Web Directories

Joshua Simon

Joshua Simon

Smartphones are blamed for many of today’s ills. Millennials are too dependent on their phones, disconnected from the world and self-absorbed with their own social media lives, according to many grumbling sources.

However, the reality is smartphones have expanded our chance at productivity. Rather than waste time, smartphones have allowed us to become more productive than ever. It all depends on how you use your device.

1. You can workfrom anywhere

A smartphone with data can let you work via cloud storage. Google Drive is available on the iPhone and Android, and comes with a full suite of document creating and editing tools. This allows you to make and change documents on the go, without waiting for a computer and WiFi access.

Other programs like Evernote and Dropbox also sync to a cloud-based storage system, allowing you to keep large files and notes on you without worrying about memory or what device it was stored on. Of course you’ll want to make sure you have a good signal wherever you are. But thanks to cloud storage and data, smartphones can help bridge the gap between work spaces by keeping you ready to open and work on any file or document on the fly.

2. You can simplify what you’re carrying

Smartphones help consolidate some of your most crucial data, allowing you to lighten the load of what’s in your wallet and what you need to have prepared.

Rather than copying down information you need to remember, you can take a photograph. Now you don’t need a notebook or a pen. Instead of taking a business card, add them to your contacts list (or take a photo of their business card). Now you don’t have to worry about a small slip of paper.

Smartphones can even be used as payment devices via apps like Squarecash, Venmo, Apple Pay and Google Wallet. Now you don’t have to carry your cash or credit cards around. Whatever you need, chances are there’s an app for that.

3. You can plan your whole day on your phone

With smartphones, you have access to everything you need to plan your day. A calendar app with timed notifications and GPS directions can help you get to all your meetings.

You can purchase airplane, bus and metro tickets from your phone, or place a request for an Uber. You can reserve a seat at the movies or order a taxi. Some apps, like Grubhub, allow you to place orders for delivery in advance without needing to make a phone call. Virtually every major organization, retailer and institution has created an app or mobile website that smartphone users can work with easily.

4. You can stay in the loop

Because smartphones allow you to text, call, IM, email and more, it’s very easy to make yourself available, and it’s very easy to stay up to date on all your information. The iPhone can be set to check for new emails every half hour, hour or longer intervals of time based on how frequently you want to check your email without requiring you to intentionally open your email and see what’s new.

Text messaging allows you to communicate with others on the fly, have multiple conversations at once and cut down on left voicemails and missed calls. By keeping an active alert system in your pocket, your smartphone can let you know about any updates as they happen so you can stayinvolved from anywhere.

5. You can get things done faster

A smartphone can significantly cut down on your time doing… just about anything. Checking email is now a matter of looking at the notifications of your email app. Notes can be dictated and recorded, and photos can be taken on the same device that notes are stored.

A smartphone allows you to switch between a huge variety of useful apps with the click of a few buttons. It simplifies your tools, serves as a portable computer and automatically keeps you notified about what’s going on. Used properly, a smartphone can streamline your productivity significantly and prove that technology is not just a productivity killer.


Source:  http://www.lifehack.org/

The irony of this age of information technology is that the more there is for us to utilise, the more difficult it becomes to do so. There is so much information out there in the digital world that accessing what’s appropriate and reliable becomes a huge task. We end up wasting a lot of our time and energy only to find half-baked information. But the boon of technology is that it comes with the hacks to break it and utilise it. Google, the God of all search engines, provides numerous such ‘tricks’ to access its database better. Here are some relevant tips for the everyday user.

Use more keywords

Google hosts over a million websites, so help it help you by using more keywords – ideally no less than five. More keywords result in a more specific search, and therefore more appropriate results. Google uses your keywords to prioritise pages. This means that the pages containing most of your keywords will appear first. So the more, the merrier.

Find missing words

When you’re not sure of the keywords to use for your search, or you have forgotten phrases and their order of words, use the asterisk (*) in place of the missing words. Google will not only fill in the gaps but will also give you a specific result. For instance, typing lazy fox*fencewhen you can’t remember the entire phrase (the quick brown fox jumps over the lazy dog) will give you the result in the right order of words. This technique, called truncation, can be used even when you’re blindly looking for ideas.

Specify order of keywords

Google normally shows results for all the words in your search. For instance, brown girl in the rain would give you results for brown, girl, and rain. But when you fit your words in double quotation marks – brown girl in the rain – Google will only show results that have the words in that order.

