Jump to content
Facebook Twitter Youtube

OyaYansa

Girls
  • Posts

    1,455
  • Joined

  • Last visited

  • Days Won

    2
  • Country

    Venezuela, Bolivarian Republic Of

Everything posted by OyaYansa

  1. Throughout the world it is well known that the official autonomy of any electronic device rarely corresponds to reality. The manufacturers carry out tests in laboratories to reach figures of autonomy that in a real environment are very difficult to reach, and a recent study has just revealed the difference that exists between the official autonomy and the real autonomy of the laptops. Because, how can we know that our laptop will last on what the manufacturer says? To try to shed some light on the matter, an English medium called Which? Has decided to rescue the results of autonomy of no less than 67 of all the laptops that passed the test table of its publishers during the last year. The study has been very simple: what they have done has been to compare the official autonomy figures that any manufacturer presumes on their website with the results of autonomy that have obtained those same equipment in a real test. The study reveals an uncomfortable truth: the official autonomy that manufacturers advertise on their computers differs from real autonomy not only in minutes, but even in some cases the difference can be measured in hours. The conclusion reached in the study is that manufacturers exaggerate the autonomy of their computers, and this charge is not a trademark. Manufacturers like HP, Lenovo or Toshiba (among others) receive an important pull of ears by this English medium. "The most optimistic manufacturers [of laptops]," the article points out, "overestimate the autonomy of their batteries by 50% or even more." The study mentions different examples: we have for example the laptops of Dell, that of the nine hours and 15 minutes of autonomy that are mentioned in its official datasheet turns out that in the tests of Which? Have been offering just over five hours of battery life. To reach these conclusions, the media has tested specific models of laptops such as the HP Pavilion 14-al115na, the Dell Inspiron 15 5000 or the Acer E15. In total they say that they have been based on the results of the tests of 67 different laptops, with a figure of between six and 20 equipment of each manufacturer. To throw the charge over Dell laptops, for example, the medium has been passed in ten tests of ten different laptops of this brand. The curious thing is that the only manufacturer that according to this study does offer the autonomy that promises in their laptops is Apple. They say that the company announces an average autonomy of ten hours in their Macbooks, and the real autonomy that obtains these equipment in a test with a daily use exceeds even those ten hours. To reach this conclusion, this English medium has tested three computers different from those of Cupertino. Manufacturers always warn that real autonomy depends on the use The manufacturers mentioned in the study have not been slow in responding to the allegations. Dell, for example, says that it is very difficult to provide official autonomy figures that are then met identically among all users. "It's something similar to the fact that different people who drive the same car can get greater or lower autonomy depending on their type of driving," they point out from the company. But not even the manufacturers say at any time that the official autonomy of their equipment is going to meet 100 percent in real use. Manufacturers like HP, for example, point out in the small print of each and every one of their devices that "[the actual autonomy depends on] numerous factors like product model, configuration, loaded applications, functions, usage, Wireless functionality and power management parameters. " In short, no company can promise that official autonomy will be fulfilled in reality. In fact, when talking about official autonomy even HP itself links to the website of a company called BAPCo. BAPCo is a company that specializes in the measurement of different parameters of devices such as laptops, and is the company that companies like Dell, HP, Lenovo or Toshiba work with to certify the behavior of their devices. In this link anyone can see the results of these tests.
  2. The statistics for the month of February already pointed out, and finally during the month of March there has been sorpasso: Android has surpassed Windows as the most po[CENSORED]r operating system in the world, at least in terms of Internet usage. This is announced today in a statement StatCounter, the company dedicated to the measurement of statistics and web analytics globally. In last month's StatCounter report we could already see that Google's mobile operating system challenged the all-powerful Windows and was only 1.2% of the Internet usage fee. The trend of recent months has been with a slight decline in users of Microsoft's operating system and a progressive increase of Android, which has allowed us to reach a point that the global statistics portal defines as "a milestone In the history of technology and the end of an era. " According to the results of the report for the month of March 2017, in terms of total Internet use through desktop computers, laptops, tablets and smartphones, Android imposes a fee of 37.93%, while Windows Is in second place with 37.91%. The gap between them is minimal, but StatCounter CEO Aodhan Cullen says it "marks the end of Microsoft's leadership in the worldwide operating systems market that has been in place since the 1980s. It also represents A breakthrough for Android, which had a share of only 2.4% five years ago. " This milestone has been possible thanks to the increase in the use of the Internet in the mobile, which already surpassed that of the computer at the end of 2016, the decline in sales of traditional PCs and the impact of Asia on the world market, where the operating system For Google mobile has a great weight due to access from the smartphone. However, Windows still boasts world leadership in desktop operating systems, with an internet usage quota of 84, 34%, with a large advantage over OS X, which is in second place with a share of 11 , 68%.
  3. G.O.G Life Aparecisteeeeeeeeeeeeeee? donde esta anderson :(:)

  4. Super Orgullosa de ti mi vida sigue, asi te quiero un mundo ya eres owner felicidades :3 :white-heart-facebook-emoticon:

    1. Show previous comments  1 more
    2. OyaYansa

      OyaYansa

      Yo igual mi vida te quiero un mundo y si se que e estado ausente un poco mi life pero no es mi intencion vida, si no que las cosas en estos momento estan un poco duras mi vida, y pues tambien que no e tenido con quien jugar :( y sola no me gusta jugar !!!

