Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
Questions | Answers | Discussions | Knowledge sharing | Communities & more.
How do video streaming services deliver content?
Streaming media services store audio, video, or gaming content on dedicated media servers that typically reside in multiple locations around the world as part of a content delivery network (CDN). This allows providers to stream content from locations closest to users to minimize latency. The serverRead more
Streaming media services store audio, video, or gaming content on dedicated media servers that typically reside in multiple locations around the world as part of a content delivery network (CDN). This allows providers to stream content from locations closest to users to minimize latency.
The server uses a process of “encoding” to compress the file, and a process of “transcoding” that creates multiple copies of each file in a variety of file sizes, video quality, and screen resolutions that will be ideal for different types of devices.
When a user requests to view a video or listen to an audio file, the streaming media server breaks the file into a series of small data packets that can be transmitted via the internet.
A media player on the user’s device receives the packets, reassembles them into a video or audio file, and plays them immediately. In a process called buffering, the media player preloads several seconds of the streaming file ahead of time to ensure a smooth and interrupted playback despite changes in internet speeds and quality of connection.
After each bit of the media file has been played, it is deleted from the user’s device.
See lessWhat are the privacy concerns related to social media?
Common Social Media Privacy Concerns 1) Data mining Scammers use data mining for identity theft. They do not need much data for that. Actually, publicly available information on social media can help them successfully target victims. Scammers can get email addresses, usernames, phone numbers, and phRead more
Common Social Media Privacy Concerns
1) Data mining
Scammers use data mining for identity theft. They do not need much data for that. Actually, publicly available information on social media can help them successfully target victims. Scammers can get email addresses, usernames, phone numbers, and physical addresses quite easily. With this data, they can send phishing scams or gather more information like leaked passwords or credit card numbers.
2) Data breach
If a company is hacked, customers’ social media data is one of the first data to be stolen. People provide a lot of personal information on social media which could be used for malicious purposes. As in the case of data mining, scammers could use this information for phishing scams or could try to gather more information to perform more serious online crimes.
3) Third-party data sharing
Many social media platforms are in partnership with third-party services and share user data with them. While it allows the integration of different services, it also creates significant privacy risks. Users often grant permission to share or sell their data to these third parties even without knowing it. When signing the Terms of Services agreement or accepting cookies, read carefully what you are signing for.
4) Privacy setting loopholes
Social media accounts often are less private than users think. For example, if you share something with a friend and they commented on it, the friends of your friend can also see the information you shared. Your friend could also repost the information you shared on social media, and it will also become available a completely different people. Even closed groups are not completely private since group members could repost your content, postings can be searchable, etc.
5) Location settings
User location paired with personal information can provide detailed information to a user profile. Scammers can use this comprehensive data to physically find and target users or collect more digital data. Even if social media users turn off their location settings, scammers can get device’s location by other means such as public Wi-Fi, cellphone towers, and others. If you care about your location settings being tracked, always turn off the GPS location services and browse through a VPN.
6) Harassment and cyberbullying
Defrauders can send threatening messages, perform harassment, or cause emotional trouble even without getting into users’ social media accounts. Publicly visible inappropriate comments on social media accounts are one of the forms of harassment. Cyberbullying includes sharing negative or harmful content about persons on social media platforms.
Doxxing is a form of cyberbullying and involves sharing harmful content about persons like revealing a person’s address, phone number, or personal photos to cause harm, embarrassment, or humiliation. They also encourage others to harass the person online.
7) Fake information
Social media can be used to spread false information or propaganda quickly. Trolls and bots often provoke social media users by manipulating emotions. They can also create a fake account or advocate for a person by posing as a person. It has also been used for harassment, or cyberbullying. Most social media platforms have content moderators or procedures for how other customers could report fake information, but it takes time for posts to be marked or deleted. You should always check information before resending it or making conclusions on social media.
8) Malware and viruses
Malware and viruses can spread through social media platforms. They can steal sensitive data, infect, or slow down users’ computers. Cybercriminals can take over the social media account of a user and spread malware to the affected account of the user and all the user’s friends.
See lessHow do autonomous vehicles navigate and avoid obstacles?
Autonomous vehicles are designed to sense their surroundings with techniques such as RADAR, LIDAR, GPS and computer vision. This array of sensors working coherently to observe and record the surroundings constitute the perception module of the vehicle. Radar sensors monitor the position of nearby veRead more
Autonomous vehicles are designed to sense their surroundings with techniques such as RADAR, LIDAR, GPS and computer vision. This array of sensors working coherently to observe and record the surroundings constitute the perception module of the vehicle.
