Saturday, February 28, 2015

Endangered sharks, easier to recognize a new … – La Voz del Interior

So precious are shark fins in some countries which are often ripped the animal’s body without being able to identify later, a problem that aims to address a new digital tool.

The iSharkfin program, developed by the Organization of the UN Food and Agriculture Organization (FAO) in collaboration with the Spanish University of Vigo, can recognize shark species, especially those most threatened by illegal fishing, to From the photograph of their fins.

“It’s very complex identification when downloading (goods) in the ports,” said Efe Spanish Castor Guisande expert Department of Ecology and Animal Biology at the university who participated in the project.

Until coastlines around the world flock ships with tons of fins, considered a delicacy in Asian cuisine, while the bodies of the dead and mutilated sharks are thrown to the sea, a practice that some countries like the European Union have banned by forcing the flap remains attached to the fish.

The new tool, Guisande explains, allows the computer to download an image of the fin, making it four reference points to define your shape and pressing a button, get the name of the species in seconds.

iSharkfin now is able to identify at least 35 species of sharks, but the goal is to expand the database and develop an application for the Android system in the coming months.

Guisande stresses that there 1,136 types of sharks and rays, although researchers have focused on collecting information from the endangered species of commercial interest, which are reduced to little more than a hundred, while there are other very rare and hard to find.

“The overexploitation (of fish resources) has a clear impact on these species, which reproduce very slowly and have poor recovery,” he adds, referring to the sharks.

These large predators occupy a very high level of the food chain in the ocean and feed on the most abundant species, helping to balance populations of different types.

Other value give the shark those diners who continue in their flippers luxury dish with which to impress on the table.

Whether for flavor or aphrodisiac and therapeutic properties that are attributed to a kilo of the fin can be worth up to thirty times more than one of the very flesh of the shark, according Guisande.

Given this tradition, the Chinese government is trying to avoid eating shark fin at official banquets and, according to some studies, sales of that product have fallen recently in the country.

Monica Barone, who heads the FAO team responsible for developing the new software shows confidence that the tool improves the statistics on global exports and imports of the fish.

Inspectors at ports and environmental managers can now launch the identification of shark fins that system to control not endangered species are fished.

The program is also aimed at researchers, teachers and anyone curious to identify this animal, feared and admired.

In addition to this initiative, holding specialist, there are other similar as the application developed by Stanford University (USA) to take pictures of rare species of shark and share on a network worldwide.

Barone, “the more the availability of these data, most significant will be the results.”

And so, in the future, comments, fishing companies can determine what type of sharks being caught and “report from the ships to the authorities” in order not to exceed the quotas established for certain species.

LikeTweet

Endangered sharks, easier to recognize new software – ABC Color

ROMA. So precious are shark fins in some countries are often torn from the animal body without being able to identify later, a problem that aims to address a new digital tool.

The iSharkfin program, developed by the Organization of the UN Food and Agriculture Organization (FAO) in collaboration with the Spanish University of Vigo, can recognize shark species especially those most threatened by illegal fishing, from the photograph of their fins.

“It’s very complex identification when downloading (goods) in ports,” the Spanish Castor Guisande , an expert from the Department of Ecology and Animal Biology at the university who participated in the project.

Until coastlines around the world flock ships with tons of fins, considered a delicacy in Asian cuisine, while the bodies of the dead and mutilated sharks are thrown to the sea, a practice that some countries like the European Union have banned by forcing the flap remains attached to the fish.

The new tool, Guisande explains, allows the computer to download an image of the fin, making it four reference points to define your shape and pressing a button, get the name of the species in seconds.

For now iSharkfin is able to identify at least 35 species of sharks, but the goal is to expand the database and develop an application for the Android system in the coming months.

Guisande stresses that There are 1,136 types of sharks and rays, although researchers have focused on collecting information from the endangered species of commercial interest, which are reduced to little more than a hundred, while there are other very rare and difficult to found.

“The overexploitation (of fish resources) has a clear impact on these species, which reproduce very slowly and have poor recovery,” he adds, referring to the sharks.

These large predators occupy a very high level of the food chain in the ocean and feed on the most abundant species, helping to balance populations of different types. Another value give the shark those diners who continue in their flippers luxury dish with which to impress on the table.

