Tuesday 16 January 2018

Retractable Fast Charging Multi-Purpose USB




USB charger and data Cord seems to have an endless design engineering. When we think USB we think of long or short cable but on sighting this USB cord, Solution to a long almost never noticed problem comes immediately to light. Normal USB cords are either too long, too short and are curling and twisting making it difficult to carry.

Retractable Fast Charging
Retractable Fast Charging 

This USB cord solves all these problems and more It can expand up to 1m and totally retractable. Super easy to carry and pack for travel. Super fast charging. Hidden USB interface. Compatible with iPhones and other smartphones.

Retractable Fast Charging
Retractable Fast Charging 

Great product here, great travel buddy and smart gift item for loved ones.

Retractable Fast Charging
Retractable Fast Charging 

Retractable Fast Charging
Retractable Fast Charging 
Retractable Fast Charging
Retractable Fast Charging 


Buy Now

Monday 15 January 2018

Super Gesture Control Armband

Super Gesture Control Armband


wymo




Information technology is just about getting warmed up, It now seems like witchery or wizardry we see on TV. Hell no! this ain't no sorcery, this is where ICT is about to dwell. If you have a passion for tech gadgets then this product is a good exploration point.


wymo whyte



This armband is a wearable gesture control and motion control device that allows you to operate and control your mobile phones, whiteboards, computer/PCs, play games, home electronics, drones, toys just name it. Truly a masterpiece.
Ideal gift item for nerdy kids and indeed for everyone. Its usefulness cuts across personal/home, enterprise, professional and military application.






Super Dancing Toy Robot for Kids





Dancing Toy Robot




Super Dancing Robot toy has a very colonizing effect on kids compared to other robot toys. The reason is that the robot can rotate 360 degrees, dancing, and issued music. It is also designed to sit on the ground and spine round at the same time.




Dancing Toy Robot



Some music will play during dancing, turn on it, When it is dancing, it will flashlight and bob, and it will also dance regularly.



Dancing Toy Robot


Dancing Toy Robot





Dancing Toy Robot


Item Type: Toy Phones
Gender: Unisex
Age Range: 8-11 Years,12-15 Years,5-7 Years
Features: Mini,Interactive,Sounding,Educational,Flashing,Battery Operated
Model Number: Robot Toy
Material: Plastic
Size: 22*16*3.5cm
Electronic: Robot Toy
Electronic toy: Space Dancing Robot Toy
Flashing toys: Vocal Toy
Interactive Game: Educational 
Toys for: Birthday gift 




Order Now

Sunday 14 January 2018

Home wireless charger Plus Bluetooth speaker


home wireless charger speaker

Regular audio speakers suck because they can only produce sounds and requires a long clumsy cable for connection. How can some have fun with this kind of speakers? the answer is NO FUN AT ALL. Here is what having fun is; Listening to inspiring noise filtered sound whilst performing your yoga, dance or routine exercise.


This Bluetooth wireless home speaker has a playback function, combined speaker connection, 2.0 channel, support Apt-x, Bluetooth, audio and auxiliary communication, can be used with a mobile phone, home theater, and audio player.

USB wireless charge Technology



The device comes with a dual function of Bluetooth wireless speaker and a wireless and wire charger, compatible with  iPhone 8 8 Plus X for Samsung s8 s8 Plus Note 8 5

multi-purpose

USB wire charging

Wi-Fi Music: SiriusXM Internet 
Playback Function: Other,FLAC,MP3,APE
Waterproof: Yes
Frequency Range: 85Hz-20KHz
Material: Plastic
Number of Loudspeaker Enclosure: 2
Battery: Yes
Feature: Wireless Charger for Mobile Phone
Built-in Microphone: Yes
Waterproof Level: IPX 4
Speaker Classification: Full-range Speaker
Speaker Structure: Catheter



Saturday 9 September 2017

Dealing with Ransomware threats- Citrix Solutions

It’s a nightmare scenario for any user or organization: in the middle of an ordinary day, your screen is taken over by an alert that your data has been encrypted and your computer’s essential functions have been locked down. You have two choices: pay a ransom—or accept that you’ll never see your data again, including any sensitive or regulated information they may contain (which, in turn, may well be leaked or sold to the highest bidder). A countdown clock shows how little time you have left to make your decision. You may be able to determine later how it got to this point—a phishing email? An infected file or web page? An exploit kit?—but you’d do anything to have prevented it from happening in the first place. Fortunately, there are steps you can take now to lower the risk of ransomware, and to minimize its impact in the event of an attack.