    3. - !el Catire *O*

      - !el Catire *O*

      Pero Mi Oya Si quieres vente Con Migo Estoy solo en el serve estoy con mi hermano frost

    4. OyaYansa

      OyaYansa

      enviame al privado vida

      :HB:

  5. At last Thursday's shareholders' meeting in Chiba, Japan, Toshiba's majority shareholders decided to separate their NAND-type Flash memory business from the company's core conglomerate. What it means to put shares for sale. From here, the madness ... Private investment firm Silver Lake Partners Learning and Finance, along with chip maker Broadcom, has put $ 17.9 billion into the table to get the entire Toshiba flash memory chip manufacturing unit. Under normal conditions such a large amount of money would have been sufficient to close the deal ... Until Apple, Amazon and Google, each on their own, have come into full swing in the bid. It has not been revealed how much they have put on the table. They are not the only candidates. Up to ten large companies have been interested in the shares of the Toshiba chip unit. From direct rivals like Micron and Western Digital, to investment firms that have glimpsed the possibility of making money. Why is Toshiba's NAND flash drive so appealing? This type of memory is used to store information on portable devices or on SSD hard drives, among many other applications. And Toshiba is one of the most prestigious manufacturers. If Apple, Amazon, or Google had their own NAND flash memory maker, they could save hundreds of millions on making their smartphones, tablets, and Internet devices for Things, as well as doing business selling NAND memory for computers, or Other brands, as Toshiba has done so far. This type of component is one of the most requested, as the requirements of memory and access speed required by modern hardware increase. Despite being the richest companies in the world, Apple, Google and Amazon will not have it easy to buy Toshiba's NAND flash drive, as there are many other candidates with lots of money bidding for it. Who will win the auction?
  6. We spend weeks decorating and adjusting our curricula but the reality is that, at least in the realm of large companies, these curricula are read by bots (computer programs) which are the ones that make a first selection. If you've been looking for a job for a long time, your resume may have been rejected more than once by a bot. Sad but true... Robert Coomps is director of an American NGO where he no longer feels necessary, so he set out to look for new challenges. In the United States, all big companies use bots to filter candidates' curricula, so he decided to use his own weapon: to create a bot to automatically search for jobs. Coomps is neither an engineer nor a programmer, but in his position as director of an NGO he acquired knowledge of data analysis. So I created a bot (a program) that automatically analyzed job boards, identified the required positions and the names of the contact persons (the recruiters), and sent letters and automated emails. It created two variants: an email written and sent by him, and another similar email that the bot was in charge of filling and sending automatically: He did not always send the same type of email, but had several variants and in some included his resume as an adjunct, in others his link to LinkedIn, etc. The first version of his bot was too aggressive. In what had gone down to the cafeteria to have a coffee, discovered that the bot had sent its curriculum to 1300 companies. He decided to refine it with the advice of contractors with whom he contacted. Thus, for example, he discovered that many bots give priority to the candidate having references from other companies, or to certain types of schools where he had studied. With version 5.0 of his bot he sent 538 resumes to as many companies, both written and sent by himself, as by means of the bot. His program received more responses and more visits to LinkedIn than emails sent by him, as you can see in this graph (in purple, bot data): For example, their emails generated 1% of visits to LinkedIn, and those of the bot, 5%. In fact, 43 companies responded to the bot seeking employment by asking them to schedule a job interview. Robert Coomps spoke with 20 of them and confessed that they had actually contacted a bot. They were all surprised and congratulated him for his program. After chatting with a lot of recruiters and checking the results of their experiment, he concluded that most jobs are achieved only if you have references, or acquaintances that put you in touch with the right people. In fact between 80 and 90% of the jobs are not covered by using LinkedIn, as one of the recruiters explained, but because someone has an acquaintance, or a manager knows an interesting person, and creates a position I work for her. Sending your resume or a job search bot is no better or worse when it comes to finding a job ...
  7. Many computer lovers have proposed at some point to build a computer from scratch. Whatever has been the result is already another issue, but if it has not been expected now you can try again thanks to PC Building Simulator, a video game to build your own PC in a virtual environment and without having to invest a single euro in the process . In the PC Simulator simulator, players can gather all the components (from the cables to the processor) that make up a computer. Throughout the process it is possible to see all parts of the PC in 3D, as well as screw the motherboard or manually connect the Molex cables. There are pieces that are not available, but pretend to be a realistic option, which will soon offer multiple game modes and real hardware elements, as we can find on major PCs designed to be entertainment elements. Judging by the menu, it seems that it has a planned mode of construction, that is, where we have customers who order us to assemble their computers. In this we have to make a living as PC manufacturers, accepting purchase orders and developing the products they ask us. Claudiu, the developer of this game to set up his own computer, says his goal in creating it was "to teach people how to build pieces while still having fun." PC Building Simulator is still in its early stages, but you can now download it for free for Windows and Linux. Definitely, the game to build your own computer will like you if you take time posing the possibility of mounting your computer by pieces ... and sure you will also be interested if you are accustomed to titles such as My Summer Car or EuroTruck Simulator.