Whether for flavor or aphrodisiac and therapeutic properties that are attributed, a kilo of the fin can be worth up to thirty times more than one of the very flesh of the shark, according Guisande.

Given this tradition, the Chinese government is trying to avoid eating shark fin at banquets officers and, according to some studies, sales of that product have fallen recently in the country.

Monica Barone , who heads the FAO team responsible for developing the new software, shows his confidence that the tool improves the statistics on exports and imports of the fish world.

Inspectors at ports and environmental managers can now launch the identification of shark fins that system to check that no endangered species are fished. The program is also aimed at researchers, teachers and anyone curious to identify this animal, feared and admired.

In addition to this initiative, says the specialist, there are other similar as the application developed by the University Stanford (USA) to take pictures of rare species of shark and share on a network worldwide.

To Barone, “the more the availability of these data, most significant are the results.”

And so, in the future, comments, fishing companies can determine what type of sharks being caught and “report from the ships to the authorities” in order not to exceed the quotas established for certain species.

LikeTweet

Friday, February 27, 2015

How you use the software? – Cuba News


 The mouse arrow ran the screen from side to side. Her feet showed anxiety about the clock marking the time. The fingers were not enough words to tell him he still had not. The delete key sounded again and again.

 How is it possible if only six years? This was the first thought I had to watch my younger neighbor was working at the computer of their parents. Apparently, Laurita’s attention was fully occupied at that game where families forming words from images, “he reviewed the last class that he gave his teacher.”

 “In primary education it is necessary to create pathways that facilitate understanding of different content from school. Since the introduction of computers in schools, and hand of different software, you can discover content that allow them to learn, research and interact with the computer; which is a wonderful tool to expand your cultural horizons, “said a Cubahora Osmany Torres Guerrero, developer educational software in Holguin.

 Despite the usefulness of this type of product and the pressing need to have more presence in our schools, the creation of software must be mediated by quality rather than quantity. You need to incorporate, and a new teaching and learning, a high quality in design, presentation and navigability project.

 No gain by producing software twentieth year, quantity does not translate into quality; won by one that is really useful and reach your target audience.

  THUS BEGAN IN CUBA

 The development of information technology is a phenomenon that contributes positively to improving educational way. The use of computers in the learning process develops creativity, confidence and initiative in students.

 Someone thoughts as clear as Ernesto Guevara once said: “The world is moving towards the electronic era (…). Everything indicates that this science will constitute something like a measure of development; whom the master will be a leading country. We will devote our efforts in this direction with revolutionary audacity. “

 His words warned of a future where new technologies mark the way forward; then, educating using computer as a tool seemed a distant dream for Cubans.

 It was not until the 80s of last century began to develop educational software in isolation in different pedagogical universities of the country; which, although only respond to specific needs, ie, difficulties with problem solving or the Pythagorean Theorem, marked the first steps in this area.

 In an interview with César Labañino Rizzo, Head of Resource Development for Learning, we met on the early onset of enthusiastic teachers with a different look to the future, at which a spontaneously began to emerge small groups that motivated the creating educational software, a process that lasted for approximately five years.

 After long hours of conversation with the specialist we could know that in Cuba, the development of technology with respect to education has two fundamental aspects: one is the technological development of the country, and on the other a factor of economic nature politically, related to the fall of the Berlin Wall.

 “It is known that when the special period began the country fell into a severe economic depression. From a Marxist perspective, following the precept that ‘man thinks as he lives,’ the economic problems existed is subsequently reflected in society. Obviously the solution was to solve the economic problem, but not being possible was necessary to resort to other issues, and the revolution opted to preserve the social factor from the educational point of view, “said Labañino a Cubahora .

