Agriculture Ministry signs a Statement of Intent with IBM for a pilot study to utilize Artificial Intelligence and weather Technology solutions in agriculture


Artificial Intelligence & Weather Technology solutions in agriculture

Ministry of Agriculture and Farmers Welfare signed a Statement of Intent (SoI) for undertaking a pilot study in 3 districts of Bhopal, Rajkot, and Nanded in the States of Madhya Pradesh, Gujarat, and Maharashtra respectively, with IBM India Private Limited, in New Delhi today. IBM’s Watson Decision Platform will give solutions in the field of agriculture through Artificial Intelligence (AI) and weather technology at the village level/ farm level to provide weather forecast and soil moisture information on a pro bono basis to help farmers make decisions regarding water and crop management for better production and productivity.

 The SoI was signed by the Minister of Agriculture & Farmers Welfare, Shri Narendra Singh Tomar, Minister of State for Agriculture, Shri Kailash Choudhary, and other senior officials of the Ministry.

Speaking on the occasion, Shri. Narendra Singh Tomar said, ‘‘Our nation is foraying further into the digital age in the line of aspiration of the Prime Minister of India towards achieving the goal of doubling the farmers’ income, and it has been the Ministry’s assurance to bring digital technologies to help our farmers to increase their income and transform Indian agriculture’’. The Minister also added that enabling next-generation technologies, such as AI and advanced weather data, for better insights to make faster and more informed agricultural decisions is a testament to our commitment.

The IBM Watson Decision Platform for Agriculture will be leveraged to obtain a farm-level weather forecast and village-level soil moisture in three Central & Western India districts as part of the collaboration. This pilot study will be conducted for the Kharif crop season 2019.

Source: Press Release
Release ID: 1576947
Date: July 03, 2019
PIB Delhi
Ministry of Agriculture & Farmers Welfare

Web Hosting Review ZenEcommerce


USP: India’s leading E-commerce platform

About Company

Director: Ankur Goel

Address

C-9, Ground Floor, Neighborhood Shopping Complex Sector-4, Nerul West, Navi Mumbai, Maharashtra 400706

Associations: Cloud-fest, Cloud-Bazaar, HostingCon & WHD India

Partners: partners: MSG91, ShipDesk, Edrone, CCavenue

Hosting Features

  • Cloud based secured hosting
  • Pre-integrated payment gateways, logistics, invoicing solution
  • A ready-to-build, pre-eminent platform with sourcing from Europe, especially Germany & Poland.
  • Its features include: facilitate payment acceptance against the products in their online store, creative layouts,
  • A pool of creative layouts and graphic skins to make business websites attractive and appealing.’

Target Customers: shopkeepers, entrepreneurs across the globe

What for Customers?

  • User-friendly and ready E-commerce solution
  • Customers can build websites instantly, without involving any developer.
  • Economical and most popular packages
  • Free domain & security certificate
  • Constant updates

Antitrust scrutiny on Facebook, Google, Amazon for competition problems & anti-competitive conduct


Technologies have become a crucial part of our day-to-day lives. As the world relies upon the internet, with each day passing, reliability increases, creating a need to check fairness in the competition. An urge to tighten the scrutiny over the tech giants has been felt and talked about by many. This world is an expensive place for people like us to survive. Imagine the pressure on tech giants like Facebook, Amazon, and Google. Like every government needs to be checked for the basic principle of balance of powers, so do these companies where the market is on the rise, and for them, anything and everything is at risk, including their image, their investment and more.

The internet needs to be a safe place for one and all and to ensure that the need for anti-competitive conduct has been raised, where everybody is out there to sell their product as if their application is the best shot we have got. All these successful companies have one thing in common: the support of the internet, without which these companies would’ve been nothing.
The government has raised concerns about the increasing monopoly of the digital markets, and the only means to keep these companies under control and on the path to righteousness is by curbing their strength and excess powers.

A recent egalitarian retaliation took place against the potential of these data monopolies; new worries over disturbing content online or behaviour, cyber-related crimes, and giving political misinformation to the public are just a few of the troubles. Have you ever thought that the only market to survive would be the online market, which sells everything from groceries to pets?

