Technical

Rooting android vs jail breaking iOS: whats the difference?

There have been long (and unhealthy) debates among iPhone and android user as to which is better: a jailbreak iPhone or a rooted android device. While on surface, both things might seems the same, getting authorized access to certain system partition to weak files and make the device do want you want they are actually very different from each other.

Rooting on android phone and jailbreaking iOS are the same thing. One essentially by passes the security checks and restrictions imposed by the OEMs to gain access to system files and modify them to enhance existing feature or add new ones both rooting and jailbreaking. Void the warranty of the device, though both are reversible and one can always restore their phone back to its stock state if they wish to, rooting and jailbreaking differs from each other in what they are capable of doing and the process of doing it. Rooting an Android device is more complex and time-consuming while jailbreaking an iPhone usually takes a few steps. However, while it is possible to root most Android devices out there, it’s rare that a jailbreak tool is available for the latest iOS release. Many Android OEMs like OnePlus actually embrace the third-party developer community and make it easier to root their devices. Apple, on the other hand, is completely against jailbreaking and actively patches exploits with every new iOS release that makes jailbreak difficult.

There are many benefits to rooting an Android device. The whole concept that it provides you with greater customization options is true only to a certain extent. Most OEMs now offer plenty of customization options on their Android devices which will suffice the need of most people out there. While you do get more customization options on a rooted Android device, the additional options will only please a handful of people.

Nowadays, people primarily root their Android device to install a newer version of Android on it. It’s widely known that most Android OEMs end up ditching their smartphones a few months after its release. This means that they are left without software updates and it is up to the third-party community to keep the phone going. So, for example, the One Plus One which never officially

Whats next? Vehicle-to-vehicle communication with connected cars

There is common refrain heard from nearly everyone gathered in Detroit to attend the world congress on intelligent transport system, connected car will be the ultimate internet of things. They will collect and make sense of the massive amounts of data from a huge array of source. Car will talk to other cars exchanging data and alerting drivers to potential collision. They will talk to sensors on signs on stoplight, bus stop even one embedded in the road to get traffic updates and rerouting alert and they will communicate with your house, office and smart devices acting as an a digital assistant gathering information you need to go about your day.

To do all that, they need the cloud because connected cars need data. Lots of data. Automobiles today are already packed with an impressive amount of processing power, because some 100 million lines of software code help run the typical luxury vehicle. But as connected cars before were sophisticated rolling wired devices, the amount of information flowing back and forth from them will skyrocket and so they will demand for the cloud’s scalability and storage capabilities.

The cloud also provides sophisticated processing and analytical capabilities. The cloud is the central hub where all of this quickly changing, far-flung information will pass through. It will provide the platform for making sense of this data and the cloud is also the home for building and developing the apps and programs used by cars on the road.

What does having blue eyes really mean?

Blue Eyes is a technology conducted by the research team of IBM at its Almaden Research Center (ARC) in San Jose, California since 1997. Blue eyes technology makes a computer to understand and sense human feelings and behavior and also enables the computer to react according to the sensed emotional levels. The aim of the blue eyes technology is to give human power or abilities to a computer, so that the machine can naturally interact with human beings as we interact with each other.

All human beings have some perceptual capabilities, the ability to understand each other’s emotional level or feelings from their facial expressions. Blue eyes technology aims at creating a computer that have the abilities to understand the perceptual powers of human being by recognizing their facial expressions and react accordingly to them.

Blue in terms stands for Bluetooth, which enables reliable wireless communication Eyes, because the eye moment enables us to obtain a lot of interesting and important information. The basic idea behind this technology is to give the computer the human power. Blue Eyes uses sensing technology to identify a user’s actions and to extract key information.

The Blue eyes technology ensures a convenient way of simplifying the life by providing more delicate and user-friendly facilities in computing devices. Now that we have proven the method, the next step is to improve the hardware. Instead of using cumbersome modules to gather information about the user, it will be better to use smaller and less intrusive units. The day is not far when this technology will push its way into your household, making you lazier. A blue eye is a technology aiming to be a means of stress reliever driven by the advanced, technology of studying the facial expressions for judgment of the intensity of stress handled. These new possibilities can cover areas such as industry, transportation, military command centers or operation theaters.

HOW FINGER PRINT SENSOR WORKS?