Citrix solutions enable four highly effective measures for reducing your exposure to ransomware and keeping your apps and data accessible to authorized users—not hackers and their clients. Virtualization, enterprise mobility management and enterprise file synchronization make it possible to insulate computers, tablets, smartphones and other endpoints against ransomware infection, and to recover quickly in the event of a breach. • Shield users of web apps from infection and keep sensitive data off the endpoint by publishing virtualized, sandboxed and hardened browsers rather than relying on the locally installed, over-configured and over-connected browser. • Prevent email-borne ransomware from compromising the endpoint by publishing a virtualized, sandboxed and hardened email client. • Protect mobile devices against attack with measures including containerization, encryption, blacklists and whitelists, and device compliance checks • Ensure the rapid recovery of ransomware-encrypted data with a secure and robust enterprise file sync and sharing service. Data taken hostage—a crime that pays handsomely Recent years have seen the Internet swarmed with more than 50 variants of ransomware with names like Locky, KeRanger, Cryptolocker, CryptoWall and TeslaCrypt. Initially targeting consumers, these scripts increasingly target victims with highly sensitive, high-value data such as healthcare, banking, legal and finance organizations. Once activated by an unwitting user, the ransomware calls home to a command-and-control server to acquire a unique, randomly created AES encryption key, then applies it to critical files found on local, network and cloud-connected drives. At that point, this data is entirely under the control of the hacker, who demands the prompt payment of a ransom to recover it or prevent its disclosure. This amount may range from hundreds of dollars for individual consumers to many thousands for a business. Payments are often demanded in Bitcoin, further complicating a business response. Citrix.com | White Paper | Ransomware: Four Ways to Protect Data Now 3 As an illicit business model, ransomware is as effective as it is simple, reportedly earning hundreds of million of dollars for the Cryptowall script alone. For the victim organization, recovering access to data and systems can literally be a matter of life and death, as in the case of a hospital where electronic medical records (EMR) as well as the systems responsible for CT scans, documentation, lab work and pharmacy functions have been rendered unavailable. Targeted companies in every industry, including education, utilities, retail, finance and government, face dire consequences as well, including losing access to core business functions such as email and payroll; the customer information to deliver services; and the production data on which operations depend.

Even without the countdown timer displayed by most ransomware, the urgency of a response is all too clear. Paying the ransom, typically in Bitcoin through a self-service process, is an unappealing prospect; doing so incurs a cost, rewards criminal activity and strengthens the incentive for such attacks throughout the industry. Still, at least the victim can be reasonably confident that they will be given the needed decryption key—or will they? Reports have begun to surface of “boneidleware,” malware that emulates ransomware and elicits payment, but deletes data rather than encrypting it, leaving paid-up victims empty-handed. Refusing to pay can be even worse. IT must respond quickly by shutting off systems and networks to prevent ransomware from spreading—a considerable disruption—and restoring encrypted data from the most recent backup. Even then, the encrypted data still remains in the hands of the hacker, who will doubtless punish the uncooperative victim and aim to monetize the attack another way through its sale or leak. The traditional approach for mitigating ransomware revolves around user education, antimalware, frequent backups—and keeping a supply of Bitcoin on hand just in case. These are sensible measures, but they’re not nearly enough, as proven by numerous spectacular failures. What’s needed is a more robust, systems-level approach designed to keep data out of harm’s way entirely. Citrix has long helped customers secure their apps, data and systems against attack through a more secure architecture complemented with robust technologies for secure access control, secure mobility, data protection, risk management and business continuity. As the threat of ransomware continues to grow, Citrix provides solutions and best practices to help prevent breaches, and to ensure that data remains available in the event that an attack does occur. We strongly recommend the four following components of the Citrix Workspace as essential methods of a complete enterprise strategy for security and data protection.

