FixNix Blog

Google aims to store all human knowledge

Aug 25, 2014 10:57:08 PM / by Shanmugavel Sankaran posted in google, information, kevin murphy, knowledge base, knowledge graph, knowledge vault, Blog, data

0 Comments

LONDON: Google is building the largest store of information in human history - a knowledge base that autonomously gathers and merges data from across the web to provide unprecedented access to all facts about the world.

Read More

China targets own operating system to take on likes of Microsoft, Google

Aug 25, 2014 2:04:18 AM / by Shanmugavel Sankaran posted in google, microsoft, Android, Blog, china, chineese, cyber security, operating system, os

0 Comments

SHANGHAI: China could have a new homegrown operating system by October to take on imported rivals such as Microsoft Corp, Google Inc and Apple Inc, Xinhua news agency said on Sunday.

Read More

Google using super-strong material to protect underwater internet cables against shark attacks

Aug 17, 2014 4:20:36 AM / by Shanmugavel Sankaran posted in fibre optic cables, google, internet cables, shark attack, sharks, Blog

0 Comments

Google is reinforcing its underwater internet cables to protect them against shark attacks.

The fibre optic lines under the Pacific are being wrapped in a super-hard material similar to Kevlar, which is used to make bullet-proof vests and military armour.

Dan Belcher, a product manager for the company, told the Google Cloud Roadshow the internet giant goes to great lengths to protect its infrastructure, Network World reported.

Sharks appear to have developed an inexplicable taste for underwater cables dating back to the 1980s.

A New York Times report in 1987 said the then new fibre optic cables linking the US, Europe and Japan were being gnawed by sharks, causing phone and computer failures around the world.

In 1985, shark teeth were reportedly found embedded in an experimental line in the sea off the Canary Islands.



One theory is that curious sharks are attracted to the electric and magnetic fields around the cables, which are far stronger than with older copper lines, and mistake it for distressed fish.

Read More

Google, IEEE offer $1 million for 'laptop' sized power inverter

Jul 28, 2014 12:11:09 AM / by Shanmugavel Sankaran posted in future, google, IEEE, Blog, challenge, power inverter, renewable energy

0 Comments

NEW DELHI: Tech giant Google is offering a prize of USD one million (about Rs 6 crore) for building a compact solution for transforming renewable energy into a power source that can be used at home.

Read More

People have the right to be e-forgotten, EU court rules against Google

Jul 18, 2014 10:52:30 AM / by Shanmugavel Sankaran posted in google, Blog, eforgetten, European court, right to forget

0 Comments

People have the right to be forgotten online,

The ruling, handed down by the European Union’s Court of Justice (ECJ), went against Google in a case concerning the removal of links to two pages published in 1998 by Spanish newspaper La Vanguardia.

Read More

Google's Android security chief: Don't bother with anti-virus. Is he serious?

Jul 14, 2014 2:36:24 AM / by Shanmugavel Sankaran posted in google, google drive, security, security engineer, android apps, android cheif, Blog, cheif security officer

0 Comments

Just before the recent Google I/O developer conference, Google's chief security engineer for Android, Adrian Ludwig, told journalists that most users shouldn't bother with anti-virus.

Read More

Malicious intent can turn Chrome speech recognition into spying device

Jul 12, 2014 11:37:25 PM / by Shanmugavel Sankaran posted in google, malicious, security leak, speech, speech recognition, Blog, chrome browser

0 Comments

A speech recognition expert contends malicious players can turn Google's Chrome web browser into a remote listening device.

Read More

Google Drive security hole leaks users' files

Jul 12, 2014 2:10:02 AM / by Shanmugavel Sankaran posted in google, google drive, google security leak, leak user data, Blog, cloud

0 Comments

We often repeat this advice from former Naked Security writer Graham Cluley: for a better understanding of how you should approach security in the cloud, simply replace all instances of the words in the cloud with the words on somebody else's computer.

Read More

Subscribe to Email Updates

Lists by Topic

see all

Posts by Topic

see all

Recent Posts