Virtual make up is it a going to catch on ?

What if you could just use your phones front facing camera to view your facing in different makeup styles , brands and colours and making it easier for you to pick the type of make up you want ? With just a press of a button you could just order it online and have it delivered to your door step in just a few days .

Look no further there’s an app for that! Sephora’s new app lets you do exactly that. Its currently available on IOS in the app store . At the moment , you can only play with lip colors, eye shadows, and false lash styles. If you like the look, well, you can purchase. Convenient! The app also offers “virtual tutorials” that show you how to contour, apply highlighter, and create winged eyeliner. It overlays the tutorial on your face.

Make up , Foundation

Even though this is convenient will women really trust the app instead of actually trying it on themselves ? Many people still preffer trying things hands on to get a better feel of the ingredients used and how their skin reacts to the make up . For example maybe the foundation or lipstick will cause them a form of swelling because they are allergic to some ingredient in the product that they might not even know if they are allergic to them .

In conclusion we can see that the technology is progressing in all sectors and we should embrace change and contribute into making our lives more convenient with out the hustle and bustle of going from one place to an other.

Samsung Galaxy S8 release date

Samsung’s new Galaxy S8 and Galaxy S8+ are scheduled to be released this Friday, April 21st, in South Korea and in a number of international markets including the United States.

Although the growing concern related to Samsung’s latest failure  Note 7, preorders of Samsung’s Galaxy S8 and Galaxy S8+ in South Korea have surpassed 1 million units.

Preordering became available on April 7th.

 

Prices stay low on the faster RX500 cards

Last year AMD brought us the RX400 series of cards which where powerful but cost effective cards more focused for more bugged friendly prices . With AMD’s new RYZEN cpu how ever they have started becoming more and more competitive to Intel CPU market . But will its release of the RX500 also yield a greater impact in the graphics department ? .

AMD’s RX500 series of cards come at a lower price than its predecessors but will a small performance boost . Although they might not be a big leap in performance it might be a good investment in those looking for a budget friendly card that can go hand in hand with NVIDIA’s Gtx1060

In addition to those three cards, AMD is also introducing a new low-cost option, the RX550. The RX550 has an 1183MHz boost speed and 2GB of RAM. But its starting price is only $79, and AMD hopes it’ll entice people to pick it up instead of using an integrated graphics solution.

4D printing and it’s future uses

 

One of the emerging fields within 3D printing research is 4D printing.  4D printing refers to types of materials that can alter their physical shape in response to a stimulus.

While this type of material is fairly new, future iterations could be used to create various compact products. Packaging materials made out of this sort of polymer could be far lass space consuming. If manufacturers can alter the stiffness of the polymer, companies could make furniture that could be shipped in a compact form and then heated to expand into its intended shape.

There’s also a wide range of applications such as:

  • home appliances and products that can adapt to heat or moisture to improve comfort or add functionality.
  • Childcare products that can react to humidity or temperature, for example, or clothes and footwear that optimize their form and function by reacting to changes in the environment.
  • Bio-compatible components that can be implanted in the human body

 

Canonical sharpens post-Unity axe for 80-plus Ubuntu spinners

With Canonicals decision to end its development for the Unity desktop environment , which has been the standard environment for Ubuntu , it has seen many changes as a company in the last couple of days. Founder Mark Shuttleworth has taken back his position as CEO of Canonical making many employees leave the Linux Distro powerhouse any many more leaving On formal notice.
The Canonical creator is cutting figures after an exterior evaluation of his company by potential new financial backers found overstaffing and tasks that lacked emphasis.Tasks have been sliced because of this restructuring, notably the long-promised but never realised Unity 8 convergence project for device and desktop.

Some personnel were bid an instantaneous goodbye without forewarning.It is also claimed inner “town hall” meeting calls were organised with other personnel, alerting them of the looming slashes before El Reg broke the news to the entire world.

A spokesperson for Canonical informed “The Register” these layoffs are being conducted in a different ways around the world because the business operates in a variety of territories with different “regulatory requirements”. They recognized that this is creating doubt for employees.