 The question of how it was possible to carry out such a task, amid the complex situation was immediate. The wise smile and accurate words of Caesar were the necessary response:

 “Imagine, we faced a very complex economic situation, which was the existence of groups of students with about forty students. Newton’s Law Teaching in these conditions was not complex, but seek and preserve values ​​was a real problem, I mean, create and preserve relationships between the school and the families of the students. Then came the idea of ​​reducing groups to fifteen students. At first glance this seems a very wise formula, but has great economic implications: more classrooms and more teachers are needed in order, it is a problem that continues to go through another economic problem “

.
 This stage marks an important point in Cuban education, because reaches the comprehensive general classroom teacher, which said the expert, “in view of a Leonardo Da Vinci had to know everything. This would have been possible if, and only if, he had been girt technological tools required to strengthen the formative work much rather cognitive, or work, was not so important that he was the wise guy, but it was very important that he was the engineer of the soul of the boys who were in the classroom. “

 With the aim of providing technology-curricular support needed to carry out this historic mission, which was the emergence of comprehensive general teacher, comes a new department within the Ministry of Education. The goal: to make the 1 o September to July 25, when a teacher need to inquire about certain content, he and the student could reach that information I needed through the educational software .

 In this context are created, throughout the entire country, twenty centers of educational software development, “which in a very organized manner functioned as Voltus 5, although working separately when needed did join to perform a rush. Thus the Multisaber collections for primary education, the Navigator, for secondary and high school education Future for created “Labañino told the magazine.



  AN EXPERIENCE IN EASTERN CUBA

 In Holguin province lies one of the first centers established in the island for the development of educational software. After contact Osmany Torres Guerrero, developer of the subject in the region, we met on the creation of two new software, designed to “raise the quality of teaching and learning of priority subjects and the development of educational activities related to the information technologies, “said fellow instructor Youth Computer and Electronics.

 Torres Guerrero explained what these two products: “The software My first letters is the principle that the child learns the phoneme-grapheme relationship, develop phonemic hearing exploiting the use of iconography, color, shape and size; distinctive elements of this age; also has precedential a story where the letters are personified and form a large family (A family of letters) .

 Regarding software for computational skills, Playing learn to calculate , is developed as a support to the learning process of the two most important calculation operations at this stage: addition and subtraction “.

 Pleased and eager to continue the work, Osmani said: “Expectations exceeded what was dreamed at first, as currently used in different educational centers of the territory, as an innovative way to facilitate learning in these two areas so important . In addition, parents of children in this age seek it as a means of preparation before starting the first grade, and then as suitable for training element of the knowledge acquired in class. “



  WHAT NOW?

 A criterion of César Labañino: “In technological terms, the educational software is in its best moments. I would say there is a concept of how to make Cuban educational software. I can assure you that we are in tune with what is done worldwide on issues of educational software, and anyone researching will not find in any country an extensive curricular support educational software the way we have, which is due mainly in the world this is very expensive. “

 In the recently concluded First National Workshop on Computerization and Cybersecurity , Wilfredo Gonzalez, Deputy Minister of Communications, said to be updated national education programs to form a citizen ready to assimilate Information Technology and communication technologies (ICT).

 If both agree on the importance of technological tool for education, and quality posed by these products, designed and created in Cuba, why in practice, that is, in Cuban classrooms do not have the necessary visibility? Let us know what you think about this issue, comment below …

LikeTweet

Free Software will be effective from May – Correo del Sur


 
 


 DIGITAL TRANSFORMATION. National authorities met in Sucre to coordinate actions in the implementation of both plans.
DIGITAL TRANSFORMATION. National authorities met in Sucre to coordinate actions in the implementation of both plans.

 


 
 PUBLIC INSTITUTIONS SHOULD BEGIN TO MIGRATE

  Free Software will be effective from May

Free Software will be effective from May

 

Electronic Government will also be implemented for proceedings

César It

 