Radar sensors monitor the position of nearby vehicles. Video cameras detect traffic lights, read road signs, track other vehicles, and look for pedestrians. Lidar (light detection and ranging) sensors bounce pulses of light off the car’s surroundings to measure distances, detect road edges, and identify lane markings.
See lessWhat is "deepfake technology"?
Deepfake technology is a type of artificial intelligence used to create convincing fake images, videos and audio recordings. The term describes both the technology and the resulting bogus content and is a portmanteau of deep learning and fake. Deepfakes often transform existing source content whereRead more
Deepfake technology is a type of artificial intelligence used to create convincing fake images, videos and audio recordings. The term describes both the technology and the resulting bogus content and is a portmanteau of deep learning and fake.
Deepfakes often transform existing source content where one person is swapped for another. They also create entirely original content where someone is represented doing or saying something they didn’t do or say.
The greatest danger posed by deepfakes is their ability to spread false information that appears to come from trusted sources. While deepfakes pose serious threats, they also have legitimate uses, such as video game audio and entertainment, and customer support and caller response applications, such as call forwarding and receptionist services.
See lessWhat are the different types of cyber threats?
Cyber threats change at a rapid pace. Tactics and attack methods are changing and improving daily. Cyber criminals access a computer or network server to cause harm using several paths. This is also called an attack vector. Common ways to gain access to a computer or network include: 1) Removable meRead more
Cyber threats change at a rapid pace. Tactics and attack methods are changing and improving daily.
Cyber criminals access a computer or network server to cause harm using several paths. This is also called an attack vector.
Common ways to gain access to a computer or network include:
1) Removable media such as flash drives
2) Brute force attack using trial and error to decode encrypted data
3) Web or email attacks
4) Unauthorized use of your organization’s system privileges
5) Loss or theft of devices containing confidential information
Types of cyber threats include:
1) Malware
Malware is also known as malicious code or malicious software. Malware is a program inserted into a system to compromise the confidentiality, integrity, or availability of data. It is done secretly and can affect your data, applications, or operating system. Malware has become one of the most significant external threat to systems. Malware can cause widespread damage and disruption, and requires huge efforts within most organizations.
Spyware, a malware intended to violate privacy, has also become a major concern to organizations. Although privacy-violating malware has been in use for many years, it has become much more common recently. Spyware invades many systems to track personal activities and conduct financial fraud.
Organizations also face similar threats from several forms of non-malware threats. These forms of cyber threats are often associated with malware. A more common form is phishing. Phishing involves tricking individuals into revealing sensitive or personal information.
2)Ransomware
Ransomware prevents or limits users from accessing their system via malware. Ransomware asks you to pay a ransom using online payment methods to regain access to your system or data. Online payment methods usually include virtual currencies such as bitcoins. Ransomware is one of the most widely used methods of attacks.
Ransomware enters computer networks and encrypts files using public-key encryption. Unlike other malware, this encryption key stays on the cyber criminal’s server. Cyber criminals will request ransom for this private key. Cyber criminals are using encryption as a weapon to hold the data hostage.
Ransomware is hard to detect before it’s too late, and ransomware techniques continue to evolve.
3) Distributed Denial of Service (DDoS) Attacks
DDoS attacks make an online service unavailable by overwhelming it with excessive traffic from many locations and sources. Website response time slows down, preventing access during a DDoS attack. Cyber criminals develop large networks of infected computers called Botnets by planting malware. A DDoS attack may not be the primary cyber crime. The attacks often create a distraction while other types of fraud and cyber intrusion are attempted.
4) Spam & Phishing
Spam includes unwanted, unsolicited, or undesirable messages and emails. Phishing is a form of social engineering, including attempts to get sensitive information. Phishing attempts will appear to be from a trustworthy person or business.
Cyber criminals pretend to be an official representative sending you an email or message with a warning related to your account information. The message will often ask for a response by following a link to a fake website or email address where you will provide confidential information. The format of the message will typically appear legitimate using proper logos and names. Any information entered into the fake link goes to the cyber criminal.
5) Corporate Account Takeover (CATO)
CATO is a business entity theft where cyber thieves impersonate the business and send unauthorized wire and ACH transactions. The unauthorized funds are sent to accounts controlled by the cyber criminal.
Many businesses are vulnerable to a CATO attack. Institutions with weak computer safeguards and minimal controls over online banking systems are easy targets. This form of cyber crime can result in large losses. Cyber criminals use malware to infect a computer through e-mail, websites, or malware disguised as software.
