Thursday 2 March 2017

BrandedLogoDesigns Reviews: Raspberry Pi Zero receives WLAN and Bluetooth


BrandedLogoDesigns Reviews


The Raspberry Pi Foundation is celebrating its fifth birthday. Just in time for the anniversary is a revised version of the IoT developer board Raspberry Pi Zero with WLAN and Bluetooth module to the start.For five years now, the compact ARM developer boards from the Raspberry Pi Foundation have caused a sensation in the tech scene. The Raspberry Pi Zero W is now launching a revised version of its compact developer board, which is now equipped with WLAN 802.11n and Bluetooth 4.0 as standard.
On the other hardware of the Pi Zero, however, nothing changes. The board is still equipped with a single core Broadcom chipset, which clocks with a maximum of 1 GHz and accesses 512 MB of memory. With this equipment, the Pi Zero W is still 40 percent brighter than the Raspberry Pi of the first generation. In addition, the IoT board has a MicroSD card slot as well as connectors for mini HDMI, micro-USB and GPIO with 40 pins. An Ethernet connection is still not installed. An official case is now available for the tiny baby, which protects the Pi Zero components from dirt and damage.For the connection of peripherals such as a mouse, keyboard or monitor an adapter kit is available, which has a mini-HDMI to HDMI adapter, a Micro-B-USB to a USB-cable (female) as well A 2 x 20 GPIO header.
In Germany, the Raspberry Pi Zero W is also available at the official partner Pi3g.
Raspberry Pi: Between hobby cellar and industry
The Pi boards have always been the basis for projects of hobbyists, but also companies rely on the economical and cost-effective systems for their IoT and Smart Home products. For example, the display professional NEC has presented a series of new screens that support the connection of the Raspberry Pi Compute Module 3. This makes it possible to realize cost-effective digital signage systems.


 BrandedLogoDesigns Reviews

Tuesday 28 February 2017

BrandedLogoDesigns Reviews: Mozilla takes Read It Later


Mozilla takes over the developer of the popular Pocket service with the software-maker Read It Later. This is to become an open source project with the integration into the Mozilla Corporation.
After Mozilla had integrated the web service Pocket since mid-2015 firmly in Firefox, now follows the takeover of the pocket developer Read It Later. As the company announces in a blog post, this is the first strategic acquisition on the part of Mozilla at all. Pocket is to be maintained as a new product line next to the Firefox browser and focus on finding and sharing high-quality web content. The two companies did not communicate the purchase price.

Mozilla CEO Chris Beard sees the acquisition as an important step to counter the increasing centralization in the network. Pocket provides users with a cross-platform platform to share their content freely.

With Pocket (formerly also Read it later) users secure objects from the net for archiving or for later reading. The service provides a clear user interface, which includes the maintenance of lists as well as various sharing connections via e-mail or social media. Pocket is available as a web app as well as a client for Mac, iOS and Android. In addition, the service is intertwined with numerous other providers such as feed, flipboard or Twitter.

Currently, Pocket counts around 10 million active users who have secured more than 3 billion web content. As part of the Mozilla Corporation, the source code of all pocket solutions will be published as open source.

How the new Mozilla service in practice suggests you in our review to Pocket.

Monday 27 February 2017

BrandedLogoDesigns Reviews:Shift into the cloud: manage networks smarter



The management of Access Points and Co. is increasingly migrating into the cloud. Com! Professional shows the strategies of different manufacturers.

Increasingly, network manufacturers are shifting the management of their systems into the cloud, albeit with very different approaches: while Zyxel has developed its own product series for Nebula, according to the name of the system, the other manufacturers usually have an update A current operating system version to manage Access Points and Co. from the cloud.

The manufacturers have also solved the deployment of the systems differently. With Zyxel and Devolo, hosting the management tool is only possible from the public cloud. With Bintec Elmeg and Lancom, system houses have the choice between public and private cloud approaches, so the systems can also be hosted in their own data center or at the customer's premises. This, of course, gives partners a greater degree of flexibility because many companies are still skeptical about the topic of public cloud and are concerned about the protection of their data.

Flexible administration

In principle, the network management from the cloud offers the partners a whole range of advantages: They have a central access to the management and also monitoring of the customer systems, the establishment of VPN connections for the remote maintenance or even the journey to the customer is no longer necessary or is only in exceptional cases necessary. Because a device has to be exchanged, the partner can send the preconfigured device to the customer, which connects it to the network, and the partner can take over the remaining installation steps, if necessary, via the cloud. "Partners thus have a chance to expand the pure product sales with Software as a Service (SaaS)," emphasizes Hans-Dieter Wahl, line management at Bintec Elmeg.

At the same time, however, these systems also provide significantly more comfort in system housings and reduce the error sources during installation. At Nebula from Zyxel, for example, partners can scan the QR code or the MAC address on the device via App and transfer this data to the management tool. At first glance, this may sound banal, but saves a re-entering of the number, as long as you have mistyped.