Exclude words

When you want a more specific search, you can exclude results that Google would typically show for your keywords, by using the minus (-) symbol. For instance ‘red flower’ will give results of all red flowers but specifying “red flower” -rose will exclude roses from your search result. Keep in mind that this is not a ‘hyphen’. The symbol is placed next to the word that you want excluded and not in between the keywords.

Find words in URL

If you can’t remember the name of a website but are sure of certain words within it, you can use the command, in url: keyword. For instance, typing in url:yum will show you results for all the URLs that contain the word ‘yum’.

Search within a site

When websites don’t have a search engine of their own, you can use Google search to find results from that website alone. For instance, site:yourstory.com “social media” will show all results related to the keyword ’social media’ and only from YourStory. In contrast, if you type “social media” yourstory.com, (without the ‘site:’ command), only the first few results of the Google result page will correspond to the website.

Find related websites

You can find websites that have content similar to a website that you already know, by using the ‘related’ modifier. For instance, when you type related:wikipedia.com, you will find a list of websites that contain information similar to Wikipedia.

Find citation links

You can use the ‘link’ command to find all the pages that cite or link to a website. For instance, link:wikipedia.com will fetch you result of all the pages that have linked to this site.

Search for a file type

If you want your results to be of a particular file type such as pdf, poerpoint etc., you can use the filetype modifier with your keyword. For instance, “self-help” filetype:pdf  will produce results that are pdf files.

These tips are more effective when you use the right keywords, and to use the right keywords you need to have a clear idea of what you want to search for. Making your Google search more effective takes some trial and error but with the right tricks up your sleeve, you can take full advantage of it.  Happy searching!

Author:  Varsha Roysam

Source:  https://yourstory.com

How can you trust a secret if you can't tell where it came from? Today, we are excited to share that the Internet Society is a proud supporter of the Cryptech initiative. From the website introduction:

Recent revelations have called into question the integrity of some of the implementations of basic cryptographic functions and devices used to secure communications on the Internet. There are serious questions about algorithms and about implementations of those algorithms in software and particularly hardware.

We are therefore embarking on development of an open hardware cryptographic engine that meets the needs of high assurance Internet infrastructure systems that rely on cryptography. The open hardware cryptographic engine will be of general use to the wider Internet community, covering needs such as secure email, web, DNS, PKIs, etc.

In his recent blog post on Pervasive Internet Surveillance, Phil Roberts enumerated some of the technical efforts underway in the IETF as a result of this past year’s ongoing revelations about unwarranted surveillance and data collection. The IETF is not the only organization involved in attempts to block or mitigate what some have characterized as an attack on the Internet itself. Recent announcements include attempts to secure email (ProtonMail, Darkmail, etc.), to secure your mobile phone (Blackphone), to put better tools in the hands of end users (leap.se), and to provide private messaging services (jabber/otr), to name just a few. There are also serious efforts to secure the routing and domain name infrastructure, which rely on underlying methods for generating and protecting strong keys for encryption.

All of these projects depend on strong encryption and strong keys as tools to both establish trust and to protect sensitive data. Sadly, trust in many of the components needed to achieve real secrecy has been undermined. Core components such as entropy, cryptographic algorithms, and purpose-built hardware have all been compromised. Some of this has been malicious, some was the result of pressure from governments, some was due to the failure of business practices in deployment, and some was the result of underfunded and understaffed volunteer efforts in maintaining widely used software. The combined result has lead to widespread doubt in formerly trusted institutions, developers, and vendors. For many, even those using these products and tools as part of their critical infrastructure, the process of key generation and key management is a black box.

Here is the paradox: how can you trust the generated secrets if you can't tell how the box was made? The Cryptech project poses the following riddle: when do you want your black box to be transparent? The answer: while you're building and configuring your own particular box.

The Cryptech effort began in late 2013 with a small group of engineers at a side meeting at IETF 88 in Vancouver. The project has strong support from the IETF and IAB chairs but the project is not limited to IETF participation. While early use cases included IETF protocols such as RPKI and DNSSEC, there was also interest from Certificate Authorities, the TOR Project, and others. Cryptech is aimed at those processes requiring a very high degree of assurance – normally provided by purchasing a Hardware Security Module (HSM) – but in this case they will replace the closed box with an open one. One of the project objectives says: 

“The intent is that the resulting open hardware cryptographic engine can be built by anyone from public hardware specifications and open-source firmware. Anyone can then operate it without fees of any kind.”

