Jul 15

Who Can Control The Data Security?

With the continuous development of scientific and technological, the popularization and application of computer technology is also updated at an alarming rate. Meanwhile, the attendant problems about computer system vulnerabilities result in a serious interference for majority of computer users. Especially in recent years, as computer vulnerabilities are constantly being maliciously used, its dangers are constantly upgraded.

On July 9, some Windows systems users was hacked, and a number of media reports that hackers took advantage of the vulnerability illegally released by an engineer in Google without notification to Microsoft.

 

For this hacker attack, Microsoft did not provide details, but said hackers launched a “purposeful attack”, which generally refers to the government’s or corporate clients’ Windows computer were attacked, and hackers majorly aim at obtaining confidential information for the purpose.

Regardless of users are using Microsoft’s Windows system, or Google’s Android system, some elements of system security should be taken into consideration.

First of all, using a firewall or router to help users protect their system is a good idea.

 

Second, updating security patches. Although in many cases, before deploy the patches to the production systems, the test can be extremely important, but ultimately the patches must be deployed to the system. If the patches don’t update for a long time, your computer may well easily be the target of unscrupulous attackers.

 

Third, using data encryption, for the attention of enterprise data security system administrators, there are different levels of data encryption available, choose one solution of folder/file encryption to protect the data and information to meet the enterprises’ need. Effective data encryption can help the administrators to secure folder/file on the LAN.

 

Fourth, protecting your data by backup, data backup is used as the most important way to avoid disaster. Enterprise administrators can set directory or drive in the local, when the local file changes, the file will automatic backup in accordance with the chronological order of release management, so that users can always check backed up files.

 

No matter business or personal, the user’s data security should not be trampled by anyone. Only picking up the information security tools, grasping security autonomy, can we calmly face the dangers of such dispute!

Jul 08

Analyze American New Thinking of Information Network Security Through the “Prism”

“Information is power, but, like all other kinds of power, someone wish to take this power for their own.” This is the warning from famous American hacker Aron Swartz who left it home before committing suicide warning five months ago.

 

Internet originated in the United States, the current terminal server still lies in its hands. But the United States has always liked to play as the victim of cyber world, Snowden, such a nobody, exposed scandals, “prism” monitoring event really showed the “American” hypocrisy. From the Bush era, the U.S. intelligence agencies have processed to data mining work in nine U.S. Internet companies, including the audio, video, pictures, e-mail, documents, and personal connection information contact analysis and action. There are ten types of monitor categories: information and e-mail, instant messaging, video, photos, store data, voice chat, file transfer, video conferencing, login time, the details of social network data, including two secret surveillance program, the one is monitoring, monitoring public telephone call records, the other is to monitor public network activity. Former CIA officers, Edward Snowden revealed government crimes of violation of user privacy, causing panic in the world, and even U.S. allies have been accused of this.

 

Internet popularity provides information dissemination with the cheapest and most effective means, which also offer a unique tool to spread American values, affect the political situation in some countries. For all this, in the past few years, former U.S. Secretary of State Hillary Clinton has been working hard to promote their political idea of “Internet freedom”, hoping to promote a set of values and political ideas that U.S. government insisted on to the Middle East and some countries that are not friendly to it with the help of cyberspace which is completely under the control of the U.S..

 

The U.S. government and the military issued a series of documents and assessment report about information network security in recent decade. In these policy documents, there has been a lot of discussion about network security strategy and tactics which puts forward some new concepts, develops new idea about information network security. There is one tip in these new ideas- cyberspace blurs the boundary between militarization and civilian applications, and cyber warfare becomes an important direction of future military transformation.

 

From this, we can say these tactics is a two-sided sword which will invade personal privacy and threaten the legitimacy of “Internet freedom”. As the general citizen, we should know that our data and information in our own computer is not that safe at all, we should consider applying more secure method to protect the information in our computer. Encrypting the folder contained confidential data will decrease the threat from attacks of hackers or malware. You should protect your data with folder locker, so the encrypted folder will not be accessed by unauthorized users.