Four ways to kidnap-proof your data 1. Publish virtualized, sandboxed and hardened browsers Browsers serve as the front end for modern applications across web, cloud, mobile and embedded platforms, making them a prime attack vector. A user’s computer can become infected simply by visiting a site that hosts malware disguised as a download or plugin update, coded in active content, or even silently embedded in an image or video. Browser virtualization provides an abstracted architecture to insulate business data and corporate networks from web-based malware such as ransomware. By using Citrix XenApp to run a hosted browser, IT can introduce a layer between the corporate environment and the Internet to shield the trusted computer and its data from attack. The virtualized browser also keeps sensitive data off the endpoint. As a further step, IT can isolate the browser through containerization or sandboxing. All web usage, including hyperlinks in emails and social media apps, are redirected to open in a onetime-use virtual browser within the container or sandbox. This browser instance does not have access to other applications, the endpoint, file shares or other sensitive resources, limiting the Citrix.com | White Paper | Ransomware: Four Ways to Protect Data Now 4 reach of ransomware to the current browser session. As a result, no data beyond the current browser session is vulnerable to third-party encryption, and the malware used to deliver the attack will not penetrate the rest of the enterprise environment or persist beyond the current session. Content inspection, whitelisting and other security measures can also be integrated with the isolated browser to reduce the risk of ransomware and other forms of malware. Use case-specific browsers allow further hardening against infection, reducing the attack surface for illicit software. By configuring a separate virtual browser for each application and use case, IT can disable extraneous settings, unnecessary active content and other capabilities not currently required, such as Flash, Silverlight or Java. As an added benefit, multiple browsers such as Internet Explorer and Chrome can be published, and multiple versions can be maintained as needed by specific applications. 2. Publish a virtualized, sandboxed, and hardened email client Similar to the publication of hosted browsers, IT can use XenApp to deliver a virtual email client to protect against infection via email links and attachments. This can be either a traditional native client such as Microsoft Outlook, or web-based email including Google Gmail and Microsoft Office 365. Publishing the email client ensures that all required security settings are configured and consistent for all users and specific to use cases. Antivirus, DLP (data leakage protection), whitelisting and other technologies are integrated with the published email application and are therefore not endpoint-dependent or limited. Only the pixels representing the email app are sent to the endpoint, not actual messages, attachments or other data, ensuring that ransomware does not infect the user’s computer and thus gain a foothold within the enterprise environment for further penetration and attack. 3. Protect mobile devices against attack with containerization As mobile devices become ubiquitous in the enterprise, they also become a prime attack vector for ransomware and other malware—especially when both personal and business apps are used on the same device.