The increasing online family is scary because all your data is out somewhere; everything you type will remain on the internet even after you erase it. Facebook had undergone a similar scandal where the company had revealed the protected data of 87 million users to a political consulting firm, further leading to speculations on the Trump campaign.

Right folks, It’s 2019. Here are the social media choices we are left with: Facebook, where your identity and data are stolen. Twitter is where your profile is abused and disgraced. Snapchat is where your profile has funny bunny ears, and life is entirely of filters. People are bots. News is bought, and the only organic thing left is avocados. If this doesn’t awaken the law-abiding citizen within you, nothing will. Author: Rishika Chhabra

Apple’s upcoming changes to its phone and computer software


Apple, beset by falling iPhone sales, declared coming changes to its phone and computer software that intend to highlight its increasing emphasis on digital services and to overlook further its customers’ privacy visions previewed during a conference in California, including a new feature that will let people log into apps and other benefits with an Apple ID instead of relying on similar sign-in options from Facebook and Google, the two companies that mine data to sell advertising.

Apple said it wouldn’t collect tracking information about users from that service. As a part of the feature, it will let users mark their valid email ID when signing into related applications and services.

Although still prevalent, the iPhone is no longer reliably driving Apple’s profits the way it has for the past decade. Sales have fallen sharply for the past two quarters and could suffer another blow if China’s government targets the iPhone in retaliation for the trade war being waged by another potential problem looms for Apple.

iPhone is still Apple’s marquee attraction. The next version of its iPhone’s operating software is iOS i3, which offers p, which offers “dark mode” for the screen, a feature already available on Macs. Apple executives also claimed that iOS 13 would be faster and feature a new version of the Face ID system that will unlock your phone 30 per cent faster. When the next version of the iPhone software comes out this fall, Apple is also promising to give people the option of limiting the time apps can follow their locations and prevent tracking through Bluetooth and WiFi signals.

Apple is expected to provide a flash at a separate store for the Apple watches to lessen the dependence on the phone. It is often likely to show updates like the applications for maps, books, messaging, etc.

More features are also expected for Apple’s toolkit to create augmented and project digital fabrications into the real world.

Apple CEO Tim Cook has been promoting the promise of augmented reality but hasn’t publicly confirmed that Apple is working on an AR headset. Author: Rishika Chhabra

Alarming Modern Internet Scams


Commercial Use of Personal Information

Alarming modern Internet scams have triggered users to find and remove their personal information from the Internet. Most websites do contain login data, sometimes credit card information, social security details, or health records, mostly taken when a user interacts.

In a well-connected world, companies have all the information about users, their location, social media connections, online purchases, browsing history, content published by them, personal habits, and much more. One way is that users are disclosing information from their smartphones, and on the other way, they are worried and want to clean all their stuff from the Internet.

Online companies trade personal information to make profits. They claim that the user has authorized the same by clicking on the ‘I Agree’ button on the user agreement. Very few people carefully read the contract before clicking; most want to approach their intentions to work. Mostly, people believe that what harm would be done to companies if that is not financial information. Hence, freely share the news on social media like Facebook, Instagram, and Linkedin. But now, people have found that companies use this information by targeting them with ads. Some may like those ads, but they aren’t enjoyable for most!

The companies have many resources to gather information like IoTs, gazettes, ISPs, websites, social media, and online forms; even the government publicizes certain information. People want vigilance on personal information to stop data from being used commercially.

How do you remove available personal information?

  • Deleting Information from Social Media Platforms: Check the information you share on your profile’s About page. Check privacy settings and hide the profile information you don’t want to disclose.
  • Contact Publisher: Land laws like the Right to Privacy provide rules and regulations that may force the publishers to take down the content. Web hosting providers may also be contacted and explain how disclosing your personal information violates laws; you can also go to court to obtain an injunction.
  • Contact Search Engines: Google and Bing provide the form to remove offending content from their search results

Use of Malicious Software

Scammers in Today’s world are evolving along with technology at an alarming rate. Meddling with your personal information through laptops and computers can be financially and mentally devastating. Downloading music, movies, and games can be enjoyable. Still, one should be aware of illegal downloads resulting in severe computer viruses and expenses you might not want to anticipate. Some downloads containing viruses can wipe out your files, and you might download dialer programs without realizing it, which enables hackers to hijack your modem and connect to unknown numbers that end up in expensive phone charges.

