Nokia 6 Durability Test - Scratch, Burn, And BEND tested

Will ALL NEW NOKIA 6 will last as it says?
Proven not through the video test?
Watch and be informed...
Closed Captions are enabled...



0 comments:

Red iPhone 7 Scratch Test - How durable is it?

This video test will prove the durability of the new iPhone 7 RED Version
Will it survive or not against the measurements of JerryRigEverything? 
Watch and be informed!

[Feel Free to Comment...]




original source video can be found at right here

0 comments:

iPhone 7 - The Best Durability Test - Will iPhone 7 SURVIVE?

Can the iPhone 7 survive the JerryRigEverything Durability tests? 
Like always we'll start with the scratch test from Mohs scale of hardness. 
With this test we can find out if Apples' new iPhone 7 has a regular glass screen, or a super scratch resistant sapphire screen. 
After analyzing all of the different aspects of the iphone 7, like the camera lens, the home button, the rear aluminum, and the charging port, you will have a better understanding of what the phone is made of, and how much abuse the iPhone 7 can withstand in every day life. 
JerryRigEverything assumes no liability for property damage or injury incurred as a result of any of the information contained in this video. JerryRigEverything recommends safe practices when working with power tools, automotive lifts, lifting tools, jack stands, electrical equipment, blunt instruments, chemicals, lubricants, expensive electronics, or any other tools or equipment seen or implied in this video. Due to factors beyond the control of JerryRigEverything, no information contained in this video shall create any express or implied warranty or guarantee of any particular result. Any injury, damage or loss that may result from improper use of these tools, equipment, or the information contained in this video is the sole responsibility of the user and not JerryRigEverything. Only attempt your own repairs if you can accept personal responsibility for the results, whether they are good or bad.


Durability test video {From youtube.com} :
closed captions are enabled...


taken from here

0 comments:

A win for Apple in Beijing as court overturns iPhone patent ruling



Apple has bigger fish frying in the world of intellectual property. But it must be a relief that an IP court in Beijing has handed the smartphone pioneers a win. On Friday, the courts overturned a May 2016 ruling that said Apple had violated design patents of a small, and now defunct, Chinese company called Shenzhen Baili.

The disputes were over the exterior design of the iPhone 6 and 6 Plus models, which Shenzhen Baili claimed were a copy of their 100C smartphones, curved corners and all. The company “barely existed” at the time it filed the suit. And its 100C smartphones were impossible to find.

Initially, Apple was handed an injunction to stop selling its iPhone 6 line in Beijing, but it quickly filed an administrative appeal and was permitted to sell the phones there again until further review by the court. Damage was likely minimal. Apple was switching up  to iPhone 7 when this IP drama first arose, as TechCrunch’s Sarah Perez noted at the time.

Since the Friday decision, iin press interviews, Shenzhen Baili’s legal team has said it plans to appeal. Apple representatives were not immediately available for comment.

Apple has lost market share in China in recent years to up and coming device makers from Xiaomi to BBK Electronics’ brands Oppo and Vivo more recently. However, it has remained the most profitable player in the market. Specifically, as the Motley Fool reports, “In 2016, Apple captured an incredible 79% of global smartphone industry profits with just 14.5% market share.”

The latest IP decision indicates that China courts will not always rule in favor of home town businesses, at least. Another ruling had raised concerns over protectionist precedents.

Last spring, a court allowed leather goods makers Xintong Tiandi to continue making bags using the “iphone” and “IPHONE” trademarks in China. Xintong Tiandi had registered to use the brand name in 2007, while Apple’s smartphones did not go on sale in China until 2009. Apple hadn’t registered the brand specifically to cover leather goods.

Quoted from here.

0 comments:

Uber grounds entire self-driving fleet as it probes Arizona crash



Uber has now grounded its entire autonomous test fleet in the U.S., following an accident in Arizona which left one of its Volvo SUVs flipped on its side earlier today. The car was in self-driving mode at the time of the incident.

As we reported earlier, the company suspended the pilot in Arizona in the immediate aftermath of the crash. But it has now said it’s grounded its entire autonomous fleet — so also in the two other regions where it is currently piloting the self-driving cars: Pittsburg and San Francisco.

