Apple’s iPhone 5S includes fingerprint scanning technology called Touch ID to unlock the phone and make purchases in iTunes.
Some are calling it the key to the future of your Smartphone — a more secure way to authenticate mobile transactions and protect your data from theft if your phone is lost or stolen.
Others are concerned about the privacy of users, worried that fingerprints will be kept on record at Apple or made available to third party software developers.

Could a thief could lift your fingerprint from elsewhere on the phone and use it to unlock the device? 
Touch ID uses a capacitive sensor in the steel ring around the home button to ensure that only materials of certain conductivity will register. The sensor uses data from your finger’s sub-epidermal layer, not just the surface, making it much more difficult to replicate.

Could someone hack your phone and get access to your fingerprint data? 
According to Apple’s website, instead of just using a photo of your fingerprint, Touch ID “creates a mathematical representation of your fingerprint and compares this to your enrolled fingerprint data to identify a match and unlock your iPhone.” Touch ID doesn’t store any photos of your fingerprint and it isn’t possible for your fingerprint to be reverse-engineered from this mathematical equation.

Could a hacker get access to your fingerprint data where it’s stored on Apple’s servers?
Fingerprint data is encrypted and is stored in a unique area of the phone’s memory chip, walled off from the rest of the operating system. According to Apple, “your fingerprint data is never accessed by iOS or other apps, never stored on Apple servers, and never backed up to iCloud or anywhere else.”

Could this fingerprint data be used to identify you using other fingerprint databases? 
Because it’s a mathematical equation, not your fingerprint itself, only Touch ID can use the data. Apple assures users that it can’t be used to match your fingerprint against other fingerprint databases.
Apple insists that the company has no immediate plans to allow 3rd party app developers access to Touch ID in order to incorporate fingerprint authentication in their programs. However, having the fingerprint scanner built into the phone offers some intriguing future-use security. Passwords or pass codes are relatively easy to hack, and many users allow their device to auto-login to avoid entering a password every time. If it proves reliable, fingerprints would be a much safer way to authenticate your identity for mobile banking, online purchases or any app that maintains your personal data.
The implications for using your Smartphone as a mobile wallet are also promising. No more easily stolen credit card numbers — use your Smartphone to pay for purchases both online and in-person while trusting that only you can access your money.
As a form of personal identification and transaction authentication, fingerprint scanning could be the future of mobile security. For now, it makes securing your iPhone from thieves easier than ever before.
Connecting social signals with physical devices, If This Then That is aiming for the mainstream with its endlessly useful control panel for the internet. IFTTT, or If This Then That, has become part of the internet furniture for many in the tech community, becoming the default way to connect one internet service to another. If you’d like to get a text reminder to take an umbrella if rain is forecast, or automatically save your Instagram Pictures to dropbox, or post a scheduled message to Twitter on New Years Eve - then IFTTT is for you. Or, if you prefer, there’s a recipe that will automatically phone you when you arrive in New York and play Jay Z’s Empire State of Mind. 

There are already more than 140 services plugged in to IFTTT, from Facebook, Twitter and Gmail through to Yo, Slack and WeMo, and two new channels are added every week. And there are, it is estimated, more than 16m combinations - excluding the record collection, with location itself also added recently.

‘Giving people more control over every day devices’

But beyond connecting web services, IFTTT has far bigger ambitions, explains founder and CEO Linden Tibbets. Its future, he believes, is in connecting the internet of things - everyday devices and objects increasingly being given internet capability to be monitored, controlled and connected online.
“It’s about giving people control over services and devices they use every day,” he says. “In the physical world we have a kind of intuitive understanding of objects around us and are constantly modifying those for our needs, so there’s an intuitive control we’re after in the digital age, and that’s especially important as those two are on a collision course to merge.”
Still in its infancy, the internet of things seems focused on connecting seemingly “dumb” objects for novelty, he says. “But the second phase of the internet of things is in building up the ecosystem around gaming consoles, phones and devices like [home monitoring technology] Nest. We’re starting to see some valuable in that kind of hub,” he says, pointing to reduced utility bills and the convenience of being able to control the temperature of your home or be warned about safety issues - a fire, or gas leak - from afar.
IFTTT is on a push to add physical device controls to its hub, which currently includes the smart garden sprinkler Rachio Iro, the Parrot Flower Power sensor which monitors the health of plants and Aros, a smart air conditioning controller that can automatically adjust according to the weather forecast, your holiday schedule or even your budget. WeMo’s range of app-connected light switches, motion detectors and sockets are also included and have a wide range of applications.

