securing endpoints that aren't visible to you isn't easy. In fact, it's pretty much impossible to stop all shadow IT use, but you can control and secure it through a mix of education, policy and technology.

Educated staff who are aware of the risks associated with unauthorised service use are more likely to ask for help, especially if policy encourages this rather than brandishing an executioner's axe. The final piece of the puzzle is technology, which can help bring visibility and control back to the organisation. Small steps such as monitoring expenses and implementing authentication through a centralised billing system can have a big visibility reach. 


Microsoft has created new image recognition tools that could help flag offensive content in videos and stop businesses running adverts alongside them.

In March, YouTube owner Google was criticised by Government ministers after it emerged taxpayer-funded adverts were found to have appeared alongside extremist content on the video platform.

Several high-profile businesses suspended their advertising with YouTube over the incident.



The new Video Indexer and Custom Vision Search tools can be used to recognise images and even faces within videos, helping to better identify their content, Microsoft said.

Google and Amazon have both created similar tools for recognising images.

The new technology was announced during Microsoft’s developer conference – Build – in Seattle.
During the event, the tech giant also announced a new translation tool that can enable users to translate a PowerPoint presentation into another language in real time.

The software, which is still being tested, would enable users to translate all their slide text into 10 different languages without changing any formatting.

Microsoft chief executive Satya Nadella also revealed the company’s Windows 10 software is now on more than 500 million devices.

“We should empower people with technology,” Nadella said during his keynote speech.
“People have to be in the loop. Let’s amplify their capability, amplify their ingenuity.”

Following the success of the Amazon Echo and Google Home smart speakers, it was also announced both HP and Intel are working on devices that will include Cortana, Microsoft’s own smart assistant.

The annual conference is used by the firm to lay out some of its plans for the coming year and to give developers early access to its new software.


Before we go into the subject of 'why programming' first let us realize what writing computer programs is. 

Writing computer programs is the technique for taking a calculation and encoding it into a documentation, a programming dialect, so it will be executed by a PC. Or, then again in simply straightforward words "Writing computer programs is a dialect of guiding a PC through an arrangement of directions." 

There are diverse sorts of programming dialects utilized, for instance: 

· Python 

· PHP 

· C dialect 

· JAVA and that's only the tip of the iceberg.. 

So why programming? What's so BIG about it? Why is it imperative? 

The principal thing, 

In this day and age everything is done on PCs; 

From sending an email/a report or even as basic as a photo to a far off partner/companion/in respect to having a vital meeting on Skype! 

EVERYTHING! 

Having a PC/portable PC has turned into a need for each and every person as it is quick, extremely solid and simple to utilize. 

So it's said that if PCs are a piece of your life, then figuring out how to program will support your life! 

The principle motivation behind why individuals get the hang of writing computer programs is on the grounds that they need to make a profession by make sites for organizations or versatile applications. 

That is by all account not the only reason you have to master programming; programming can likewise help increment the effectiveness and efficiency of a man too! 

How you inquire? 

We should take a case of a Youtuber; 

I trust everyone knows youtubers' identity? For the individuals who don't have a clue about, Youtuber's are those individuals who transfer every day content on YouTube. 

A Youtuber in the wake of recording a video needs to alter and transfer it, correct? 

Be that as it may, it's not a simple as undertaking, there are distinctive viewpoints he/she needs to deal with for making the recordings alluring; there is sound, there is Video, there is Animations and so on. Since they must be sorted out; they make an envelope for each of them so the individual does not get befuddled what to put where? 

Presently! Making an organizer for each of them as per the scene can be tedious; it would essentially take hours just to arrange it! 

On the off chance that that individual knew nuts and bolts of PYTHON; he would have the capacity to make a script asking him, what number of organizers do you need? What might be the name of the envelope? Et cetera; and that was it! He would simply spare hours of cerebral pain of arranging by compacting it into three basic strides or something like that. 

It is not said that everyone ought to wind up noticeably a developer or anything like that. Be that as it may! Everyone ought to know at any rate the nuts and bolts of it. With the goal that they can work sagaciously and increment their profitability.

The Surprising Way to Free Up Time on Your Calendar That Actually Works


I just love an empty calendar. It promises something valuable and rare: time. Time to think, to work, to do whatever you want.

But for most people, empty calendars just aren’t realistic—and that includes me.

My schedule often looks like a minefield. A 15-minute “quick chat” explodes into hours, destroying Tuesday afternoon. I agree to present at a local conference at 11 AM on Thursday—hey, at least I’ll have the afternoon free—but forget that public speaking sucks up all my energy. Our regular team meeting is every Monday, which means that all I’m doing every Monday is attending this one meeting.

I enjoyed a meeting-free stretch last year while we wrote our book Sprint: How to Solve Big Problems and Test New Ideas in Just Five Days, but that’s not normal. No, most weeks I have to fight and scrape and resort to dorky tricks to regain control of my time.

My favorite trick I discovered recently is this: Start your day with a full calendar. Basically, you fill it with activities that matter to you, before others can fill it for you.

Seems overwhelming? Don’t worry, it actually saves you time.

I learned this trick from Graham Jenkin, COO at AngelList. From 2007 to 2008, Graham was my boss at Google. He managed something like 20 people, and he gave each of us personal attention and true support.

But Graham wasn’t just a great manager. He also led the redesign of AdWords, Google’s flagship advertising product. While working with us on various projects, he was designing user interfaces, testing with customers, reviewing specifications, and negotiating with the engineering team. I often wondered where he found the time, but assumed he was just really busy. I was wrong.