Jul 01

HP Recovery in Progress: Whitman Still Faces Challenge to Reach Victory

From the big data platform to the cloud computing operating system, from Android desktop computer to the printer, Hewlett-Packard launched a large number of new products in this “World Tour”, and these new products is no longer a follower, but have more new technology .

 

The first is its private, hosted and public cloud offerings, HP also announced the next generation of common architecture based on OpenStack. The followed are HP OS and CloudSystem Enterprise starter kit, along with new servers, tape libraries, 3P storage new products, HP comes up with a holistic solution.

 

This is Whitman’s “IT new forms”, she thought that “cloud computing, security, big data and mobile computing is changing this era,” and HP’s strategic goal is to allow the company to deal with this new form.

 

Last quarter, HP’s PC market share in China reached 7%, which is HP  new high after the incident of 315, and the in the aspect of printer, HP launched competent products which can come up with that of other major competitors such as Epson.

 

One of the outstanding products is a brisk 21-inch screen Android desktop computer, which is the first desktop computer with Android system in the industry. Apart from the market feedback, the action of launching this product itself is meant innovative.

 

Here, we may say now the competitions are almost around science and technology, and the rapid development and generation shift of electronic products makes computer, mobile phone and other scientific and technology products become one dispensable part of our life. At the same time, the data security is the attendant result the hi-tech society brings to us, we may always worry about the security of data and information stored in the computer, for they are easy to store, transfer and be stolen. When we enjoy the joy and convenience the science and technology offer us, we should protect our important data by locking file/folder for the data will be leaked via the Internet. With password protection of file/folder, the data and information will be under strict control by you yourself.

 

Even the furious competition of PC in the market, Whitman believes that “HP has started to recover,” and the iconic feature is the company concluded an internal adjustments.

 

Cite the case reported by Forbes for Whitman, after the failure that HP competed with Dell for Microsoft Bing server orders which worth $ 350 million, Whitman directly call Microsoft CEO Steve Ballmer, asking him outspoken how HP can do better. When Microsoft gave her a memorandum, HP spent one year enhancing their products, and in January of this year, HP beat Dell in the Bing order of $ 530 million.

 

But now what Whitman faces, is still an uncertain IT environment. EMC, IBM and even DELL are actively respond to the enterprise market, while Microsoft, Oracle began the transformation of cloud computing, HP’s software division has been considered a core competency, but the status that IBM are beginning to lay off increases the difficulty of HP recovery.

 

 

If HP’s recovery process is divided into two steps, which Whitman is now helping companies stopped the downward trend is the first step, and the second stage will be more difficult.

Jun 24

Companies and Governments Are Trying to Control the Internet

Tim Berners-Lee said in an interview that companies and government attempts to control the behaviors of the Internet which is against the original intention of creation of the Internet; and the public should be alert.

Berners – Lee said the Internet is facing a major threat, that a number of people who want to control it are penetrating the entire Internet based on the “Stop Online Piracy Act” as well as the Internet giant’s actions.

“If you can control the Internet, if you start to control people’s behavior, or to intercept communications information, you will be very powerful …… If this power is given to a corrupt government, they will be able to govern forever.” He said.

“Unauthorized monitoring act of government is a violation of fundamental human rights, which threatens the foundations of a democratic society.” Berners – Lee said, “I appeal to all netizens to ask for better legal protection and due process, in order to protect privacy of their network communications, including noticing them when their data are solicited or saved.”

He added: “Over the past 20 years, the network has become an integral part of our lives, tracking our use of it may be exposed to some very personal thing. Safekeeping of such information is a huge responsibility: Who do you think qualifications can use these data to determine when, or to protect these data security? “

Berners – Lee said the former Egyptian President Hosni Mubarak once cut off communication service when faced with opponents, which has given us a “wake-up call.” “A lot of people think that the network is like the air, in a free flowing, but after the incident, they will ask: ‘Who is capable of shutting off my internet?’” He said.