As of May, all public institutions of the country should migrate from proprietary system to free software and begin implementing Electronic Government, as confirmed authorities of the Ministry of Development Planning and the Agency for Development of the Information Society in Bolivia (ADSIB), which met yesterday in Sucre.
 In compliance with the General Law of Telecommunications, Information Technology and Communication and Supreme Decree 1793, the Ministry of Development Planning in coordination with several institutions, including the ADSIB, over the past 15 months advanced in the plan Implementation of Free Software and Open Standards for the executive bodies, legislative, judicial and electoral; besides the implementation plan of the Electronic Government at all levels of government.
 “Concretely been working on developing a portal for online transactions that will allow tomorrow to citizens access to all information of procedures offered by the State to the public and will also allow in a short time digitally perform procedures, “the director of the Electronic Government, Diego Pimentel.
 According to the Supreme Decree 1793, both plans will take effect from May 2015, for which all public institutions are obliged to make computing transformation.
 “We’re starting to sign some agreements with ELAPAS with the Departmental Assembly, among others, so they can go migrating to free software programs and once the plans are implemented in Bolivia, there will be an institution to continue with proprietary programs, “said Sen. Nelida Sifuentes, promoter of the project.
 Also, the senator said that on Monday March 2nd from 18:00 in the Andean University, Ambassador of Ecuador Ricardo Ulcuango, make an explanation of technological advancement at the University of Technology Experimental Research at the City Knowledge Yachay of that country.

 
 
 

LikeTweet

Thursday, February 26, 2015

After the scandal by malicious software, they turned the page … – InfoBAE.com

   
   


 
     

       
       
 
       
 
       
       
 
Credit: Reuters
Instead of his usual appearance The homepage of the company portal showed a few hours photographs of teenagers accompanied by songs and a group of hackers called “Lizard Squad” claimed the attack on one of their Twitter accounts.
A Then the company, which does not officially acknowledged having been the victim of a cyber attack nor related what happened to the action of pirates, published on its website a message of apology in nine languages.
“Right now the site web is not available, but the service will be restored as soon as possible. To check or check the status of an order and any questions you might have, please contact your sales Lenovo to help in whatever precise “, it read on the website of the firm.
However, Lizard Squad, the group hacking the PlayStation and Xbox portals Christmas was attributed, claimed responsibility via Twitter profileLizardCircle, which also released screenshots with emails sent Lenovo employees.
The computer maker is criticized in recent weeks following the factory installation of software Superfish , a program introducing advertisements among results of searches performed on the Internet.
The program has vulnerabilities and threatens to users.
The Chinese firm apologized, announced that it had ceased to include this program in their devices and opened a hotline for customers to resolve potential problems created by this software.
“We decided to install Superfish in some notebooks, something that frustrated many users and therefore decided to remove it from preinstallation. Then we saw reports of a vulnerability created by this software and take immediate action to remove. Clearly, this raised concerns among our customers, partners and those who care about Lenovo, industry and technology in general. For this, I apologize again, “he said.
In its brief, Hortensius acknowledges that the reputation of the company was affected and planning” send safer products “to consumers.
Anyway, it emerged that a user group analyzes file a class action.

     


     

Infobae

     

 
   


 
   
   
   
   

   
 
   
 
   
   

   
   
   
   
 
   
   
   
   
LikeTweet

Software: five things to develop in 2015 – InformationWeek Mexico

There hottest trends that can not fail to be seen and you sure as anticipated, but we must not overlook the maxim: Follow the money! So before my list of the five areas of opportunity in software in 2015 should analyze the predictions and where the opportunities lie. Clearly. In business software

If any sector continues to enjoy full health within IT is the software industry. Its growth in 2014 was estimated by the consultancy Select at 13.2%, totaling $ 33.709 million.

The Telecommunications segment would be one of the main investors in software followed by sectors such as finance, trade and manufacturing, traditional vertical driving the software, highlighted Select

As for transverse applications, infrastructure (virtualization and storage) and security, represent 37% of the country’s demand.; followed by tools such as databases, productivity suites and Business Intelligence, with 33%; and finally the application (ERP, CRM, SCM and Collaboration) with 30%.

Security software would be the most outstanding in 2014, according to predictions by the same Mexican firm. In 2013 he recorded an increase of 6.2%, with a value close to $ 3.340 billion. In 2014 it was estimated to have a growth of 16.2%.

A worldwide are estimated to add up spending $ 335,000 million, 5.5% more than in 2014, according to Gartner. Further price erosion and consolidation among providers, derived from a fierce competition among those offering Cloud and on-site software offering is expected. For the CIO this means the opportunity to negotiate aggressively with its software suppliers, many of whom are worried about losing them to alternative cloud

Here are the five things to develop in 2015.