“Our vehicles in Arizona remain grounded while we continue our investigation. Our vehicles are grounded in Pittsburgh and SF today as well,”
an Uber spokeswoman told us.

Four hours ago the same spokeswoman told us the fleet was grounded in Arizona but did not mention the other two locations so it appears the company has decided to expand the suspension in the past few hours.

The spokeswoman confirmed that the Arizona grounding will last as long as the duration of the investigation into the crash but added that the wider suspension does not have a set timing — so it’s not clear how long all self-driving Ubers will be parked. Presumably at least for the rest of today.

Although Uber pulled the autonomous vehicles out of SF last December, after a dispute with local regulators, a smaller fleet returned to California’s roads earlier this month — after it was granted a permit to test two self-driving cars. In Phoenix and Pittsburg Uber has been testing 12 cars apiece.

All Uber’s test vehicles include a human driver sitting in the driver’s seat so they are in a position to take over driving should that be necessary.

In the Arizona incident, in which no one has been reported seriously injured, the WSJ reports local police saying Uber’s self-driving technology was not responsible for the accident — instead a regular vehicle “failed to yield”.

As we noted earlier, the crash is just the latest in a string of bad news stories for Uber — including several related to its self-driving technology but also beyond that, with accusations the company has a problem with systemic sexism in its corporate culture.

That run of bad publicity might explain why it’s taken the decision to err on the side of caution in this instance and ground all its autonomous vehicles, despite the tech not being accused of culpability.

Quoted from here.

0 comments:

Apple Unveils Budget-Friendly iPad, Dresses iPhone in Red

ipad-9.7-inch

Apple on Tuesday announced an iPad update, a red iPhone 7 and 7 Plus, and a new video-editing app for iOS.

The iPad upgrade has a 9.7-inch, 2048 x 1536-pixel Retina display with 264 pixels per inch, and Apple's A9 64-bit processor.

The unit will come in silver, gold and space gray with a starting price of US$329 for 32 gigabytes of storage and WiFi-only support. It will cost $459 for a 32-GB unit with WiFi and cellular support.

As with prior models, the battery life for the new iPad is 10 hours. It has an 8-megapixel rear-facing camera and 1.2-MP front-facing FaceTime unit.

The new iPad is available for order on Mach 24 from Apple's website and will be in Apple Stores next week.

With the latest upgrade, Apple's iPad lineup looks like this: iPad Pro 12.9 inch ($799); iPad Pro 9.7 inch ($599); iPad 9.7 inch ($329) and iPad mini 4 ($399).

Not Quite an Air Replacement

Although the latest iPad replaces the iPad Air 2 in Apple's tablet lineup, it doesn't quite supplant it.

"It falls somewhere between a new device and the old device," said Carolina Milanesi, a principal analyst at Creative Strategies.

"They upgraded the most important thing on the device -- the processor," she told TechNewsWorld. "Not only will the performance be better, but other components, like the camera, will be snappier."

Pricing is also an outstanding feature of the new iPad, Milanesi said, noting that "$329 for a 9.7-inch device is very aggressive."

Prying Old iPads from Users' Paws

Attractive pricing may tempt some iPad owners to upgrade their old hardware.

"The replacement cycle for iPads is getting really long," said Mikako Kitagawa, a principal research analyst with Gartner. "If you have a 3- or 4-year-old iPad, you may want this upgrade."

The pricing also could attract some new users into the Apple universe.

"They're going to stretch the iPad's market into the mid-range tablet market," Kitagawa told TechNewsWorld.

Competitive pressure also may play a role in Apple's new entry-level tablet pricing.

"It's an interesting strategic move for Apple," said Rhoda Alexander, director of tablet and notebook research at IHS Markit.

"They've held that $499 introductory price on the 9.7 for seven years now," she told TechNewsWorld. "That price is way above the competition, so this is a realigning of the product to bring it to a more competitive price point.

The lower price point for the iPad could gin up some additional iPad sales, "but not as much as many believe," said Patrick Moorhead, principal analyst at Moor Insights and Strategy.

"The biggest challenge to large tablets are Windows two-in-one laptops and touch Chromebooks," he told TechNewsWorld.