  8. A team of researchers at security firm Check Point has revealed a vulnerability that allowed hacking of WhatsApp and Telegram accounts in a simple way: by sending a malicious image. According to the report, with this strategy attackers could take complete control of victim profiles, with access to contacts, conversations, and shared photos and videos. From Check Point they explain that the bug could be exploited through the browser version of WhatsApp and Telegram. The web application of both platforms is synchronized with the user's device and contains a mirror of all the messages sent and received by the users, so that the security gap allowed the attacker to have free access to all the contents of the account. According to the researchers, to take advantage of this security bug all you had to do was send a seemingly normal image with malicious code injected. In the case of WhatsApp, when the victim clicked on the photo to open it, the code that was executed allowed the attacker to enter the local storage, where the user's data is located. In Telegram it was necessary to click again to open a new browser tab and give access to local storage. From this moment, the cybercriminals could view and download all the contents, as well as control the account at will. In this way, he could repeat the attack with the contacts of the victim by mass sending the malicious image. In addition, because the messages are encrypted end-to-end, companies are not aware of the files being sent, which prevents them from detecting malware. Check Point informed WhatsApp and Telegram of the vulnerability on March 7. It ensures that both instant messaging platforms tested and recognized the security issue, developing a solution for web clients that fixed the bug. Telegram denies having been affected by the vulnerability Following the release of the news in the media around the world, Telegram has issued a statement to deny that this vulnerability has existed. According to the company, Check Point reported that Telegram had the same problem as WhatsApp to maximize its impact on the press, and assures that in the case of its platform the security of the account has not been compromised at any time by the described technique .
  9. In the scams, calls are no longer taken, messages have been passed: in recent months thousands of Spaniards have received a message warning of (false) problems in the device and urged to call a phone number to solve them. Once that contact was established, the customer had to pay between 100 and 200 euros for a service that he did not really need. The so-called thymus of false technical support shows the alert messages in the user's system, either from the browser or displaying the false alert in full screen without blocking it. This scam uses two techniques to try to give a reliable look and people fall into their trap: on the one hand, the voice that answers when you call the supposed number of help speaks perfect Spanish. They have learned from their mistakes since a year ago the same scam was detected with English criminals who were biting Spanish and did not have an effect. On the other hand, the way of acting in the thymus of false technical support has changed; No longer call them, but wait for the customer to contact the switchboard in which they work. This is a new variant that "makes it the victim who calls the scammer and not the other way around, generating messages that deceive him into thinking that his system is seriously threatened," explains David Harley, a researcher with computer security company ESET . According to a study carried out in February, the thymus of false technical support was practically non-existent in our country until July 2016. However, since that date, the number of detections has only increased and is already almost 50% Of threats that are confirmed each month. As can be seen on the map, Spain is the country that has most affected this scam. Of what contents we should distrust From received emails that contain a link in the body of the message. These redirect us to a web page prepared for us to call false support services. From malvertising, fake ads embedded in webs that are not suspicious. To avoid scams like this one of the false technical service the only thing to do is to install an antivirus and every time that we need help, contact the official support numbers that the companies provide us.
  10. The technology based on the solar energy is far from being habitual in the market but more and more innovations appear; The last will not cease to amaze you. That awkward moment when you're walking down the street looking at your Whatsapp messages and seeing that the battery is low has an easy solution; You only need a garment, more specifically this cap that charges the battery of the mobile. We talk about the Sol Sol project of an American start up that wants to take the advantages of solar energy to everyday life. For it incorporates a series of solar panels in the visor of its cap with which would generate the sufficient energy to maintain loaded a device. The mobile phone connects to the cap through a USB cable, which may be a little strange aesthetically, but will be very helpful when the battery is running out and we do not have any charger at hand. As soon as it is exposed to the sun it begins to store energy, being able to charge a smartphone completely in approximately four hours of direct sunlight: it can complete the battery of a device at a rate of 200 mAh per hour. The cap that charges the mobile phone battery can be purchased from the company website and comes in different colors. In addition, if you like to wear a more formal style can also be purchased in the form of a hat, with the same functions, although this does not work with IOS 10; Will only charge devices with earlier versions of Apple's mobile operating system. Both products also charge tablets, speakers, Go Pro cameras and headphones. They are one size fits all and are priced at $ 56. The manufacturer of the cap that charges the battery of the mobile phone is working to introduce advances, especially in the time it takes to complete the battery, so it is anticipated that a new improved model will soon be released.
  11. I liked most as it was before our ts3