A finger print sensor is an electronic device used to capture a digital image of finger print pattern. The captured image is called a live scan. This live scan is digitally process to create the biometric template which is stored and used for matching. Many technologies have been used including optical, capacitive, RF, thermal, ultrasonic, piezoelectric, mems.                                                                                                                Fingerprints offers a complete range of technology for working with fingerprint biometrics that can be used separately or in combination, including sensors, biometric processors, and modules. The competitive advantages offered by Fingerprints’ technology include unique image quality, extreme robustness, low power consumption, and complete biometric systems. Fingerprints’ area sensor and swipe sensor are both based on patented proprietary technology, which offers several strong advantages such as high image quality, programmable pixel elements, and 256 gray-scale values from every single pixel element. The sensors contain small capacitive plates, each with their own electrical circuit embedded in the chip. The sensors use Fingerprints’ proprietary HSPA (High Sensitive Pixel Amplifier) that allows each pixel element in the sensor to detect very weak signals, which improves image quality for all types of fingers. Extremely weak electrical charges, sent via the finger, are created, building a pattern between the finger’s ridges or valleys and the sensor’s plates. Using these charges, the sensor measures the capacitance pattern across the surface.

Fingerprints’ HSPA method also allows the use of a patented protective coating that is 25 to 30 times thicker than other suppliers and helps Fingerprints’ sensors to withstand values. Capacitance is the ability to hold an electrical charge. Fingerprints’ sensors contain tens of thousands of small capacitive plates, each with their own electrical circuit embedded in the chip. When the finger is placed on the sensor, extremely weak electrical charges are created, building a pattern between the finger’s ridges or valleys and the sensor’s plates. Using these charges, the sensor measures the capacitance pattern across the surface. The measured values are digitized by the sensor and sent to the neighboring microprocessor. The surface of a capacitive sensor is a neat array of plates that are able to measure the capacitance between these plates and thus the finger print contour. This can be above directly by applying an electrical charge to the plate.

HACKERSMIND advisory for Ransomwore & patch from Microsoft .

________

In view of prevailing cyber security situation worldwide, threats and severe risk to the important, sensitive and confidential information of the people and increasing Cyberattacks and Ransomeware, Jain Software foundation advises following steps to the common people to avoid such risks:
• ‘Precaution is better than cure’, therefore be super secure and use genuine, good quality antivirus.
• Avoid exposing your system to any unauthentic, insecure network.
• On being attacked, remove the affected system from the network.
• You can restore any affected files from a known good backup. So always keep a good secure backup
. Restoration of files from a backup is the easiest and fastest way to regain access.
• Make sure all the incomings to the system are properly scanned.
Ransomware a comparatively less known/used but constantly increasing cyber threat among the common people. A Ransomware is a virus that has a potential to encrypt your entire system, you won’t be able to read//access/encrypt any of your files. It can enter your system through orthodox means and can encrypt all your files and drives which might be of great importance to you. It will demand money (encrypted currency, Bitcoin) for reverting your system to its original condition otherwise your files are deleted. Security experts have warned that ransomware is the fastest growing form of computer virus.
WannaCry Ransomeware ` WannaCry Ransomeware cyberattacks has not been able to affected India majorly. Leaving some unfortunate incidents , most Banks, Hospitals, Corporates and
Government departments are isolated from this cyberattack.
‘WannaCry searches and encrypts 176 different file types and appends .WCRY extension at the end of the filename. Asks users to pay Ransome of $300 in Bitcoin.

Wannacry Ransomware fixes from Microsoft. Do update ASAP and share with others. 🙂
 
Windows XP SP3
 
http://download.windowsupdate.com/d/csa/csa/secu/2017/02/windowsxp-kb4012598-x86-custom-enu_eceb7d5023bbb23c0dc633e46b9c2f14fa6ee9dd.exe
 
Windows Vista x86
 
http://download.windowsupdate.com/d/msdownload/update/software/secu/2017/02/windows6.0-kb4012598-x86_13e9b3d77ba5599764c296075a796c16a85c745c.msu
 
Windows Vista x64
 
http://download.windowsupdate.com/d/msdownload/update/software/secu/2017/02/windows6.0-kb4012598-x64_6a186ba2b2b98b2144b50f88baf33a5fa53b5d76.msu
 
Windows 7 x64
 
http://download.windowsupdate.com/d/msdownload/update/software/secu/2017/02/windows6.1-kb4012212-x64_2decefaa02e2058dcd965702509a992d8c4e92b3.msu
 
Windows 7 x86
 
http://download.windowsupdate.com/d/msdownload/update/software/secu/2017/02/windows6.1-kb4012212-x86_6bb04d3971bb58ae4bac44219e7169812914df3f.msu
 
Windows 8
 
http://download.windowsupdate.com/c/msdownload/update/software/secu/2017/05/windows8-rt-kb4012598-x64_f05841d2e94197c2dca4457f1b895e8f632b7f8e.msu
 
Windows 8.1
 
http://download.windowsupdate.com/c/msdownload/update/software/secu/2017/02/windows8.1-kb4012213-x64_5b24b9ca5a123a844ed793e0f2be974148520349.msu
 
