Facebook plans to implement algorithms that limits the virality of political posts

Why it matters?

Facebook is set to deploy more rigid algorithmic tools to limit the spread of viral content on its platform. This is according to a new report by the Wall Street Journal that highlights measures that have been tested in recent elections, including in Sri Lanka and Myanmar, to mitigate disinformation campaigns.

The move is in preparation for the November U.S. presidential election, which is set to pose some unique challenges. The company believes that there’s tremendous potential for upheaval spurred on by the spread of disinformation during election season.

According to a recent blog post by Facebook CEO Mark Zuckerberg, the country is deeply divided along political lines. Zuckerberg has raised concerns about the recent surge in politically-motivated acts of violence as well as misinformed statements by public figures. He has alluded to these as indicators that democracy could be undermined if information is not regulated.

The following is the statement issued by Andy Stone, the company’s Policy Communications Director, in relation to this. “While I will intentionally not link to the New York Post, I want be clear that this story is eligible to be fact checked by Facebook’s third-party fact checking partners. In the meantime, we are reducing its distribution on our platform.” Facebook currently relies on a network of third-party fact-checking organizations to authenticate such information. They include the Associated Press, the Daily Caller, and France-Presse.


Samsung Galaxy Tab S& Review

Summary

The Galaxy Tab S7 + has a 12.4 "OLED screen. That is very large for an Android tablet and it is simply the nicest screen on an Android or Apple tablet. It also has the fastest soc available for Android at the time. The software runs smoothly and is suitable for demanding tasks. However, few will want or be able to replace their laptop with it, even though the Book Cover Keyboard itself is a nice - albeit pricey - accessory and you get It comes with a handy stylus, but it's ideal for traveling and as a tablet next to a PC or laptop, but expensive, making it by far the best Android tablet you can get.

Pros
  1. Very nice 120Hz OLED screen
  2. Very Smooth user experience
  3. Four fine speakers
  4. Stylus included
  5. DeX mode has added value with a pointer

Negatives
  1. Pricey, especially with Book Cover Keyboard
  2. Slow changer included with a cable that is too short
  3. Not a laptop replacement for most
  4. More flexible than desired
  5. Moderate battery life


Cisco Announces Intent to Acquire BabbleLabs to Improve Video Meeting Experience

Most Advanced Noise Removal Enables Working from Anywhere, Without Distraction

Summary

  • Most Advanced Noise Removal Enables Working from Anywhere, Without Distraction

  • The acquisition builds upon a focused technology and talent strategy to continue to integrate intelligence into the Cisco COllaboration platform - helping users work smarter and be more productive.
  • Promote Customer privacy and Cloud Security by processing noise removal 100 percent at the source where the noise happens (on the client-side), aligning with Cisco's culture of security by design.

According to a Cisco global survey* focused on the future of work, 98 percent of workers say they experience frustration from distractions during video meetings when working from home. Two of the top 5 frustrations called out are about background noise—either from other participants or their own side of the call.

With the addition of BabbleLabs, Cisco will bring native noise removal capability to its entire Collaboration portfolio. Initially, Cisco will focus on integrating BabbleLabs to deliver a best-in-class audio experience to Webex Meetings users - wherever they are, and however, they connect via the Webex application (whether via a conference room or mobile device). A great user experience is also secure user experience. BabbleLabs complements Cisco’s focus on secure and private collaboration by processing noise removal 100 percent at the source where the noise happens (on the client-side). In doing so, BabbleLabs aligns with strict data policies that underpin Cisco’s culture of security by design.

“A great meeting experience starts with great audio,” said Jeetu Patel, senior vice president, and general manager, Cisco Security and Applications Business Unit. “We’re thrilled to welcome BabbleLabs’ team of highly skilled engineers. Their technology is going to provide our customers with yet another important innovation – automatically removing unwanted noise - to continue enabling exceptional Webex meeting experiences.”

“BabbleLabs is excited to become part of Cisco and the Collaboration Group,” said Chris Rowen, CEO, and co-founder of BabbleLabs. “The Cisco team shares our passion for speech as the core of collaboration and communication. Cisco’s Collaboration platform will enable us to quickly scale our exceptional speech enhancement technology for hundreds of millions of Webex users.”


Best High Resolution Monitor: LG 27UD88-W

The LG 27UD88 is an affordable, color-accurate, and beautiful monitor for both work and play. There’s very little to complain about, and so much to praise. This is a genuinely fantastic and versatile display for any computer.