‘Using pictures signifies something much bigger’

Founded by Tibbets and his brother in 2011, IFTTT has had $38.5m investment, with the latest round of $30m, from Norwest Venture Partners and Andreessen Horowitz in August 2014, focused on building its offering as a control hub for the internet of things. Tibbets won’t say how many users IFTTT has, but it’s in the millions with recipes being run more than 18m times per day.
Though a staple among developers, Tibetts says the site is constantly trying to refine examples that explain the site for new users because it is hard to visualise so many potential combinations. IFTTT, he says, has a very distinct visual language, with overlarge fonts designed to echo the language of children’s books and imply simplicity.
He refers to Edward Tufte’s design work on sparklines. “These are little graphs that can be embedded in sentences. It’s an idea that goes back to Leonardo and Archimedes - using pictures to represent something much bigger - and that was a big inspiration. Take something like programming, that is syntax based, and you can use pictures and logos that people have such a deep association with. The Twitter bird - you know what that means, that logo represents your relatisonship and so is a catalyst for so much more.”
The process of creating a recipe (a combination of services) is a heavily simplified and visual, with as few clicks as possible, and the logos are a key part of that.

‘Would you like IFTTT to save that Instagram picture to Dropbox?’

As part of the ambition to make IFTTT “a foundational layer” for the internet of things, a next step is to make recipes a fixed part of third party apps. So where Instagram users are offered the choice of posting to Facebook and Twitter, they might be offered an IFTTT recipe too.
“If we recognise that you’re manually posting to Instagram, could we automate that for you?” says Tibbets. “Over the next 10 to 20 years, we will be building for inputs that are as much social signals as mechanical inputs, so thinking about touch points like getting into an Uber car as a way of interacting with the service.”
Some of the “abstract challenges” of IFTTT are to read the inferred intent within an action as a trigger for another task. Maybe your weight reaching 70kg would switch to your lower calorie Ocado order, or clicking your fingers on the doorstep after your jog would set the bath running. Or maybe no emails, texts of Facebook posts from a friend would automatically notify you to call them.

There isn’t enough discussion about ethics at business school

And with so much potential for so many different uses, how does IFTTT protect itself from any unethical use of the service? A lack of ethical oversight has played a part in many recent technology stories, from Snowden to Whisper to the Right to be Forgotten.
“There’s a healthiness in scepticism, so if you’re a consumer and feel your privacy is not respected then just don’t use that service,” says Tibetts. “The general mistrust the media has been able to spotlight is good, because it has made us have a dialogue about it.
“When you invent something the moral framework does come second. But there isn’t enough discussion at business school about ethics, because if you can build trusty and maintain it that is incredibly powerful - it becomes not just a product but a movement that people want to believe in.
“Our thing at IFTTT is ‘creative control’, so the user has intuitive control to create a recipe using companies they trust.”
 Maroon Bells Wilderness in Colorado’s White River National Forest
Photographing on a foggy morning near Pampore, India
Bay of Arcachon in southwestern France

Sulphur streaks the rocky, lake-filled Ijen crater in East Java, Indonesia
Phoenix area (Sun City)
Frost settles over the village of PeÅŸtera, Romania
Mount Bromo (in foreground) and Mount Semeru (in background), Indonesia.
summer capital of Estonia.
Iceland’s Holuhraun lava field.
Are you Guys interested to look Beautiful and Glamorous on this New Year's Eve??? Of course Yes. So let us tell you about how can you do that. 

1. Apply Glitter to your simple shoes:
Still looking for the perfect pair of glam shoes for to match with your dress? If you can’t find the right fit… why not make them yourself! Today we are sharing fail-proof steps on how to perfectly glitter a pair of high heels for your special day… or any other day for that matter!
     What you need?
  1. A pair to high heels.
  2. Glitters.
  3. Glue.
  4. Paint Brush. 
 Take a pair of heels you want to glitter. Must place a newspaper below to save extra glitter at the end.

Apply Glue with paint brush to the required area. Apply a thin coating so that it can easily dry. If you have excess glue lines after your stroke you need to smooth them out, otherwise you shoe will end up looking wrinkled and/or possibly having lines.

Apply the glitter smoothly on the glue coated area of heels and tap the heels to remove excess Glitter. And also clean the inner surface  with smooth brush.

And here your Heels are ready to wear. Enjoy your new year's eve with your new shoes.
 
2. Unique Hand Made Bracelets:
       You just need some simple techniques to make cool bracelets to fit with your dress. Follow the given tutorials.
Made with Old shirt cut pieces

 

3. Apply stones and sprays on your Clutches:
Yellow and black sprayed Bag
Patterns made with Led tube
Striped Clutch
 Gems Glued on Clutch

 Simple tricks make your life cool and stylish. Must try these at your home at let us know about your experience.

Facebook recently provides new application for its users known as "Year in Review". Facebook now admits that forcing people to revisit their most Liked and commented upon photos and statuses from the past year might not have been the best idea. As Facebook uses the tagline "It’s been a great year! Thanks for being a part of it." But though some people would not have a great year and would prefer not to be reminded of it. This week, the product manager for the social media company's "Year in Review" app apologized to Eric Meyer, whose six-year-old daughter died of brain cancer earlier this year. Eric didn’t want to relive his painful memories, but was forced to when Facebook automatically positioned the “Year In Review” banner at the top of his news feed. The algorithm for choosing which images appear in the banner depends on how many “likes” they’ve received.