Berners – Lee called on the government to protect neutrality and independence of network and think this contribution to democracy can emulate the freedom of the press. He believes that organizations which run the network should has contact with the government, but they need to maintain a certain distance.

From the matter offered above, we should be aware of the importance of data security during surfing the Internet. We know that the information we presented on the Internet or even our own computer are not that safe, for they will be controlled by organizations, governments or even hackers who can get them. In order to prevent the invasion of unauthorized access to you private or confidential information, apart from stop offering detailed private information to the social networks, you should put all your important data into an encrypted folder so that they can be well protected and no one can access them without correct password. How to password protect folder? Hardware encryption or software encryption, each method has its own advantage and disadvantage, you can choose one as your need.

Jun 17

Prism: U.S. Use it to Monitor Netizens

Last week, former CIA employee, Edward Snowden’s leakage issue is called as reality version of American movies, handsome agent, glamorous pole dancing girlfriend, sophisticated state secrets, betrayal and exile, the agents system and lies, complicated Hong Kong, depressed black president, conflicts between personal privacy and national interest …… various elements are available, and some even have entitled: “Leaker: Snowden.”

This project is called “Prism” which means secretly use super software to monitor Internet users and telephone records. Now, the debate concerning that Snowden is a hero or a traitor is still in progress, Snowden’s whereabouts is still pending. Apart from these troubles and view companies and industries involved, their interests, gain and pay are a relatively clear picture.

According to Snowden, Google, Yahoo, Microsoft, Apple, Facebook, AOL, PalTalk, Skype, YouTube, etc. nine companies have been involved in espionage allegations, these companies are suspected of being involved in the issue that opening their servers to U.S. National Security Agency, which makes the government easily monitor millions of netizens mail, instant communication and data accessed.

Subsequently, these companies strongly denied the charges. But by June 14, Facebook, Microsoft admitted that the U.S. government indeed ask them for user data, and published some of the information and data content in order to get rid of quagmire as soon as possible.

 For this case, all of us, no matter individuals or groups, should turn our attention to potential information security threats. We should be aware of the security of private information and confidential data. For example, never fill your detailed information and private information in any forum, social network so that you will be less likely to be tracked through network by hackers. As for the data and information stored in the computer, their security is also an important matter that we should focus on, for once your computer are connected to Web, your computer becomes a totally open device which allow others to access your computer as well as you to contact the world. However, in this case, you cannot ignore the importance of data security, otherwise, data leakage and breaches will put you into troubles. Applying third party software to password protect files/folders stored in computer, and then they won’t be accessed unless entering right password, what’s more, the administrators can configure different access permissions so different people will have different right for the protected files/folders.

 

Actually, many people have noticed the importance of data security. For example, the forthcoming cloud computing standards will likely pay more attention to security issues, which will offer local production of hardware and software, system integration and cloud computing platform provider greater development space.

Jun 04

Top Hot Ultra-book

In this rapidly developing mobile electronic age, who can firmly grasp hot point, break the convention, who can get caught the attention of consumers? Over most of the year, the direction of development will continue to be variability and touch function. This can already be seen in the last year, capacitive multi-touch screen from the original tablet PCs and smart phones, steps into the ultra book. A number of products have realized the 2-in -1 of tablet computer and ultra book through morphological changes.

Touch-screen laptop should make many changes in products form and design because of the change in interaction, so we see a lot of ultra-book which is able to flip, rotate, slide and even be detachable. The designer emphasizes on how to solve the convenience and safety of touch-screen interaction, which is not be considered before.

Now, I will introduce some types of hot ultra book as below.