  12. A computer, also called PC, is a device that allows us to process information, it is clear that this classic definition is somewhat old, since the variety of tasks we can perform with this device is very wide. Through it we can draw, write, play and communicate with other people around the worldin importing the distance, too, and honoring the original definition, we can process information in its pure state through the programs or software indicated. There are hundreds of thousands of applications that we can give to a computer, and each user can use the tools necessary for the PC to assist in every task that begins. What is a computer Basically a computer consists of two parts: the hardware and the software. Hardware is a generic term used to designate all the physical elements that make it up, ie cabinet, monitor, motherboard, RAM and so on. Meanwhile, software is everything that gives the computer the instructions needed to perform a certain function. These include the operating system, games, device drivers, etc. What is hardware Just as the computer is subdivided into two parts, the hardware that compose it also, so we can find the so-called basic hardware and complementary hardware. The basic hardware groups all the essential components for the operation of the PC like motherboard, monitor, keyboard and mouse, being the motherboard, RAM and CPU the most important components of the set. On the other hand we have the complementary hardware, which is all that non essential component for the operation of a PC like printers, cameras, pendrives and others. Also we can find an additional differentiation between the components of the PC, and is given by the function that they fulfill within the same. In the following paragraphs we will know how they are divided. Input Devices: Devices that allow the input of information to the PC. Chipset: Integrated in the motherboard, the chipset allows the traffic of information between the microprocessor and the rest of the components that conform the PC. CPU: This device has the task of interpreting and executing the instructions received from the operating system, in addition to managing the requests made by the users through the programs. RAM Memory: RAM or Random Access Memory is where the computer stores the programs, data and results processed by the CPU, which allows its rapid recovery by the system, thus providing a better performance. Storage units: These are all those devices destined to the storage of the data of the system or of user, that is to say, the physical place where the operating system, the programs and the documents of the user are located. These can be hard disks, CD, DVD or Blu Ray drives, removable external drives or disks. Output Devices: These are the devices responsible for showing the user results. This group includes monitors, printers and everything that serves the purpose of offering the user the possibility to see the result of their work. Mixed devices: These are components that deliver and receive information, and in this group we can mention network cards, modems and communications ports, among others. What is software? The software of a computer is anyone who allows the user to order the computer to perform a task. They should also be subdivided into various categories based on the functions they perform in the system. Software Concepts Software is a sequence of instructions that are interpreted and / or executed for the management, redirection or modification of a data / information or event. Software is also a product, which is developed by software engineering, and includes not only the program for the computer, but also manuals and technical documentation. A computer software is composed of a sequence of instructions, which is interpreted and executed by a processor or by a virtual machine. In a functional software, that sequence follows specific standards that result in a certain behavior. In our computer, all the programs that we use are software: Windows, Outlook, Firefox, Internet Explorer, antivirus and even viruses are software. A software can be executed by any device capable of interpreting and executing the instructions for which it is created. When software is represented as instructions that can be executed directly by a processor we say that it is written in machine language. The execution of a software can also be done through an interpreter program, responsible for understanding and executing each of its instructions. A special and notable category of interpreters are virtual machines, such as the Java Virtual Machine (JVM). The best known device that has a processor is the computer. There are other programmable machines, such as cell phones, industrial automation machines, etc. Software Classification System Software: This group includes the operating system, device drivers, system utilities and all that tool that serves for the specific control of the characteristics of the computer. Application Software: It is called application software to all those programs used by the users for the accomplishment of a task, and in this group we can find office-type software, graphic design, accounting and electronics, just to mention one Small fraction of all the categories of applications that we can find in the market.
  13. Imagine that you need to get to work on your Windows computer, but when you turn it on you find that Windows 10 has not found a better time than that to start automatically installing an update. Microsoft has confirmed that with the arrival of Creators Update, many things will change about it. To start, from April Windows 10 will allow you to decide when you want to install a system update that has already been downloaded to your computer. The Microsoft operating system will start giving you the option to choose between three different options after an update has been downloaded: Restart now, choose a time to reboot (Pick a time) or block the reboot ( Snooze). In this way, Microsoft will put an end to what until now was a mandatory option without any possibility of choice: restart the computer after a Windows 10 update. The problem was not so much that it was necessary to restart the PC, logical thing To a certain extent, but in many cases it was the system that decided for itself at what point this restart had to occur. That, with Windows 10 Creators Update, will be over. The Creators Update, for those who do not know, is the next major update of Windows 10 that is scheduled to begin deploying from the month of April. It will bring many new features, including from a