Author: admin

Gender & Age Classification using OpenCV Deep Learning ( C++/Python )

In this tutorial, we will discuss an interesting application of Deep Learning applied to faces. We will estimate the age and figure out the gender of the person from a single image. The model is trained by Gil Levi and Tal Hassner. We will discuss in brief the main ideas from the paper and provide […]

from Learn OpenCV…

A New Look For The Apple Mac And iPads

For decades, Apple has reigned supreme in the world of technology and almost everybody is fine with it since they gifted us with some of the best and most advanced devices that are now widely used today and has been the inspiration for competitors to embrace smart technology. For many, Apple is synonymous with class, elegance, sophistication, luxury, you name it. People are always on the lookout for the next line of Apple products because it sets the bar in the industry that competing brands must either follow in order to stay relevant or overshadow to dominate the market.

When it comes to smartphones, it is still a close match between iPhones and the Samsung smartphones with the two brands having a loyal group of customers who patronize their products. Apple has maintained its edge in the field of smartphone but over the years has lost its edge in computers. The Mac is still a legend in its own right but many complain that its hardware is a bit outdated compared to newer Window models right now. It is about to change as Apple just recently launched new Macbook Air, Mac mini, and iPad pro versions.

As Apple rolled out updated products at its event in New York on Tuesday, analysts quickly noticed a pattern. New versions of the company’s iPad Pro, Mac mini, and MacBook Air all had impressively improved features—along with higher prices than what they replaced.

The new entry-level iPad Pro got a larger screen, faster processor, and lost its home button in favor of Apple’s high security facial recognition login system, Face ID. But its starting price jumped to $799 from its predecessor, which cost $599.

Likewise, the revamped MacBook Air got speedier and comes with a higher resolution screen than what it replaced, circa 2015. But the new laptop starts at $1,199 versus $999 for the older model, which Apple will continue to sell at that price—at least for now.


The world is always attentive to any new releases coming from Apple …

How SMBs Can Achieve Dependable PCI Compliance

What is PCI Compliance?


The Payment Card Industry Data Security Standard (PCI DSS) is a compliance standard that’s designed to protect credit card information. With the proliferation of online payments and eCommerce, ensuring strong PCI-DSS compliance has become a significant source of concern for small and midsized businesses in New York.

The primary reason the standard causes so much anxiety is that it’s long and complex, totaling about 130 pages. The requirements document opens with 12 high-level objectives, which seem easy enough to understand. However, those objectives are composed of over 300 separate controls for the monitoring and reporting of IT systems, all highly technical in nature, making them almost impossible for a layperson to understand. Want to give it a try? You can browse the complete document here at the official site.

So, what’s the best way to achieve full PCI-DSS?

Which Level of Compliance Do You Need?

The PCI Compliance standard is broken down into four levels, depending on how many credit card transactions a business processes per year and the size of those transactions.

  • Level 1 – Businesses that do $6 million or more in transactions, accept global transactions, or a business that’s experienced a serious data breach in the past.
  • Level 2 – $1 to $6 million in transactions
  • Level 3 – $20,000 to $1 million in e-commerce transactions
  • Level 4 – Less than $20,000 in e-commerce transactions and up to $1 million in transactions for other businesses

Naturally, Level 1 certification is the most rigorous, requiring a yearly compliance check with a security professional who possesses PCI DSS training, known as a Qualified Security Assessor (QSA). Most SMBs fall into Level 3 and Level 4. Businesses in those categories can perform their own internal PCI-DSS audits and self-report their compliance.

Some businesses think self-assessment leaves wiggle room for “good enough” compliance. That’s far from the case. Any business that’s caught out of compliance faces thousands of dollars in fines per day and might lose the right to process credit card transactions entirely.

The Consequences

The evolution of Wi-Fi 6: part 3

In part two of this series, we explored the basics of MU-MIMO, OFDMA, and 1024-QAM. In this blog post, we’ll take a closer look at Wi-Fi speeds, along with an in-depth look at OFDMA, MU-MIMO and BSS Coloring.