  • Freesync compatibility
  • Good price to performance ratio
  • Beautiful Image

  • 60Hz refresh rate
  • No swivel on Y axis

Price and Availability

Normally, if you’re looking to get a 4K panel with FreeSync and a high sRGB color gamut coverage, you’d be looking at a moderately expensive monitor. However, that’s not necessarily the case here.

At £490 (about $649, AU$900), the LG 27UD88-W is, quite frankly, a bargain. When we first saw the price of this monitor, we had to do a double-take to make sure we noted the model number right. While many monitors in this price range, like the Acer XB281HK feature higher refresh rates and lower response times, it’s hard to find a panel with this level of color accuracy for a better price. And, given that it’s not primarily a gaming monitor, that’s a sacrifice worth making.

If you’re a graphic designer or creative professional, and you’re looking for an affordable monitor that won’t hold you back, you can’t do much better at a lower price.

Design

Considering the manufacturer, it shouldn’t be too surprising that the LG 27UD88 is an attractive display. With a white chassis and black bezels, the classy build belies the low cost of the device. It’s not an unbelievably huge display, like the Dell UltraSharp UP3218K or an ultra-wide like the AOC Agon AG352UCG. But, with its 27-inch display and narrow bezels, it’ll effortlessly blend in to any office environment.

Performance

The LG 27UD88 has a gorgeous IPS panel at 3,840 x 2,160 and covers a whopping 99% of the sRGB color space. That would be enough to carve out a win in our book, but in reality, it’s even sweeter.

The panel is factory calibrated, so we don’t have to screw around in the menus to get the perfect image. Instead, we are able to just plug it in and get to work.

And, as we’ve already hinted at a few times before, this monitor is at its best in creative workloads. We found ourselves hunting across the internet for RAW photos to mess around within Photoshop. Even other productivity tasks, like word processing or web browsing, take advantage of this bright, colorful display that makes content pop.

Final Verdict

When you’re looking for the best 4K monitor, you want to find something that’s affordable, but also has fantastic picture quality. It’s a balance that’s pretty rare, but the LG 27UD88-W hits it out of the park. Not only does this panel cover 99% of the sRGB color space, but it does so with an insane contrast ratio and a response time to display the best PC games as they should be seen. The best part? It does all this while maintaining a reasonable price tag. If you have the horsepower to drive the LG 27UD88-W, you should pick it up.


Secure Web Gateway Explained

What is a secure web gateway?

So what exactly is a secure web gateway? A secure web gateway is an advanced, cloud-delivered, or on-premises network security service. It enforces consistent internet security and compliance policies for all users regardless of their location or the type of computer or device they are using. These gateway security tools also protect against threats to users who are accessing the internet via the web or are using any number of web-based applications. They allow organizations to enforce acceptable use policy for web access, enforce compliance with regulations, and prevent data leakage.

As a result, secure web gateways offer a way to keep networks from falling victim to incursions through internet traffic and malicious websites. They prevent data from such places from entering the network and causing a malware infection or intrusion.

This form of gateway security is accomplished through malware detection, URL filtering, and other means. A gateway effectively blocks malware from calling home and acts as a barrier against the sensitive intellectual property being stolen or sensitive data such as social security numbers, credit card numbers, and medical information getting into the wrong hands. The web gateway secures people, processes, or programs from downloading or accessing external sites, software, or data that could harm them, or the organization. Additionally, they stand in the way of untoward, unauthorized access from the outside.

A secure web gateway, then, is a solution that filters unwanted software or malware from user-initiated web and internet traffic while enforcing corporate and regulatory policy compliance. These gateways must, at a minimum, include URL filtering, malicious-code detection and filtering, and application controls for popular web-based applications, such as instant messaging (IM) and Skype. Native or integrated data leak prevention is also increasingly being included in these products. Similarly, analysts note convergence with other security technologies such as endpoint protectionnetwork firewalls, and threat detection.

What does a secure web gateway do?

How does a secure web gateway work? As a web proxy, a secure web gateway terminates and proxies web traffic (ports 80 and 443), inspects that traffic via several security checks, including URL filtering, advanced machine learning (AML), anti-virus (AV) scanning, sandboxing, data loss prevention (DLP), cloud access security brokers (CASBs), web isolation and other integrated technologies. Web gateways apply policies and enforce threat prevention and information security rules based on user, location, content, and a variety of other factors.