Thursday 23 February 2017

BrandedLogoDesigns Reviews: Google launches GPU support for Cloud Platform


BrandedLogoDesigns Reviews

: Customers from Google's Cloud Platform can also rely on additional computing power from Tesla GPUs in the future. The Group has started GPU support for the first regions as part of a beta phase.
Google now also offers GPU support for its Cloud Platform customers. This is especially for companies who want to perform computer-intensive tasks in the areas of machine learning or AI in a virtualized cloud environment. The new offer is initially available as part of a beta phase in the regions us-east1, asia-east1 and europe-west1.
The use of up to eight Nvidia GPUs will dramatically shorten the development time of machine learning solutions in the Google Cloud.
As a hardware, Google is using Nvidia's Tesla K80 GPUs. They each have 2,496 stream processors and 12 GB of GDDR5 memory. On the software side, the Nvidia cards support common AI frameworks such as TensorFlow, Theano, Torch, MXNet and Caffe as well as Nvidia's Cuda software for creating GPU-driven applications. Through the use of the powerful Hadware, Google promises dramatically shortened development times in conjunction with its in-house Cloud-Machine-Learning service (Cloud ML).
As required, customers can connect one, two, four or eight GPUs for additional computing power. Billing is carried out in the minute minute with a minimum time of 10 minutes. For each booked GPU, Google is charging US $ 0.77 in the Europe and Asia regions, while the US is priced at US $ 0.7 per hour.New software and hardware for powerful machine learning
It was only in the middle of the month that the IT company presented the new version of its AI library with TensorFlow 1.0.0. The open-source project is to enable even more powerful solutions and to be deployed more flexibly at the same time. Google uses the technology in practice, for example, for its intelligent image search in Google Photos or its translator software Google Translate.
Nvidia had already introduced new models of its Quadro series with Pascal architecture at the beginning of February. The more powerful versions are to be used in workstations for the calculation of complex simulations and VR- or AI-workflows.


BrandedLogoDesigns Reviews

Wednesday 15 February 2017

BrandedLogoDesigns Review:Word: Insert watermark - How it works


Do you want to put your personal stamp on documents? We'll show you how to insert watermarks in Word.


Using this input mask, you can refine your Word documents by inserting personal watermarks.


You can create watermarks on a Word document in a simple way. You can also set the content of the watermark yourself. Click the Design tab, and then click the Watermark icon in the Page Setup group. Here are some watermarks.


If the right watermark is for you, select it. If it is not, click Custom Watermark. Select the Text watermark checkbox.

In the text field, where "Example" is currently, type the desired text. Clicking on OK creates your watermark and displays it on all pages.

If you want to edit your watermark again, select the Watermark and Custom Watermark commands. The previous settings of the watermark are shown, can be changed and saved again. To remove the watermark, activate the Watermark command, and then click the Remove watermark.

Tuesday 14 February 2017

BrandedLogoDesigns Review:This was from ICQ, Napster, Second Life and Co.


Many old digital sizes like Altavista, Winamp and Co. are today's snow yesterday. Com! Professional takes a look at the descent of the former overflights.

Altavista, Napster, ICQ or Second Life were once extremely popular on-line services, without which hardly anyone could get away. They were the flyers on the Internet or as a standard program installed on any computer. Meanwhile, they have disappeared meaninglessly or completely. Com! Professional is on the trail of the once-digital overpassers.
Long before Google dominated the search engine market at will, Altavista was the first stop for many Internet users. The service started in 1995 under the URL http://altavista.dec.com and for many years was the market leader in the web search. Altavista's algorithm used the meta tags of web pages for its search results. In addition, text fragments were also indexed and included in the ranking. After the unsuccessful attempt to establish Altavista as a web portal, the focus was again placed on the actual web search. Since the competitor Google, however, much more effort for his search engine operated, Altavista gradually sank in insignificance. After several acquisitions, the last owner - Yahoo - 2013 finally stopped the service.

From the standard tool to the shopkeeper

A similar fate came to the once so popular Mediaplayer Winamp. The software was released in 1997 and was developed by Justin Frankel, Dmitry Boldyrev and Gianluca Rubinacci. Winamp quickly established itself as a standard player for Windows users, especially since the software after the takeover by AOL was completely free. Unfortunately, the newer versions of the software increasingly caused problems, as more and more users switched to other players. In 2013, Winamp was to be finally discontinued, but a buyer of the software was unhappy. Since then, the user has been waiting for new versions of the player.

Many other online platforms, but also programs from the spring of the Internet are now history. In our picture gallery you can see more digital sizes of the past.


BrandedLogoDesigns Review

Monday 13 February 2017

BrandedLogoDesigns Reviews:Virus scanners compromise HTTPS connections

Many antivirus programs monitor encrypted HTTPS connections, causing security problems. This includes products from Bitdefender, Kaspersky and Avast.

Just recently, the former Firefox developer Robert O'Callahan warned in a blog post before antivirus software, which deeply in the systems nestles and rather damages than protection offers. A researcher has now found that antivirus programs and company proxies often interrupt TLS encryption, thereby reducing their security when scanning content from web pages for malicious software.

As the colleagues of heise.de write in a report, the researchers showed that 13 out of 29 investigated anti-virus programs in the encrypted TLS connections. Almost all of them worsened the security of the connection, often even massive security problems could be detected. Avast software, BitDefender, BullGuard, Dr.Web, Eset, G Data and Kaspersky even allowed direct attacks on the secure connections.

Security applications for the inspection of TLS connections were similar in the study - 11 out of 12 products weakened the connection security, partly because some of them still use the obsolete cryptostandard RC4. In addition, the number of monitored connections was much higher than the researchers expected.

Around eight billion TLS connections with the Firefox update service, with several popular e-commerce sites and with cloudflare investigated the researchers.

Antivirus manufacturers must improve

In their publication the researchers write that the problem is well known in the security industry, but is largely ignored and underestimated. They also call on the manufacturers of anti-virus software to adapt their security precautions.