Stephen Farrell, an IETF Security Area Director, had this to say in supporting the project:

“The particular aspect that the cryptech folks are addressing is that there is somewhat of a crisis of confidence in the implementation of the cryptographic functions that underpin our most important Internet protocols. These functions are required for securing the web and for many other aspects of Internet infrastructure such as DNS security and routing security. Cryptech and the team that has been assembled could significantly help to alleviate these specific concerns by producing open-source hardware designs that can be directly used or re-implemented by others. A significant benefit of that is to provide confidence that the design and implementation is as free from potential nation-state or other interference as can be. While it may never be possible to achieve 100% confidence in that, it is definitely technically possible (though non-trivial) to do far better than we have to date – today we essentially have a choice between pure software cryptography or commercial hardware products for which its impossible to see what's "under the hood."”

The Internet Society is in strong agreement with this statement and has been an early supporter of this effort. We are actively encouraging additional partners. The project will need steady funding sources, active coders, good community review, and additional experts to audit and validate the project outputs.

The Cryptech team has been evangelizing the project and will be on hand at IETF 90for a project update. The briefing will be held on Wednesday, 23 July, during the lunch hour in the Quebec room of the Fairmont Royal York Hotel in Toronto. Please come and bring your questions and your inputs.

Details of the Cryptech project can be found here: https://wiki.cryptech.is. The project is hosted by SUNET, but participants come from a variety of sources including academia, the open hardware and software communities, the TOR project, and the IETF. The team is committed to a transparent development process and early code is available at https://cryptech.is/browser.internetsociety.org

Please join us in this effort to help make the Internet a safer place.

Source:  internetsociety.org

I tried to give you my best advice in the title of this article and if you are reading this, you chose not to take it. So please reconsider.

If you are having some strong dis-ease following the Presidential Election in the USA, you might want to think some more about what I am suggesting. Don’t read another article about the Election. For that matter don’t listen or watch anything related to the Election either. For goodness sake don’t write anything about the Election at all. That suggestion should be the easiest for you to follow, because I am writing this for you.

Now as to your dose of not consuming or producing any Election thoughts, that varies by weight of your post-election emotional burden. Some of you might want to wait about a decade before taking a peek at what happened next. For most that won’t be necessary.

News and views that you can’t use, can give you the blues.

We are built to detect threats, act quickly to reduce them and to save energy by calmly accepting some risk and discomfort related to there being nothing we can do about somethings at the moment.

Being exposed to more and more news and what could or should be done about this or that can make one quite jittery, particularly if most of it doesn’t give you a clue as to what you can specifically do. Viewing the news and checking out new views can trigger, “should I prepare to fight, prepare to run, prepare to hide and breathe softly and deeply?” If the news does not contain much direction regarding your particular situation, you may just freeze and seek further news and views. Things can get increasingly chilly.

If you are following news on the political climate like some people follow weather reports and forecasts you might want to stop that. The weather can indeed hit people where they live. Forecasts can inform as when to run or hide or seek higher ground, but usually not. Some people have a friend or family that live some place that a weather forecast has under a rotating cloud, but these people probably don’t need to be warned about that. Having nobody that is near the forest fire or in the hot lava’s path doesn’t stop some people from being good citizens of the world by feeling a duty to keep current about the state of such affairs, but they do so at an emotional cost that often goes unnoticed. When the report comes on about the earthquake, even if you calculate that you are thousands of miles from the epicenter quickly, your brain still spent some milliseconds sensing if your foundation was shaking.

Like weather reports, political news can rile you up with no need or no place to go.

For instance if you see yourself in some oppressed class that Donald Trump is reportedly not fond of, you may feel a need to stay informed as to Mr. Trump’s plans. If you have heard of Wikileaks and aren’t sure that all the information provided there was made up by the Russians, you might be bracing yourself for what will be revealed upon the release of the next batch of leaks, not having close to processing the thousands and thousands of leaks already revealed.

Wanting more and more news and opinions can even rewire your brain which makes it much more difficult to process information and more difficult to see big pictures. Some of these big pictures are obvious and obviously important and go completely unseen due to news and views distraction.

News that you can and want to use can get lost in the Breaking News.

Overwhelming people with news is consciously used tool of propagandists. New news doesn’t just sell advertising and the goods and services advertised, it draws attention away from unsolved problems to the delight of those profiting from these problems.

You may think that giving yourself a news blackout or constriction as being unpatriotic or not what a social justice warrior does. Think again. There can be great value in contemplating what you already know or what you already think that you know. Compare what you’ve heard with your personal experience. Question the sources of information you believe and ask yourself how you would judge information from a source you don’t trust, if you did trust that source.

