Thursday, 2 March 2017

brandedlogodesigns review: Commodore's retro show shows PC legend


brandedlogodesigns review



Where the Commodore computer center was once the headquarters of the European Union, an exhibition commemorates the time of C64 & Co. The fact that the Americans chose Braunschweig for the billion-dollar business with the "breadboxes" had a very special reason.
The letters shine as if the company had never disappeared from the market. Newly installed spots radiate the Commodore logo at the huge hall also at night. It is the original lettering that once decorated the Europacentrale of the PC pioneer in Braunschweig.For a look at the history of Commodore, the packaging service provider Streiff & Helmold has had the letters reassembled to the outside wall of his company center. Once the company delivered the packaging for the entire European Commodore market. Braunschweig was however from 1980 to 1993 the also the main production site of Commodore in Europe with up to 2,000 employees. After the failure of the manufacturer, the company took over the site of the European headquarters of the computer-builder in 1996.In the former Commodore canteen, senior chief Helmut Streiff recalls the great time of the Commodore personal computer, which is closely linked to his own life. "This is the least we can do". Nostalgically Streiff looks back on the once-close partnership with the Commodore employees. Since October 1980, the European headquarters was in Braunschweig.
In showcases there are products that have revolutionized the market for home PCs. The Commodore 64, for example, which was sold millions of times worldwide - and the first home PC, which was also affordable for the normal consumer. Klobig and angular looks the device from today's point of view, just like a "bread box" just as the nickname of the device was. A limited edition special gold edition was launched for the one millionth C64 in Germany. One of the only 250 copies can now be admired in the permanent exhibition.


brandedlogodesigns review

Tuesday, 28 February 2017

BrandedLogoDesigns Review: Microsoft and Porsche show the Book One


On the MWC, Microsoft and Porsche presented the Book One with a particularly noble and powerful 2-in-1. The approximately 2.800 euro expensive device comes with QHD display, Core i7 CPU and large Intel SSD memory.
Microsoft has brought to the Mobile World Congress in Barcelona a multi-functional Windows 2-in-1 designed together with Porsche. The Book One is Convertible and Detachable in one. For example, the keyboard can be completely turned around by using the device as a tablet, or the user can completely remove the keyboard from the case.
By the way, the development of the swivel joint was inspired by the design of a sports car transmission, the companies said on Monday. The gears are made of high-quality stainless steel and intermesh precisely. Thus, the tablet unit should get the required stability in any position.
The device is powered by an Intel Core i7 processor with a maximum of 3.5 GHz and has an Intel-produced 512 GB disk drive. Lots of memory is also available with a capacity of 16 GB. The 13.3-inch touch screen provides high-resolution images with 3,200 x 1,800 pixels. The Book One supports biometric user authentication via a built-in 5 megapixel camera and infrared sensor via Windows Hello. Interfaces include 2 x USB 3.0 and 1 x USB 3.1 Type-C / Thunderbolt 3. As an operating system, Windows 10 is, of course, used in the Pro edition.

The processing and equipment but also their price. With around 2,800 euros the Book One clearly addresses a premium market. It will be available from April in Germany and other countries.

Monday, 27 February 2017

BrandedLogoDesigns Review: Bitcoin is more valuable than ever


With hardly one currency is it as up and down as with the digital currency Bitcoin. Political uncertainties around the world and strict control of capital movements in China are now giving the crypt diet a considerable boost.

The digital currency Bitcoin has continued the rapid high-altitude flight of past trading days and reached a record high. In the course of the night, the price jumped for the first time over the brand of 1,200 US dollars and rose temporarily to 1218.85 dollars. In the morning, however, profits were received and Bitcoin was last traded at 1161.49 dollars.

"The main reason for the recent price rise is speculation on the approval of the first Bitcoin ETF by the US stock market supervision," said BayernLB's foreign exchange expert. Accordingly, the decision to approve the fund will fall on 11 March. This is expected to fundamentally change the trade in bitcoins, as it would give more investors access to crypt.Previously, the Wall Street Journal had already reported that the US stock market supervisor SEC would decide by March 11th on a change in the rules that would allow the approval of the "Winklevoss Bitcoin Trust ETF". According to experts, this could lead to a strong influx into the Bitcoin business.