To prevent infection, IT can use Citrix XenMobile to create a separate container on the smartphone or tablet for business data and corporate apps, making it possible to centralize management, security and control for apps as well as data and settings without interfering with any personal content on the device. For example, IT can define contextual security policies that provide access only in approved scenarios to reduce exposure to malware. Whitelists and blacklists can prevent the installation of known malicious apps on the device, including those known to deliver ransomware. Similarly, XenMobile checks to ensure that the device has not been jailbroken or rooted to allow the installation of pirated or non-validated apps, a common vector for malware designed to acquire super admin status. Non-compliant devices are blocked prior to enrollment, ensuring that any ransomware or other malware they may contain will not enter the corporate network. To keep pace with constantly changing malware definitions and security trends, and protect devices proactively against any ransomware, malicious app or profile, XenMobile natively integrates with security vendors such as Skycure, Palo Alto Networks and Zimperium. 4. Provide a secure and robust enterprise data sync and sharing service The rise of ransomware is a stark reminder of the critical importance of data. When users can’t access their files, work comes to a halt—customers can’t be served, development and production can’t proceed, and the business simply can’t function. An enterprise data sync and sharing service like Citrix ShareFile can help keep data out of reach of ransomware without impeding productivity. Instead of being stored on a local device or network drive, data can be stored, managed, secured and accessed elsewhere—while still appearing as if it resides locally from the user’s perspective for optimal convenience and ease of use. For added protection, organizations should take steps to ensure that clean, up-to-date data will always remain available no matter what happens.
 In the event a file is encrypted by ransomware, IT can revert to the most recent uncompromised version, eliminating the need for a hacker’s decryption key. Both protecting data against attack and ensuring that an uncompromised version of data is always available, ShareFile provides multilayered protection against ransomware and other malware. Proven protection Citrix customers are already using these methods to avoid the damage and disruption of ransomware. One healthcare industry IT leader reports that he has already counteracted numerous ransomware attacks through the secure Citrix architecture in place. “We probably see at least one ransomware attack a week of some kind or another, and 99.99 percent of the time, we have been successful in containing that to just the workstation.” The organization simply swaps in a newly imaged hard drive for the workstation and restores its data from an enterprise file sync and sharing service, and work proceeds as usual. In this case, the users in question are doctors and other medical professionals for whom access to data can literally be a matter of life and death. The Citrix approach to ransomware protection keeps hackers from holding the organization and its patients hostage—so the delivery of care can continue. Conclusion Ransomware is one of the most serious security threats organizations face today, and calls for an equally robust response—well beyond simply cautioning users about suspicious links. Citrix recommends a multilayered approach designed to reduce exposure to ransomware attacks, as well as to recover encrypted data more quickly and effectively. Citrix supports this approach through Citrix Workspace solutions, providing an integrated and flexible framework to secure apps, data and the network from infection by malware of all kinds. By publishing virtual web browsers and email clients with Citrix XenApp, IT can isolate endpoints from the corporate network and ensure that infected hosts are unable to further spread ransomware and place more of the organization’s data at risk. Citrix XenMobile enables secure mobility through containerization to protect data on smartphones and tablets. Citrix ShareFile captures versions of files in real time to ensure that a clean version is always available to replace a file that has been encrypted by ransomware. In this way, IT can protect the business and its data, minimize disruptions and avoid rewarding hackers for their illicit activity. To learn more, please visit citrix.com/secure. About Citrix Secure Digital Workspaces Only a Citrix Workspace offers a truly integrated solution to enable people to securely access their apps, desktops and data from anywhere. The Citrix digital workspace includes end user computing and networking technologies that are industry-recognized leaders in their individual categories. You can rely on Windows app security and delivery from XenApp, high performance virtual desktops from XenDesktop, mobile productivity apps and device security from XenMobile, secure data sync and share with ShareFile, and network security with NetScaler. The Citrix Workspace can be delivered on-premises through Citrix Workspace Suite, or as a full cloudbased solution through Citrix Workspace Service

Saturday 1 July 2017

Notpetya Awareness





Notpetya


What is NotPETYA?
(or PETYA)
Though the name is similar to ransomware that first appeared in 2016, this is a completely new strain. Hence, researchers have named it NotPetya while others are classifying it as close to “GoldenEye” malware (Petya + Mischa). This ransomware spreads through a combined client-side attack (CVE-2017-0199) and network based threat (MS17-010). It spread rapidly using ETERNALBLUE (MS17-010), while it harvested password hashes and psexec as infection vectors from each infected machine.

Infection Process
1. Arrived via an update to an accounting system in Ukraine (ME Doc)
2. Spread like a worm from an infected machine
3. Exploited Windows SMB vulnerability (aka EternalBlue), fix by Microsoft was released (MS17-010)
4. Spreads into the local network using Eternal Blue, psexec , WMIC
5. Encrypts MFT (Master File Tree) tables for NTFS partitions
6. Overwrites the MBR (Master Boot Record) with a custom bootloader
7. Shows a ransom note demanding USD 300, same bitcoin wallet
8. Prevents victims from booting their computer.

9. Hard coded local kill switch

There is no guarantee of recovery of files as the email (wowsmith123456@posteo.net) is no longer valid. This is actually most likely NOT ransomware but instead, it is most probably destructive wiper malware disguised as ransomware. A close reading of the code shows there is no way for data to be recovered – only destroyed.