This form of gateway security can stop known and unknown threats in their tracks. This includes zero-day and other forms of advanced threats.

Web gateways start with filtering the URL

URL filtering is typically the first layer. It blocks access to known malicious URLs and can form a buffer against zero-day threats. It does this by recognizing new URLs that are similar to or the same as known malicious web servers.

Further layers such as AML and AV can remove attempted downloads of threats, including new and unknown threats. Sandboxing is also included in some secure web gateways. It conducts real-time blocking and can prevent targeted attacks by emulating a company’s environment.

Web isolation is another element that some vendors have incorporated. It runs webserver code and malicious code in a virtual instance that is isolated from the user. DLP, too, can be used to stop unauthorized data leakage.

Secure web gateways vs firewalls

Some people have confused secure web gateways with firewalls. So what is the difference? Secure web gateways are dedicated to cloud services or appliances for web and application security. They are proxies (meaning they terminate and emulate network traffic). Because of specialization, they can detect and protect against much more sophisticated and targeted attacks that use the web.

Firewalls have a different function. Firewalls are great at packet-level security, but are not as sophisticated on the application layer for security, said Gerry Grealish, head of Product Marketing for Cloud & Network Security Products at Symantec. Firewalls typically do not terminate or inspect entire objects, and many are reliant on stream-based AV scanning as a defense against malware. That’s why evasive threats operating on an application-level can easily bypass some firewall defenses. But the clear distinction between secure web gateways and firewalls is beginning to blur.

Some cloud-delivered secure web gateway services now offer an optional cloud firewall service to enforce controls on non-web internet traffic.

Secure web gateways vs Cloud Access Security Brokers

The CASBs is another technology that can sometimes be confused with secure web gateways. Indeed, there is some overlap. However, CASBs are able to recognize a bigger range of applications than secure web gateways. They also provide better-detailed control over the use of applications.

A secure web gateway needs a CASB for full visibility and control, and a CASB needs a secure web gateway for full traffic and log information of web and application activity. By working together, they offer comprehensive gateway security for the web as well as application security.

As in many areas of security technology, convergence is evident. Some vendors have integrated secure web gateways with CASBs. This trend is accelerating. By tying together CASB and secure web gateway functions, it is much easier to provide access security capabilities to SaaS applications.


Rotterdam tech bags designer can start again after the reopening of the Italian studio

A year ago, the Simone Tertoolen from Rotterdam presented the first model in her sack name MINOIS, which was generally welcomed during the structure week in Milan and New York Fashion Week. She went to work with two new models, however, Corona tossed a spanner in progress, and the Italian production line needed to close. Now that the factory can open again, Simone can still start production of its latest model. Her tech bags include features such as built-in lighting, a charger for your phone and a wireless charger for the bag.

The MINOIS line with the Isobel tote has received a new addition, which should also fit your laptop. After the forced interruption by Corona, the Italian factory is now able to start manufacturing this model. Simone is also working on the development of a third model.


Google and Apple release contact tracing app API to public health agencies accross the globe

Google and Apple delivered their contact tracing app API to public health agencies across the globe. The apps would allow Bluetooth pings between smartphones within six and a half feet of each other. And in theory, these apps would notify you if you had been in close contact with someone diagnosed with COVID-19. In practice, public health authorities will have to encourage around 60% of people in a given state or country to download the app in order to meaningfully conduct contact tracing/exposure notification. Computerworld executive editor Ken Mingis and PCWorld/Macworld’s Michael Simon join Juliet to discuss Apple and Google’s unprecedented collaboration, privacy concerns, and how state and federal governments will utilize the API.

You can listen to this podcast episode right now clicking on this link. And you can subscribe to this podcast series from your favorite podcast app on your mobile device to listen to any time, so you won't miss an episode. Just click the desired podcast app's button below to subscribe.


Measures taken by EHT to prevent the COVID19

As we all know by now, we are experiencing a pandemic like never before which is very contagious.

With that in mind, we would like to inform you about the measures we have taken to ensure that our clients are safe in regards to the buying and selling of our hardware.

Measures Taken

Wearing of hand gloves

Before the outbreak, our colleagues always wore gloves whenever the hardware was either been cleaned, refurbished, and packaged. Now, we make sure this is even needed than ever before.

