In a breakthrough that may help those with severe voice difficulties to communicate, an aerospace engineer; who is from Chennai; has created the world’s most unique glove. These gloves give voice to hand gestures. These Gloves convert simple finger movements into gestures which control speech through a synthesized voice. The user simply wears the glove … Continue reading Chennai techie’s gloves give voice to hand gestures
Facebook security bug briefly exposes user contact info The Facebook nightmare of a security bug exposing the contact information of some of its more than 1 billion members has come true, the social networking company admitted on 22nd June, 2013.
Scientists working on most powerful cyber security Australian scientists are working on Quantum mechanics which is being applied to computing in order to develop most powerful and impenetrable cyber security method ever conceived.
Hello Everyone! How you doing? Hope you all are fine and doing good. Every blogger was in contact with the Google’s blogspot network. And it might be the case that you have started blogging with Blogspot.
Forget Keyboard; Here are the Voice Controlled Browsers Yeah! Thats right. I am talking about controlling the browser by voice. And No; you would not need to install any other browser for that. Your veru own Chrome will do that.
‘Mass Exploit Distribution’ 0-day vulnerability of Java revealed On 10th of January a 0-day vulnerability of Java revealed. Oracle has not quoted any response on this vulnerability till now, despite widespread adoption by exploit kits and evidence it is being used to serve up nasty malware.
Yes; you heard it correct; Ubuntu for Smartphones. First of all Hello everyone and Welcome. Today I’m gonna share my views about Ubuntu for Smartphones.
Security Flaw found in Samsung Galaxy Phones Samsung has been in the talks for its flagship devices Samsung Galaxy S III and Note II. But now here is some trouble for the users of these devices. Yes the security of these devices is found vulnerable and can lead to malware attacks.