Resist seeking news to avoid your friends knowing something that you haven’t heard yet. Your friends will probably like you better for giving them the opportunity to be the ones to let you know the latest, then they will think of you as a moron for not knowing.

Notice if you have a tendency to get interested in collecting more an more news that supports your views and delight in being more and more and more convinced that you are right and the wise guy where you work is wrong. Maybe you have collected enough ammunition for awhile.

If seeking more news is making you feel more relaxed about accepting things that you have no immediate plans to do much about, keep seeking. If seeking news is energizing you to bond closer with friends and family, or is energizing to do something to express what you have come to believe in, keep seeking. If you believe strongly in something that you have been recently questioning, make seeking that a priority.

If you are finding that your post-election news seeking has eroded some of your seeking of sports score, fashion trends, pictures of what your friends had for dinner last night, the latest hilarious videos that have gone viral, what the humidity might be tomorrow, that might be a good thing.

Source:  goodmenproject.com

Friday, 14 October 2016 08:29

Probing the Dark Net for Terrorists

The Indian intelligence agency are probing known modes of communication through the deep web. Looking into it, they are probing the dark corners of the Internet which allows these sympathizers to meet, reach, organize and attack. These new tools of closed user group interface, is the new mode of stealth communication. The same dark web is being intercepted for coded communications from terror modules like the one that attacked the Uri 12 Brigade military camp. In fact, IB had given specific input to the Brigade Commander on terrorist sightings across the LoC.

IB and RAW using a coordinated unit under the aegis of IB are monitoring this kind of traffic, namely ascertaining which site is part of which web, who is talking to whom, what kind of messaging and communication is doing the rounds, among other things. Rana Banerji, ex special secretary cabinet secretariat, one of the foremost minds on this subject told Financial Chronicle, “Agencies are sifting through communication across suspected sites and this goes beyond listening posts tuning into chatter, for it is the internet and its recesses which are proving to be far more dangerous vesting places.”

Former RAW chief A.S. Dulat speaking to FC said, “We are adequately prepared to deal with this menace. The

NTRO has a key role to play in this.” In fact, the secretive National Technical Research Organization directly under the National Security Adviser in the PMO is increasingly proving to be the minder of the deep and dark web using sophisticated monitoring equipment to ferret out the vital clues from both the dark and deep web, sharing resources with the IB-RAW on this sensitive beat.

D.C. Pathak, former director Intelligence Bureau told FC, “As the nation’s technical intel agency, NTRO tracks enemy activity in cyber space and also advises on critical information infrastructure protection which is now so important in the age of cyber warfare.” NTRO is particularly concerned with economic installations being attacked by unethical hackers like say the Indian power grid or a ‘spectacular’ attack on a refining complex or a nuclear site.

At almost 500 times the size of the surface web, the deep web’s potency as a communication tool with frightening implications is worrying for the agencies particularly because it cannot be indexed by regular search engines. To keep track of these browsers, new software is being created to stay ahead of the curve. In terms of indoctrination and recruitment, the Islamic State of Iraq and the Levant, also known as the Islamic State of Iraq and Syria, Islamic State, and by its Arabic language acronym, Daesh, which is a Salafi jihadist militant group that follows a fundamentalist Wahhabi doctrine of Sunni Islam has been at the vanguard of internet usage.

NTRO’s off-the-air GSM monitoring device code named Fox is capable of picking up signals between cellphones and mobile towers only within a radius of 2 km and has been used extensively in the Kashmir Valley.

The dark web is the encrypted network that exists between Tor servers and their clients, whereas the deep web is simply the content of databases and other web services that for one reason or another cannot be indexed by conventional search engines. What you want to access are sites using the Tor Hidden Service Protocol. It works over regular Tor (anonymity network), but instead of having your traffic routed from your computer and through an onion-like layer of servers, it stays within the Tor network.

It needs to be mentioned here that only deep web browser can help access the deep web. The most famous of these deep web browsers is called Tor and this is the one that is recommended if you’re looking to get onto the deep web. Downloads of Tor soared in August by almost 100 percent as the general population became more and more concerned about their privacy amid revelations about US and UK intelligence agencies monitoring web traffic.