1. Mobile Enterprise Applications

CRM and other business mobility will detonate. Salesforce started the trend in 2014, with investments in its mobile app, and got his integrators’s use it.

In 2015 mobility will remain a crucial stage for the great players of CRM, which will continue bringing its functionality moving ever closer to the level of your main web product. As employees spend less time in the office, have to be “friendly mobility” solutions (CRM, BPM, etc.) will be essential.

If you want to succeed at enterprise level solutions should prioritize the needs and behavior of mobile employees in its design to ensure they are connected wherever they are and are able to communicate and collaborate with colleagues in the office.

 2015-aplicacionese

Mobile Awareness (Mobile awareness)

‘ve probably used their phone to navigate with GPS while driving but the GPS technology can be used for much more. This field has been there for long, but now it has become socially palatable.

When in the past appeared Bluetooth phones, advertisers were exploring sending SMS ads to users who passed front sensors. Finally technology never took off because users felt intrusive concept.

Now, ubiquémonos quickly in the present and the digital landscape has changed dramatically. Whether browsing, social media or game, all these apps have access to the GPS chips in mobile devices. One of the most notable cases of sensitivity mobile technology in the real world will be using iBeacons shops within its stores to local navigation and display targeted based on a user frequents departments ads.

Besides trade, any application that uses the location as a factor to shoot a feature, falls into this trend. Provided that these systems are implemented, you should make them optional to avoid a backlash from users.

2. Open Source

Data warehousing and BI have long been the domain of proprietary software, concentrated in a handful of providers.

However, in the last 10 years have seen the emergence and continued dominance of Spark Hadoop and then open source alternatives that offer low-cost scalability and sophistication to derive information from Big Data.

The open source software will continue gaining ground in business in 2015. The Hadoop ecosystem estimated to reach $ 25,000 million for 2020. And today Spark is distributed by more than 10 manufacturers, including SAP, Oracle, Microsoft and Teradata, with support for the leading BI tools such as Tableau, Qlik and Microstrategy.

2015-opensource

3. Analytical skills

While we will continue talking about big data, the problem 2015 will be the availability of people with analytical skills, rather than the technology itself.

Companies need people who can build new data architectures needed to manage unstructured data and results in real time.

Other advances will be required in areas such as product innovation, discovery habits, decision making, or availability of IT as the huge sets of data continue disrupting business operations and IT.

You can be a data scientist. Analytical tools are becoming easier to use and widely available, so data science is not limited to the technology sector. In 2015 anyone with the right tools can derive powerful discoveries of the data.

The scientific data should learn from anthropology and understand that qualitative information can provide answers to questions you never knew you had.

2015 bigdata

4 .- The Internet of Things

have a major impact on customer service, while consumers expect more personalized interaction with suppliers.

The Internet of things changes the entire dynamic of customer service. Systems Management Customer Experience (CEM) will be capable of processing data streams in real time wearables for exercise, motor vehicles, electrical appliances and medical devices, to name a few of the categories of connected devices that are in the horizon. When you collect, correlate and implemented, data from these devices will collide in an unprecedented view of customer needs, resulting in a huge competitive advantage for those who take advantage.

2015-mobile

Sensors & Wearables

What began as a novelty is now one of the hottest sectors of the technological landscape. While all countries of the world struggle with the increasing rise of health care, industry suppliers are turning to medical data generated by sensors in real time to inform and improve their medical decisions.

software developers, creating algorithms to process the gold of medical information is an essential skill for many companies who want to succeed in the area of ​​health care. Additionally, offer efficient ways of displaying this information is crucial for users to really give good use.

While the wearable sensor technology and are technically hardware devices, software developers will be vital to create applications and devices that make it possible for consumers to good use.

 2015-wearables

5. The API, the workhorse 2015

Web APIs are opening many new views pair of modern enterprises, and people which is responsible for building the technology to jump-start things.

The Application programming interfaces (APIs) have been part of tools developers for many years, to help them build and link applications. Now, the Web APIs or interfaces to services that can be invoked over the Internet, be part of any emerging scenario you can imagine. From the IoT to analytical data integration tracking to end users

2015-api

There is no end to what the API will for us in the next 12 months:

1. IoT will glue

There is no API IoT, and virtually any data that moves on a device come there with an API. In addition, the API provides the taxonomy of IoT, allowing “transaction data at the device level, without having to wait for processing at the back-end to do the necessary work to deliver results to the user.