A good anti-virus software program can help prevent this negligence and protect your computer from threats. Ensure everyone in your household or business checks with you before downloading programs. One mustn’t download files from a site which is not trusted. Being cautious about emails offering information or entertainment services is vital and ensures you remain safe from unwanted suffering. Supervision over children when they’re surfing the Internet is critical. Lured by promises of fun, children may ignore the user agreement or other warnings. Family members worried about children surfing the Internet should take advantage of the ability to block Websites they do not want visitors to.

It is essential to be safe and informed while accessing the Internet. One must watch out for phishing emails that pretend to be someone they are not and retain your personal information the only misuse. Fraudsters use links to lure people to Websites that look just like the actual sites of the company they are impersonating. If you follow the instructions and enter your personal information, you’ll deliver it directly to identity thieves. To check whether the message is from the company or agency, call it now or go to its Web site.

Only open email attachments if you expect them and know what they contain. Even if the messages look like they came from people you know, they could be from scammers and include programs that will steal your personal information, so you should be very sharp and attentive towards the website you are logging into and sharing your details because you never know what might harm your rights.

Automation with Artificial Intelligence


‘Artificial Intelligence’ has enabled us to explore tremendous possibilities in every field. Humans learn with experience, and machines are also, so their performance is increasing. The logic rules, i.e., coding, are improving, thus making the devices work efficiently and effectively. The machines are now used in strenuous or uninteresting, painful or dangerous jobs, freeing people who can be trained for something else. It leads to an era of automation with state of the art in technology. The companies have started determining whether any task can be automated, with most minor human interference. However, the adoption of automation is lower than its potential due to economic-social regulatory constraints and necessary re-skilling.

The machine’s capabilities far exceed humans in data acquisition and processing and can establish winning strategies in well-defined environments. Hence, companies seek process automation, which requires high human intervention.

Transfer Learning

Machines would store knowledge gained by solving one problem, grouping unsorted information according to the similarities and differences, and applying it to a different related problem. Also, they would be used to make predictions based on an initial set of labelled data. The machines can perform a specific task without explicit instructions if initial data is unavailable. Thus, with AI, the devices sense their environment, think, learn and act in response to their programme objectives.

Assembler Robots

Massachusetts Institute of Technology researchers are working on tiny assembler robots that can build massive structures like spaceships, spacecraft or aeroplanes. These robots view themselves as part of the structure rather than as separate entities building a network. Both NASA and Airbus are interested in potentially using these robots in a new form of manufacturing.

Ananova As News Caster

Ananova, the first newscaster and presenter in charge of reading the news and conducting interviews with guests convincingly, was provided face, expressions, voice, and intonation and was well-modelled on the original.

Ananova.com As It Now

Using 24/7 tracking of over 40,000 web hosting providers, ananova.com analyzes more than 100 data points, downtime, new, deleted and transferred domains, and social media sentiment to develop comprehensive, impartial reviews of web hosting providers that cannot be found anywhere else.

Ananova.com is the only source for this data-driven, unbiased educational information supplemented with authentic user reviews and comments. All information is accessible to all visitors so they can make confident decisions on their web hosting investments. Ananova.com is paid by web hosting providers and receives affiliate payments, ad revenue, or other income, but it does not affect the content of its reviews and reports in any way. ananova.com is a reliable source of information that users can depend on to help them distinguish facts from hype and subjectivity and accurately compare their options.

Latest News

(September 23, 2019) The Digital Humanities launch event was held in the Reactor, Microsoft Israel’s innovation space.
The Ben-Gurion University of the Negev and Microsoft Israel unveiled two remarkable tools to search the Ben-Gurion Archive of thousands of printed and handwritten pages scanned and uploaded online 20 years ago. Still, researchers could only “thumb” through the documents individually.
They construct causal vectors, trace issues and ideas through multiple documents and illuminate relationships through an interactive map.
A second tool integrates Ben-Gurion’s diaries into Outlook. It gives researchers the unique ability to see the diary entries on any date and understand how Israel’s most legendary leader made decisions over time.