Network Communication protocols

These technologies to work need internet protocols to allow them to send data through out the internet . These technologies are :

  • Peer to Peer : this protocol makes the clients that want the data into “servers” . This splits up the data to different computers and you give and take data as you are connected . Unlike other protocols which degrade with more users peer to peer increases performance as more users join in, but suffers from “leechers” that only download the files but never upload back causing a degradation in performance.

  • TCP/IP : is a protocol that consists of a Client and a Server . This means that most of the time your download speed is only limited by your Isp and the amount of people connected to the server . It is the most stable of protocols but degrades in performance as more and more users connect to it .

  • UDP : User Datagram Protocol is a protocol which is much faster than TCP/IP and has less latency than other protocols it is used for things likes VOIP and online games that need a fast connection. Although UDP is fast is easily prone to interference and will continue sending packets even if a packet is lost .

Technologies and communication protocols.

There are many different types of internet technologies and protocols used today each has its advantages and disadvantages:

  • Asynchronous transfer mode (ATM) is a switching technique used by telecommunication networks that uses asynchronous  time-division multiplexing to encode information into little, altered measured cells..This is different from Ethernet , which use variable packet sizes for data or frames.

  • Dial-up Internet access is a form of Internet access that uses the facilities of the public switched telephone network (PSTN) to create connection between the ISP and the Computer by calling a telephone number. The user’s computer or router uses an attached modem to encode and decode information into and from audio frequency signals, respectively. Dial up can reach speeds up to 56 kbps.

  • Digital subscriber line is a family of technologies that are used to transmit digital data over telephone lines. These technologies can work simultaneously  through the same line there for one call take and receive call and also be connected to the internet.

Documenting, testing, reviewing and analyzing your virtual infrastructure.

When we analyze our system we must keep a log of the data as time progresses we can review and compare how our system has performed over time and determine what software and services are the most intensive and what can we do to improve them. For example keeping a log for each virtual machines CPU / Memory usage over time can indicate when the machine has had an issue, can help us find the any vulnerabilities in the system and can also give us an indication if the system has been infected with a virus and has not been detected by the anti-virus.

Viruses like worms hog up system resources and spread through the network infecting more more system as they go on. If we see a sudden spike in the system using too much resources it will be a cause for concern . Viruses can spread from vm to host (although it is very difficult ) it is possible that they can spread since they use the same hardware resources. Most importantly software developers should be aware of these vulnerabilities and make sure that visualization software and software on the virtual machines is properly virtualiazed.

Using spread-sheet software we can create charts and visual representations of how virtual machines have performance over time and in addition create a list with all the vulnerabilities found in the systems over time. This allows to view the data in an easy to read way and acknowledge what how safe our virtualized solution is from threats . Keeping logs is very important for reviewing any problems that happened over time .

Software we can use to create a better analysis is one like ELKI which can be used to create also future prediction of the possible usage and more. We must plan and adapt to ever changing hardware requirements be continuously upgrading software and hardware to meet standards that are set by the company in order to function correctly.

To build  a stable infrastructure we need feedback and lots of times to fix any issues regarding it. To collect feedback from customers we can ask them to complete a questionnaire regarding the system every end of month. We can then use that data  in the forms of graphs and charts to allow us to see any improvements regarding the system . Also we can review any issues the users might have with the infrastructure and also prioritize any common issues that arise .

         Meetings can be setup to inform the IT staff each month of the findings and allow the staff to discuss any issues that have risen in the last month from their point of view . For example if end users and having a difficult time accessing certain services , if bandwidth is not enough for the users to use voip and other network services simultaneously . This can be solved by integrating QOS (Quility of Service ) allowing us to configure which services have priority over others . In most cases using QOS will eliminate most bandwidth issues when using a decent connection .

            Using the data collected we can can test any changes we would like to make to the system in a virtualised environment, so that if any thing goes wrong we can just roll back to a previous snapshot in just a matter of minuets . If one of the virtual machines has a virus we can be assured that it cannot spread to the host machine allowing us to safely deal with the virus in the vm with out affecting the host system .

            On every operating system there are built in tools to monitor the performance of the system which display data in a visual way which allow for easy monitoring of the system. Performance monitor in windows gives use the option to display data on almost anything on the system . We can set it up to create a log file every so often and give us an analysis on the data gathered .

            We can also monitor Linux systems with a program called ajenti which gives us a web interface of the Linux system allowing to see system information such as disk space , processor usage , disk usage , free ram space , swap file and much more . It will also keep logs of any event that happens on the system  and even allowing us to use the terminal remotely.

            Even though visualization is a revolutionary step in forward in technology we cannot virtualize everything . For example even thought  developers can develop in  virtual environments they can virtualize specific hardware like graphics cards . Games for example cannot be run in a machine since they need the drivers necessary to work . Code will

Monitoring VM solutions

When monitoring our Virtual solution we have many different options to choose from one of the leading tools on the market “Nessus”. Nessus is a tool used to monitor , patch and find security vulnerabilities in our vm solutions . It is continuously monitors the virtual machines , as stated on their web site Nessus can log in and pull information from VMs, such as active and inactive VMs on the host. This information is useful to continually audit your virtualized environment, and acting on it can help prevent VM sprawl”. This gives us an easy way of monitoring our solution since most of the hard work is done by the software. Also in extension we can use the software to Identify misconfiguration on the guest operating system, hyper visor, and applications running on the virtual images. It will Audit configuration against compliance standards or custom requirements.

Also other proprietary software for network monitoring can help us determine if Virtual machines are using too much bandwidth and causing instability in our network . One other piece of software to help us is “PRTG Network Monitor”. It screens system availability utilizing an assortment of strategies from straightforward ping through SNMP and WMI conventions to particular errands, for example, HTTP, DNS, and Remote Desktop accessibility utilizing different sensors. Utilizing particular sensors for particular machines, a manager can screen be told right away of issues. Additionally, PRTG accompanies some transfer speed checking sensors, so you can guarantee that malware intended to do DoS and other over-burden exercises are not working on your system.

Also we can use penetration testing specific operating systems like kali linux which is full of tools that can be used to “hack” into our system and find any vulnerabilities . For example we can use a tool in the linux terminal called nmap which allows us to find all open ports on our virtual machine then by exploiting open ports we can begin to try to infiltrate into our operating systems with other tools . We can try to exploit web server vulnerabilities using XSS or cross – scripting to run malicious code on the web server to do so we will have to use sql injection to inject sql commands through the webserver by accessing the website and deploying our code. Any users that view the code could them be infected. In this way we can find vulnerabilities and fix them at the same time this allows us to view the issues first hand but requires a knowledge of using the tools and the use of multiple programing languages .

Maintenance on virtualised solutions

To maintain a visualized solution we must focus on three aspects speed, stability, and security. Visualization offers many benefits such as isolation, live migration and intrusion detection. We can easily perform maintenance on a virtual machine by creating a snapshot of it when it is first installed allowing us if mistakes are made or the virtual machine is corrupted we can recover in just a matter of minutes to the snapshot. Using live migration to seamlessly move one virtual machine to an other physical server to balance the load on the server can improve performance and reliability of the visualized solution.

There are two options when using live migration seamless live migration and Pre-copy memory migration. Pre-copy memory migration is spit into three phases : Warm up phase , stop and copy phase and post copy memory migration . Warm up phase refers to the phase where the hyper visor copies all the memory pages from the source destination while the virtual machine is still running on the source . Stop and copy phase refers to the phase where the Virtual machine will be paused copying and page files left to the destination host and the virtual machine resumes on the destination host . The larger the memory of the applications running on the VM the larger the downtime of the virtual machine but downtime is almost zero since this process takes just a few milliseconds and the end user wont even notice.

Our visualization environments need to be secure that is why each virtuliased os is isolated allowing each one to work independently without conflicting with other systems. One issue which many network administrator are aware of is the attacks from inside the network. VM patching and user permissions are a must for any network and VM. We must split virtual machines into segments and form teams of people that can access these virtual machines. For example the accounting team can only access Virtual machines that are used for accounting software but cannot access the Virtual machines that are using in fields like engineering . Vendors such as Vmware offer products for extensive privilege management and compliance . This can allow us to limit what user can and cannot do which can help strengthen the security of the virtualized environment.