Action Guide
• Improve Detection (Implement IoCs in SoC, where available)
• Updated AV / Anit-Malware systems
• Kill Switch
• Implement IoCs into SoC and timely incident response
• IoCs are detailed
• Clears the windows event log using Wevtutil
• Detected indicator that file is ransomware
• Disable Automatic reboot
• Prevent local admin privileges for normal user operations
• Avoid SMB (Port 445) and RDP on servers [Guidance]
• Disable SMB1 or Block incoming traffic to port 445
• Kill Switch: Create a file in %windir% called perfc.dat, prevents creation of
Perfc.dat file by Malware. Deny write permissions to perfc.dat.
• If infected
• Report to law enforcement agencies and ISAC (where applicable)
• Activate your incident response plan

Indicators of Compromise (IoCs) & Remediation
• Improve Detection (Implement IoCs in SoC, where available)
• Updated AV / Anti-Malware systems
• Block URLs
• http://mischapuk6hyrn72.onion ; http://petya3jxfp2f7g3i.onion;
http://petya3sen7dyko2n.onion
• http://mischa5xyix2mrhd.onion/MZ2MMJ; http://mischapuk6hyrn72.onion/MZ2MMJ
• http://petya3jxfp2f7g3i.onion/MZ2MMJ; http://petya3sen7dyko2n.onion/MZ2MMJ
• http://benkow.cc/71b6a493388e7d0b40c83ce903bc6b04.bin COFFEINOFFICE.XYZ
• http://french-cooking.com/
• Block IP addresses
• 95.141.115.108; 185.165.29.78; 84.200.16.242; 111.90.139.247
• Update AV Hashes
• a809a63bc5e31670ff117d838522dec433f74bee
• bec678164cedea578a7aff4589018fa41551c27f
• d5bf3f100e7dbcc434d7c58ebf64052329a60fc2
• aba7aa41057c8a6b184ba5776c20f7e8fc97c657
• 0ff07caedad54c9b65e5873ac2d81b3126754aac
• 51eafbb626103765d3aedfd098b94d0e77de1196
• 078de2dc59ce59f503c63bd61f1ef8353dc7cf5f
• 7ca37b86f4acc702f108449c391dd2485b5ca18c
• 2bc182f04b935c7e358ed9c9e6df09ae6af47168
• 1b83c00143a1bb2bf16b46c01f36d53fb66f82b5
• 82920a2ad0138a2a8efc744ae5849c6dde6b435d
• 027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745 (main 32-bit DLL)
• 64b0b58a2c030c77f8dbabdfa03068130c277ce49c60e35c029ff29d9e3c74c362521f3fb02670d5 (signed PSEXEC.EXE)
• fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 (main 32-bit DLL)
• 02ef73bd2458627ed7b397ec26ee2de2e92c71a0e7588f78734761d8edbdcd9f (64-bit EXE)
• eae9771e2eeb7ea3c6059485da39e77b8c0c369232f01334954fbac1c186c998 (32-bit EXE)

Dear Colleagues,
In last few days, a massive cyber attack has infected machines around the world and is demanding ransom to release
files. This attack, called “NotPetya,” has so far has impacted critical infrastructure sectors like energy, banking,
transportation, telecom and other businesses in many countries by infecting a large number of computers.
In this heightened situation, we request you stay vigilant while using your computers. While dealing with any emails from
external unknown email addresses, do not click any link or execute any unknown attachments.
We request you to follow best practices while performing your daily operations as outlined below.
Phishing & Attachments:
• Do not open attachments in unsolicited e-mails, even if they come from people in your contact list.
• Do not click on a URL contained in an unsolicited e-mail.
• Use a browser to type URLs or navigate through a URL domain.
• Report any suspicious emails/attachments to the IT or IS team.
House Keeping:
• Adhere to the company computer usage policy.
• Do not download software, videos, MP3s, etc.
• Ensure your anti-virus is updated and running on your machine.
• Backup your critical data periodically.
• Set aside time for updating, patching, and anti-virus updates.
• Use the account with the lowest level of user privileges to complete each task and avoid using accounts with admin Privileges unless necessary.
If Infected, immediately disconnect your machine from the network by pulling the LAN cable and call the information
security team. Do not tamper with the machine or data. Do not try to restore your data on your own.


Thursday 25 May 2017

Smashing BMW 8 Series Coming soon : Pictures

Microsoft Releases New Surface Pro with extended Battery life.



Microsoft has announced the release of a new version of its Surface Pro Windows tablet that is thinner, lighter and has a longer battery life.
The company, on a roll from a previous announcement of the new Surface Laptop and Windows 10 S, launched the updated hybrid computer, which can turn from a tablet into a laptop with the addition of a keyboard, at an event in Shanghai. The new Surface Pro replaces the Surface Pro 4 and drops the numbering scheme Microsoft has used for the last five years.



The new Windows 10 tablet will have the latest, seventh generation Intel Core processors – something rivals such as Apple’s MacBook Pro line lack – and up to 13.5 hours of battery life and a smoother, as well as a more rounded design than its predecessor. A new version of the Surface Pen stylus was also released, which supports tilt recognition for sketching on the 12.3in high-resolution touch display.


A version will be available with a built-in 4G modem, while a new kickstand hinge on the back will allow the tablet to adjust to an angle of 165 degrees to make writing or drawing on the screen with the stylus easier. The Surface Dial accessory, which was launched alongside the Surface Studio all-in-one PC in October 2016, will also work with the new tablet.




Microsoft said that new versions of the Surface Pro’s optional keyboard will be available with an Alcantara fabric material – the same finish that raised eyebrows when it was used to cover the keyboard deck of Microsoft’s Surface Laptop.



Tuesday 23 May 2017

HP releases new premium laptops .





HP’s way of drawing attention to its creativity-oriented high-end laptops and hybrid tablets is by choosing the Cannes festival. The most interesting device is the Spectre x2, a Surface Pro-like tablet with a detachable keyboard and stainless steel kickstand. 







HP is targeting Windows Ink users and other graphics pros with the 2.5-pound tablet, which has been significantly updated from the last model with an Ink-certified, pressure sensitive stylus, 3,000 x 2,000 pixel 12.3-inch touchscreen and detachable, full-size keyboard.






It should be no slouch in the performance department, with a 7th-gen (Kaby Lake) Core i7 processor, 360GB M.2 SSD and Intel Iris Plus 650 graphics that can support two 4K external monitors. The battery will run up to 8 hours, or a bit less if used for video playback. Other features include HP fast charge, Bluetooth 4.2 and 802.11ac 2x2 WiFi, and dual speakers "custom-tuned" by Bang & Olufsen. 





Saturday 20 May 2017

New Features coming to Android O


android O



Google revealed more details at last developers conference about upcoming versions of android. Though the official release is not out yet but here are a few eavesdrops. 


broken emoji

1. Broken emoji is gone

Android O will help ensure you never miss out on the latest releases. A new feature for developers lets them integrate a new emoji library that automatically fills in missing emoji even if you don't have it available on your keyboard yet.


2. Smart Sharing

Android O has the ability to understand what you have in your photos and recommend specific apps and actions based on what is in it the composition and your prior behavior. "If a user takes a photo of a receipt, Android O can suggest an expense-tracking app; if the user takes a selfie, a social media app can better handle the image," Google says.
This also applicable to videos, URLs, text, and other types of content — your phone can learn what you typically do with different types of content to improve its recommendations.


Cleaner Icon

3. Cleaner Icons

Android developers will be able to create an array of icons to match the styles for different devices. This implies that if you use a phone that defaults to round app icons, apps that have typically used square icons now have the ability to use round ones instead.

4. Notification Snoozing

Android O places a lot of emphasis on improving notifications. One notable tweak will be the ability to snooze a notification for later.

badge notification

5. Badge Notifications

One of the most significant changes to notifications is the addition of badge notifications — small dots that appear over an app icon to indicate a new notification from that app. Furthermore, you can long press on an app to check its notifications.

6. Background colors for notifications

Another little but notable method Google applies to redesigning the look and feel of notifications: Developers will have the ability to enable background colors for notifications from their app.
Hope you are not expecting your notifications tray to look extra colorful — Google recommends developers "only use this feature in notifications for ongoing tasks which are critical for a user to see at a glance," like navigation or phone calls.

 
notification channels
7. Notification Channels

Apart from just changing the look and feel of notifications, Android O is now letting users have much more fine-tuned control over which notifications they see in the first place with something called notification channels. Notification channels let you decide which types of notifications you want to see from your apps.
.
 
TV Launcher


8. New Android TV Launcher

In addition to getting new superpowers thanks to Google Assistant, Android TV is also getting a redesigned launcher menu that emphasizes content discovery.
 
new animation
9. New animation styles

 Android O is adding support for a new animation style called physics-based animation. "Physics-based animation relies on the laws of physics to manifest a high degree of realism in animation. In our day-to-day life, when a change occurs, it comes with a physical transition that is natural for us to recognize. "
This will manifest in a few different styles of animations, but one is a new type called "fling animation," which helps you slow down motion at the end of a graphic.