Cheap Drupal Hosting


As a potent website content management system, Drupal is perhaps one of the most popular open-source tools deployed in the web development industry. Drupal Open Source CMS development is the buzzword these days. Drupal has proved to be a compelling platform for building rich and highly interactive websites and has nearly revolutionized how websites are designed in the industry.

If you surf the web, you will find innumerable discussion forums, blogs and networking platforms where Drupal has been employed in web development, and such websites are also enjoying very high ranks on Google. Webmasters use Drupal Solutions to include various interactive and user-friendly features within their websites like blogs, discussion forums, bookmarking, photo sharing, RSS feeds and similar functionalities.

These programs have particular requirements for web hosting and storage space to make it more essential for you; they require more of it. Do you want the Drupal site to function constantly and dependably? If you wish the website to run the way it was designed in the initial Drupal development, then it is necessary to have a devoted space for the program and file-storing facilities.

Drupal hosting is a new concept in the internet world and has amazed all human minds. In the beginning, there was just a simple concept: web hosting. It later developed into dedicated and cheap web hosting; the technology improved, and PHP and ASP hosting services dawned on the web.

The new technology gets better each day, and from static to dynamic pages, things only keep improving slowly. WordPress hosting, Joomla hosting, and PHPBB hosting have come our way.

To get the multisite features of the best Drupal hosting, you must gain access to the Unix Shell and create a Symlink. However, for security purposes, this might not be permissible. You can also create a PHP script to accomplish your task in such cases.

Resource sharing is also possible with Drupal hosting; therefore, your hosting package can be managed along with the other websites. Moreover, this can be done at a much more affordable price range.

However, people’s actions may have a direct impact on the performance of your account. Generally, Drupal ensures the smooth functioning of blogs that get less than 1,000 unique visitors daily. It has indeed become essential to create and maintain an effective online presence. To do this, it is crucial to make your website look attractive; Drupal Hosting UK will make this happen, and your business website will surely get a competitive edge.

That is correct; cheap Drupal hosting is not that difficult to find. Many companies may offer services that claim to be the best Drupal hosting services. However, before hiring the services of these companies, one must be completely aware of what Drupal hosting is all about.

Yes, the question is, what is Drupal hosting? In layman’s words, this can be explained as something that uses PHP as its programming language. Additionally, it can run on IIS, nginx, Apache, and Lighttpd. It utilizes databases like MySQL and PostgreSQL to store all the information securely. Again, Drupal is a platform that permits the administration of Content Management or CMS. It is efficient and helps run everything from major websites to personal blogs. It also has a multisite option that allows you to run many websites from the same account with the help of a single code.

In addition, one may find cheap hosting for Drupal services at Ananova.com. Now that the idea of Drupal hosting is clear, you may be looking forward to hiring a company that offers affordable hosting. Despite this, as a first-timer, you may need to know what this quality comprises. You need to read through at least one Drupal hosting review that is abundantly available online or in software magazines. Here are a few pointers you may need to remember while hiring the services of any of these Drupal hosting sites.

The first thing you need to remember while starting with Drupal hosting is to secure a clean URL for the smooth functioning of all actions and for making your website search engine-friendly. Then, always keep your backup updated for your own good. Most companies will promise unlimited disk space, but you should know you will only get what you have paid for! Beware of the freebies, as you can surf the net to get such free installations and downloads.

Moreover, while working with cheap Drupal hosting service providers, try to bear another thing in mind: cost. A cost of $5 per month is considered relatively inexpensive as an economical Drupal web hosting option for anyone who is a newbie in the web hosting sphere. This will ensure a slow and steady growth in your traffic as the higher you want, the more you have to shell out of your pocket!

Although Drupal is a relatively new concept in Internet marketing, it is considered one of the most resourceful platforms to promote your business. It can help you expand your business within no time at all. This is why there has been a rise in the industry’s need for varied and cheap Drupal hosting services.

