Select Page

HoloLens 2 gives Microsoft the edge in next generation of computing

Microsoft Blogs – 2.27.19 (2.24.19)

Chelsey Potts felt so much pressure to succeed when she first stepped from the manufacturing floor into the cab of a Kenworth truck.

“When you get a job at Kenworth, most people are doubling what they made at their last job. And, you know, they’re nervous,” she said. “I have a 5-year-old and a 10-month-old, and saying, ‘Mommy’s not going back to work the next day,’ that’s my biggest fear.”

Her new job — outfitting the interior of a sleeper cab — required her to perform an intricate sequence of mechanical and physical tasks that were challenging to learn at first. For workers wielding tools in complex industrial settings, flipping through training manuals or consulting a screen takes focus and hands away from the work.

Read more: HoloLens 2 gives Microsoft the edge in next generation of computing

How Will the Working World of 2030 Differ from that of Today?

Dell Blog – 2.27.19 (2.25.19)

Steam engines revolutionized the working world back in the late 18th century – first in England, and then in the rest of the world. This development kicked off the Industrial Age: Commercial production took a great leap forward, the mechanical production of goods ousted previously conventional ways of working, and people had to make radical adjustments accordingly. In turn, this gave rise to entirely new types of work, as well as new opportunities.

Read more: How Will the Working World of 2030 Differ from that of Today?

PureBoot, the High Security Boot Process

Purism Blog – 2.27.19 (2.25.19)

The boot process, in computer hardware, forms the foundation for the security of the rest of the system. Security, in this context, means a “defense in depth” approach, where each layer not only provides an additional barrier to attack, but also builds on the strength of the previous one. Attackers do know that if they can compromise the boot process, they can hide malicious software that will not be detected by the rest of the system. Unfortunately, most of the existing approaches to protect the boot process also conveniently (conveniently for the vendor, of course) remove your control over your own system. How? By using software signing keys that only let you run the boot software that the vendor approves on your hardware. Your only practical choices, under these systems, are either to run OSes that get approval from the vendor, or to disable boot security altogether. In Purism, wbelieve that you deserve security without sacrificing control orconvenience: today we are happy to announce PureBoot, our collection of software and security measures designed for you to protect the boot process, while still holding all the keys. Read more: PureBoot, the High Security Boot Process – Purism

Apple highlights best photos shot on iPhone around the world

Apple Newsroom – 2.27.19 (2.26.19)

iPhone photographers around the world shared their best photos for the Shot on iPhone Challenge, capturing remarkable moments with the world’s most popular camera. The 10 selected winners will be featured on billboards in select cities, in Apple retail stores and online. The winning shots came from a range of models, from iPhone XS Max to iPhone 7, showcasing the quality of cameras across the line.

Read more: Apple highlights best photos shot on iPhone around the world

Social Media Auto Publish Powered By : XYZScripts.com
jQuery(document).ready(function($){ $(‘.et-social-icon .icon’).each(function(){ $(this).find(‘a’).attr(‘target’, ‘blank’); }); });