Uncertainty pushes Bitcoin course up

As other prize-winners, market observers cite investors' general concerns about political uncertainties in the US and Europe. Recently, increasing capital controls in China had also boosted bitcoin. Chinese investors can circumvent such controls by avoiding the uncontrolled digital currency.

Bitcoin is a digital currency that has been created on the Internet. It has been in circulation since 2009. Bitcoins are generated in complex computing processes on the users' computers. They are based on the so-called "blockchain" technique: all bitcoin transactions are stored on all participating computers, grouped into blocks that are concatenated with all previous transactions. A central register, as in a central bank, is no longer required.

Thursday, 23 February 2017

BrandedLogoDesigns Review: High damage from mobile attacks


BrandedLogoDesigns Review


According to an IDC study, the security situation with regard to mobile technologies has intensified further - the damage to the companies is considerable.


After their survey in 2015, the analysts at IDC in December 2016 once again interviewed companies on mobile security in their companies. The key finding of the study is that the security situation has intensified since 2015.


At least 65 percent of the respondents report that they have had experiences with attacks on mobile devices, which is 8 percent more than in the predecessor study. In practice, the number of attacks is likely to be significantly higher, since many cyber attacks are not noticed by the companies.
Overall, according to another study, 26 per cent of companies said they had suffered losses of more than 100,000 euros last year from security incidents with mobile technologies.



The damage sums could increase further in the coming year. By the end of May 2018, the new Basic Data Protection Act (DSGVO or English GDPR) came into force. This is relevant for every company that operates in the European market and thus data from persons Of the EU. Then the data protection authorities can collect fines of up to 20 million euros or four percent of sales. "By the DSGVO, violations of data protection are on a par with fines for money laundering or corruption," explains Mark Alexander Schulte, senior consultant and author of the IDC study.
However, it is a good thing that three quarters of all surveyed companies are already preparing for the new regulation, only five per cent of the decision-makers have not yet arrived. According to the interviewees, the most promising measures to comply with the DSGVO are the prohibition of access from unauthorized WLAN, the revision of the security guidelines and the definition of a data protection officer. Equally, Shadow IT is to be more strongly combated - and an EMM (Enterprise Mobility Management) software is introduced or expanded.



BrandedLogoDesigns Review

Wednesday, 15 February 2017

BrandedLogoDesigns Review: Are you creating secure passwords?


Do you know what is important with a secure password? In our quiz, you will learn how to secure your passwords.

Email accounts, social networks or online banking - on the InternetHere's about the DSL comparison of connect! There are many services where we need to protect our private data through passwords. Because hackers and cyber criminals are often not far when we enter personal data or even the credit card number or bank connection.

The many different online accounts add another dilemma: in order to remember all passwords, many users like to access simple passwords or use the same password combination again and again. Not for nothing "123456" has long since ranked number one of the worst passwords. For HackerHier you can find the right products on Amazon.de! This is not a major obstacle.

But how to create a secure password that you can easily remember? The answer to this can be found in our tips for safe passwords.

Now answer quizzes

You think you already know all the tricks? Then take part in our test. How secure are your passwords?

Tuesday, 14 February 2017

BrandedLogoDesigns Review:Facebook changes its algorithm

To prevent false messages, Facebook wants to change its algorithm. In the future, he will prefer "authentic" messages.


Because of false news, Facebook has been criticized for weeks. Now, the network wants to do something against the fake news: Authentic content that is "real, not misleading, not sensational and no spam", Facebook wants to push in future, according to the company in a notice.

Identification of Fake News

To get behind the phenomenon of fake news, Facebook has initially categorized sites that spread false news and attention-grabbing headlines. On this basis, an algorithm was set up so that similar false messages can be detected. Conversely, contributions that do not have the characteristics of false messages are highlighted in the message feed.

With the action, Facebook wants to restore its reputation. In connection with the US presidential election, allegations were voiced that the Facebook news feed was dominated by Fake News. A German false-news filter should be available before the Bundestag election this year.