10. Picture-in-picture

 Android O is getting support for picture-in-picture that works with any app, not just YouTube. It will take some time before more developers start adopting the feature, which is pretty buggy in the current developer preview, but PiP will definitely level up your multitasking.




Friday 19 May 2017

Microsoft is changing windows design






The recent creators update Microsoft released for Windows 10 may sound very unattractive and unartistic, but the truth is the is filled with artistic potential and useful features that will give users a timeline to manage complex work sessions, APIs that tie all of Microsoft's services together and, notably, a new design paradigm intended to radically overhaul the flat-rectangle user interface it's known for. Microsoft's Fluent Design System focuses on five tenets to help developers build more creative and engaging user interfaces: depth, material, light, scale and motion.

   




Light

If you are a filmmaker then the read is worth it. You will to know just how important lighting is in a scene. With design, it's no different: How bright or dark an interface is can change how the user perceives it.  It creates atmosphere, lending an app design a sense of place. That's true enough, but when it comes to designing an interactive menu or app interface, it's also an important tool for drawing a user's attention. An illuminated button can teach customers how to use an app, or highlight a program feature they might otherwise pass over.





Depth

With earlier versions, Windows has almost relied on square frames to present users with information and tools. Microsoft is challenging developers to kill that paradigm by breaking information and objects free of a traditional 2D frame With Fluent Design.
Instead of the usual flat traditional calendar, for example, Microsoft's Build presentation imagined an "at-a-glance" agenda zooming in and telescoping important events toward the user -- creating an illusion of depth by layering and sizing more important appointments to appear larger. The hope is that by using depth to lend interfaces the illusion of a physical environment, Windows apps will be able to keep their users engaged for longer.






Motion

An amazing animated interface is indeed an engaging one, and the "motion" edict is all about keeping a user's attention by giving her something active to look at and interact with. The use of motion in Fluent Design to a director using movement is being likened to lead the viewer to the story they want to tell. "Motion design has a special power to bring all of our experiences to life," Belfore says, "and lead people from one task to another with a cinematic ease."

Microsoft illustrates this with the Xbox One's live pop-in menu, music visualization in a media player and with a motion graphic transitioning a simple graph to a more dynamic, brightly colored array of representational shapes -- all examples that quickly draw the attention of the user to the task at hand, be it controlling music, managing game settings or simply keeping the viewer engaged with a dataset.





Material


Similar to most of Fluent Design's  concepts, "material" almost seems like a dig at the visual style of Windows' past. The functional squares of the traditional Microsoft interface may be, well, functional, but it lacks a connection to the physical world. Belfiore suggests that the key to making users love Windows' app design is to emulate the "sensory and invigorating" feel of the materials that make up the real world.

"We want to bring more of that character to our designs in the right way, with a physical quality," he says. "Inviting people to touch and interact." This statement could easily be dismissed as an effort to give apps more interesting textures -- but with Windows 10, the idea of making a PC interface inviting to touch holds some merit. We may think of PCs as simple, traditional keyboard-and-mouse interfaces, but the Fall Creator Update leans hard on better voice control, better touch interaction and natural-feeling stylus input. Building an interface that invites that kind of interaction makes a lot of sense.




Scale

Microsoft's recent design language seems surfaced with improvement on the traditional computing environment -- objects under glass controlled with peripherals and accessories. "Scale" is a bit different. Here, Microsoft is looking toward its own future. Specifically, the scale of digital objects used in 3D interfaces and virtual/augmented reality.

The relative "size" of digital assets happens to be something VR developers have been working on for a few years now -- an object that might be properly scaled when viewed through a computer monitor might seem incredibly large or surprisingly small when viewed through an AR or VR headset. Getting the size of virtual objects right is paramount to building a good first-person interface. By challenging developers to think about the scale of their interface in terms of a 3D environment, Microsoft is asking them to imagine how their product might look through the company's Hololens headgear.



It's quite too early to say for sure how Fluent Design will work out, but Microsoft is clearly thinking about its user interface in a completely new way. It's a little odd but the idea that the next version of Windows could look completely different is absolutely exciting.