Friday, 16 October 2015

Facebook manupulated, shows users how many people viewed their posts.

Facebook doesn't have plans to add the feature officially but because of the bug people were able to see how popular they are.



A Facebook bug has shown some users how popular they are, by showing how many people had viewed the post. 
The feature shows up next to the 'Like' button, where you see it if you own a Page for a company, brand or personality. 
• Facebook now lets you filter out painful memories
• Facebook error stops users from posting these three harmless words

However, this is not supposed to be used for personal profiles, as Facebook has no plans to show people who use Facebook purely for their personal social media interaction how many people have viewed their posts.
This did not please the general public, who found that their posts are unpopular:  

Other social networks including Twitter, Vine and YouTube already show view counts, and Twitter even has a detailed analytics feature that shows what people did after viewing your post. 

It shows whether the person who viewed it clicked on any links, or on your profile, or on any pictures embedded in the tweet. 

Facebook prefers not to do this, and instead only shows likes and comments.

Perhaps it is because of the self-esteem issues faced by those whose posts no one views - if only 12 people are looking at each status you post, you might stop posting them.
On the other side of the coin, if a post has hundreds of views but no likes or comments, this could also upset people. 

Facebook has now fixed the bug, and it does not look like this issue will be coming back any time soon.


Lets watch the space.

NEAT

Facebook's real-time news app is reportedly called Notify


The social networking giant Facebook is reportedly working on a breaking news app called "Notify", and is ready to launch it by October-end, according to a media report.
The app will reportedly allow users to aggregate their favorite content into real-time notifications.



Partnering publications will have the ability to create specific notifications for the mobile platform on behalf of Facebook, like a mega-tweet. Then users will be directed to the publication's website via the notification, according to The Awl.

Facebook seeks to expand its functionalities to something much more than just a social network the most popular one in the world if it makes any difference.
The app will allow users to subscribe to certain organisations dubbed as stations and they will then receive notifications during the day, every time one of the stations they have subscribed to promotes a new story.
That will obviously give a big boost on Facebook's presence as a multi-functioning platform, rather than just a simple social network.

According to statistics, nearly no media networks and companies have managed to establish a well designed smartphone app that its readers or most of them actually use; at least not near the capacity of Facebook.

This gives the company the advantage that it is very likely that users will read more articles through Facebook media networks with strong app presences, such as Buzz
Feed and the New York Times, which may consider working with Notify to direct the fire hose of social media users in the right direction.

Besides all the above, Notify will also be a challenge for Facebook's rival social network, Twitter, which also launched a new feature last week called Moments, that lets Twitter curate tweets into different categories, such as news and sports.

So media companies will also have a chance to create their own moments and fill the feature with their content which will ultimately attract more readers and hence users as well.

NEAT

There is always away

Wednesday, 14 October 2015

How to hide your IP Address?




When you connect to the Internet, your Internet Service Provider (ISP) assigns you an Internet Protocol (IP) address. Most users have a router that connects the computers in their home to the Internet. Your router gets a public IP address from your ISP, and each computer within your home (or office) gets a private IP address from your router. When your computer connects to the Internet, the world sees your computer as your router. If you have only 1 computer, you can connect your computer directly to the Internet and it gets a public IP address from your ISP. Since the IP address assigned to you is public, any host en-route to the other end can track your Internet activity.

Conceal your IP address with a Virtual Private Network

Virtual Private Network (VPN) offers a connectivity to another network, and when connected your computer receives an IP address assigned by the VPN server. The traffic routes through the VPN network, so your true IP address assigned by your ISP is hidden. Aside from hiding your IP address, using VPN allows you to access any network even though your organization may block traffic from certain network. They help you get on the Internet with a different IP address than the one assigned to you by your ISP.
Here are a few VPN providers I recommend: But there are very many others you can find on the internet
VPN Services allow you to obtain a new IP address from any country (provided that the VPN provider you choose has a server in the country where you want) on any device (PC, Mac, iOS and Android), and surf Internet anonymously and securely. 

By renewing an IP address whenever and wherever, you'll never be blocked by regional blockage. Since traffic between you and the VPN server will always be encrypted, no hacker will intercept your data or eavesdropping on your Internet activity.

Now, Why would you hide your IP address?

You may have your very own reasons for hiding your IP address from others, but here are a few popular reasons why people would want to hide their public IP address.

  • Hide your identity from your competitors - You may be commenting on your or competitor's products on various forums, and using your IP address will reveal your identity.
 
  • Hide your geographical location - Certain networks prevent users from a specific geographical location, and use of proxy IP address will solve  this problem. When someone get to know your actual IP address, the your location can easily be revealed.
 
  • Prevent Website Tracking - Every website or webpage you visited is tracked by the server hosted by the website owner. By hiding your IP address, your web visits cannot be tracked.