BrandedLogoDesigns Review

Monday, 13 February 2017

BrandedLogoDesign Review: Ford invests in start-up for self-propelled cars


Ford is investing a billion dollars in the AI ​​company Argo AI, which is specialized in AI. With the help of the start-up, the Autobauer wants to develop a new software platform for robotic trucks.

Ford is in the running for the development of self-propelled cars a billion dollars in the start-up of a former Google developer. The second-largest US car dealer will distribute the investment over the next five years, taking over the majority of the company Argo AI from Pittsburgh, which specializes in artificial intelligence. Ford plans to launch autonomous vehicles on the road in the year 2021, just like other automakers.

Ford announced Friday that they wanted to use Argo to develop a new software platform for robotic trucks. This technology could then possibly be licensed to other companies.

Argo was founded by Brian Salesky, who was responsible for the hardware of Google robotic cars, and a leading developer of software for autonomous driving at Uber, Peter Rander. The service agent developed his own robotic robot technology and joined the department of the University of Carnegie Mellon in Pittsburgh, where Salesky and Rander were once.

Asked as never before: specialists for autonomous mobility

While the big manufacturers are pushing up the pace in the development of self-propelled cars, top developers, who are self-employed, are buzzing. The Ford rival General Motors took over the start-up cruise for about 600 million dollars last year. Over 680 million dollars for the only months-old start-up Otto, which developed technology for self-propelled trucks. Otto co-founder Anthony Levandowski, a pioneer of Google's robotic vehicle program, is now working on self-propelled cars at Uber.

Also the former head designer of Google cars, Chris Urmson, and the former head of the "Autopilot" program at Tesla, Sterling Anderson, now want to elaborate their own technology in a start-up. However, they were sued by Tesla.

At the same time, in addition to motorists and tech companies, industry suppliers also work on technology for autonomous vehicles.

Ford is working hard to get ahead in the race for the car of the future. To this end, SAIPS, a company specializing in the development of self-learning machines, was already bought from Israel and invested 75 million dollars in Velodyne, a developer of laser radars.

In addition, Ford plans to double the number of employees in Silicon Valley by the end of 2017 to around 260. In addition, the Autoverse is also heavily based on electric and hybrid drives - by 2020, the development of 13 new models will be worth 4.5 billion dollars. The share of such vehicles in the total offer is to increase from currently 13 to 40 per cent.

Friday, 10 February 2017

BrandedLogoDesign Review:Twitter: Significant loss and less growth

Twitter could not benefit from the US election campaign. In the US, the user figures remained unchanged. With a turnover of 0.9 percent to 717.2 million US dollars, the short news service missed the expectations.

In the past quarter, Twitter has not been able to benefit from the US election and the tweets of Donald Trump. The growth in user numbers and sales slowed even, the loss increased significantly. The stock fell by more than eleven percent on Thursday before trading.
The number of monthly active users increased by only two million in the final quarter of 2016 to 319 million. Perhaps the most surprising: in the US, there was no growth, 67 million users remained unchanged.

Trump bad for the Twitter business

In the third quarter, Twitter had attracted more users: four million worldwide and one million in the US. Trump had been on the finish line of the election campaign until November and also in his first weeks as president for much attention with his controversial Twitter news.

"If the Trump effect does not bring any growth in user numbers, what can it do?", Analyst Michael Pachter of Wedbush Securities commented. His colleague Richard Kramer from Arete Research even suspects that Trump could be bad for the Twitter business. His tweets may have caused so many conflicts that they scared advertisers, he said on US CNBC. The advertising revenues - Twitters main source of money - declined slightly year-on-year from 641 to 638 million US dollars. The Christmas business is traditionally a good quarter for online advertising.
Expectations

With a turnover of 0.9 percent to a total of 717.2 million US dollars the Kurznachrichtendienst missed the expectations of the analysts. The quarterly loss grew to $ 167 million from $ 90 million a year earlier. In the past year, Twitter lost nearly $ 457 million after $ 521 million in 2015.