Wi-Fi 6

Theoretical peak speeds vs. network capacity and efficiency

As we’ve emphasized throughout this series, the 802.11 standard has rapidly and significantly evolved over the past two decades. For example, wireless LANs once focused on achieving theoretical peak speeds. With the advent of Wi-Fi 6 (802.11ax), the emphasis has shifted to overall network capacity and efficiency, in addition to throughput speeds. As the latest iteration of 802.11, Wi-Fi 6 (802.11ax) is expected to become prevalent in ultra-dense environments such as transport hubs, urban apartment complexes, college campuses, concert venues and sports stadiums. These are all locations where many clients routinely access the internet over Wi-Fi, as well as share UHD content and stream 4K video. 

Currently, in advanced development, the IEEE 802.11ax standard is slated to be released in 2019. It is worth noting that the maximum theoretical speed of Wi-Fi 4 (802.11n) was 150 megabits per second, per stream. Wi-Fi 5 (802.11ac) increased this to a theoretical speed of 866 megabits per second, per stream, which is considered a six-fold jump. Wi-Fi 6 (802.11ax) supports maximum speeds of up to 1201 megabits per second. Although Wi-Fi 6 is certainly faster than its predecessor, it is not the six-fold increase seen with the release of Wi-Fi 5 (802.11ac). 

Wi-Fi 6: 4x increase in throughput

More specifically, Wi-Fi 6 (802.11ax) is expected to boast a 4x increase in throughput for the average user. This is primarily due to more efficient spectrum utilization and various improvements for dense deployments. Clearly, speed is not the most important issue, as the maximum rates are notoriously inaccurate when it comes to real-world performance. These can vary widely based on a range of obstacles, other signals in the air, multipath reflections and the capabilities of both access …

Ruckus ICX 7850 Switch Delivers 100GbE Edge-to-Core Solution for Multi-Gigabit Enterprise Networks

Ruckus Networks, an ARRIS company, has expanded its extensive switch lineup with the ICX 7850. The new switch is specifically designed to provide a complete edge-to-core solution for campus networks well into the next decade.

ICX 7850

“The ICX 7850 delivers high-end routing and security capabilities suitable for large campus networks in a fixed form factor,” said Siva Valliappan, Vice President of Wired Products, Ruckus Networks, an ARRIS company. “Perhaps most importantly, our stackable ICX 7850 provides the power, performance, and reliability of a chassis with a pay-as-you-grow model. This makes the ICX 7850 a cost-optimized solution for complex network requirements across a range of verticals and businesses including education, government, enterprise and service providers.”

As Valliappan notes, recent advances in Wi-Fi technology, such as Wi-Fi 6 (802.11ax), the IoT and LTE are all driving the demand for multi-gigabit access by significantly increasing the amount of data traversing enterprise edge networks.

“Enterprise and data center networks are being pushed to the breaking point and the capacity of traditional 10 Gigabit Ethernet (GbE) backbones is being tested,” he explained. “The ICX 7850 can help by enabling seamless replacement of existing 10G products with a high density, secure, scalable platform. The ICX 7850 supports high density 10GbE, 25GbE, 50GbE and 100GbE using existing customer investment in fiber cabling to enable unprecedented network growth.”

Many organizations, particularly school districts with older, existing networks have OM1 or OM2 fiber optic cables that require Long Reach Multimode (LRM) optics to achieve the 10 Gbps connections needed for today’s bandwidth needs. The ICX 7850 provides investment protection and an upgrade path for customers with older fiber infrastructure by offering support for LRM optics with select family members.

Pay-as-you-grow with the ICX 7850

As we noted earlier, the ever-increasing need for Wi-Fi connectivity is taxing the network core, although the solution to keeping pace with the proliferation of connected devices and advances in Wi-Fi technology does not need to be complex and expensive. While the introduction of multi-gigabit connectivity at the edge is driving the need for …

How Technology Affects Mother Nature

The planet is going through so many difficulties right now because of human abuse and misuse of resources. The continuously increasing human population is likewise putting too much strain on the planet and the rapid advancements in technology do not help either. While many of us feel relieved that manual labor is no longer a must in most of the things we do since almost everything is automated now, we fail to realize its negative effects to Mother Nature.

As our digital footprint increases, so does our carbon footprint. We burn fuel in running our tech devices and equipment and the more gadgets we use, the more fuel we likewise burn. It does not help that we are now heavily addicted to social media, online games, online streaming, etc. that we can’t just slow down with our tech use. We become increasingly reliant on these contrivances not only for work or study but to keep us entertained 24/7. More often than not we get stressed at technical difficulties we face like hardware failure or data loss and would not hesitate to spend hundreds to thousands of dollars on services like and rather than worry about the hazards these new technologies pose to human life.