2. They allow greater integration in the cloud

The Cloud and SaaS applications need to be integrated in Internet time, and API that provide the agility to rapid integration. In addition, it is expected more emphasis on identifying, integrate, orchestrate and manage API that will help bring together applications and data.

3. They provide access to further analyze big data

In the year ahead, the API will not only facilitate the transmission of communication and data but apply analytics to understand how they are used data . The APIs provide tons of data and information on customer behavior that can not be obtained from any other source. This information includes who is using the data, how are consumed, and when modifications and changes are required.

4. They open doors to innovation:

The API will help in two ways: first, companies are opening their data through API to uncover the creativity of its partners and developers. Second, products and services enabled by API developers are offering tools that allow them to focus on building something new, innovative and useful, and in a way they do not have to worry about the back-end management and administrative tasks side the server. These features include security and orchestration capabilities.

5. They will promote the use of microservices

The APIs are highly componetizadas, and this leads naturally break down enterprise applications microservices. APIs are the agents of a varied kind of data and apps, while microservices help build these apps as a mix of services needed rather than a conglomeration of software tightly integrated with a single purpose.

View http://www.zdnet.com/article/api-economy-2015-update/

LikeTweet

Wednesday, February 25, 2015

Unlicensed software and malware, closely linked: BSA – The Economist

From 600 million computers in 81 countries IDC found that the higher the rate of unlicensed software, the greater the amount provided computer viruses or malware installed PCs of those nations.

A study conducted by IDC in a sample of 600 million computers in 81 countries found that the higher the rate of unlicensed software, the greater is always the amount of malware or virus computer installed PCs these nations.

For example, in 2013, the rate of software piracy in the US was 18% and the rate of malware found was 13% in each quarter of the year . For Indonesia, the software piracy rate was 84% ​​and the rate of malware found was 44% per quarter.

Brazil with software piracy rate of 50%, had an incidence rate malicious code 31% per quarter in 2013.

The solution to this problem is simple, says a new report commissioned by The Business Software Alliance (BSA). The strengthening of strategies to combat illegal software by governments, companies, civil organizations and end users will lead to a clear reduction of cyber attacks.

“This analysis shows that the link between the use of unlicensed software and malware is real, which means that good management software management is an essential first step to reducing risks of cybersecurity, “said Jodie Kelley, senior vice president and general counsel at the BSA.

undefined

IDC analysis compared the rates of unlicensed software installed on computers in 81 countries, based on detections of malicious code by Microsoft, a partner in BSA. And it was based on a study of this association of technology firms and agencies of intellectual property, which had previously examined the global rates of use of unlicensed software.

In 2014, the Global Survey Software BSA reported that 54% of software installed in Mexico, for example, during 2013 did not have a license, compared with 43% worldwide, and further revealed that then existed in the country a rate of 31% of teams contaminated with malware.

The study also found that the main reason given by users worldwide not to use unlicensed software obeys the reason to avoid threats to their security.

The risks associated with unlicensed software, 64% of users worldwide cited unauthorized access by hackers as a major concern, and 59% associated it with the loss of data access.

BSA recommended this time users and organizations implementing internal controls and management practices of software assets that comply with ISO, to reduce exposure to cyber threats to ensure that all software installed in their systems count on the licenses.

Kiyoshi Tsuru, director general of the BSA in Mexico, said the asset management software is an effective tool to reduce risks of cyber attacks and a way to establish security practices in corporations.

erp

LikeTweet

Tuesday, February 24, 2015

How to protect your electronic equipment with a monitoring software – lanacion.com (Argentina)



Tablets, mobile phones and computers may have a monitoring service at no cost, allowing locate the device and wipe data remotely. Photo: File / Intel

The various equipment and electronic devices have connectivity features that allow them to stay connected to the Internet, either through Wi-Fi or over the mobile network. In addition to geolocation service, users have an ideal combination that lets them know the location of their personal computers, tablets and smartphones.