The short news service has been fighting for some time with slow growth and red figures. Twitter boss Jack Dorsey wants to focus the service on current news and video content. Recently, about 600 hours of live video had been broadcast over the service, it said. However, with 31 million users, only around one tenth of them saw anything.

Tuesday, 7 February 2017

BrandedLogoDesign Reviews: 8 Security Tips for Digital Everyday Life


To celebrate the Safer Internet Day com! Professional eight elementary tips for a safe digital everyday at PC, Smartphone and Co.The Safer Internet Day is a yearly organized action day, in which (worldwide) the Internet threats and the handling of the same should be clarified. The day was initiated by the European Union and the institution INSAFE.

1. Configure wireless networks securely


Security on the Internet begins with your own infrastructure.
Therefore, it is important that this is protected against foreign access. Today, wireless surfing at home is an everyday occurrence. If you are buying a router or one from your provider, passwords and other settingsstandardized. This is detrimental to safety. Ensure that both the password for the WLAN, the password for the router access and the roaming name, the so-called SSID, are changed.

2. Use current software and operating system


The operating system is also part of the company's own infrastructure.
This is often thought to be a self-catering. This is only partly true: Regular updating ensures that hackers or malware will not exploit security gaps. If the support for a system is running, a newer version should be changed. Old operating systems are often no longer supplied with security updates and therefore pose a real danger to data and users. The same is also true for other software or the smartphone: keep them up-to-date. There is a widespread misconception that updates always bring problems. This can happen, but is by far not as frequent as many think.In addition, it should be, to a faulty update, usually very fast a patch.


3. Use secure passwords
E-mail providers, social media, cloud accounts - on the Internet almost every user uses one or the other service, which requires a password.
Unfortunately, weak, fast-to-guess passwords are still being used - whether for convenience or because it is assumed that "nobody is interested in my data anyway". This is a fatal misconception. Therefore, set passwords that represent a certain hurdle, such as case-insensitive, numbers, special characters, and a certain length. It is also advisable not to use the same password for every service! More tips on how to create secure passwords can be found in our secure passwords workshop.
4. Finger away from the Admin account

Operating systems now allow to create different user accounts with different legal levels.
Not infrequently there is simply a user who can do everything. There must be, finally, something needs to be repaired or installed, but this account is not for daily use. Log in for daily surfing and working as a normal user. The reason is obvious: there are many viruses, trojans, and other malware who need to access the computer's core system to work. If the active user now captures a malware but does not have the necessary rights, it may not become active.
5. Only surf on secure sites

Known sites such as Facebook or Gmail support the encryption standard HTTPS.
Especially in cases requiring a password or dealing with sensitive data, HTTPS is indispensable. We recommend installing the browser extension HTTPS Everywhere. This forces websites to transfer all data only encrypted. The extension is free and available for Firefox, Chrome and Opera.

6. Use two-factor authentication

Many Internet providers or other web services already offer two-factor authentication, which ensures the respective user account with an additional security level. For example, banks usually use a small machine for their e-banking, which generates a random code. Every time you log in to your e-banking, this code is different. This means that you are protected twice - together with your PIN, which you must enter anyway. Other providers will do this with an additional number that you send to them by SMS or a previously defined question. You can find out more about 2FA and how it is applied here.

7. Do not spread the data freely in the network

Ensure that an exchange of personal data such as address, e-mail, telephone numbers and the like only takes place in a secure environment (keyword: HTTPS). Old HTML / Java guestbooks at club websites are not a place to leave your e-mail address or phone number. So leave your data only where it is unavoidable: flight bookings or online shopping on reputable portals. 

8. Beware of e-mail attachments

Even experts have already pointed out: e-mails from seemingly serious senders, with serious-looking concerns and with contaminated attachments, which can permanently damage your network, delete or encrypt data. Such mails are no longer traversed by bad grammar or even characters from other alphabets (often Cyrillic). It may also happen that your surfing habits are spied, then create a phishing message (often word files with alleged billing or similar). If you receive such an email, think carefully: Do I expect something like this? Is it plausible that I receive the expected e-mail? If in doubt, call the (alleged) sender by telephone.