DuoSkin | Temporary Tattoo to Control Connected Interfaces


Microsoft Research and MIT Media Lab recently introduced a new product called DuoSkin. DuoSkin is basically a temporary tattoo that will allow you to control connected interfaces. For example, you can use it to control a game or even your smartphone. Additionally, you can use DuoSkin as an NFC tag, which you can easily use with your smartphone.

For more information: DuoSkin

Support Group for Bots: Coping with Humans

IBM Watson is a cognitive system that”s ushering in the new era of cognitive business. Recently, a group of battered science fiction bots spoke about their yen to take over the world and their dislike for working with humans. Unlike them, Watson works with humans to out-think competitors, challenges, limits.


Robots in our Brains

Google’s Director of Engineering, Ray Kurzweil, predicts that humans will be hybrid robots by 2030.

That is when nanobots will be implanted into our brains so we can expand our intelligence by directly tapping into the Internet.

Hybrid robots, we understand that.

Two-Factor Authentication

Two-factor authentication adds an extra layer of security by asking you to provide two forms of identification before you can access your personal information. The first is your usual user ID and password. The second is typically a unique code that is sent to your phone or some other physical device, that you then enter during the second stage of the login process.

Because the second identifier is sent to something that you physically carry with you, it makes it harder for hackers to access your information.

Apple: Apple sends a four-digit code via SMS or Find My iPhone to register your machine as a trusted device. Anytime you try to access your iCloud or iTunes account from a new device, you’ll be required to enter a new four-digit passcode. Instructions on how to enable two-step verification for your Apple ID are here.
Google: Google can send verification codes in several different ways: SMS, voice call, or through its Google Authenticator app. During initial sign-in, you can tell Google to remember your device for 30 days. But a new code is required anytime someone tries to log in from a new machine.
Yahoo Mail: Once two-step authentication is activated, Yahoo will send a passcode via text or voice call. The verification process will only occur whenever you’re logging in from a new computer or mobile device, or if you’ve cleared your browser’s cache.
Facebook: Facebook offers login approvals, which require you to enter a passcode anytime you try to log in from an unrecognized computer or mobile phone. Codes are sent via text message.
Twitter: Twitter will send a verification code via text or as a push notification on iOS and Android devices. The company also provides a backup code, so that in the event that you lose your phone, you can enter the backup code to log in to your account. This isn’t saved anywhere, so be sure to write it down someplace.
Dropbox: Like the others, you’ll receive a code anytime you try to access Dropbox from a new machine. They can be sent via text, or you can use an app like Google Authenticator or Duo Mobile. The company also provides a 16-digit backup code in case you lose your phone or for some reason can’t receive a PIN using the aforementioned methods. Again, write it down somewhere safe.
OneDrive: You can receive codes from Microsoft via text, email or authenticator app. A PIN is only required when you sign in from an untrusted device. Instructions on how to enable two-step verification are available here.

DARPA Robotics Challenge Finals

NASA’s quadrupedal RoboSimian

The DRC is a competition of robot systems and software teams vying to develop robots capable of assisting humans in responding to natural and man-made disasters. It was designed to be extremely difficult. Participating teams, represent some of the most advanced robotics research and development organizations in the world,

To qualify for the DRC Finals, the teams had to submit videos showing successful completion of five sample tasks: engage an emergency shut-off  switch, get up from a prone position, loco-mote ten meters without falling, pass over a barrier, and rotate a circular valve 360 degrees.

25 teams will compete during the two-day event, to be held June 5-6, 2015, at Fairplex in Pomona, California.

DARPA Robotics Challenge

Windows 7 | Software Recovery

windows7recoveryMicrosoft has recently launched a new website that enables you to recover and install Microsoft Windows 7 purchased through a retailer.

This site will help you accomplish the following:

  • Create a Windows 7 DVD for installation on a new hard drive
  • Create a backup Windows 7 DVD
  • Create a bootable USB drive with a copy of Windows 7

Make sure you have a reliable internet connection and sufficient data storage available. You also need a valid Windows 7 product key to start the process.

Head on over to Microsoft Software Recovery if you need to recover your Windows 7 product or create a backup for later.

User Support Editorial Report – January 2015

Latest Technology

Quantum Credit Cards:

In a report issued last month, a team of scientists from the Netherlands is proposing a security system for credit cards and passports that would leverage the power of quantum physics. Dubbed quantum-secure authentication (QSA), the technology uses a strip of nanoparticles on the card that would be virtually impossible to hack. Read on…                               

Tips & Tricks


Best Free Panorama Software
How to Resize Icons in Windows 8.1
Backing up the Outlook Address Book
Rename Email Accounts and Mailbox Folders
How to Manage Attachments in Outlook 2013

 Computer Safety

Make Your Entire Internet Life More Secure in One Day:

From chat encryption to secure backups, time to find the easiest ways to make your online life secure without causing too much inconvenience..  Read on



Bonus Video of the Month

User Support Editorial Report – July 2014