Game Mode to a function of automatic cleaning of temporary files, also going through interesting changes to the autonomy of laptops. But, above all, this update will be the solution to the annoying problem of updates in Windows 10. Microsoft itself acknowledges that it is time for something to change with updates to its operating system: "[users] want to have more control over when Windows 10 updates are installed," said John Cable, A high position within the Windows platform. "We have also heard that forced restarts are very annoying if they take place at an inopportune time," he said. In Windows 10 Creators Update, users will have different options available to manage the installation times of the updates. They can decide when they want the computer to restart so that the new version is installed, and they will even have the possibility to change the restart schedule several times if it coincides at a time when they can not abandon the use of the computer. Windows 10 updates will weigh less in the future On the other hand, another surprise of this operating system for the coming months is that Windows 10 updates will weigh less and less. Microsoft has reminded us that we can expect a downsizing of up to 35% on new versions of Windows, all thanks to the Unified Update Platform (UUP) system that the company introduced at the end of last year.
  14. The war of the processors has arrived and the users will be the main beneficiaries. A few days ago, AMD officially announced its new generation of its Ryzen high-performance PC chips, and given the threat of its powerful specifications and competitive costs, Intel has responded by lowering prices for its Kaby Lake, Skylake and Haswell processors before That the alternatives of AMD Ryzen arrive at the market next the 2 of March. As reported by the specialized WCCFtech, Intel has given a significant scrap price for its PC chips in some retailers in the United States, with cuts that reach up to 300 dollars, a rebound that is expected to become global soon. Here's the list of price cuts for Intel processors: Intel Core i7-6950X ($ 1,599): lowers the price 300 dollars. Intel Core i7-6900K ($ 999): lowers the price 200 dollars. Intel Core i7-6850K ($ 549): lowers the price 150 dollars. Intel Core i7-6800K ($ 359): lower the price $ 140. Intel Core i7-5820K ($ 319): low price $ 100. Intel Core i7-7700K ($ 299): lower the price 80 dollars. Intel Core i7-6700K ($ 259): lower the price $ 140. Intel Core i7-4790K ($ 279: lower the price 90 dollars. Intel Core i7-7700 ($ 289): low price $ 50. Intel Core i7-6700 ($ 259): lower the price 90 dollars Intel Core i5-7600K ($ 199): lowers the price 70 dollars. Intel Core i5-6600K ($ 179): lowers the price 90 dollars. Intel Core i5-4690K ($ 189): lowers the price 70 dollars. Intel Core i5-7500 ($ 189): lowers the price 30 dollars. Intel Core i5-6500 ($ 179): lower the price $ 50. Intel Core i5-4590 ($ 159): lower the price 60 dollars. Intel Core i3-7350K ($ 159): lowers the price 20 dollars. Intel Core i3-7100 ($ 114): lowers price $ 15. Intel Core i3-6100 ($ 109): lowers the price 20 dollars. Intel G4400 ($ 49.99): lowers the price 20 dollars. Intel G3258 ($ 49.99): lowers the price 27 dollars. At the moment there is no confirmation about the date in which these price reductions will arrive in Spain on Intel processors, but surely they will not take long and probably in the coming weeks we will see similar cuts in stores in our country.
  15. New version of Xagent malware capable of infecting Mac computers. This sophisticated computer virus, which had previously been identified in Windows, Linux, iOS and Android systems, is now also targeted against macOS computers. Behind Xagent is APT28, a Russian cyberspeed group that has been in place since 2007. These hackers are often blamed for attacks and incursions into computer systems from other countries, the last of which was interference in the presidential election Of the United States of 2016. According to the researchers of Bitdefender, Xagent is a backdoor that, once installed in the computer, waits for the appropriate time not to be detected, and when it has free path connects to the Internet to initiate communication with C & C servers And download the payload modules. When the malware is fully operational, it is capable of taking screenshots, detecting system hardware and software configurations, or running additional files, stealing passwords stored in the browser, and getting iPhone backups stored in The computer of the victim. At the moment, Bitdefender experts are not quite sure how this malware is being distributed, but believe it would be spreading through Komplex, a malware downloader that exploits a macOS vulnerability similar to the one used by MacKeeper. The investigation is still ongoing, so an in-depth analysis has not yet been released. If you want to prevent the security of your Mac is compromised by this type of malware, we recommend that you avoid downloading programs from any source other than the App Store or a trusted developer.
  16. If you need energy at all times, take note because this invention interests you: it is called Motherbox Mini and it is a portable wireless powerbank to charge the battery of your smartphone wherever you are and without the need for cables. Today we live hooked on the mobile, and whoever says otherwise, lies. We all carry them, even those who claim they would be happier without a smartphone. That is why having energy has become a priority in the modern world, since we need it to charge the battery of our phone and keep it alive throughout the day. This growing need has po[CENSORED]rized the use of powerbanks, but they have the drawback that it is necessary to keep the mobile plugged in, with the discomfort this can generate. Motherbox Mini solves all these problems: it gives you the electricity you need to charge your mobile phone battery anywhere and, thanks to its wireless technology, you can forget the uncomfortable cables. This external battery with wireless charging system is shaped like a soccer ball and is available in two sizes: one mini so you carry it with you that has dimensions of 3.5 x 3.5 x 3.5 inches, and Another larger 6 x 6 x 6 inches for you to have at home. The mini model has a portable battery that has a capacity of 7,000 mAh, while the desktop version needs to be connected to the power to supply power. Motherbox's wireless charging system is compatible with iOS and Android devices, and to work, all you have to do is connect the receiver to the terminal. In addition, it has the ability to load multiple devices at the same time. The developers of Motherbox have launched a crowdfunding campaign to make their invention come true and have already more than doubled the $ 25,000 that had been set as an economic goal. If you want to get your portable wireless charger, you still have 23 days to buy it on the Indiegogo page for $ 89. The desktop version costs $ 79, but be aware that this model can not be taken with you.
