PC Speak: An Abney and Associates Internet and Technology Research Lab Presents the IPv6

Internet Protocol version 6 is the most recent update of the IP, the main communications protocol that holds the whole Internet. It is created to supplant the older Internet Protocol version 4 that is still in use on most of the web traffic until today. IPv6 was formed by the IETF (Internet Engineering Task Force) as a solution for the IPv4′s imminent address shortage.
For every device that connects to the Internet, it needs an IP address — a binarynumber assigned to it to enable communication with other devices. And with the quick turnout of Internet-capable devices today, the current IPv4 protocol is running out of addresses that we could use.


Android befall iOS in popularity in Singapore, HK

When it comes to Smartphones, It is clearly a battle between Android and iOS. But signs are emerging that Apple might be loosing grip in the two Asian markets.
Conforming to Reuters report, most of the well-off smartphone users in Singapore and Hong Kong are turning to Android handsets, mostly Samsung, rather than iOS of Apple. The trouble that iPhone is their desire to be different that causing them as weakness and in turn an advantage to competing device.
Continue Reading:

Cyber-Threat Trends of 2013

Experts forecast a rise in computer and cellphone scams
It takes no expert to predict that there will be for sure an increase of sophisticated methods and updates of old scams to try to take control of our computers and cellphones to get identities and money. Yet another year, here comes 2013, scammers are busy or maybe had already developed new ways to swindle us in the coming months.

Sign up for the AARP Money Newsletter.
This comes as a general rule and everyone must know even without asking tips from the experts, to stay safe one must know the basic vigilance. Now the question is how. This is how: Keep your security software updated and run it regularly. Click only on links from trusted sources; the same goes for buying cellphone apps. Be smart about where and how you navigate in cyberspace.


Computer scientist looks for ways of fraud prevention

Jeremy Wendt, Sandia National Laboratories computer science researcher, focuses on working on a program to uncover probable preys of nefarious emails.

The weakest link in many computer networks is a gullible human. With that in mind, Sandia National Laboratories computer science researcher Jeremy Wendt wants to figure out how to recognize potential targets of nefarious emails and put them on their guard. – Phys. Org

He aims to trim down the figure of visitors that cyber analysts have to check as possible bad guys among thousands who search Sandia websites each day.


Net providers begin warning of illegal downloads

In the first decade of the 21st century, technology made it possible to download music, movies or televisions shows from the Internet to your computer. Before this, you had to go to a music store physically and purchase an album or CD if you wanted to hear the latest from your favorite artists. With this new technology, the entire scope of how you obtain your music has changed.
But as the technology advances rapidly, unlawful downloading sites also places on a huge number. And with these, internet users who illegally download online could soon receive warning notices from the nation’s five major internet service providers. Consumers who are using peer-to-peer software are the number one target this week of the Copyright Alert System.

Continue Reading:



Transmission Control Protocol and Internet Protocol are the core of internet protocol suite as the they work together in supporting web functions.
TCP is used in email, FTP, file sharing, media streaming and the Internet in general. Because of traffic load, network congestion and other network behavior, IP packets could not be delivered properly so TCP detects possible problems to achieve successful data transmission.


PC Speak: An Abney and Associates Internet and Technology Research Lab talks about TCP / IP and other related protocols:
Abney and Associates Internet and Technology Research Lab illustrated the importance of IP addresses. IP has the responsibility of addressing packets to be transmitted across a network or across the Internet.



A complete and definitive list of programming languages ever made, with no distinction of their being high- or low-level. (Classification of PLs as low- or high-level changes over time and is highly relative to time. What is considered high-level today could be seen as low-level in the future just as assembly language was deemed high-level before.) So instead,

Continue Reading: