Articles

Time-Of-Flight Sensor, And How It Takes Invisible Light For Depth-Sensing Capabilities

Smartphones have multiple cameras for reasons. For example, a telephoto lens for long-focus, or a wide-angle camera for better landscape shots.

But with the demand of the market that hunger for innovations, smartphone makers were ramping up their efforts to improvise the existing, and introduce new technologies as they say fit.

In the camera sector, one of which, is the Time-of-Flight camera.

How To Secure Your Online Activities By Increasing Your Web Browser's Security

Web browser is the gateway to the World Wide Web. And that is why securing your online activities should start from securing your web browser.

When downloaded and installed, web browsers come equipped and already set with their default settings, which may not offer the very best protection. Most people unfortunately, don't really bother to dig deep into the settings to customize things, or to improve their web browser's capabilities.

How 'ERIM' Technique Can Protect Sensitive Data Using 'Efficient In-Process Memory Isolation'

In the evergrowing world of internet, data transactions happen all the time. And this is why there should be a way to properly secure sensitive data as they are delivered from one place to another.

One of which, is by isolating the data and state to increase the security and robustness of many applications. Examples include protecting cryptographic keys against exploits like OpenSSL's Heartbleed bug or protecting a language runtime from native libraries written in unsafe languages.

The Reasons You Should And Shouldn't Get Investors For Your Business

If you.ve just started your own business, welcoming entrepreneurship with proud, know that things won't be easy.

You may have the brightest idea, but that idea is nothing without execution. As a matter of fact, everyone has ideas, especially in this extremely competitive world. But none of those ideas will ever be revolutionary, unless someone is willing to do something about it.

Starting a business can be one of the most challenging things to do.

It takes time, energy, and of course money. The more of those three you have, the more likely you can execute your idea.

Embracing The 'Post-PC Era': The Criteria Needed For A Device To Replace PCs

When humans created the first computer, it was so huge it needed a whole room to operate. When technology advanced and chips became smaller, computers also shrank, and it introduced us to Personal Computers, or PCs.

And when that got smaller, behold we have smaller PCs we all call laptops (then "notebooks"). And when those became smaller, yes, they became the smartphones we hold in our pockets.

How Facebook Catches Bugs On Its 100 Million+ Lines Of Code Platform

As the giant of the web, there is only a few services with sophistication that par with Facebook.

Consisting of over 100 million lines of code (LOC), that is indeed a lot of typing. While Facebook teams of engineers managed that, they also have the responsibility to maintain those codes, by tweaking when necessary, adding more codes, or may even remove some.

With billions of users to serve, Facebook needs to make sure that its platform is up and secured, and capable of delivering all the contents it have under its sleeves to its ever-hungry users.

Polymorphic Malware, And How They Continually Change To Avoid Detection

There are a lot of variants of malware, with each having their own unique traits. Then there is one that continuously change.

This kind of malware is called 'polymorphic malware'. From viruses, worms, bots, trojans, or keyloggers, their polymorphic variants can have different characteristics every time they run, like having different file names and types or encryption keys.

With their ever-changing characteristics, polymorphic malware can be unrecognizable to many detection techniques.