6) Automated Teller Machine (ATM) Cash Out
ATM Cash Out is a type of large dollar value ATM fraud. Cash-outs involve simultaneous large cash withdrawals from several ATMs in many regions. It may also include large withdrawals at one ATM.
The Cash Out usually affects small-to medium-sized financial institutions. The attack involves changing the settings on ATM web-based control panels. Cyber criminals change the ATM’s dispense function control to “Unlimited Operations.” The “Unlimited Operations” setting allows withdrawal of funds over the customer’s account balance or beyond the ATM’s cash limit. Stolen ATM or debit card information is often used to withdraw the funds. As a result, your financial institution can suffer large dollar losses.
See lessWhat are the key differences between 4G and 5G technology?
1) The speed of 4G is up to 100Mbps, while the speed of 5G is up to 10Gbps. 2)The latency of 4G is 50 ms, whereas the latency of 5G is only 1 ms. 3) 5G supports devices ranging from smartphones to IoT to industrial equipment, whereas 4G primarily supports smartphones and tablets. 4) 5G combines cellRead more
1) The speed of 4G is up to 100Mbps, while the speed of 5G is up to 10Gbps.
2)The latency of 4G is 50 ms, whereas the latency of 5G is only 1 ms.
3) 5G supports devices ranging from smartphones to IoT to industrial equipment, whereas 4G primarily supports smartphones and tablets.
4) 5G combines cell towers and small cell networks for consistent networks, whereas 4 G relies on large cell towers for coverage.
5) The application of 4G includes HD video streaming and high-speed browsing. In contrast, the application of 5G includes Autonomous Vehicle, Telemedicine, AR, and VR.
See lessHow do smart home devices communicate with each other?
Smart devices can use Bluetooth to communicate with one another, and can allow you to control them from a smartphone with Bluetooth capabilities. It is a short-range protocol and can only be used when devices are within range of one another.
Smart devices can use Bluetooth to communicate with one another, and can allow you to control them from a smartphone with Bluetooth capabilities. It is a short-range protocol and can only be used when devices are within range of one another.
See lessWhat is the difference between augmented reality and virtual reality?
1) Augmented Reality uses a real-world setting while Virtual Reality is completely virtual. 2) AR users can control their presence in the real world; VR users are controlled by the system. 3) VR requires a headset device, but AR can be accessed with a smartphone. 4).AR enhances both the virtual andRead more
1) Augmented Reality uses a real-world setting while Virtual Reality is completely virtual.
2) AR users can control their presence in the real world; VR users are controlled by the system.
3) VR requires a headset device, but AR can be accessed with a smartphone.
4).AR enhances both the virtual and real world while VR only enhances a fictional reality.
See lessHow do encryption techniques secure data?
Encryption is used to protect data from being stolen, changed, or compromised and works by scrambling data into a secret code that can only be unlocked with a unique digital key. Encryption works by encoding “plaintext” into “ciphertext,” typically through the use of cryptographic mathematical modelRead more
Encryption is used to protect data from being stolen, changed, or compromised and works by scrambling data into a secret code that can only be unlocked with a unique digital key.
Encryption works by encoding “plaintext” into “ciphertext,” typically through the use of cryptographic mathematical models known as algorithms.
To decode the data back to plaintext requires the use of a decryption key, a string of numbers or a password also created by an algorithm. Secure encryption methods have such a large number of cryptographic keys that an unauthorized person can neither guess which one is correct, nor use a computer to easily calculate the correct string of characters by trying every potential combination (known as a brute force attack).
See lessWhich form of energy is commonly used in the working of a TV remote?
TV remotes use infrared (IR) light, a type of electromagnetic radiation (EMR), to communicate with TVs. When a button on the remote is pressed, the transmitter, or remote, emits a series of infrared light pulses that form a pattern unique to that button. The receiver, or TV, recognizes the pattern aRead more
TV remotes use infrared (IR) light, a type of electromagnetic radiation (EMR), to communicate with TVs. When a button on the remote is pressed, the transmitter, or remote, emits a series of infrared light pulses that form a pattern unique to that button. The receiver, or TV, recognizes the pattern and responds accordingly.
The remote emits the signal by turning the light on and off, with the time between flashes indicating whether a 0 or 1 is being sent. For example, the code for “turn up the volume” might be a series of light flashes for volume up, followed by a code for the type of TV.
IR.
IR light is invisible to the human eye, but can be seen with a digital camera, video camera, or phone camera. The wavelength of IR waves ranges from 700 nanometers to 1 millimeter.
See less