One day, I was trying to schedule a meeting with Graham, so I clicked on his name in Google Calendar and overlaid his schedule on mine. It was the typical schedule of a corporate manager. Each day was packed with meetings: short events with names like “Graham Alex 1:1” and “Sync on AW3”; longer stretches for “Ads Product Review” or “Promotion Committee”; and the occasional multi-day block for “Managers Offsite” or even “Vacation.”

But, there was also something unusual about his calendar: From 7 to 11 AM each day, Graham had scheduled time with himself, labeled “Do not schedule/Morning routine.”

So, I asked him about it:

“That’s my time. I wake up early, get to the office early, hit the gym, grab breakfast, then work for a couple hours before my meetings begin,” Graham explained.

“Don’t people schedule over it?” I asked.

“Sometimes they try, but I just tell them I’ve already got plans,” he said.

(Graham describes his calendar in a lot more detail in a recent article.)

10 years later, I still use Graham’s trick. In fact, I copied his “morning routine” bit almost word-for-word. Every day, I wake up early (5:30 or 5:45 AM) to exercise and write for two hours.


When I’m working on a big project, I also schedule time with myself—for writing, editing, research, and the occasional bout of web development.

If you want to try this out, here are a few tips I picked up along the way:

  • Play Offense, Not Defense: Don’t fill your calendar with “Do not schedule” blocks just because it’s empty. Be strategic and purposeful with your time—schedule important projects and activities that you actually want to make time for.
  • Don’t Be Greedy: Resist the urge to gobble up every scrap of unscheduled time. It’s good to leave space for opportunities or emergencies, and your team will appreciate your availability.
  • Take it Seriously: When you schedule time for something important, be serious about protecting it. Learn from Graham and tell people you already have plans.

In an ideal world, I’d love to be like Jason Fried, the CEO of Basecamp, whose calendar is as empty and still as a country pond at sunrise. (Seriously, I feel more calm just looking at it.) And, having glimpsed the power and beauty of an empty calendar in my own life, I’m searching for a way to re-create those circumstances.

But until then, I’ll just have to keep a full calendar.



QUICK AND EASY

I'm good at lots of things, from eating lunch at exactly noon every day, to starting my articles in ways that make me look cocky, to downloading productivity apps and using them once or twice before forgetting about them entirely.

You see, I love organization, and timelines, and spreadsheets. So if I read an article that tells me that downloading a certain app will help me organize my life, I'm 110% in.

And I'll always use it for a few days—before ultimately deciding what I was doing previously was better. And what I was doing previously was almost always something super simple. Take my to-do list for example. I've tried so many of the (free) to-do list apps out there. Yet, I always come back to using sticky notes on my Mac.

I'm telling you all this not because I think you're interested in my to-do list evolution, but because I want to make it clear that I'm someone who likes to keep my productivity hacks simple. And this latest I've come across is the most simple.

In fact, it's so simple that I'm slightly embarrassed I haven't used it before.

I've started using the Gmail email stars. You know, those little stars right next to your subject line—turns out that they're not just there for decoration.

Here's how I'm using them:

1. I star any email that needs an answer that I can't respond to right away.

2. At the end of every day, during my I'm too lazy to do real work" period, I go through my starred emails and respond.

3. I remove the star. (Side note: Am I delivering on simple or what?)

4. If it requires follow-up or I'm not ready to respond yet, I give it a blue star. (Did you know you can change the star colors? Well, you can, and the instructions to do that are right here.)

5. At the end of the week, I go through the blue stars and see what needs my attention. And depending on my conclusion, I either keep or remove the star.


This system essentially creates a quick and easy inbox to-do list that only involves one click. Plus, it helps me to feel like I'm on top of my incoming emails, while simultaneously removing that "either respond to this now, or else the world ends" feeling I used to get when I saw the notifications piling up.


Securing your accounts just got a whole lot easier. 

Researchers from Carnegie Mellon University's CyLab Usable Privacy and Security Laboratory and the University of Chicago have developed a new password meter that educates people on how they can make their password stronger. The project is open source and can be added on to existing services.

This is particularly important in a time when passwords are easier than ever to crack. While passwords themselves can be bypassed, it's still important to keep passwords strong to protect against brute force attacks, which is when hackers try guessing your password over and over until they're successful. 

The password meter aims to motivate people to use better passwords by educating them about why their passwords are weak and providing suggestions about what they can do to make them stronger. 

The idea of a password meter is not completely new, many websites have begun offering feedback about password strength. Here's Google's for instance, with the password "mashable2017":


Despite being labeled as "strong" by Google, the same password basically gets a "try again" with some context from this new tool. 

The meter states: "Don't use words used on Wikipedia," "avoid using dates like 2017," and also provides a better option. Each of the reasons can be expanded to learn more. 


If you use "password," for example, the meter responds with "Your password must not be an extremely common password." 


I also dropped a password generated by LastPass, a popular password manager, in the new password meter and not surprisingly, the tool liked it. But it also gave me some important advice: "Make sure you use it only for this account."


The meter uses a neural network to scan a large database of existing passwords and identify trends. Then it checks the user's entered password against these to figure out if it's something attackers may guess. 

"For example, if you change Es to 3s in your password, that’s not going to fool an attacker. The meter will explain about how prevalent that substitution is and offer advice on what to do instead,” said Blase Ur, the study's lead author, in a statement. 

The site also features a guide for creating strong passwords:


The researchers found that providing data-driven feedback made a huge difference in security as compared to just labelling the passwords as weak or strong. You can try the demo for the service here.

MARI themes

KZMZ. Powered by Blogger.