Hand sanitizers

After the gloves are taken off, the employees wash their hands and uses the hand sanitizers to sanitize their hands to avoid germs.

Nose and mouth guards

This is a precaution the employees are currently working with us to ensure that our customers/clients get their hardware.

 

 


Computer Hacking and How To Protect It

Individuals using a device connected to the Internet are vulnerable to the threats posed by cyber predators and computer hackers. Such computer hacking experts typically use phishing scams, instant messages or spam emails and fake websites to deliver dangerous malware to your computer and compromise your computer security.

If you are not secured by a firewall, these hackers may also try to access your device and private information directly. You will be able to monitor your messages, review the back-end of your personal website, and also install malware. Protecting your device from hackers is, therefore, a growing concern that can be solved by installing effective antivirus software and other virus protection measures.

Hackers can do the following things with your computer:

  • Make purchases
  • Hijack your passwords and usernames
  • Obtain cash advances
  • Ruin your credit
  • Request new account Personal Identification Numbers (PINSs) or additional credits
  • Add themselves or an alias that they control as an authorized user so it is easier to use your credit.

Tips on how to stay protected from computer hacking activities

Install, update and use antivirus

Installing antivirus software is an extremely important step that helps to protect viruses and avoid malware, but it doesn't affect everyone.

Turn on the windows firewall

Windows has a built-in firewall that protects your PC from unwanted internet attention. This software firewall is enabled by default and works alongside any hardware firewall that is installed into your home broadband router. Check its settings by entering "Test Firewall" in the Start menu search box and selecting Check Firewall status from the list. Three green tick marks mean that the firewall is usually operating, if not, choosing each one to turn the firewall on.

Check link locations

Unknown messages are connected to unknown pages. You could end up facing unintended consequences if you visit a cryptic website. Such pages may be unsecured or compromised with malware. Copy and paste the connection location to a new browser to see which site is on the other side. Encrypted pages are the easiest to visit because you know they are safe when you see HTTPS in the URL and the lock icon on your browser.

Use Advanced Password

An effective password includes lowercase, uppercase, punctuation, numbers, and special characters. Do not store a list in a saved file and refrain from making a personal reference to the password. Never use the same password on multiple accounts.

Use Two-Factor Authentication

When hackers get your passwords, they try to study which personal accounts they can control with the stolen data. Two-factor authentication is known to be an effective way to stop attackers who have stolen passwords. A growing number of companies are now setting standards for logging in. For two-factor authentication, users will need to enter a password and also validate an entry with another element like a code that is sent to the phone.

Be Suspicious of Emails

If you receive phone emails, make sure to check your email address to see if it suits the website you think it is from. You can also search the sender's IP address in order to be extra careful. This can be done by identifying the source information from the email and then searching for an IP address that matches the' Received: from' line. Google will have an IP address to discover the source of the email.

Use The Most Recent Version of Your Web Browser

Web browsers are vital tools, but they can contain bugs just like other apps. Hackers are fast to capitalize on these and create false websites with data designed to exploit them. After hacking the web browser in this way, the hacker will be able to monitor anything you type, from credit card numbers to passwords. It is therefore important for you to use the most recent version of your web browser, as this helps prevent hacking attempts by your computer and other related issues.

 


The Edge

Edge computing has saved an entire industry today, countering the major concern of reduced efficiency affecting management operations.Edge computing today is closing towards accelerated response rate computing time and thus positively processing the data analysis.

Edge computing not only brings data storage and computation closer to the target, it saves bandwidth as well. Being able to save bandwidth indirectly translates into saving money, less data traffic = lower bills. Edge computing is the new trend in the techno world, competing all the sophisticated, high powered computers which are bound to reduce the latency.

The current status of Edge computing is being powered by the fast growing development of internet of things the (IoT). It is very likely that in the future, it will form an undefined niche in many distributed cloud services.

There are so many example of in our every day life wherein gadget are being controlled using IoT. To begin with, there are drones making deliveries for Amazon. It (the gadgets) directly communicates with the enterprise IoT platform and conduct peer-to-peer exchanges. There is every increasing rise in the use of storage, sensor, computer, and advanced AI capabilities. Not just Amazon, but these following companies have also invested in IoT;

  • Samsung
  • Apple
  • Google
  • Microsoft
  • Philips