A Red iPhone

Apple introduced red versions of its iPhone 7 and 7 Plus to celebrate the company's 10-year partnership with (RED), an organization that funds programs to help prevent the transmission of HIV from mothers to unborn babies.

 iPhone 7 and iPhone 7 Plus (PRODUCT)RED Special Edition
Apple customers can contribute to the Global Fund to fight AIDS with iPhone 7 and iPhone 7 Plus (PRODUCT)RED Special Edition.

A portion of the sales of the RED iPhone will go to the organization, to which Apple has contributed more than $130 million during the partnership.

Slated for availability in Apple Stores on Friday, the RED iPhone pricing will start at $749 for a 128-GB model.

Video Editing With Clips

Apple also announced Clips, a new video-editing app. The software is designed to combine photos, video and music without timelines or complicated tools.

iPhone Clips
Real-time filters, emoji and other effects available in Clips can add fun to any photo or video.

Its LiveTitles feature lets you use your voice to create animated titles and captions. As you speak, titles appear on the screen perfectly synced to your speech. You can edit titles with a tap.

Comic book filters are included, as well as support for speech bubbles and shapes. You can use the software to create full-screen posters with animated backgrounds too.

Dozens of music soundtracks are available for the content you create with the app. What's more, the app automatically trims them to fit your production.

Available in April, Clips runs on iOS 10.3 and is compatible with the iPhone 5s or later, all iPad Air and Pro models, the iPad mini 2 and above, and the iPod touch 6th-generation model. 

Quoted from here.

0 comments:

WikiLeaks Exposes CIA's Device Surveillance Tricks

Panama Papers leak

WikiLeaks on Thursday announced that it had released more Vault 7 documentation online, including details about several CIA projects to infect Apple's Mac computer firmware and operating system.

The site unloaded its first batch of stolen Vault 7 data earlier this month.

The CIA's Embedded Development Branch developed malware that could persist even if the targeted computer were reformatted and its OS were reinstalled, according to data WikiLeaks exposed.

The newly released files shone a spotlight on the CIA's efforts to gain "persistence" in Apple devices, including Mac computers and iPhones, via malware designed to attack their firmware.

One of the documents highlighted in Thursday's data dump exposes the "Sonic Screwdriver" project, which likely was named for the handheld tool wielded by the science fiction character "Doctor Who," as the device seemingly can bypass any digital or mechanical lock.

The CIA described it as a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting," accordingly to WikiLeaks, to allow the attacker to gain access even if a firmware password were enabled.

Who Is Listening

The CIA has been infecting the iPhone supply chain of specific targets since at least 2008, a year after the release of the first iPhone, WikiLeaks claimed.

It also released the CIA's manual for "NightSkies 1.2," described as a "beacon/loader/implant tool" designed for use in infecting iPhones.

"Today's release appears to confirm that the CIA had developed tools to hack the iPhone well before most people ever owned one," warned Ed McAndrew, cybersecurity partner at Ballard Spahr and former cybercrimes prosecutor with the U.S. Attorney's Offices for the Eastern District of Virginia and for the District of Delaware.

"Infection within the supply chain illustrates how committed the agency was to widespread and persistent exploitation of these devices over the long term," McAndrew told TechNewsWorld.

"With malware development moving at light speed, it is frightening to think of how the CIA's hacking capabilities have likely advanced from back then to today," he added. "Unfortunately, this release may provide little that will be useful to Apple or its development partners in eliminating vulnerabilities in today's devices."

Controlling the Firmware

Also among the data released on Thursday is information on "DarkSeaSkies," a project that could implant UEFI (User Extensible Firmware Interface) -- a specification that defines a software interface between an operating system and platform firmware -- on an Apple MacBook Air computer.

EFI/UEFI, which is expected to replace BIOS as the connection between firmware and a system's OS, typically is installed at the time of manufacturing and is the first program that runs when a computer is turned on.

Controlling the UEFI would make it virtually impossible for anyone to remove the installed malware.

"If you want persistent access -- which is an exploit that will remain available to you even after a user updates her software -- then there is almost nothing better than control of the firmware," said Jim Purtilo, associate professor in the computer science department at the University of Maryland.

"This gives you control of the device even before the user's software starts to run on it, and your defensive measures will guard digital premises that have already been violated," he told TechNewsWorld.