Unlimited Web Hosting


Everyone has a different opinion on unlimited web hosting. For some people, it means hosting plans that allow them to host total domains under one hosting account. For others, such unlimited hosting plans will enable them to utilize unmetered bandwidth or disk space. However, an absolute web hosting service should be the one that lets you use all the features below:

Unlimited Domains Allowed: There must not be any restrictions to the number of domains that are permitted to host. With the Add-On Domain feature, you can set up various kinds of sites covering multiple niches or topics.

Unlimited Disk Space: The amount of disk space you can use to store files, pages and emails must also be unmetered. Logically, the more disk space provided, the more files you can store on the server. Usually, the content of a site should be kept updated.

Unlimited Bandwidth: With this feature, you do not need to worry about the accessibility of your sites when you have a large number of visitors. This is one of the vital components to ensure your visitors will always be able to access your websites.

Unlimited Databases: Many web-based scripts specially designed to build forums or blogs require one or more databases set up. If you plan to build 20 WordPress sites under your hosting account, each with an image gallery or other database-driven program, it is not fun if you can only set up fewer than the required databases. Unlimited web hosting companies usually offer MySQL along with phpMyAdmin access.

Unlimited Email Accounts: Ideally, a website needs to have at least one email address. If you intend to have dozens of sites, ensure the web host company lets you set up one or more email accounts for each domain. Using Unlimited POP3 Email Accounts with SMTP feature, you can use one email address to communicate with visitors and one for article submission, for instance, for each domain. Modern unlimited hosting providers usually provide related features such as Webmail Access, Mail Forwards, Email Aliases and Spam Prevention Tool.

Unlimited Subdomains: Webmasters usually use subdomains to create a forum. Some website owners use this feature for URL redirection. For this purpose, they set up multiple subdomains where each is used to redirect visitors to a specific website address.

Unlimited web hosting is perfect for one who wants to build an array of websites. Other standard features supporting multiple sites are Website statistics, your sites’ performance, and Fantastico to install Blogs, Porblogs, Fportalsr forums, and galleries.

Some popular unlimited web hosting like Hostgator also provides other excellent facilities such as Free Website Templates and a certain amount of Google Adwords Credit. Other companies offer a free domain name for a new customer. With all the benefits, web hosting services with an unlimited hosting plan should be considered. Such a plan will significantly save your hard-earned money in the long run.

Artificial Intelligence Age


Artificial Intelligence

Technology has improved daily lives by solving many of the most significant challenges. With each new advancement, human work decreases, allowing one to focus on pleasant tasks. At the pace at which machines are taking the action of humans, the day will come when appliances do all the work. This led to a new society where social scientists are showing their concerns. Imagine a world without work; only people would be involved in harmonious and thriving communities, living properly and enabling everyone to succeed. But technology has two sides, like a coin. Such advancements are made to augment humans, but is it what humans need? The technology’s unprecedented pace and magnitude have a powerful influence on the socio-economic part of society.

People worry that in future, they will lose their jobs and hence can’t take today for granted; they need to keep themselves constantly updated with the future requirements and work.

The expected time is of AI (Artificial Intelligence) and is the most compelling transformative force. It has already penetrated our lives; now, we can see how our future will be with these machines. Artificial intelligence is changing our daily lives, making it safer, more comfortable, and more convenient.

Industry Already Started Using Artificial Intelligence

  • In the medical industry, it has brought good, satisfying results in diagnosing and curing disease warehousing; it optimizes routes and calculates prices.
  • The financial industry most benefitted, as it helps detect fraudulent transactions and manages investment portfolios.
  • The artificial industry is used in cars, voice, object recognition analyses and translation.
  • Technology has made an immense contribution to education, agriculture, and health.
  • Maintaining the environment and controlling global warming are still significant challenges.
  • Furthermore, artificial intelligence is also used in security solutions to prevent cyber attacks, keeping private personal data safe from unscrupulous actors’ hands.

The results of the use of AI are impressive. Still, social activist considers that one day, its unlimited use would pose dangers and risk as criminal-minded people would use it to create lethal mass-killing weapons that would misalign and manipulate society and might inadvertently destroy the entire planet.