Windows 10
 
http://download.windowsupdate.com/c/msdownload/update/software/secu/2017/03/windows10.0-kb4012606-x64_e805b81ee08c3bb0a8ab2c5ce6be5b35127f8773.msu
 
Windows 2003 x86
 
http://download.windowsupdate.com/c/csa/csa/secu/2017/02/windowsserver2003-kb4012598-x86-custom-enu_f617caf6e7ee6f43abe4b386cb1d26b3318693cf.exe
 
Windows 2003 x64
 
http://download.windowsupdate.com/d/csa/csa/secu/2017/02/windowsserver2003-kb4012598-x64-custom-enu_f24d8723f246145524b9030e4752c96430981211.exe
 
Windows 2008
 
http://download.windowsupdate.com/d/msdownload/update/software/secu/2017/02/windows6.0-kb4012598-x64_6a186ba2b2b98b2144b50f88baf33a5fa53b5d76.msu
 
Windows 2008R2
 
http://download.windowsupdate.com/d/msdownload/update/software/secu/2017/02/windows6.1-kb4012212-x64_2decefaa02e2058dcd965702509a992d8c4e92b3.msu
 
Windows 2012
 
http://download.windowsupdate.com/c/msdownload/update/software/secu/2017/02/windows8-rt-kb4012214-x64_b14951d29cb4fd880948f5204d54721e64c9942b.msu
 
Windows 2012R2
 
http://download.windowsupdate.com/c/msdownload/update/software/secu/2017/02/windows8.1-kb4012213-x64_5b24b9ca5a123a844ed793e0f2be974148520349.msu
 
Windows 2016
 
http://download.windowsupdate.com/d/msdownload/update/software/secu/2017/03/windows10.0 -kb4013429-x64_ddc8596f88577ab739cade1d365956a74598e710.msu
 
#HACKERSMIND #JainSoftware #Important

#HACKERSMIND #JainSoftware #Important

DUAL CAMERA TECHNOLOGY

In a world were use of smart phones are increasingly day by day, new features are a need. As some phones are struggling to excite us anymore. Phones need something to satisfy this need, and this technology easily satisfies that need.

  • Our eyes come in a set of two, so why not digital camera on a smart-phone. There are several notable benefits in having two cameras.

 

Corephotonics : A technology that will change smart phone imaging is capable of performing optical zoom upto 5 times without any moving parts. The big trick in Corephotonics use of 2 lenses with different focal length, one is wide angle, other is 3x zoom. It means you can switch lenses to magnify objects without resorting to digital zoom.

 

  • The magic happens when the images from two lens, one is fixed focus telephoto ( a lens with a longer focal length than standard). With a narrow field of view and a normal wide angle combined together via algorithms into a single image.

 

  • In a world where use of smart phones are increasingly day by day, new features are a need. As some phones are struggling to excite us anymore. Phones need something to satisfy this need, and this technology easily satisfies that need. Dual camera technology will embrace the image quality and user experience of mobile imaging.

 

  • Huawei and its subsidiary honor both are approaching the dual lens setup to improve focus. This year Iphone 7s, LG & Huawei technologies have led their way with new android flagships and claims its offers in noise reduction in low light, sharpness. Iphone 7s dual camera posses the dual shooter path plus 12 megapixel sensor behind its 28mm wide angle lens. This are optically stabilized which minimizes the blurriness of photos

 

  • In my experience with honor 8 and P9, i found that it comes with laser-assisted autofocus mechanism & provides an excellent results in picture quality and color reproduction even in an ample light.

 

  • The downside is that despite the aid of huawei image processor, the process takes a second or two to complete. As both P9 and honor lack optical image stabilization, when there is less than sufficient light the process may results in blurry photos.

 

  • However we know for sure that the dual lens is the smartphone camera setup for future.

 

 

 

Jasleen kaur

– Jain Software Foundation .

 

 

 

 

 

 

 

Fitness Bands

microsoft-band-2.jpg (2040×1479)

After smart phones there is a new trend catching on in India for fitness bands. Fitness bands is a wrist-worn device that can detect some combination of walking steps, running distance, heart rate, sleep patterns and swimming laps. Fitness bands interact via Bluetooth with an app in a mobile device that configures the device and receives the wearer’s activity data. Most smartwatches support some number of fitness activities via a health app. However, just as the smartphone combined phone, media player, camera and a raft of other devices into one, there may be little difference between a smartwatch and a fitness tracker in the future.

Tests conducted on 22 healthy volunteers (even split of males and females) completing a variety of activities ` ranging from running, cycling and walking, to seated and lying rest ` for a period of approximately one hour there are limits to how much trust we can place in such devices to monitor energy balance and, therefore, to serve as weight loss aids. The measurements of the wrist-worn devices were compared to electrocardiography readings every 15 seconds and against a portable gas analysis system which measured the number of calories burnt. As per manufacturer’s instructions, each of the wrist-worn devices was individualised to reflect the users age, gender, height and weight. Researchers found that wrist-worn fitness monitors underestimated energy expenditure with variances of more than 40 percent.