Bridge Between Hardware and Software

The boot process reflects the increased complexity of modern devices -- that is, how many bridges between hardware and software must be erected when a device is powered up.

"It starts when a modest amount of hardware is used to load and execute commands which are stored in a special type of memory reserved just for this process, and these in turn will cause yet more commands to be loaded from the device's storage -- perhaps a flash drive," explained Purtilo.

"This is where it gets really complex, because there is so much variety in hardware anymore that one boot program can't do all the work itself. It must interrogate each subsystem to ask what special bridges or connections must be initialized for that component to work correctly too," he added. "Otherwise you risk that a display might come up with the wrong settings, or the phone would not be ready to connect to the local service."

Taking Command of a Computer

Through the use of a special UEFI, a computer in essence can be monitored, modified or otherwise controlled by a third-party, often without the actual owner becoming aware of any loss of control. This could give the CIA untold power to monitor almost anyone.

"This boot process is an ideal place for an intruder to introduce his own commands," said Purtilo.

"The hardware must necessarily trust the commands it is given at this point, and that's why designers do whatever we can to protect them from being corrupted by others," he pointed out.

The complexity of the device means there are many paths in -- and to ensure integrity, it's necessary to guard all of them.

"What Wikileaks tells us is that the CIA found a path that the designers missed," said Purtilo. "The suggestion that you can exploit this defect with only quick access to 'factory fresh' phones -- which is what they asserted -- means the vulnerability is pretty fundamental, and that in turn tells us that the number of devices exposed by it could be huge."

Infected Supply Chain

WikiLeaks' Thursday release also includes documents suggesting that the CIA has developed the means to infect an organization's supply chain by interdicting mail orders and other shipments. Tactics could include opening boxes and infecting the machines, and then resending them to their destinations.

That suggests even brand new machines could be infected before they come out of the box.

"The significance of these disclosures is not so much the specifics of the tools used, but that the CIA was able to access new-in-the-box devices through a known vector of vulnerability," said Robert Cattanach, partner at Dorsey & Whitney.

"Similar exploits in the future cannot be ruled out, and the effectiveness of ongoing protections is limited by the imagination of those attempting to anticipate potential vulnerabilities," he told TechNewsWorld.

The bottom line is that "the more sensitive the information, the less willing one should be to trust the security of any device," Cattanach added.

The Intelligence Game

It's questionable whether the information leaked should be considered very revealing, given the way intelligence operates today.

The mission of U.S. intelligence services is to "gather intelligence against those with the intention and capability to harm our national security," explained Cattanach.

"Those agencies presumably will attempt to access information in any way technically possible, using methods that are as difficult to protect as possible," he added. "Legal nuances are will likely be skirted, and potentially ignored outright."

It's unlikely that Apple is the only company that should consider its products vulnerable to malware and spying by the CIA and other intelligence agencies.

"Until we know more specifics, I would not presume that this is limited to only Apple products," said Purtilo. "The hardware instructions would be tailored to a given platform, of course, but depending on what flaw is being exploited, the approach might be similarly applied to other systems in the same chipset family." 

Quoted from here

0 comments:

What to do about those ‘government-backed attack’ warnings from Google

TOTALLY PANIC.

Just kidding; please don’t do that. Google regularly issues warnings to people whose accounts are or have been targeted by state-sponsored attackers, and every time it does, users get really nervous that their emails are going to wind up on WikiLeaks. Don’t freak out if you get one of these notices — it doesn’t necessarily mean that your account has been compromised, it just means you should think about taking a few extra steps to secure your account.


I got a “government-backed attack” warning. What does it mean?


You’re in good company — lots of journalists and academics have received warnings like these. According to Google, it means that a sophisticated attacker has tried to gain access to your account using phishing, malware or some other tactic.

Just because you get a warning doesn’t mean you’ve been hacked, though.

“We send these out of an abundance of caution — the notice does not necessarily mean that the account has been compromised or that there is a widespread attack. Rather, the notice reflects our assessment that a government-backed attacker has likely attempted to access the user’s account or computer through phishing or malware, for example,” Shane Huntley, a member of Google’s Threat Analysis Group, wrote.

Unfortunately, you’re unlikely to hear more information, such as when the attack happened or whether or not it was successful. Google doesn’t always send the warnings out right away and doesn’t give specifics about the attack or the responsible parties because it doesn’t want to tip hackers off about how they were detected. If Google says too much, the attackers will change their tactics — and then Google might not be able to warn you about the next attack.