Technology in Paramedics

Revolutionary Cloud-Based Technology Potential Boosts Health Results

A new handheld Butterfly portable ultrasound device connected to mobile phones provides images instantaneously on a connected smartphone. The tool uses a computer chip with tiny little discs. It brings ultrasound technology to patients without needing large ultrasound machines. Doctors could see issues immediately and call a specialist to discuss the images live in real-time by sharing the vision online using cloud-based sharing and archiving. Thus, crucial decisions are made directly, and action is taken.

Eventually, doctors’ stress would reduce, and they may throw away their stethoscopes or stop moving patients to specialist rooms for X-rays. The latest technology is fast, safe, and accurate because it doesn’t involve radiation.
Thus, an extraordinary development in Medical Technology could help people in the Victoria region living apart from major public hospitals and eventually have life-saving effects in regional hospitals.

Per Butterfly device would cost $3,000

BASH Shellshock bug


Right now, security professionals are jostling to fix a security flaw that has come to be known as Shellshock. It is also known as Bashdoor and is a security bug in the widely used Unix Bash shell, disclosed on 24 September 2014. Bash, short for Bourne-Again Shell, is the default shell in Ubuntu, and it is a free piece of software that is now built into more than 70 per cent of the machines that connect to the Internet, which consists of routers, servers, computers, some mobile phones and even everyday items like refrigerators and cameras.

Introduction:

Why do we need it, and what is Bash?

Bash is an interpreter that allows you to orchestrate commands on UNIX and Linux systems, typically by connecting over Telnet or SSH. Bash can also be a parser for CGI scripts on any web server. It’s been around since the late 80s when it evolved from earlier shell implementations and is highly accepted. There are additional shells out there for UNIX variants; the thing about Bash is that it is the default shell for Mac OS X and Linux, which are well-established operating systems.

What is the bug that is discovered?

Most considerably, no validation is required when exploiting Bash via CGI scripts.

The risk centres around the ability to arbitrarily define environment variables within a Bash shell, which states a function description. The problem commences when Bash continues to process shell commands after the function definition, resulting in what we would classify as a “code injection attack”.

Who is vulnerable?

Macintosh and many other web servers run operating systems such as Linux.
Computers will be vulnerable if they invoke Bash in an unsafe way. This is true of numerous web servers, and it is held that different network services could also be susceptible. However, it will take a while for security experts to audit various pieces of software to check for vulnerabilities.

Many IOT (Internet of Things) devices run embedded Linux sharing with Bash. All these devices have already been shown to demonstrate serious security vulnerabilities. Bash shells are also present in many general devices, e.g., our home routers.

What should be done for Protection?

The first and foremost thing as an end user is to keep an eye on your platform’s software’s latest update that they are rolling out and to install it as soon as possible when it is available. The bigger worry is the devices with no easy patching path, for example, routers.

In short, the advice to consumers is this: always be alert for the latest security updates, predominantly on OS X. Also, be on alert for any information you may get from your ISP or other providers of devices you have that run embedded software. Be very cautious of emails instructing you to run software or requesting information. Avoid logging into untrusted wifi networks, as malicious wifi routers could use the bug to hack into users’ laptops and mobile devices.

Most of the heavy lifting needs to be done by security professionals, not the end user, as for most components, servers are more vulnerable than users’ computers.

How can attackers take advantage of this vulnerability?

The bug can be used to hack into helpless servers. Once inside the server, attackers could steal user data, deface websites and engage in other harmful activity.

There is a fair chance that hackers will use the weakness to generate a worm that automatically swells from vulnerable machine to vulnerable machine. The consequence it will lead to will be a botnet, a network of countless compromised machines that function under the control of a single hacker. These botnets — often produced in the wake of significant vulnerabilities — can be used to steal confidential data or propel spam, contributing to website denial-of-service assaults.

As this is being written, security professionals are racing to update their server software before the hackers have time to attack it.

How much time will it take to fix the problem, and how difficult is it?

From a technical perception, the fix is not that difficult. A part of the fix has already been made available, and a complete fix will be out as soon as possible.

The most complicated part is that as Bash is embedded in many different devices, it will take extensive time to locate and fix them. For example, many personal wifi routers run web servers to enable users to configure them using a web browser. Several of these devices may be vulnerable to a Bash-related attack. Regrettably, these devices do not have a straightforward or automatic mechanism for upgrading their software.