Android Nougat Ready to Launch on 22 August

The timely launch of Android 7.0 is almost certain Nougat. Based on the latest information from mobile operators from Canada, Telus, the latest Android operating system will be launched on 22 August.

Information from Telus is expected to participate include accurate enough because Android security update information for multiple devices at once.

Huawei and LG Nexus Nexus 6P 5X into two series of the first phone that will receive the update to Android 7.0 Nougat. However, there might no changes were made regarding the schedule for the launch of the new operating system.

This information was also confirmed by LG websites also briefly displays a special page of the test LH G5 OS that will be conducted on September 22, 2016.

Given Nexus 5X made by the South Korean company, it is also possible LG got the Android Open Source Project code first.

Besides LG, several other vendors such as Sony also said to have received the most new AOSP code. That way, vendors are expected to have more time to prepare and adjust to their device needs an update.

Unfortunately, other Nexus series is uncertain when it will obtain the update. However, based on previous information, other than 6P and Nexus5X Nexus, Nexus 5 is another series phones will receive an update to Android 7.0 Nougat.

News of the latest version of Android’s presence is quite fast, only about 5 months. After the developer version slide in March 2016 and then, the final version for developers has been released in July.

Deciding on the Best Way to Store Photos and Videos

There is a famous comedian who has a joke about how in the past individuals had photo albums that were from specific events or vacations. Nowadays, he says that individuals have computers that store all the photos and videos from certain events. So he says that he has a computer from when he was single, he has a computer for when his kids were born, and he has a computer for his wedding. Each of these computer stores photos and videos from that time period.

In addition to being funny, this idea really shows that people have a lot of information they want to store. This is true no matter if you are talking about an individual or if you are talking about a business. Individuals have important documents, photos, videos, music, movies, and much more that they store on to their computer and storage devices. Businesses have a lot of information that needs to be stored, including past business records, tax papers, inventory lists, and more. This underscores the importance of creative storage systems.

When it comes to finding the right kind of storage system for photos, videos, and any kind of paperwork, security is of utmost importance. First, you do not want to physically lose the storage system. For this reason, some individuals have decided to store USBs and other external storage devices that they have in a fireproof safe in their home. If their home experiences a fire or there is some other disaster, their information will be protected. Second, security is important when it comes to protecting your identity and not having your information stolen digitally. For this reason, if you are looking to store your information online, you want to be sure to work with a reputable company.

You also want to find something that is appropriate for the amount of storage you need. This is especially true if you are going to make a decent size investment in the storage system that you are using. If you are going to be storing photos, videos, and important personal documents, you may need to not need to spend a fortune on storage. However, when it comes to important business documents, you may be willing to spend a little bit more in order to to protect the interests of your business. As you are looking for appropriate storage, you want to consider your current and future needs.

5 Steps to Secure Data from Ransomware Attack

Business segments becoming increasingly attractive target for developers cipher-malware. According to Kaspersky Lab’s report, based on data from Kaspersky Security Network (KSN), the number of attacks on the corporate sector in the period 2015-2016, compared with 2014-2015 grew six-fold (from 27,000 to 158,000).

This fact shows that the ransomware try to encrypt the data of each one in ten users B2B.

Cyber criminals who use ransomware attack often start businesses, especially small and medium enterprises (SMEs).

This trend is confirmed by IT Security Risks 2016 report from Kaspersky Lab and B2B International, where 42% of respondents from small and medium enterprises (SMEs) agreed that crypto-malware is one of the most serious threats they face last year.

For small companies, even though in the short period can lead to significant losses or even bringing all their operations stopped completely.

If a company has not taken appropriate steps to ensure the security of important data, then buy the decryption key from cyber criminals is the only way to recover the data.

However, this does not guarantee complete data recovery. The best way to protect enterprises from malware is to prevent attacks early on.

Kaspersky Lab experts recommend to companies of small and medium enterprises (SMEs) to follow the 5 steps following these simple safety rules.

1. Make a backup copy of all important files on a regular basis. Companies must have two backups. One in the cloud (eg Dropbox, Google Drive, etc.), and another in an additional server or on a removable medium if the data volume is not too large.

2. Use well-known and trusted service providers who invest for security. Usually you can find the security recommendations on the company’s website. They also published an audit of the security in the cloud infrastructure from third parties.

Do not assume that the cloud provider has absolutely no security issues, availability or data leakage. This raises the question, what would you do if you delete the data security provider.

There should be a data backup and restore process transparent data in conjunction with data protection and access control.

3. Avoid the use of security services and anti-malware software for free. Usually small businesses expect basic security features in free solution offered is sufficient.

Free security solution does provide basic protection, but often they fail to provide layered security support.

Instead, look at a special solution, which does not require a large investment, but is able to provide a higher level of protection.

4. Regularly update the OS, browser, anti-virus, and other applications. Cyber criminals use the vulnerabilities in the most popular software to infect users of the device.