From Meyer's posts:
And I know, of course, that this is not a deliberate assault. This inadvertent algorithmic cruelty is the result of code that works in the overwhelming majority of cases, reminding people of the awesomeness of their years, showing them selfies at a party or whale spouts from sailing boats or the marina outside their vacation house.
But for those of us who lived through the death of loved ones, or spent extended time in the hospital, or were hit by divorce or losing a job or any one of a hundred crises, we might not want another look at this past year.
To show me Rebecca's face and say "Here's what your year looked like!" is jarring. It feels wrong, and coming from an actual person, it would be wrong. Coming from code, it's just unfortunate. These are hard, hard problems. It isn't easy to programmatically figure out if a picture has a ton of Likes because it's hilarious, astounding, or heartbreaking.
Jonathan Gheller, Facebook’s project manager for “Year in Review,” apologized to Meyer and released a statement to the Post addressing the issue:

“[The app] was awesome for a lot of people, but clearly in this case we brought him grief rather than joy,” he said. “We can do better — I’m very grateful he took the time in his grief to write the blog post.”

Others have also complained about the feature.
 Did you use the Year In Review feature? What did you think? Let us know in the comments.
Welcome to Techno World. Let us know you about Cool Gadgets.

GOJI:
Have you ever thought about a gadget that take the picture of the visitors at your door and send alert on your mobile phone. Also maintain a system log as a backup. This can easily done through GOJI. Easily and securely send access to your home to anyone with a supported smartphone. If you choose, you can even specific days and times when the recipient can enter.

No need to worry about getting keys back from guests or renters. Goji is invaluable for managing access for houseguests and home service professionals (housekeepers, dog walkers, contractors, etc.). Rest assured, you can easily cancel or change access for key recipients at anytime.


Mira Fitness Experience:
Working women catch this opportunity to make you fit. In this real world, one can just think to be fit with a just wearing a cool bracelet. Mira is a wearable device for women devoted to delivering a simple, personal and motivational fitness experience with style.

 Mira is changing the conversation in the wearable device category. Mira provides an easy way to fitness for working women those who put there families first. Stylish, cool and decent bracelet with a quality to make a women fit and graceful.

Power Pen: 
Imagine you are on your way back to home and want to make an urgent call but unfortunately your smart phone's low charging is not allowing you to call. You just connect a pen as micro USB with your smart phone and make your important call. Yeah power pen allows you to write as a stylus and also charge your smart phone. 
Pop the cap to reveal the familiar USB connector and you’re ready to start re-charging. It’s truly the only pen you’ll ever need. Just make sure you don’t let your friends and colleagues get wind of its full potential.
So Guys are you interested to make your glass non transparent...?? You can easily do this by frosting your Glass and can also make patterns through frost spray or tape.

Frost Spray your Glass:

     What you will need?
  1. Frost Spray.
  2. Rubber gloves.
  3. Protective Tape.
  4. Lint free cloth.
  5. Decorative Stickers.

Clean your glass you want to make non transparent with glass cleaner. Make sure there are no finger prints or dust. Apply protective tape around or on the glass. You can also use some removable stickers for beautiful patterns and designs. Apply a light coating on the glass first and keep it about 1 feet away. The coating must be fine and even. Allow the spray about 24 hours to dry thoroughly. Carefully take off the tape and stickers. Now enjoy with your new non transparent glass.

Applying Frost Film to glass:

     What you will need?
  1. Frost Film.
  2. 1 spray bottle of water having 2 two drops of detergent.
  3. Stanley Knife.
  4. Credit card or similar wrapped in a dust free cloth.
Clean the glass thoroughly and remove all the spots and dirt. Do not use window cleaning spray, as it can damage the film. Place your frost film design on a flat surface. Peel off the covering. Do it very slowly and make sure the design stays stuck to the Application Paper. Liberally spray the glass and exposed surface of the film. Lightly spray your hands to stop the film sticking to them. The solution you made will help slide it perfectly into position. Keep the film straight and do not allow it to curl up on itself or wrinkle to avoid creasing. Make sure all the bubbles are out of the film.Once the film is in the correct position, leave it to dry overnight or a minimum of 5 hours. Spray the application paper with water and carefully remove making sure that all the design is stuck to the window. This is best done, by peeling the paper flat back against the glass. If required trim around the edges of the frame with a Stanley knife. To remove bubbles – simply pop them with a pin and rub.

To clean the film after installation, use mild soapy water and paper towel. Avoid using an abrasive material, as it will scratch the film.

  
 
Next PostNewer Posts Home