  17. Zuckerberg recently posted in his Facebook profile a full photo report revealing the inside of one of its most unique data centers, being located in the sweltering Swedish region of Luleå, just 100 km Arctic Circle. And is that Facebook has always been committed to a policy of transparency (or at least to appear, since, like any large corporation, has much information that does not reveal). It is rare the week that the social network does not lead some news of today, either by a change of its algorithm or a new service for advertisers. Boasting this corporate and communicative strategy, Facebook has no share in showing what is behind the scenes, spaces that only those who work in the company can see or access. As for example the data center, spaces with great measures of security and inside of which the companies keep the most valuable thing that they have: the data. Something that in the case of Facebook is increased, because thanks to them their gigantic advertising machinery can continue to work and generating multi-million dollar revenues. A recent TechCrunch report revealed the inside of a Facebook data center, specifically Prineville (Oregon), the first to build the Zuckerberg company to store information. Usually these buildings have the appearance of an industrial warehouse and go unnoticed by the pedestrians. Unless you are Facebook, you then conveniently sign it. Data centers-fecabook Although the choice of a desert does not seem the most appropriate for a data center, Facebook located it here to take advantage of solar energy and with it provide cooling systems. Prineville has a po[CENSORED]tion of about 8,000 inhabitants, so it is not surprising that the social network is the main employer; In addition it is responsible for providing other services that have nothing to do with technology, such as water or light. Something that the inhabitants of the region do not hesitate to thank with banners like this one. As we said before, despite the transparency of the company, there are many other things that Facebook does not show the public. It is the case of data destruction rooms, present in this and other dating center, and where it destroys the data that it will no longer employ or to which it will give another use. In every corridor of the Facebook data center in Prineville there are a dozen servers that store user data. All of them are open source and predominantly blue because they use LED lighting, which consumes less. The cooling system of this Facebook data center is different from that used by other companies because it is not based on air conditioning, so it is quieter. To cool the servers, the building has hot and cold walkways; In the first is the front of the servers, where the cold air enters, and the back gives the hot aisle, where the air is expelled when heated. The fans are then ejected outwards. In addition to the traditional servers, Facebook's data center also hosts servers that work with machine learning, which are the ones that later identify faces in the photos so that you label them or guess your tastes and suggest certain publications. They are called Big Sur servers, with eight high-power graphics processors known as GPUs (manufactured by Nvidia, leading provider). The high energy consumption of GPUs requires the design of an infrastructure designed for the cooling of the building. In addition to the hot and cold corridors, this Facebook data center has air and water rooms. The picture below shows the outside air entrance room. It filters on the right, hits the filters on the left and so the dust does not enter; Then circulates through a cooling and evaporation system. When outside it is too cold, the building is programmed to mix it with the hot air that gives off the rooms of the servants. In the building that is seen in this photograph, Facebook stores data and information of its users that have fallen into disuse; For example, photographs or videos that have long been receiving no interactions of any kind. There the "cold storage" is carried out, since the servers that it contains are dormant, storing that information, until somebody returns to resort to it. Outside the main building we also find powerful and generous power generators, to supply the data center in case of power failure and so that the servers continue to operate with total normality. If we return to the building intended for "cold storage" we see that there is also a space for laboratory tests. Basically it is about several dozen autonomous racks with mobile devices, where they are testing the latest versions and updates that are then implemented in the Facebook app.
  18. At a time when digital photography is advancing by leaps and bounds, the ability to record and transfer image data at high speeds is imperative. However good it may be - for example - the 4K camera we use to immortalize a scene, it is essential to use an external memory card that is capable of processing the data at the speed required by the most modern image formats. The SD Association, the organization that regulates the standards of external storage cards, has announced the UHS-III, the format that will help to transfer large amounts of data to a SD card generated by 3D cameras, drones and 4k video cameras to A speed of 624 MB per second. The UHS-II (the standard under which nowadays most of the external memory cards work), in turn, does not exceed 200-300 MB / s of transfer speed. UHS-III is a specification dictating the speed of data transfer between the SD card and a device. Precisely this week has been Sony which has presented a microSD card that beat all speed records under the previous standard, the UHS-II, with a writing speeds of up to 300 MB / s. The UHS-III standard now occupies the position of the fastest speeds in the market for external storage cards, since to be exact it will double the data transfer rates in relation to the previous UHS-II format that allowed to reach the 312 MB / s. The UHS-III will be compatible with both SDXC and SDHC as well as the older SD specifications, ie it will work with all the SD currently on the market, although the performance would be higher with the first two configurations. The storage capacities of the latest cards are larger and allow you to save more photos, as well as use unique video features in the latest camera models. In this sense, UHS-III will help to organize these contents more quickly and smoothly. The UHS-I announced in 2010 began opening the world of ultra-high speed with 104 Mb / s, which tripled with the UHS-II of 312 Mb / s and will reach its peak with the UHS-III of 624 Mb / s . Both the first and the second make the storage more manageable and portable. The size and shape of the cards would not be modified with the UHS-III since only one aspect of the PHY would be changed. The UHS-III, therefore, is positioned as one of the best specifications of SD and undoubtedly the fastest and most powerful of the moment.