5. Prevent the precarious situation of the TI – invite experts to configure enterprise security solutions. Small businesses typically do not have an IT department or a dedicated full-time administrator.

Companies rely only on employees who best understand IT issues to deal with computer problems, in addition to regular duty.

Do not wait until an incident occurs, use of IT support IT service providers to review the software and security configuration from the outset.

“Crypto-malware threat that is increasingly serious, not only the company suffered a loss of money for the ransom, but the business could be paralyzed during the recovery process file. Vector of attack is quite extensive including website, email, exploitation software, USB devices, and others,” said Konstantin Voronkov, Head of Product Management Endpoint Kaspersky Lab via email.

To avoid infection, he added, IT personnel must explain where the attack originated and these employees should not open email attachments, visit the web from untrusted sources or connect a USB device to a computer that does not have protection.

Voronkov said anti-malware solutions become important measure to avoid security incidents occur frequently.

If there are files of companies that are ciphered, it does no harm and is worth a try. If at all possible, to restore the file using the free facilities or key decryptor

6 Tips on buying a secondhand laptop cheap and quality

Laptops can be practically almost replace the function of the computer in daily activities at this time. Indeed, computers are still pretty much used to work in an office or activity in the gaming house and cafe, but the laptops offer high mobility dangerously close to the specifications of the computer.

The higher the specification of a laptop, the more expensive price. Therefore, one of the most economical way to have a high specification laptop is to buy a used laptop. Well, so you can get used laptops cheap but still good quality, follow some of these tips.

1. Buy from a trusted friend

Before getting into the online trading forum, you can start from their own friends first. Perhaps among them there are indeed willing to sell the laptops at low prices and quality is still good. If your friend slick, chances are you get a laptop that is still okay bigger.

2. Use the COD system

The payment system in place, or better known by COD (Cash On Delivery) is the best way to trade second-hand goods. You have to meet directly with the seller to determine the characteristics of the seller (slick or not) while trying to direct the performance of the laptop.

3. Check the market price range

If you know the market price of a new laptop, you can make it as a base to negotiate with the seller. Then, you can also check the prices of many used laptops sold in an online trading forum thrift. In this way, you can get to square off what a fair price for a used laptop that you shoot.

4. Search for a laptop with a life under 1 year

The longer the lifetime, the cost is the price of the laptop. However, laptop-of-life for too long certain potentially been damaged in certain parts.

In addition, the lifetime under 1 year is usually still covered by the warranty. This makes the laptop is still quite secure in terms of quality.

5. Check if the specification laptop

While fiddling with a used laptop, make sure you check if the specifications mentioned in accordance with the seller. You can see this in the Settings section, or open a command run (press Start + R on the keyboard), type ‘dxdiag’ and press enter.

6. Check the condition of the hardware

The final step, make sure the hardware conditions are still in good condition or in accordance with the seller described. For example, to check all the hard drive, you can copy and paste a number of files in the folder or drive. If it is very slow, it is likely a problem hard drive.

Check also the whole key keyboard and mousepad is still functioning well, because if there is damage, it will be difficult to be replaced. Also make sure the display, WiFi, USB port, fan, webcam, etc., are still functioning properly.

Latest generation Bluetooth Promises High Transfer Speed

The latest version of the most popular wireless networking, Bluetooth, ready to slide on 16 June. Certainty is expressed directly by the Executive Director, Bluetooth, Mark Powell, some time ago.

This update will be named Bluetooth 5, no frills point behind the figures for updates. The move was chosen to simplify and facilitate the marketing process name.

Bluetooth 5 confirmed attendees with a series of new capabilities that make it better, especially in terms of speed.

This latest version has a wider range and speed transfer superior Bluetooth 4.2 up to four times.

In addition, there is also the addition of a much larger capacity when transmitting. Thus, information from a device that is not connected is much faster making it easier for the user.

It is uncertain how the amount will be used in packet transmission for Bluetooth 5.0. However, it will be more than the ability of the current package, ie, 47 bytes are 31 of them are available for data.

Unfortunately, unconfirmed list of devices that will be compatible with this latest version of Bluetooth. However, generally the latest version of Bluetooth requires a new Bluetooth device as well, not just through software updates.

For that, most likely Bluetooth adoption of the new 5 will be present at next year on devices, such as laptops, tablets, mobile phones, including other wireless accessories.

5 Do not install this popular app on your Android

Currently, the application becomes inseparable from smartphone users. How could I not, with a variety of applications, the user is possible to do various activities such as playing games or writing reports.

On the other hand, a variety of functions and the advantages it was not shared by all applications on the Google Play Store. Android users must recognize that not all applications are really helpful and have features capable.

In fact, not a few of the popular apps appeared to save malicious files or even threaten the security of the user.

To that end, muster popular applications that actually do not need to be installed on Android phones, as quoted from page Make Us Of.