For the location of a team to theft or misplacement is cash requires configuring a monitoring software. The main platforms of mobile phones and tablets offers this service free of charge, and serves both to identify both the geolocation and the remote deletion of personal data from the device. It also tends to capture a picture using the camera used for video conferencing, an option used by Mike Fabrikant, a user who denounced social networks to a certain Paul for stealing your Macbook (and created a site to track it, so managed to recover the computer).

In the end, the defendant had purchased the team in good faith, and research continued on the seller’s side.

Apple has for its entire line equipment the Find My iPhone feature, available for the entire line of iOS mobile devices like the iPhone, iPad and iPod touch in addition to also cover Mac computers. No cost, the application requires an account Apple ID to register equipment and, thus, enable remote monitoring.

Windows Phone users can activate the location and remote wipe their mobile phones from the site www.windowsphone.com/find while those owners of a smartphone with Google’s mobile operating system Android have Device Manager service, which can be configured in www.google.com/android/devicemanager. For tool called BlackBerry Protect.



Prey, the option mutliplataforma

To ensure effective monitoring of a Windows, Mac or Prey Linux is an open source platform that also supports tracking of mobile devices with Apple iOS and Google Android. Requires install the corresponding program for each operating system and configure the service with a username and password.

Once completed these steps, Prey monitoring can be done from the web site and provides a series of powerful tools to lock, locate or remotely wipe data from a lost or stolen computer. The service is free of charge up to three computers, and if higher performance is required, there are plans from $ 5 per month.

One way or another, the dilemma is to perform a remote wipe or maintain active team up that police authorities to initiate the procedure to arrest the suspect and recover lost personal items.

Of course, it is always recommended that you configure the preform services backup to protect the images, documents and other important files. Some of the strategies that can be adopted for an automatic backup to external hard drives or platforms like Dropbox, Google Drive or OneDrive of Microsoft are detailed in www.lanacion.com.ar/1568031.



The assistance of the Police

As background, journalist Maria O’Donnell managed to recover their stolen thanks to the geolocation feature of your mobile phone, objects while a tablet allowed a family San Antonio de Padua could track down criminals with the assistance of the police.

“Time is vital for such cases, and for this specialized staff are employed in tracking devices based on the various tracking software. Once the complaint filed with the participation of the respective specialized units, the agents involved with the findings required by the case, such as the area of ​​tracking and identification of the home, “Gabriel said at the time Rojas, head of Telematics Research Special Area Metropolitan Police said in a note that detailed the steps to the theft of a tablet, a phone or other electronic equipment. .

LikeTweet

They arrested a thief for spyware that the victim was in … – lanacion.com (Argentina)

A woman of 39 was stolen Citadel home when she was not. Your computer, 2700 pesos and took LCD. When I thought it would be impossible to find the offender, much less recover belongings, photo came to his cell to face the thief: it was the boyfriend of her friend, who never had the computer would have a software spy who takes a picture to who uses the device and is not registered.

According to the newspaper Chronicle, the thief was then identified that the machine, after being activated, you take a picture and forwarded to cell of the injured.

Miguel Angel Maccario, Chief Police Department on February 3, detailed the use of cybernetic program. “When the offender wants to operate the computer, put misinformation and take the picture. Hours later, the victim arrives the image to the phone. He was surprised because he never imagined that the boyfriend of a friend was going to break in and steal” , featured in televised remarks.

The incident occurred on Saturday morning in Padre Elizalde 1400, Citadel. “The assailant violated a fence and broke the door. Once inside, stole a sum of less money to three thousand pesos, 42-inch LCD, computer and some other items of value, including you clothing,” said Commissioner Maccario.

The hostess came to his home at dawn and found his house every revolt, so he immediately called the police over the phone 911 and then made the complaint of theft to the police station in the area.

But the surprise came hours later, during the Saturday when he received on your phone Iphone a message telling him that his computer had been turned on.

“At that time, she sees that the man who had just lit his computer was the boyfriend of her friend, so he decided to tell the police and the courts,” Maccario Telam said.

She was the second of Citadel station with photo and reported the incident. Since I knew the offender because it was almost a year ago with his girlfriend boyfriend, police raided his home in Caseros. The operation was carried out in Esteban Merlo to 5000. There, he was arrested without offering resistance and police seized the stolen belongings.