 

3 Dimensional Printing – The Next Industrial Revolution

3D printing or additive manufacturing is a process of making three dimensional solid objects from a digital file. Prepare a 3D model before it is ready to be 3D printed. This is what they call slicing. The technology was first invented in the 1980s, and since that time has been used for rapid prototyping (RP). However, in the last few years, 3D printing has additionally started to evolve into a next-generation manufacturing technology that has the potential to allow the local, on-demand production of final products. It is possible to 3D print in hundreds of different plastic, metal and ceramic materials, with pioneers now 3D printing molds, aerospace components, jewelry, works of art, toys and medical devices.The process of creating cell patterns in a confined space using 3D printing technologies, where cell function and viability are preserved within the printed construct is called bioprinting.

3D-printing.jpg (2000×1000)

Bioprinting can be defined as the use of computer-aided transfer processes for patterning and assembling living and non-living materials with a prescribed 2D or 3D organization in order to produce bio-engineered structures serving in regenerative medicine, pharmacokinetic and basic cell biology studies.

 

From my personal experience I can say that, this is the future of human organ replacement since my father is aged 80 years and since his denture has become loose. Dentists say that even the standard procedures will not be helpful in creating a denture which fits him perfectly. Here 3D printing when in its advanced stage implemented in India can help him.

 

Mohan P. | Assistant General Manager

Jain Software Foundation .

IoT : The Things Is Far Bigger Than Anyone Expects

819

The Internet of Things (IoT) is the network of physical objects—devices, vehicles, buildings and other items—embedded with electronics, software, sensors, and network connectivity that enables these objects to collect and exchange data.

 

 

Basically with a internet connection you can control your car,home appliances eith built-in sensors from anywhere.Dutch Telecommunication company KPN have announced that by using LoRa(long range) network it has implemented IOT all over the country. Remotely monitor and manage your home and cut down on your monthly bills and resource usage. Easily track down those lost keys or cell phone in your house using Bluetooth and other wireless technology devices like the cobra tag.

 

 

Cobra Tag uses Bluetooth wireless technology to create a two-way separation alarm between your smartphone and your valuables. When that connection is broken, both your phone and the Cobra Tag device on your essential start ringing to let you know something is being left behind.

 

 

Range of add-on sensors can track if a water pipe has burst in your basement, if there is motion inside your home while you are away, and have it automatically send you a notification by email or text message when it happens.Automatically turn off the lights when no one is in a room.This concept has been applied to some of the premium malls in India in metro cities.

Notifies authorities when a fire extinguisher is blocked, missing from its designated location or when its pressure falls below safe operating levels. Alerts can be sent directly through an instant email, phone call. Drifters (Outfitted with cell communication, GPS, temperature, and salinity sensors) can be quickly deployed in response to unanticipated events such as floods to track the movement of water, contaminants, and other conditions in waterways.

Help protect wildlife by using system consisting of a tracking collar that utilizes a GPS/GSM module to locate and track the lions and communicate their exact positions to the authorities. With efficiencent gains for systems of just 1% could result in 15 year savings of $30 billion worth of jet fuel for the airline industry.

Monitoring of parking spaces availability in the city. Monitoring of vehicles and pedestrian levels to optimize driving and walking routes.Intelligent Waste Management by detection of rubbish levels in containers to optimize the trash collection routes. Earthquake Early Detection by distributed control in specific places of tremors. Intelligent Shopping Applications by getting advices in the point of sale according to customer habits, preferences, presence of allergic components for them or expiring dates.

Google proposes 13 emoji to depicts professional /working women

Google proposes 13 emoji to depicts professional /working women

Emoji Women

In an effort to better represent women in today’s digital conversations, Google has come up with 13 new emoji depicting them in various lines of work, such as healthcare, technology and agriculture. They’re included in a proposal (PDF) to the Unicode Consortium, which is responsible for standardizing emoji worldwide.

 

 

A group of Google developers has designed a set of 13 new emojis they believe will better represent and depicts the modern woman in day to day life.  The new emojis show woman in roles such as doctors, tech workers, mechanics, farmers, educators and rock stars.

There are some Unicode shortcode to show or generate emojis which are shows the Woman and Man emojis…

 

Some of the gender diverse emoji proposed by Google this week.

 

The Google team  also pointed out that young women are the heaviest users of emoji and are more likely to use emoji at work while communicating with peers.It’s also worth noting that the proposal includes representation of male emojis in these professions.

 

Awadhesh Kumar

Jain Software Developers

Request a Free Estimate
Enter Your Information below and we will get back to you with an estimate within few hours
0