1. ES File Explorer

For Android users, ES File Explorer is an application explorer app is popular in a few years. In addition to presenting a variety of features, this app also has a display that allows users to explore the data available Android on their devices.

However, this does not occur if the user is wearing the free version of the application. Various bloatware and ad-ware appear at any moment. Not only that, a notification pop-up contains an invitation to download additional applications often appear suddenly and can not be disabled.

Alternatively, users can use the application OI File Manager is already available Google Play Store. In addition, there are also applications FX File Exproler and Total Commender.

2. UC Browser

Browser Chinese origin is called so popular in China and India. This application claims to have ‘fast fashion’ that is able to load websites faster. The mode is also capable of compressing the site so that less data consumption.

Nevertheless, this browser has security related problems of tracking. That is because the search list sent without encryption to India Yahoo and Google. That list includes IMSI number, IMEI number, Android ID, including Wi-Fi Mac address.

For users concerned with the security, Google Chrome and Mozilla Firefox can be an option. However, keep in mind that not all browsers have adequate security features.

Besides UC Browser, Dolphin Web browser also has a similar problem. Mobile browser was found to have a security hole that makes the data is sent without encryption.

3. CLEAN it

As the name implies, this application has a function to clean up junk files on your smartphone. Because of the popularity, the application is already installed on more than 10 million times and have a high rating.

Nevertheless, basically the application is not very useful because it clears the cache memory does not affect the speed performance of the smartphone. In addition, cleaning RAM only result in the use of a larger battery.

Even so, for those of you who still want to use applications with similar capabilities Greenify can choose to save battery power. SD Maid There are also applications that can be used to clean up garbage data.

Other applications that also have similar features is a Clean Master. Application made by Cheetah Mobile also does not have many uses and are often your ads appear.

4. DU Battery Saver & Fast Charge

This application has a function similar to CLEAN it. Only, this app has additional features to speed up battery charging. There are more than 7.6 million users who have downloaded this app.

Although it looks capable of accelerating battery charging, this app actually does not have that capability. Not to mention so many of these applications show ads that might be annoying for most users.

Alternatively, people can use applications such as GSM Battery Monitor to monitor the battery status of the device. Meanwhile, in order to save power the user can select the features available in the application Greenify.

5. Application of Anti-Virus

At present, many anti-virus application that can be found in the Google Play Store. In fact, many of whom are developers who also have anti-virus software for the PC. However, how effective anti-virus for Android devices?

While not bad, it does not mean an Android device really need anti-virus applications. One reason is still the number of security holes that sometimes opened by the user, such as to root the device or install unofficial applications.

Both conditions were certainly open up a security hole bigger. However, that does not mean anti-virus applications have no usefulness at all.

Some applications such as Avast and Avira offers extra data safety features, such as locking the screen until the call blocking.

Want to work at Apple? Check the list of interview questions here

Who doesn’t have a desire to work in companies such as Apple? As one of the prestigious companies in the world, don’t be surprised if the selection of work at Apple isn’t easy.

Just like other technology companies, Apple interviewers often ask technical matters pertaining to the workplace ago. However, there are also the questions posed confusing like a puzzle.

Curious as to what was the question? Here are some questions that are often asked for admission Apple.

1. We have a cup of hot coffee and cold milk from the refrigerator, the room temperature is between these two bodies. When will we have to mix the milk to hot coffee to get the best combination of cold? (At the beginning, in the middle or at the end). This question is usually intended for candidates positions of product design.

2. What is the weight of the Empire State Building? This statement is submitted for candidate solutions consultant.

3. How do you explain the RAM to children 5 years old? Statement for the candidate genius of Apple.

4. How does the wings of the aircraft? Questions for the candidates Lead System Engineer.

5. Give me five ways to measure how many liters of gasoline were found in a car? Questions for the candidates Hardware Engineer.

6. If you have two eggs and you want to know, from what floor you can drop an egg without shattering, how do you do it? Software Engineer for a candidate statement.

7. How you can specify the price of this pencil? Questions for the candidates Global Supply Manager.

8. Describe an interesting problem and how would you solve it? Software Engineer for a candidate statement.

9. How do you explain the function of the router / modem to children 8 years old? Questions for the candidates Home Advisor.

10. How many children are born each day? Questions for the candidates Global Supply Manager.

11. How do you test your favorite application? Questions for the candidates Software QA Engineer.

12. There are three boxes each containing apples, oranges, and one contains both boxes again. However, it has been labeled the third box does not match what is in it. Open one box, without looking into the box, take one of the fruits. By looking at the fruit, how do you fix the existing labels on the box so that in accordance with its content? Questions for the candidates Software QA engineer.

13. Whether you are an intelligent person? Questions for the candidates Build Engineer.

14. Are you a creative person? Give one thing you think is the result of your creative thinking. Questions for the candidates Software Engineering.

15. Which is more important, whether the fix customer problems or create a product that has a high user experience? Statement for Home Advisor Apple.