The deepest layers of the Deep Web, a segment known as the “Dark Web,” contain content that has been intentionally concealed. The Dark Web can be defined as the portion of the Deep Web that can only be accessed through specialized browsers. A recent study found that 57 percent of the Dark Web is occupied by illegal content like pornography, illicit finances, drug hubs, weapons trafficking, counterfeit currency, terrorist communication, and much more. Probably the most notorious example of these activities can be seen in The Silk Road website. To access material in the Dark Web, individuals use special software such as Tor or I2P (Invisible Internet Project).

TOR was initially created by the U.S. Naval Research Laboratory as a tool for anonymously communicating online. It relies upon a network of volunteer computers to route users’ web traffic through a series of other users’ computers so that the traffic cannot be traced to the original user.

As another expert James Lewis has highlighted, “One of the characteristics of terrorist websites is their ability to manage rapid changes of internet addresses. When authorities force a site to move, informal networks based on chat rooms or e mail inform the group’s supporters of the new network address. The word of mouth system to distribute new addresses to audiences is very effective. It reinforces a sense of inclusion in the group and of success in defying the authorities.”

At the start of August, a whole bunch of hidden websites – some saying as many as 50% – completely vanished off the deep web and this was linked to the take down of a hosting operation in Ireland. The Irish Independent reported that the U.S. was seeking the extradition from Ireland of a man named Eric Eoin Marques, who is alleged to have been involved in distributing child pornography online.

Gabriel Weimann, Professor of Communication at the Department of Communication at Haifa University, Israel writes, “Following the November 2015 attacks in Paris, ISIS has turned to the Dark Web to spread news and propaganda in an apparent attempt to protect the identities of the group’s supporters and safeguard its content from hacktivists. The move comes after hundreds of websites associated with ISIS were taken down as part of the Operation Paris (OpParis) campaign launched by the amorphous hacker collective Anonymous. ISIS’s media outlet, Al-Hayat Media Center, posted a link and explanations on how to get to their new Dark Web site on a forum associated with ISIS.

The announcement was also distributed on Telegram, the encrypted communication application used by the group. Telegram is an application for sending text and multimedia messages on Android, iOS, and Windows devices.

Telegram is so confident of its security that it twice offered a $300,000 reward to the first person who could crack its encryption. The messages shared links to a Tor service with a “. onion” address on the Dark Web. The site contains an archive of ISIS propaganda materials, including its documentary-style film, The Flames of War. The site also includes a link to the terrorist group’s private messaging portal on Telegram.

Terrorists can use the Dark Web for fundraising, money transfers, and illegal purchase of explosives and weapons, using virtual currencies like Bitcoin and other crypto-currencies.

Source : themerkle

I’ll never forget when there were only a few channels on TV. NBC, Fox, ABC and WB were the only choices I had as a kid. As cable TV got easier to access, more channels popped up. Most of those channels weren’t even worth watching, but they were there nonetheless.

There are so many TV channels these days that they had to add a guide function for us to be able to see them all in one place without endlessly channel surfing and getting lost in our cable box.

Social media is following the same trend. We have gone from a small handful of outlets to having way too many to keep up with. It’s even worse if you have a common name. Chances are someone else beat you to the handle you wanted. This causes a problem for connecting.

The problem is, we’ve arrived at a point to where we’re drowning in social media log-ins, handles, passwords and networks. Literally, hundreds of big-time social media sites are out there. It’s impossible to have the same username across all your personal channels.

Until now, there’s never been a place to keep all your sites together. Sure some sites allow you to manage all your profiles, like Hootsuite and Social Oomph, but there’s never been a social site for the public to find all their social media profiles in one place. Until now.

A new site called Clyxo stores the top 16 social media sites all in one place. This means users can now use one handle that links them back to every one of their major social media profiles. No more email signatures with 5-10 different icons. No more space taken up on your computer. No more added contact lines on your business cards. One logo, one site, one handle, with Clyxo.

Clyxo.com is easy to use and takes less than 90 seconds to connect all your accounts. With Clyxo’s one-click-api-integration technology, connecting is surefire and sure easy for users to set up their accounts. Clyxo is all about making life simpler for social media users.

Clyxo is also completely customizable. You can leave out sites you aren’t on and arrange the sites you are on in order of your usage. With the drag-and-drop profile feature, visitors will see what sites you frequent the most.

Behind the scenes, Clyxo is becoming the first ever social media search engine. Clyxo is NOT a social media site. It’s a social bookmark that allows users to find people on social media with ease. No more relying on Google to give you the right profile for the people you want to connect with. Clyxo solves this problem and more.