LenovoYoga13-IFI

Lenovo Yoga13-IFI (daylight orange)

Operating system

Windows 8

Motherboard chipset

Intel QS77

CPU model

Intel Core i5 3317U

Memory Capacity

4GB

Hard drive capacity

128GB

Hard to describe

SSD Solid State Drive

Screen Size

13.3 inches

Screen Resolution

1600×900

Screen description

Capacitive multi-touch support ten-point touch, IPS wide viewing angle screen

Graphics chip

Intel GMA HD 4000

Webcam

Integrated 1.0 mega pixel camera

Wireless network card

802.11b/g/n wireless protocol

Bluetooth

Support, Bluetooth 4.0 module

Notebook Weight

1540g

Case Description

Sunlight Orange

 

Asus: TAICHI 21

Asus TAICHI 21

Deformation

Dual

Operating system

Windows 8

CPU model

Intel Core i5 3317U

CPU frequency

1.7GHz

Memory Capacity

4GB

Hard drive capacity

256GB

Hard to describe

SSD Solid State Drive

Screen Size

11.6 inches

Aspect Ratio

16:9

Screen Resolution

1920×1080

Screen description

Capacitive multi-touch support ten-point touch, IPS wide viewing angle screen

Graphics chip

Intel GMA HD 4000

Webcam

Integrated 5 megapixel camera

Data interface

2 × USB3.0

Battery Type

Polymer battery, 3500 mA

Notebook Weight

1250g

Shell material

Magnesium alloy

Case Description

Silver

Acer:S7

Acer S7-191-53334G12ass

CPU model

Intel Core i5 3337U

CPU frequency

1.8GHz

The Process

22nm

Memory Capacity

4GB

Hard drive capacity

128GB

Screen Size

11 inches

Screen Resolution

1920×1080

Backlight Technology

Backlit FHD

Screen description

Capacitive multi-touch

Graphics chip

Intel GMA HD 4000

Webcam

Integrated camera

Data interface

2 × USB3.0

Reader

Multi-in-1 card reader

Keyboard Description

Backlit keyboard

Battery Type

4 polymer battery, 4680 mA

Notebook Weight

1248g

Samsung : 700T

Samsung XE700T1C-A01

Operating system

Windows 8 (64bit)

CPU family

Intel Core i5 3-generation family (Ivy Bridge)

CPU model

Intel Core i5 3317U

CPU frequency

1.7GHz

Supreme Turbo

2600MHz

Bus Specifications

DMI 5 GT / s

Memory Capacity

4GB

Memory Type

DDR3

Hard drive capacity

64GB

Screen Size

11.6 inches

Aspect Ratio

16:9

Screen Resolution

1920×1080

Card type

Core Graphics

Graphics chip

Intel GMA HD 4000

Data interface

1 × USB3.0

Video Interface

Mini HDMI

Keyboard Description

Keyboard Dock

Shell material

Composite materials

Case Description

Black

Toshiba : U920t-T06B

Toshiba U920T

Operating system

Windows 8

CPU model

Intel Core i5 3317U

CPU frequency

1.7GHz

Memory Capacity

8GB

Hard drive capacity

256GB

Hard to describe

SSD Solid State Drive

Screen Size

12.5 inches

Screen Resolution

1366×768

Card type

Core Graphics

Graphics chip

Intel GMA HD 4000

Bluetooth

Support, Bluetooth 4.0 module

Data interface

USB2.0 + USB3.0

Video Interface

HDMI

Notebook Weight

1520g

 Lenovo :ThinkPad S230U

Lenovo ThinkPad S230u Twist (33473QC)

Operating system

Windows 8 Professional edition 64bit (64 of professional edition)

CPU model

Intel Core i5 3317U

CPU frequency

1.7GHz

Memory Capacity

4GB

Hard drive capacity

24GB +500 GB

Hard to describe

Hybrid hard drives (SSD +7200 rpm HDD)

Screen Size

12.5 inches

Aspect Ratio

16:9

Screen Resolution

1366×768

Screen description

Capacitive multi-touch, support for five-point touch, IPS wide viewing angle screen

Graphics chip

Intel GMA HD 4000

Data interface

2 × USB3.0

Video Interface

Mini HDMI, Mini DisplayPort

Notebook Weight

1580g

Sony : Duo 11

Sony D11217CCB (Metallic Grey)