  19. The European Union is becoming quite a headache for the most important technology companies. Now it's Microsoft's turn to face her. The reason: the privacy problems detected by the EU in Windows 10. For several months now, one of the commissioners of the European Commission has warned of the lack of respect on the part of Windows 10 towards the privacy of its users. In theory, Microsoft should have solved these shortcomings with the latest updates, but it has not. W10 continues to collect huge amounts of private data on its users. The technology firm promises to do more about it, while the European Union remains skeptical about what Microsoft can do about it. The mistrust goes so far as to sign the following statements: "Even considering the proposed changes, we remain concerned about the level of protection of personal data." To this devastating sentence they add "Microsoft should clearly explain what kind of data is processed and for what purpose. Without such information, consent is not on the table, and therefore is not valid. " At the moment, the so-called Article 29 Working Party has only issued one report. It is the body responsible for monitoring the respect of the rights of European citizens to the privacy of communications. It is not known if the manufacturer of the world's most po[CENSORED]r operating system will follow in the footsteps of Facebook, who had to stop sharing data between their social network and WhatsApp. Apple was also shaken less than a year ago by the community executive. In his case it was for fiscal issues, and is that the EU accuses the company of evading taxes illegally throughout the Union. The accusation is quite clear: Windows 10 is not allowed to skip user privacy because it does not explain what it will do with them and does not guarantee the security of the same. The Working Group, which reports to the Commission, has no authority to take action, but it can create the necessary climate for them to be adopted. Users have few alternatives. Linux is one of them, particularly distributions that promise to respect privacy. However, the main problem is that the vast majority of users are unaware of their rights and the way in which they are violated.
  20. Sony is a technology company that is in all. It has high-end mobiles, has a reputation for reputation in the photography market and is present in the homes of half a planet with its televisions. But the Japanese company also manufactures external memory cards, and the one just introduced this time has beaten all the records in the world. Sony has introduced the new range of SF-G Series SD cards, and with it has been released in the market that automatically becomes the fastest SD external memory card in the world. It is a card that reaches 299 MB / s writing speed (with 300 MB / s read speed), which leaves in diapers the 170 MB / s of writing that reaches the microSD card UFS Samsung or even the 260 / 300 MB / s of the SanDisk Extreme PRO SDXC UHS-II. It does so through the UHS-II standard. This new family of ultra-fast SD cards from Sony will be available in three different storage capacities ranging from 32 to 128 GB, and by its characteristics is clearly intended for professional photographers who need cards with high speeds of writing / Read to quickly transfer files from the camera. Why can a photographer need a writing speed of 299 MB / s? It is a speed that guarantees the maximum performance in the camera when taking a burst of hundreds of photographs in a row (during a soccer match, for example), as well as being an essential feature to record 4K videos with a high Frame rate per second. This speed of the card, of course, must necessarily be accompanied by a camera to match the circumstances. This new series of SF-G cards from Sony will hit the market in the form of three different models: SF-G32, with 32 GB capacity, SF-G64 with 64 GB capacity, and SF-G128 with 128 GB capacity . The company has just announced that this new SD card will go on sale in the coming months. Although Sony has not confirmed the price of this new range of external memory cards, we can get a good idea of its starting price by taking a look at what it costs right now the Lexar Professional 2000x, which until now was One of the fastest SD on the market: 32 GB for 62 euros, 64 GB for 105 euros and 128 GB for 257 euros.
  21. Jide Technology, the creative company of Remix OS, has announced a new mobile version of its Android-based software called Remix Singularity. This new version stands out because it allows to turn an Android mobile into a PC, an idea very similar to the concept of Windows 10 and Continuum. As Jide explains, today smartphones are equipped with hardware that allows them to offer much more than the functions of a phone. Remix Singularity exploits the full potential of the device, so that when connected to a screen becomes a fully functional computer. Remix Singularity has two operating modes: PC mode and TV mode. The first one turns the mobile into a computer with all the possibilities offered by Remix OS. In case you do not know it, it is an operating system that was born with the aim of tapping the full potential of Android, exploiting the functions it already has and optimizing it with options that it lacks. The result is an Android version running in the desktop environment, with an interface adapted for the use of the keyboard and mouse, multiventry and multitasking options, menu and optimized taskbar, as well as the usual applications of the mobile operating system of Google. On the other hand, the TV mode allows the users to access the applications and games of the mobile adapted for their visualization in the big screen of the television, guaranteeing a much more satisfactory experience. The release of Remix Singularity is scheduled for the second half of 2017, although there is still no confirmed date. You can download it for free, just like Remix OS. If you want to consult more information or to subscribe to the updates, you can do it in the official page. Although previous similar experiences of other companies have not yet taken off, such as the case of Microsoft Continuum, Jide believes that its functionality to convert a mobile into a computer will be welcomed mainly by two advantages: it is free and is based In the Android ecosystem. We will see how users respond when available.