The best part—Clyxo is 100 percent free with no upsells, no hidden fees, or any of that. It’s simply a free tool for social media users to implement to make being found easier. An app in the app store also gives you plenty of unique handles to choose from. You can see an example profile at www.clyxo.com/closer

Source: huffingtonpost

What if you could behave like the crew on the Starship Enterprise and teleport yourself home or anywhere else in the world? As a human, you're probably not going to realize this any time soon; if you're a photon, you might want to keep reading.

Through a collaboration between the University of Calgary, The City of Calgary and researchers in the United States, a group of physicists led by Wolfgang Tittel, professor in the Department of Physics and Astronomy at the University of Calgary have successfully demonstrated teleportation of a  (an elementary particle of light) over a straight-line distance of six kilometres using The City of Calgary's fibre optic cable infrastructure. The project began with an Urban Alliance seed grant in 2014.

This accomplishment, which set a new record for distance of transferring a  by teleportation, has landed the researchers a spot in the prestigious Nature Photonics scientific journal. The finding was published back-to-back with a similar demonstration by a group of Chinese researchers.

"Such a network will enable secure communication without having to worry about eavesdropping, and allow distant quantum computers to connect," says Tittel.

Experiment draws on 'spooky action at a distance'

The experiment is based on the entanglement property of , also known as "spooky action at a distance"—a property so mysterious that not even Einstein could come to terms with it.

"Being entangled means that the two photons that form an entangled pair have properties that are linked regardless of how far the two are separated," explains Tittel. "When one of the photons was sent over to City Hall, it remained entangled with the photon that stayed at the University of Calgary."

Next, the photon whose state was teleported to the university was generated in a third location in Calgary and then also travelled to City Hall where it met the photon that was part of the entangled pair.

"What happened is the instantaneous and disembodied transfer of the photon's quantum state onto the remaining photon of the entangled pair, which is the one that remained six kilometres away at the university," says Tittel.

City's accessible dark fibre makes research possible

The research could not be possible without access to the proper technology. One of the critical pieces of infrastructure that support quantum networking is accessible dark fibre. Dark fibre, so named because of its composition—a single optical cable with no electronics or network equipment on the alignment—doesn't interfere with quantum technology.

Towards quantum Internet: Researchers teleport particle of light six kilometres

A group of physicists led by Wolfgang Tittel have successfully demonstrated teleportation of a photon, an elementary particle of light, over a straight-line distance of six kilometres.  Credit: Riley Brandt, University of Calgary


The City of Calgary is building and provisioning dark fibre to enable next-generation municipal services today and for the future.

"By opening The City's dark fibre infrastructure to the private and public sector, non-profit companies, and academia, we help enable the development of projects like quantum encryption and create opportunities for further research, innovation and economic growth in Calgary," said Tyler Andruschak, project manager with Innovation and Collaboration at The City of Calgary.

"The university receives secure access to a small portion of our fibre optic infrastructure and The City may benefit in the future by leveraging the secure encryption keys generated out of the lab's research to protect our critical infrastructure," said Andruschak. In order to deliver next-generation services to Calgarians, The City has been increasing its fibre optic footprint, connecting all City buildings, facilities and assets.

Timed to within one millionth of one millionth of a second

As if teleporting a photon wasn't challenging enough, Tittel and his team encountered a number of other roadblocks along the way.

Due to changes in the outdoor temperature, the transmission time of photons from their creation point to City Hall varied over the course of a day—the time it took the researchers to gather sufficient data to support their claim. This change meant that the two photons would not meet at City Hall.

"The challenge was to keep the photons' arrival time synchronized to within 10 pico-seconds," says Tittel. "That is one trillionth, or one millionth of one millionth of a second."

Secondly, parts of their lab had to be moved to two locations in the city, which as Tittel explains was particularly tricky for the measurement station at City Hall which included state-of-the-art superconducting single-photon detectors developed by the National Institute for Standards and Technology, and NASA's Jet Propulsion Laboratory.

"Since these detectors only work at temperatures less than one degree above absolute zero the equipment also included a compact cryostat," said Tittel.

Milestone towards a global quantum Internet

This demonstration is arguably one of the most striking manifestations of a puzzling prediction of quantum mechanics, but it also opens the path to building a future , the long-term goal of the Tittel group.

The Urban Alliance is a strategic research partnership between The City of Calgary and University of Calgary, created in 2007 to encourage and co-ordinate the seamless transfer of cutting-edge research between the university and The City of Calgary for the benefit of all our communities. The Urban Alliance is a prime example and vehicle for one of the three foundational commitments of the University of Calgary's Eyes High vision to fully integrate the university with the community. The City sees the Alliance as playing a key role in realizing its long-term priorities and the imagineCALGARY vision.