Operating system

Simplified Chinese version of Windows 8

CPU model

Intel Core i3 3217U

CPU frequency

1.8GHz

Memory Capacity

4GB

Hard drive capacity

128GB

Hard to describe

SSD Solid State Drive

Screen Size

11.6 inches

Aspect Ratio

16:9

Screen Resolution

1920×1080

Backlight Technology

Backlit FHD

Graphics chip

Intel GMA HD 4000

Bluetooth

Support, Bluetooth 4.0 module

Data interface

2 × USB3.0 (one powered USB powered common interface)

Video Interface

HDMI

Notebook Weight

1305g

Thickness

17.85mm

Shell material

Magnesium alloy

Dell : XPS 12

Dell XPS 12 (XPS12D-1508)

CPU model

Intel Core i5 3317U

CPU frequency

1.7GHz

Memory Capacity

4GB

Hard drive capacity

128GB

Hard to describe

SSD Solid State Drive

Screen Size

12.5 inches

Aspect Ratio

16:9

Screen description

Capacitive multi-touch

Card type

Core Graphics

Graphics chip

Intel GMA HD 4000

Webcam

Integrated 1.3 megapixel camera

Audio System

Built-in audio chip

Speaker

Built-in speaker

Microphone

Built-in microphone

Wireless network card

Intel 6235 AGN

Bluetooth

Support, Bluetooth 3.0 module

Data interface

2 × USB3.0 (one powered USB powered common interface)

Video Interface

Mini DisplayPort

Audio Interface

Headphone / microphone combo interface

Other interfaces

RJ45 (network interface), power connector

Pointing device

Glass touchpad

Keyboard Description

Anti-leakage keyboard, backlit keyboard, full-size keyboard

Notebook Weight

1520g

Length

317mm

Width

215mm

Thickness

15-20mm

Shell material

Magnesium alloy

Case Description

Gray

 

As the rapid development of computer, we have to recognize that computer has become one important part of man’s life. We use it for work, entertainment, and living, we may take it as transfer media, storage devices, etc., and meanwhile, we should pay more attention to our information security in computer. You’d better lock files/folders to prevent someone else will access and view your sensitive and confidential data and information without your permission. 

May 27

How Much Do You Know About BYOD?

According to a new study of Cisco system inc., the so-called BYOD (Bring Your Own Device) policy saves cost for enterprise, while, at the same time, it increases the burden of employees.

Cisco’s report indicated, for the company that have high requirement of BYOD, they can save $1300 per year on each users. For users, they will take more money out of their own pocket.

This survey launched in six countries for 2,415 users reveals that after adopting the policy of BYOD, the average spending of per person on equipment is $965, and the data package fee of $ 734 will be paid per year.

The survey displays, employees bring their own device is happier than before, and perform a significant progress in efficiency. In American, staffs BYOD will shorten their working time of 81minutes per week, more than 70 hours a year.

However, this policy is not applicable for all countries, BYOD will produce negative impacts, for example, it will increase the difficulty of management and distract employees so as to reduce the working efficiency.

As for specific products, 81% BYOD staffs said they use the intelligence gathering, 56% said they would carry their tablet, 37% staffs carried laptop.

The report shows, the number of BYOD staffs is expected to increase to 406 million by 2016. At that time, this kind of employees in China will reach to 166 million, 106 million in U.S.A, and 76 million in India. At present, American has the largest number of BYOD staffs in the world.

We should be alert, the expansion of this policy will put our laptop and tablet into totally open environment, that’s to say, the private data and information stored in the device may be visited by others. If you don’t want your private information accessed by unauthorized person, you’d better take security measures to protect them, for example, you can password protect the folders and files on your computer.

 

With the help of folder protector, the data and information in your computer will be under encryption, so you can protect your private and confidential data from invasion and being stolen as well as enjoy your working time with your own devices.

May 20

Lenovo Want to Be Flourished in Table PC Market

In the morning on May 20(Beijing time), Liu Jun, senior vice-president of Lenovo group, president of Lenovo business group, discloses the development strategy of business of Lenovo smart phone, tablet computer and smart TV. Liu Jun said, Lenovo will be flourished in the areas of the tablet computer, and have confidence to fulfill the goals of the 100 million Lenovo brand terminal shipments.