“In order to secure some of the details of our detection, we often send a batch of warnings to groups of at-risk users at the same time, and not necessarily in real-time,” Huntley added.

So what do I do now?

Google recommends several steps to secure your account. The company offers a quick Security Checkup, which lets you review the devices and apps that have access to your account and double-checks your account recovery method.

Google makes some additional recommendations to high-risk users that will help prevent account compromise:

>> keep your software up-to-date (don’t let those updates        languish forever because you don’t feel like pausing a          show on Netflix long enough to let them install)

>>enable 2-step verification on your account (you can do        this through regular old text message, but Google  recommends its own Authenticator app or a Security Key      as the best methods)

>>install Password Alert in Chrome (or another browser          extension that alerts you when you enter your password      on a suspicious login page)

Also, pay attention to the email address of the sender and make sure it’s someone you know and trust (rather than someone with a similar email address who’s trying to masquerade as your friend). Don’t click on links and PDFs if you don’t trust the sender. Encrypting email is kind of difficult, but consider doing it anyway, especially if you’re sending sensitive documents or information.

Even if you haven’t gotten a “government-backed attack” warning yet — and you probably won’t as Google only sends them to less than 0.1 percent of users — you can take all these steps to secure your account today. A little extra security never hurts.

Reference :- Right HERE!

0 comments:

NaaP (Network as a Platform) is the Latest Acronym to Spell Growth


The cloud has become a well of acronyms, each promising to fuel digital transformation and bring flexibility to once-closed systems. While most cloud adopters have become intimately familiar with acronyms such as SaaS (Software as a Service), PaaS (Platforms as a Service), and so on, a new acronym is emerging that might just change how enterprises achieve their cloud goals.
That acronym, NaaP, lends itself to the concept of a Network-as-a-Platform model, a concept that drives the ability to transform existing infrastructure investments into a cloud-like model. In other words, NaaP strives to bring legacy systems into the world of the cloud services, all without having to re-engineer enterprise infrastructure. Part of that transformation comes from the idea of going beyond NFV (Network Function Virtualization) solutions, and enhance hardware abstraction of network functionality by providing tools that ease integrating critical elements, such as provisioning, policy enforcement, configuration, troubleshooting, and licensing.
In a quest to fuel the growth of NaaP and more importantly, bring an advanced service delivery and management platform to fruition, networking vendor Riverbed has launched the Riverbed Service Delivery Platform (SDP), a software solution which wraps the functionality of NFV into the ideology of DeVOps, where on-demand access to services and platforms have become the key components for speeding services delivery, addressing issues of scale, and improving operational security.
Riverbed SDP is purported to bring carrier-grade service management tools that ease bringing DevOps ideologies to the world of networking. Or as Irina Farooq, Vice President Management and Strategy, Riverbed says “Essentially, our SDP transforms existing NFV investments into a cloud-like NaaP model where each service becomes a building block to create another service that brings even more value to the customers.”
While the concept may seem somewhat complex, Farooq explained “SDP should be thought of as an abstraction layer that facilitates the provisioning of VNFs required for the delivery of a service using Network Function Virtualization (NFV) / Software Defined Networking (SDN) principles.”
For the enterprise and service provider crowd, that means riverbed is looking to bring the agility of the cloud to existing infrastructure, by adding a new abstraction layer, which automates and simplifies thorny tasks, such as provisioning, scaling, and overall services management.
That said, the real takeaway here is that SDP will make digital transformation much easier, all with the added expense of new hardware, appliances, and network re-engineering.
Of course, fueling digital transformation is the only goal of those promoting NaaP solutions. NaaP also promises to bring better security and more flexibility to cloud services environments, something that has become more important as businesses strive to build hybrid infrastructures, without adding oppressive complexity to their services offerings. NaaP helps to unify the management of services and tear down the silos that have existed between DevOps, Networking, Cloud Services, and Information Security. In the end, the added layer of abstraction, combined with monitoring and management tools will bring more capabilities to existing systems, while removing the age old encumbrances of static provisioning and lack of scale.
Reference:- Right HERE!

1 comments: