Friday, November 22, 2019

Have yo ever listened about animated sound holograms ?

It is currently conceivable to make a 3D moving picture utilizing only a little polystyrene ball and a variety of little speakers.

Ryuji Hirayama at the University of Sussex, UK, and his partners constructed the gadget from 512 speakers, situated above and beneath a little 3D organize that goes about as the picture show. The speakers transmit quiet ultrasound to make little pockets of low pneumatic stress in which the polystyrene ball coasts. By controlling the soundwaves radiating from the speakers, it is conceivable to quickly move the exact 3D position of the low-pressure pockets, thus control the situation of the dab.

In the event that the dot moves quick enough, it makes what appears to the watcher to be a 3D shape, and it is even conceivable to change the type of that shape after some time to give the impression of a moving 3D object. In any case, this needs to happen very rapidly. The 3D shape must be followed out in full in under 0.1 seconds – any increasingly slow enhanced visualization is lost.

It is even conceivable to add shading to the 3D questions by coordinating light emissions, green and blue light onto the bead.In one exhibit of the innovation, the framework shows a butterfly fluttering its wings. In another, it shows numbers tallying down to zero.

"It resembles enchantment," says Hirayama, who was propelled by visualizations and levitation portrayed in famous movies.

Read more

Tuesday, November 5, 2019

The mixed economy

A mixed economy is a type of society that synthesizes elements of a market and command economy, in which the market mechanism is complemented by vigorous activity of the state. A mixed economy involves the use of the regulatory role of the state and the economic freedom of producers. Entrepreneurs and workers move from industry to industry by their own decision, and not by government directives.
 The state implements antitrust, social, fiscal (tax) and other types of economic policy, which to one degree or another contributes to the economic growth of the country and increase the living standards of the population. The modern world is characterized by a wide variety of mixed models. For example, the Swedish system is known in which social policy is the core.


The Japanese economic model is characterized by developed indicative (recommendatory) planning and coordination of government and private sector activities. In the American economy, the state plays an important role in approving the rules of economic activity, regulating business, and developing education and science. But most decisions are made based on the market situation and pricing on it. The Swedish system is characterized by vigorous participation of the state in ensuring economic stability and redistribution of income.


The core of this system is the social policy of the state, backed by a high level of taxation. Here, differences in incomes are relatively small with an overall high level of social security. The Japanese model of the economy is characterized by developed planning and coordination of government and private sector activities.



The plans are state programs (of a recommendatory nature) that orient individual parts of the economy toward the fulfillment of national tasks. In the American economy, the state plays an important role in approving the rules of the economic game, developing education, and regulating business.

 Know more about @ Blended Economy

Thursday, October 3, 2019

9 blunders we make while selecting passwords

Passwords, passwords or passwords. We think they're guarding us, but it's an illusion, according to Frank Abagnale, a former fraudster and today an information security consultant, who wants to replace the password system with more modern and better security solutions.

"We think passwords keep us safe, but it's just an illusion. Passwords do not protect us from hackers, nor do they protect the privacy of our online data, ”claims Frank Abagnale, an information security consultant, in a text published on CNBC.

Frank Abagnale is a former professional fraudster and author of one of the best-selling autobiographies, " Catch Me If You Can, " by which Steven Spielberg made a movie of the same name with Leonard DiCaprio in the role of Abagnale in 2002. Today he is one of the world's leading authorities in terms of fraud, forgery and information security.

He has enjoyed the trust of the FBI for more than four decades - he teaches at their academy and lectures on the ground. His latest book, " Fake Me If You Can, " discusses strategies to combat modern fraud .

"The story I told in my biography published in the 1980s interested the public in identity theft, but also in one of the main problems when it comes to fraud, which are passwords. My new book 'Cheat Me If You Can' is about that, "Abagnale writes.

Passwords are the weakest security link


The technology that surrounds us today - smartphones, online banking and commerce, Google, smart TVs - has emerged in the last twenty or so years. Usernames and passwords (passwords or passwords, as you please), the most widespread security mechanisms in use today, were invented in 1963 , more than half a century ago.

The inventor of the password for the computer, Fernando Corbató (who passed away this year at the age of 93), said "passwords with the advent of the World Wide Web have become a nightmare" for users.


Michael Chertoff , who served as secretary of state at the U.S. Department of Homeland Security from 2005 to 2009, endorsed Corbato's views in 2016. "In-depth investigations into the biggest frauds reveal that what they all have in common is that a password was the key to breaking into the security system ," Chertoff told CNBC.

"The reason is simple," he explained. " Password is by far the weakest link in cyber security . If the government would declare the replacement of passwords with more modern security solutions a national priority, it would encourage companies and other institutions to adopt better quality solutions, and data leaks due to password breaks would become a thing of the past. ”


Common password errors


Abagnale supports Chertoff and lists some of the biggest mistakes we make with passwords.

1. Change your passwords too often
Frequent password changes are counterproductive because people tend to change one password to another, which they also often use. Often changed passwords are easy to forget and just as easy to steal as rarely changed passwords.

2. You choose too complicated passwords
Keep your passwords simple but smart . Studies examining complex password requirements - for example, those that oblige you to use symbols and uppercase and lowercase letters - show that such requests result in less secure passwords.

3. You do not check the selected password
The National Institute of Standards and Technology recommends that you compare your selected password with a list of commonly used or known compromised passwords. Enzoic.com and Passwordrandom.com are two examples of websites that offer password verification tools.

4. Recycle the same passwords
Reusing the same password on multiple websites is especially dangerous for emails, bank accounts, and social media accounts . Even if you haven't used them in years, once stolen, they can be used to access different websites.

5. Use (pre) available data
Do not use the following information for passwords or security questions: dear or pet names, maiden names, birthdays, birthdays, wedding dates, or any other similar information available on the Internet.

6. Use the option to remember the password for your computer
Never, absolutely, never apply the "save" or "remember me" option on a public computer. The following user could easily access your account.

7. You use character strings that are easy to hack
Do not use a string of characters such as "123456", "qwerty" or "password" for the password. Many hackers still use the "guesswork" strategy to enter. Think of something more complex, yet memorable and personal for you. For example, "70YrS @ n% styll% LUVN ^ life!" Which could mean "70 years old and I still love life!"

8. Do not password protect your mobile device
A study by Kaspersky found that 18 percent of smartphone users use almost no security, even password. When setting a password on a smart device, it would be wise to avoid combinations such as "1234," 0000, "2580" (top to bottom) or "5683" (which, if the letters are used instead of numbers, would indicate 'love' ', that is, love in English).

9. You have stored a password list on your computer.
Saving passwords is fine, provided they are not saved on your computer or smartphone. However, if you do so and your computer is infected with malware, you are bound to fail. Writing in pencil on paper, stored in a safe place is a better choice. Especially if it consists of hints instead of real passwords.


The cost of not doing


Changes take time, but also willpower. Abagnale calls for action immediately.

"We must act now. When cybercriminals break into a database with usernames and passwords, they take over your identity, ”he warns.

With account identities and credentials, they have merchandise that is very well marketable in the online black market. They can be easily converted into cash or cryptocurrencies. The money earned is mostly used for illegal purposes, often much worse than stealing money, warns Abagnale.

"Let's not let the bad guys win," he added, quoting at the end of the Anglo-Irish statesman and philosopher Edmund Burke: "The only thing necessary for evil to win is for good people to do nothing . "

Read more