Protect your identity

If you navigate on the Internet with your IP address, your privacy and sensitive information about you can be monitored. With an IP address, your location, your ISP and your privacy or security can be breached. There are full of suspicious people on the Internet, and you need to protect your identity by hiding your IP address and use someone else's instead. There are many tools available to mask your IP address (free and paid), and use 3rd-party IP addresses offered by public companies.

Mask your IP address with Proxies

There are thousands of free web proxy servers that you can use to hide your IP address and surf anonymously. Browsing through a proxy means that you are not accessing a website directly, but going through a intermediate "proxy" which relays the information back and forth between you and the destination website.

Use someone else's network

Alternatively, you may use free Wi-Fi services offered by a coffee shop, hotel, or any public location. An IP address does not travel with your computer, but they are rather assigned by the router placed in the area you are in. To find your public IP address, Just type "Find My IP" without the quotes in the Google search engine. 

NEAT

Facebook, Twitter posts could hold clues to users health


"By building a language databank, it may be possible to link social media content to health outcomes," researchers said. (Source: Reuters)

The language people use on social media and the information they post may offer valuable insights into the relationship between their everyday lives and health, a new study has found.

Researchers from the Perelman School of Medicine at the University of Pennsylvania found that many adult Facebook and Twitter users are willing to share their social media data and medical data for research purposes. "By building a language databank, it may be possible to link social media content to health outcomes," researchers said. 

"We don't often think of our social media content as data, but the language we use and the information we post may offer valuable insights into the relationship between our everyday lives and our health," said the study's senior author, Raina M Merchant, director of the Social Media and Health Innovation Lab and an assistant professor of Emergency Medicine at Penn Medicine. 

"Finding ways to effectively harness and mine that data could prove to be a valuable source of information about how and why patients communicate about their health. There is a rich potential to identify health trends both in the general public and at the individual level, create education campaigns and interventions, and much more. One of the unique aspects of this data is the ability to link social media data with validated information from a health record," Merchant said. 

In the study, patients visiting an Emergency Department were asked if they used social media, and if they would be willing to share their social media data and electronic medical data with health researchers, for the purpose of building a research database. Similar to existing banks of genomic data, the research database of language and other social media data allows researchers to draw correlations between participants' online content and their health. More than 1,000 participants consented to share their social media and medical data over seven months. 

Analyzing content from as far back as 2009, the shared social media data consisted of nearly 1.4 million posts and tweets to Facebook and Twitter, comprising almost 12 million words. Researchers found that variations in word complexity could suggest cognitive decline, or a change in the number of words per post or network size might be indicative of a depressed mental status. 

Posted content could also reveal information about adherence to prescribed medications, new medical conditions, or health behaviors like exercise and diets. The researchers also found that individuals with a given diagnosis in their electronic medical record were significantly more likely to use terms related to that diagnosis on Facebook than patients without that diagnosis in their electronic medical record. The findings are published in the journal BMJ Quality & Safety. 

NEAT

Tuesday, 13 October 2015

Ideas are better than ideology.




"Using a core set of beliefs about the right way to do things can seem like the most professional approach to evaluating ideas. It isn’t. "


As an IT manager, you probably spend a good part of your day dealing with ideas, weighing them, refining them, rejecting them and embracing them. You’re bombarded by ideas all day, every day. They might come from you, your subordinates, your boss or even people like me who write for the media.


  • “If we rewrite that section of the SQL to avoid using cursors, it might improve performance substantially.”
  • “If we deploy a mobile reporting app, the salespeople will be able to see what their clients already have on order.”
  • “If we refuse to help users who try to bypass the help desk, they will have to follow the support process we designed for them.”
 
Regardless of where the ideas come from, it’s your job to handle the flow. How well you generate, solicit, select, collect, evaluate, modify, prioritize, test, implement and communicate about ideas determines, to a large degree, your success as a manager. Pick the best ideas (in other words, make good decisions), and you’re a hero. Choose and/or implement badly, and things won’t go so well. 

Of course, it’s easy for me to sit here and say, “Choose well.” But in the day-to-day chaos and ambiguity that is IT work, how do you do that?
In my experience, managers choose one of three archetypal options when making decisions (or combinations of them), all of which, by the way, have virtues to recommend them. 


Approach 1: Analyze each idea. 
Subject each idea to a rigorous process that predicts the costs, benefits, probability of success and cultural fit. Examine the stated and unstated assumptions underlying the idea and assess how well they fit with known facts, current interpretations and past experience. And then decide whether the idea is worth pursuing or not. Done exhaustively, this is quite time-consuming. Decisions may be better, but they may be too late to matter sometimes.

Approach 2: Go with your gut.  
Monitor your general emotional response to the idea and use that as a guide. Emotional responses are not completely divorced from analysis or evidence. Emotions serve as an instant synthesis of experience, biases, preferences, knowledge and assessments. If it feels good, implement it. If it feels really good, do it with gusto. This is usually much faster than rigorous analysis, and better accounts for the fact that decisions are always made with incomplete information. At the same time, biases and personal comfort alone often lead to poor decisions.