../img/sprite/This email address is being protected from spambots. You need JavaScript enabled to view it.";) -1180px 0px / 1233px 160px no-repeat scroll transparent; display: inline; float: none; vertical-align: middle;"> Explore further: New approach enhances quantum-based secure communication

More information: Raju Valivarthi et al. Quantum teleportation across a metropolitan fibre network, Nature Photonics (2016). DOI: 10.1038/nphoton.2016.180

Qi-Chao Sun et al. Quantum teleportation with independent sources and prior entanglement distribution over a network, Nature Photonics (2016). DOI: 10.1038/nphoton.2016.179

Original source of this article is Phys.Org

Wednesday, 24 August 2016 03:09

50 Digital Media Resources You May Have Missed

It has been another action-packed week here at Mashable. We've been covering the newest gadgets coming out of Mobile World Congress in Barcelona, the Pope's last Tweet and the fate of Groupon CEO Andrew Mason.


We know you've been busy with your own lives, so we rounded up the most important updates in tech and social media to keep you informed. So read below for tons of digital media resources, new innovative apps and much more.

Editor's Picks

Social Media

Business & Marketing

Tech & Mobile


Source : http://mashable.com/2013/03/02/digital-media-resources-73-2/#QNhJvKbIiPq0 


Search-driven piracy is a red herring, Google argues.

Pirate sites are now an ‘infinitesimal’ part of Google search results, according to a new copyright-focused report created by Google. “Worldwide, more than 3.5 billion searches are made each day on Google Search, making it the most widely used search engine in the world,” the report states. “Search’s popularity has tangible benefits for rightsholders, as it helps more than a billion people worldwide find licensed copies of content. For example, between our Search and Google News services, Google sends over 10 billion clicks per month to publishers’ websites.”

“There are more than 60 trillion addresses on the Web, but only an infinitesimal portion of these have any connection to piracy.”

Exactly what percentage quantifies ‘infinitesimal’ is not specified in the document, nor are absolute amounts defined. Also unclear is to why Google created this document, though major content owners, policymakers, and key member of the media appear to be targets. The document was dated July, 2016.

Throughout the substantial piracy-focused PDF, Google attempts to dismantle the supposition that search is a major driver of piracy traffic. That includes considerable attention towards YouTube, particularly the highly-effective control mechanisms offered by Content ID. Specifically, Google claims that 99.5 percent of music infringement claims are handled by Content ID, an assertion first reported by Digital Music News and heavily debated by the music industry.

Misleading ‘Long Tail’ Piracy Queries?

In the document, Google also noted that most people aren’t searching for pirated material at all. Instead, the search giant accused its critics of artificially constructing piracy-laden search queries that typically don’t exist. “The search results for the vast majority of media-related queries show results that include only legitimate sites in the top results pages,” the document continues. “This is thanks to both our constant improvements to the algorithms that power Google Search and the efforts of rightsholders to prioritize and target their copyright removal notices.”

To illustrate the point, the document contrasts search results for mainline search terms with those carrying piracy-focused additions. That includes terms like ‘Watch,’ which may indicate interest in streaming piracy sites. “Some critics paint a misleading picture by focusing on the results for rare, ‘long tail’ queries, adding terms like ‘watch’ or ‘free’ or ‘download’ to a movie title or performer’s name,” Google asserts. “While the search results for these vanishingly rare queries can include potentially problematic links, it is important to consider how rare those queries are. Look at the relative frequency of these Google searches in 2015:

‘Katy Perry’ searched 14,812x more often than ‘Katy Perry free download’
‘Taylor Swift’ searched 4534x more often than ‘Taylor Swift download’
‘PSY Gangnam Style’ searched 104× more often than ‘PSY Gangnam Style download’
‘Star Wars The Force Awakens’ searched 402× more often than ‘Watch Star Wars The Force Awakens’
‘Pixels’ searched 240× more often than ‘Watch Pixels’
“Google Search isn’t responsible for piracy.”

That supports Google’s broader assertion that search isn’t the reason for piracy. “Google Search is not how music, movie, and TV fans intent on pirating media reach pirate sites,” the document continues. “A 2011 study found that all traffic from major search engines (Yahoo, Bing, and Google combined) accounts for less than 16% of traffic to sites like The Pirate Bay, and recent statistics from ComScore confirm these numbers. Research that Google co-sponsored with PRS for Music in the UK further confirmed that traffic from search engines is not what keeps these sites in business. These findings were confirmed in a research paper published by the Computer & Communications Industry Association.”