Liu Jun, said the market of tablet computer will be splendid instead of being dominated by any one product. He further revealed that Lenovo will not only launch products covering high, middle, low price level, but also launch a new type of tablet computer in the second half of this year.

In the Lenovo internal staff meeting held in April this year, Liu Jun, as the president of Lenovo business group, came up with a rather challenging performance target: 100 million shipments of the Lenovo brand terminal this year. This number is twice that of last year.

As for this performance target, Liu Jun admitted is very challenging, but it is very possible. He said there are about forty million sets of one hundred million devices are PCs, and as PC products have deformed evolutionally, Lenovo will further expand the market share.

Market research firm Canalys published the intelligent terminal market of the first quarter of 2013, with quarterly 15.3 million shipments; Lenovo is ranked third in the world, next to Samsung and Apple. Liu Jun didn’t want to comment on this number, but emphasized the company’s shipments in the first quarter conforms to the plans.

Just like the radio displaces the newspaper, the TV displaces the radio; the computer tends to gradually displace the TV. People around the world prone to use the computer for entertainment, working and life. So people in industry of PC producing are nowadays trying to optimize computer so that it will be more convenient for people and more useful for life. Therefore, PC will be not only a tool to communication, work, entertainment, etc., it will penetrate into the whole society and life of human beings. We will open ourselves to the world through PC, and let others in the world know more about not only you yourself but also the environment around you, your relatives and friends and every detail of you. When you enjoy the world PC bring about for you, you should be aware of the potential threats the open world bring back to you.

As most people will store their private and confidential information in their PC and always they lack the awareness of data security for they think PC is safe enough. In fact, data and information will easily be lost and stolen when they are stored in computer without any protection. In order to prevent data from hackers and malware, you should apply a type of file encryption software to encrypt your files/folders so that they will not be breached by unauthorized access even though someone else enter your PC. Locking files will be helpful for you to avoid financial and reputational loss caused by data leakage

May 13

Count Ten Brands of Storage Devices

Not long ago, storage appliance was still a new concept. Now, there are hundreds of storage appliance products in market. According to Gartern’s statistics, the only market of backup devices will achieve 19% yearly growth before 2016.

And then I will introduce ten types of storage devices below.

Data Domain DD160

EMC Data Domain sells various data de-duplication devices. Data Domain DD160 is the entry-level product which can meet customers’ need of data protection on a unified platform. It supports most back-up and archival applications and it integrates with EMC Avamar and EMC Networker. Increasing another remote DD160 will provide your disaster recovery with remote copy function based on the Internet.

EVault

Evault provides EVault Plug-n-Protect Appliance and EVault Express Recovery Appliance series back-up and recovery products. They contain default hardware, store and software, which is designed for data protection of cloud connection. EVault Plug-n-Protect has the cloud copy function, while EVault Express Recovery Appliance is able to speed up data recovery by keeping local data cache for data backup.

The price of EVault Plug-n-Protect is between $17,995 to $10,995.

Asigra Cloud Backup Connector Appliance

It is based on Cisco Integrated Service Router Generation 2 and is equipped with Asigra software under private, public and composite backup environment. This equipment will enable users to protect all company data on local LAN or backup all the data to data center of ISP.

 

The quotation of Asigra Cloud Connector starts at $2695.

Astute ViSX

Astute ViSX series are based on Performance Storage Appliancesof SSD. It offers storage I/O speedup, this function will be applied to the existing storage system. It start at $32,000

Gridstore

Grid from Gridstore enables you to increase storage block based on requirement. It virtualizes storage stack and distribute it in a grid based on network. It can also optimize workload by virtual controller. These controllers can well adjust every I/O requirement of virtualized or non-virtualized workload.

 

HP StoreOnce 2600

HP StoreOnce Backup provices joint data de-duplication function, which is available in small branch offices as well as large DR recovery site. This product contains several series, in which 2000 series is entry-level product. The quotation of StoreOnce 2600 starts at $10,000.