Approach 3: Check your ideology. 



Evaluate each idea for its consistency with firmly held beliefs about the “right way” to do things. If it fits and seems important enough, then do it. Otherwise, discard it. In IT, this is not usually a political ideology, but a set of beliefs that defines a “one true way” to do things. Many people base these beliefs on well-developed frameworks or methodologies which synthesize the experiences of many people. Some managers rely on their own personal experience, expecting to repeat past successes with identically repeated activities. This might not be the case always though.

Although most IT people think of the “gut check” as the quick and lazy way of doing things, relying too heavily on ideology is really the quickest and easiest way of all. Comparing an idea to an idealized worldview is the shortest shortcut there is. Of the three generic approaches, ideology is the only one that relieves the decision-maker of the burden of professional judgment. In fact, taken to extremes, which happens all too often, ideology prohibits personal judgment, prescribing approaches and activities as moral virtues rather than as potentially good ideas to be vetted and considered. 


And this is where problems begin to happen. When managers replace professionalism with ideology, they turn their success over to an abstract system of thought. The best decisions are made when managers retain responsibility for their own decisions, applying their own judgment rather than accepting them as delivered truth. 

NEAT

How time is assigned

If you have gone for a vacation before, then you know what exactly am talking about hear. Some times I sit down on my bed and wonder how God made time  move fast in certain aspects of life and very slow in others yet in actual sense it is the same rate.

Check out the difference below.


NEAT

Hike messenger adds feature to operate without internet.


Instant messaging platform hike messenger recently launched a new feature named hike Direct which will allow the app to function without an Internet connection and also said that it has reached a user base of over 70 million.

"At a point of time where several people are yet to come online, hike Direct will connect users in a never before seen revolutionary way. The feature can work without Wi-Fi or mobile data and allow users to send photos, stickers, files and messages to anyone who is also on the hike network," said Kavin Bharti Mittal, founder and chief executive of hike messenger.


"Files as large as 70 MB can be sent in over 10 seconds," Mittal added.
Although the feature can work without internet, it won't work outside a 100-metre radius. 

The technology used to create the feature is same as the Wi-Fi direct technology available in most smartphones today.
Mittal said the messaging application was growing at a pace of 100 per cent year-on-year. "Currently, we are processing 20 billion messages monthly and people are spending at least 140 minutes on the app on a weekly basis."

Recently, the messaging platform released a feature that would allow users free group calling on the app, connecting up to 100 people at the same time.

The Bharti Soft bank-backed messaging app has released a flurry of new features which include free stickers in local languages, data transfer option up to 100 MB and making the platform 4G ready, to expand its consumer base.

Other popular rivals like Whatsapp and Viber, respectively, have a user base of 900 million and over 40 million.
The messaging platform had also secured $65 million in funding in the middle of last year from a group of overseas investors led by Tiger Global Management.

The Indian community is really moving forward with improving the technological state of the world.

NEAT

Microsoft to make Russia's Yandex as default search engine on Windows 10



Russia's biggest search engine Yandex on Tuesday said Microsoft would offer it as the default homepage and search tool for Internet browsers across its Windows 10 platform in Russia and several other countries.

"The companies have signed a strategic cooperation agreement, under which users in Belarus, Kazakhstan, Russia, Turkey and Ukraine will be offered Yandex when upgrading to Windows 10," Yandex said in a statement.
This a great idea for the Russian people.

NEAT

BIRTH OF YOUR COMPUTER AND WHY IT'S CALLED A COMPUTER

The computer as the name it computes a program to find instruction in it for execution.
The main component on a computer is a processor ,the processor understand 0s and 1s.
The reason why it understands 0s and 1s because its self is in 0s and 1s
0 represent current not flowing and 1 represent current flowing.


The processor is made from transistors a three terminal device with Base(b), collector(c) and emmiter(E) the transistor what it does is switching in 0s and 1s ,0 when off and 1,when on.
This is achieved by building logical gates out of transistor namely AND,OR,XOR etc which nomally evaluate true or false.


Intel core 4004 contain 1000 transistors now the latest processor contains about 30million transistor, this is achieved through lithilogy a very complicated process.
Engineers at intel developed very small transistors to fit in a small processor.
It is made for silcon got from tipical sand.


Transistors make micro controllers, microprocessors and all Integrated circuits  (ICs) in phones,tablets, computers etc.
After a complicated intergration of transistor ,the CPU must produce 2.6ghz freq to run a program.


The mother board componets work hand in hand with the CPU. These are given addresses like harddisks'rom,ram
A program can request the processor to get an image at address of hard disc in folder xxp,
The CPU contains registers like r0,r4,r5 etc,each with specific tasks to perform on your program like r0 to load variables in the memory.
The size of the registers determine the power and speed of processor ,r0-r16 in ARM processor is 32 bits making 32 bit processor which u call Pentium 4.


Thanks for reading I will explain more later. Have a great day.

NEAT