  22. Amyotrophic Lateral Sclerosis (ALS), known in the United States as Lou Gehrig's disease, a former New York Yankees baseball player who in 1939 had to withdraw because of this disease and in France as the Charcot's disease, is a degenerative disease of the neuromuscular type that causes progressive muscular paralysis. In advanced cases the patients of ALS the only form of communication they have is through sight, that is why Microsoft Research developed an application called GazeSpeak that aims to enable people suffering from ALS to communicate with others through the Movement of your eyes. The application is executed on the smartphone of the person with whom the patient tries to communicate. Aiming the camera of the smartphone as if they were capturing a photograph. The smartphone in turn has a sticker on the back that shows a grid with letters grouped in four boxes, one to the left, others to the right and the remaining up and down respectively. As the patient looks at the pictures with the letters, GazeSpeak uses computer vision to capture the movement of the eyes and thus identify the letters to which it points. One of the developers of GazeSpeak, Xiaoyi Zhang, explains how the application works as follows: For example, to say the word "task" the patient first looks down to select the group containing the letter "t", then look up to select the group containing the letter "a" and so on with the rest. Of course, at this point you will wonder how the application knows that the letter in the box below is the "t" and the letter in the upper box is the letter "a", other developers, Meredith Morris, explains that the application Uses artificial intelligence to predict words. In tests carried out to determine the effectiveness of GazeSpeak, it showed an average of 78 seconds to complete a sentence that by current methods takes 123 seconds. In one of the tests a person arrived managed to "write" a sentence in 62 seconds and said that this could probably improve when used in the real world. In May, Microsoft will present the application at the Conference on Human Factors and Computer Systems in Colorado, United States, but according to the Redmond company will be available earlier in the Apple application store and those who want to collaborate to improve it or Adapt it will be able to do it since it is open source and the code will be available in totally free form.
  23. If other years was about improving the virtual reality, most projects of Creative Lab Samsung this year are responsible for offering useful and practical uses for day to day. If innovation in trends is involved, the projects of Creative Lab (C-Lab) Samsung are always protagonists in each event. If last year they were Entrim 4D to simulate sensation movement in virtual reality, or IoFIT, smart shoes with which to monitor sports and improve on them, this year it is Relumĭno, Monitorless, VuildUs and traVRer. Relúmĭno is an application that allows visually impaired users to read books and watch videos clearly through a terminal inserted in a Samsung Gear VR. According to Samsung in the news, the technology allows to eliminate blind spots by scrolling images. The most relevant of Relúmĭno is that, although limited to Gear VR, it allows people with these problems to access a product much cheaper than other similar ones in the market. Monitorless, meanwhile, are a pair of glasses with a large set of integrated chips that control computers using touch screen smartphone using Wi-Fi Direct, without adding an additional monitor. Thanks to the electrochromic crystal that they integrate allow to switch between a virtual reality and augmented reality mode, which shows the elements of the smartphone arranged on the background of physical reality. The grace of Monitorless is the concept that reinforces: in a future loaded with convergence, the monitor will become irrelevant. VuildUs is a tool to decorate the home intelligently with augmented reality, through a 360-degree camera scan that captures measurements and physical elements. Once done, the user places a Gear VR and can represent in their home different furniture at a real scale, in order to check what items would fit in terms of size and what not, and which may fit or not in the style of the house . Integration into the ecosystem allows you to buy from the app paying with Samsung Pay. traVRer Finally, traVRer is a 360-degree video platform that deepens the user's desire to fly from the living room to any point of the world, as it has done with Street View, but with much more immersion; Both visual and ambient. When you reach the end of a zone or route you can choose another video and continue "browsing" for that unknown place for the user.
  24. Today is my birthday and I am here in my beloved community :gift-emoticon: :white-heart-facebook-emoticon: :HB:

    1. Show previous comments  7 more
    2. Miguel Chuchuca

      Miguel Chuchuca

      feliz cumpleaños  :3 ; que la pases super bien con todos en tu familia , psdta: TE AMOOOOOOOO :( <3

       

    3. OyaYansa

      OyaYansa

      Gracias mi vida :3 psdta: yo no te amo *-* :YD:

       

    4. Miguel Chuchuca

      Miguel Chuchuca

      :( ya perdoname :(  no te hice nada >.< , a soy karate ,, te amo :$ <3

  25. Anderson mi vida donde andas metido :( :white-heart-facebook-emoticon:

    1. Show previous comments  1 more
    2. OyaYansa

      OyaYansa

      Andresonnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn onde andabas.... -.-

    3. AndersoNN-

      AndersoNN-

      En Colombia mija ? q es de tu vida

    4. OyaYansa

      OyaYansa

      En venezuela mijo Calandome a maduro Hahahaha Mandame Un telefono JAJAJAJAJAJ ok no ?

WHO WE ARE?

CsBlackDevil Community [www.csblackdevil.com], a virtual world from May 1, 2012, which continues to grow in the gaming world. CSBD has over 70k members in continuous expansion, coming from different parts of the world.

 

 

Important Links