Avere FXT 3800

Avere FXT 3800 is a compound edge file system device. It can automatically have layers in memory, SSD, SAS and SATA. Data block will be distributed based on data active level. It can be clustered into other FXT Edge file system device, and be extended up to 50 node. It starts at $112,500.

 Sepaton S2100-ES3

With configuration of version 7.0 software, Sepaton S2100-ES3 Backup and Recovery Appliance PBBA contains 8Gb/sec fiber channel、1Gb/s Ethernet and 10Gb/s Ethernet connections. It can absorb data with speed of 80TB/h. It is configured with calendar data storage array, which can encrypt data during idle time and de-duplication. The price of it starts at $355,000, and the encryption of it needs individual authorities.

Pivot3 HC-3 Healthcare Validated VDI

Combined with VMware、Teradici、Samsung and Imprivata, Pivot3 provides medical sevice providers with VDI based on equipment. It integrates all storage and sever hardware, desktop virtualization software, license management software and endpoints in device mode. Every Pivot3 VDI device supports up to 125 desktop.

Silver Peak Virtual Appliance.

Silver Peak VRX-2、VRX-4 and VRX-8virtual devices provide data acceleration function to speed up the process of copy. They adopt Virtual Acceleration Open Architecture of Silver Peak to solve the problems of WAN and quality. This software runs on the standard virtual machine manager which includes VMware、 vSphere、MS、Hyper-V、Citrix XenServer and KVM。

The price of entry-level product, VRX-2 with the configuration of 60GB/h and remote copy function, is $2,764 per year.

 

With rapid development of storage devices, we should also pay more attention and efforts to file encryption to protect the important or even confidential data and information from stealing and breaching.

May 06

Google Glass Is Coming

Google glasses are coming into being! Wearable device, visual search, smart assistant, all of these concepts is abstract for ordinary people. We are still confused and wonder that what on earth can we do wearing Google glasses?

 

Google glasses has been known weigh 5 ounces which is more than 150 grams, while weight of normal spectacles frames are generally not more than 30 grams, and the lightest is only 8-9 grams. The weight of overall glasses are generally less than 100 grams, the lightest is less than 30 grams. Theoretically, the optimization of Google glasses weight won’t be less than normal glasses, for apart from glasses, there are several components such as chip and camera, etc.

 

Google glasses are completely integrated with Google server. As for the third-part application  developers, they can only utilize Mirror API for development. If you were Twitter, you can create a card which can be launched through voice recognition function to tweet a new card. However, all the data and information must be tweeted to Google server by Twitter first, and then Google will tweet them to Google glasses. Of course, when you enjoy the fun brought by Google Glass, what you should take notice every moment that your information and data are at risks of being stolen and missing. Password protect files stored in your portable devices.

 

This is a flexible and firmly controlled system by which you can tweet anything into your glasses card, such as a website or an IOS application. On the other side, Google thoroughly control every service to directly communicate with glass system. For example, there is no way to close the share system of glass, you don’t have systematic sharing method. On the one side, this way will enable Google to firmly control glasses applications. On the other side, this can ensure the system won’t use too much power owing to applications.

 

Nowadays, Google concentrates on making Mirror API and sharing system more effective, and the developers will gain ADB permissions as using Android.

 

For the time being, Google Glass is a smart phone companion, basic communication, input and output, etc. are still rely on smart phone. Google Glass, it along with cell phone makes our live richer. If Google Glass develops gradually to tackle the problems such as input and output, it will be a competitor against cell phone. At this stage, Google Glass and cell phone are in coordination. Google Glass will force cell phone to produce more applications to assist it, such as My Glass. For cell phone, it can also utilize the functions of Google Glass such as camera feature, interaction between visual search and eyes dominate, etc. which are portable and unique to innovate new applications for it.

 

Google Glass show us a new era where human beings make a further development between ideal and reality. The appearance of Google Glass makes more opportunities to connect people all around the world. You can express yourself as well as learn others with it.