Source :http://www.digitalmusicnews.com/2016/08/11/piracy-infinitesimal-part-google-search/ 


Google has produced a car that drives itself and an Android operating system that has remarkably good speech recognition. Yes, Google has begun to master machine intelligence. So it should be no surprise that Google has finally started to figure out how to stop bad actors from gaming its crown jewel – the Google search engine. We say finally because it’s something Google has always talked about, but, until recently, has never actually been able to do.

With the improved search engine, SEO experts will have to learn a new playbook if they want to stay in the game.

SEO Wars

In January 2011, there was a groundswell of user complaints kicked off by Vivek Wadwa about Google’s search results being subpar and gamed by black hat SEO experts, people who use questionable techniques to improve search-engine results. By exploiting weaknesses in Google’s search algorithms, these characters made search less helpful for all of us.

We have been tracking the issue for a while. Back in 2007, we wrote about Americans experiencing “search engine fatigue,” as advertisers found ways to “game the system” so that their content appeared first in search results (read more here). And in 2009, we wrote about Google’s shift to providing “answers,” such as maps results and weather above search results.

Even the shift to answers was not enough to end Google’s ongoing war with SEO experts. As we describe in this CNET article from early 2012, it turns out that answers were even easier to monetize than ads. This was one of the reasons Google has increasingly turned to socially curated links.

In the past couple of years, Google has deployed a wave of algorithm updates, including Panda and Panda 2, Penguin, as well as updates to existing mechanisms such as Quality Deserved Freshness. In addition, Google made it harder to figure out what keywords people are using when they search.

The onslaught of algorithm updates has effectively made it increasingly more difficult for a host of black hat SEO techniques — such as duplicative content, link farming and keyword stuffing — to work. This doesn’t mean those techniques won’t work. One look into a query like “payday loans” or ‘‘viagra” proves they still do. But these techniques are now more query-dependent, meaning that Google has essentially given a pass for certain verticals that are naturally more overwhelmed with spam. But for the most part, using “SEO magic” to build a content site is no longer a viable long-term strategy.

The New Rules Of SEO

So is SEO over? Far from it. SEO is as important as ever. Understanding Google’s policies and not running afoul of them is critical to maintaining placement on Google search results.

With these latest changes, SEO experts will now need to have a deep understanding of the various reasons a site can inadvertently be punished by Google and how best to create solutions needed to fix the issues, or avoid them altogether.

Here’s what SEO experts need to focus on now:

Clean, well-structured site architecture. Sites should be easy to use and navigate, employ clean URL structures that make hierarchical sense, properly link internally, and have all pages, sections and categories properly labeled and tagged.

Usable Pages. Pages should be simple, clear, provide unique value, and meet the average user’s reason for coming to the page. Google wants to serve up results that will satisfy a user’s search intent. It does not want to serve up results that users will visit, click the back button, and select the next result.

Interesting content. Pages need to have more than straight facts that Google can answer above the search results, so a page needs to show more than the weather or a sports score.

No hidden content. Google sometimes thinks that hidden content is meant to game the system. So be very careful about handling hidden items that users can toggle on and off or creative pagination.

Good mobile experience. Google now penalizes sites that do not have a clean, speedy and presentable mobile experience. Sites need to stop delivering desktop web pages to mobile devices.

Duplicate content. When you think of duplicate content you probably think of content copied from one page or site to another, but that’s not the only form. Things like a URL resolving using various parameters, printable pages, and canonical issues can often create duplicate content issues that harm a site.

Markup. Rich snippets and structured data markup will help Google better understand content, as well as help users understand what’s on a page and why it’s relevant to their query, which can result in higher click-through rates.

Google chasing down and excluding content from bad actors is a huge opportunity for web content creators. Creating great content and working with SEO professionals from inception through maintenance can produce amazing results. Some of our sites have even doubled in Google traffic over the past 12 months.

So don’t think of Google’s changes as another offensive in the ongoing SEO battles. If played correctly, everyone will be better off now.


Page 2 of 6


World's leading professional association of Internet Research Specialists - We deliver Knowledge, Education, Training, and Certification in the field of Professional Online Research. The AOFIRS is considered a major contributor in improving Web Search Skills and recognizes Online Research work as a full-time occupation for those that use the Internet as their primary source of information.

Get Exclusive Research Tips in Your Inbox

Receive Great tips via email, enter your email to Subscribe.