The Functional Unit of Instruction 6 San Martin also raided another house that the suspect shares with his girlfriend.

In addition, police sources detailed that spyware does not just send the picture who is not authorized to use the device, it can also remove all the contents if the person does not own the computer. “This system will be popularize in the not too distant future,” said Maccario.

The arrested man, identified as Ruben Oscar Gomez, 56, is in custody and police are investigating if you have a history.

LikeTweet

He stole a computer and was stopped due to spyware that … – InfoBAE.com

   
   


 
     

       
       
 
       
 
         
 
       
       
 
 
 
       
 
       
 
       
 
        
 
       
A man aged 56 was arrested in the last hours accused of stealing a laptop to a friend of his girlfriend, in addition to money and other valuables. Strangely, was the machine that betrayed the thief , thanks to a spyware that the owner had installed it.
The theft occurred in a house in the street Padre Elizalde 1400, in the town of Citadel of Tres de Febrero. As the system is configured, the victim of theft received a picture on your cell automatically takes the notebook is barely on.
In the picture, the woman, 39, was able to see the person who had his computer, whom he identified quickly because it was a known person. So He soon made a complaint to the police station 2nd of Tres de Febrero, providing data of the alleged offender and home address, according to the newspaper Chronicle.
Hours later, members of the Buenos Aires police conducted a raid on the home of the accused, on the street Esteban Merlo 5000, in the town of Caseros. There not only were found with the computer, but also with TV 42 inches, clothing and 2,700 pesos in cash , all elements of the victim.
The case was labeled a ” theft “and is being investigated by the Functional Unit No. 6 of the judicial department of San Martin.

     

     

Infobae

     

 
   


 
   
   
   
   

   
 
   
 
   
   

   
   
   
   
 
   
   
   
   
LikeTweet

Monday, February 23, 2015

How to uninstall the malware that Lenovo included in their … – InfoBAE.com

   
   


 
     

       
       
 
       
 
       
       
 
AFP
The software in question is Superfish , you would be able to intercept encrypted banking connections, ie, might be able to steal personal data or at least open a door through which to filter malicious software.
In the beginning Lenovo said it examined “background” Sueprfish and found “no evidence to justify security issues” . Nevertheless, the Chinese company, the number one computer manufacturer, decided stop installing the program on the computers of users.
Days later, through a statement, Lenovo said. “. We did not know about this potential security vulnerability until yesterday Now we are focused on fix”
In addition to the manual removal instructions, Lenovo launched an automated tool to “help users remove the software and certificate. ” In both cases, the solutions are only available in English . Click to access
In parallel, Lenovo said it works with McAfee and Microsoft for the Superfish software and certificate is deleted or quarantined either through their tools and industry-leading technologies. “These actions have already started and will automatically fix even for users who are not currently aware of the problem,” said Lenovo
Lenovo clarified that “this issue in any way impact our products ThinkPad;. Any tablet, PC desktop, smartphones,. or any server or other storage device “
The company did not specify which countries or many machines are compromised, but users to Infobae reported that some computers sold in Argentina take that software . The list of models where settled Superfish:
Serie G : G410, G510, G710, G40-70, G50-70, G40-30, G50-30 , G40-45, G50-45
Serie U : U330P, U430P, U330Touch, U430Touch, U530Touch
Series Y : Y430P, Y40-70, Y50-70
Serie Z : Z40-75, Z50-75, Z40-70, Z50-70
Serie S : S310, S410, S40-70, S415, S415Touch, S20-30, S20-30Touch
Serie Flex : Flex2 14D, 15D Flex2, Flex2 14 Flex2 15, Flex2 14 (BTM), Flex2 15 (BTM), Flex 10
Serie MIix : MIIX2-8, MIIX2- 10 MIIX2-11
Serie Yoga : YOGA2Pro-13, YOGA2-13, YOGA2-11BTM, YOGA2-11HSW

     


     

Infobae

     

 
   


 
   
   
   
   

   
 
   
 
   
   

   
   
   
   
 
   
   
   
   
LikeTweet