Watching your favourite show or listening to your playlist has never been easier.

A virtually endless supply of film, music and TV can be streamed and downloaded almost instantly.

But at what cost to the environment?

Vast amounts of energy are needed to keep data flowing on the internet and demand will only increase as our reliance on digital services grows.

Some of that energy is generated from clean energy sources, but much of it comes from burning carbon-based fossil fuels, which scientists believe is a contributing factor to rising global temperatures.

The latest report by climate scientists demonstrates the scale of the dangers faced from carbon emissions.


Most technologies burn fossil fuel for energy and they contribute to global warming and the increasing threats of global warming. This is the …

Invisibility Cloak using Color Detection and Segmentation with OpenCV

If you are a Harry Potter fan like me, you’d know what an invisibility cloak is. Yes! it’s the cloak which Harry Potter uses to become invisible. Of course, we all know an invisibility cloak is not real — it’s all graphics trickery. In this post, we will learn how to create our own ‘Invisibility […]

from Learn OpenCV…

Ruckus Networks’ Raelyn Kritzer recognized as 2019 CRN Channel Chief

Ruckus Networks, an ARRIS company, today announced that CRN, a brand of The Channel Company, has named industry-veteran Raelyn Kritzer, Channel Chief, Vice President of Worldwide Channels, to its prestigious list of 2019 Channel Chiefs. The top IT channel leaders included on this list continually strive to drive growth and revenue in their organization with their channel partners.

CRN Channel Chief

According to Bob Skelley, CEO of The Channel Company, each
of the 2019 Channel Chiefs has demonstrated exceptional leadership, vision and
commitment to their respective channel partner programs. Channel Chief honorees
are selected by CRN’s editorial staff
based on their professional achievements, standing in the industry, dedication
to the channel partner community and strategies for driving future growth and

“The individuals on CRN’s 2019 Channel Chiefs list deserve special recognition
for their contribution and support in the development of robust partner
programs, innovative business strategies and significant influence to the
overall health of the IT channel,” said Skelley. “We applaud each Channel
Chief’s remarkable record of accomplishments and look forward to following
their continued success.”

Indeed, Kritzer is a recognized channel leader with expertise in building partner programs, onboarding and enablement and developing multi-touch marketing campaigns that drive revenue to and through the channel. Kritzer has played a major role in developing Ruckus’ Ready Partner Program and Ruckus’ Cloud-Ready Specialization Program for Channel Partners. In addition, Kritzer has helped launch an integrated wired and wireless program and developed specializations that recognize the unique verticals and expertise of Ruckus’ partnerships. These include Cloud programs, support for new delivery offerings and finance programs designed to empower MSPs.    

“Ruckus has always been a company fully dedicated to the channel,” said Kritzer. “Since our success is determined by our partners, we continue to bring simplified, feature-rich programs to our channel to help them boost their profitability. I’m honored to be part of this prestigious CRN Channel Chief list for the second straight year alongside other top executives.”

It should be noted that the 2019 CRN Channel Chiefs list, including the 50 Most …

What Disaster Recovery Means To Businesses

Data not only dominate the world but most businesses also rely heavily on data in their daily operation. Small or big data is not only helpful in monitoring how well your business is doing but in also keeping track of your customer base such as in storing their contact information for future use. Unfortunately, nothing is safe in this world from disasters no matter how many precautions you take. This is worsened by the continuous threats from cybercriminals that are always prowling the web and waiting for a chance to strike whenever your defenses are down or too weak to be taken advantage of.

If you own a business, you need to double your safeguards because any minor mistake can cost your business if you are not careful enough. Not only will the operation be put to a halt because the systems are down but will require you to spend a lot of cash on data recovery, which is not only expensive but there is no assurance as well that all lost data will be retrieved. You can lose your customers if you can’t get back on track ASAP and they may switch to the competition. This is really costly for small businesses who often don’t have the backup fund to help them weather this particular storm.

As an entrepreneur you simply can’t afford to lose your data. You need to keep it safe from all the disasters. Not taking serious action towards the protection of your data is risky and leads to business loss as well. Who will want that?

Data recovery is the process of restoring lost data which has either been made inaccessible, has been deleted accidentally or corrupted. Data recovery simply means restoration of data to a server, external storage, desktop, laptop, etc. from a backup.

Causes of data loss:

Data loss occurs due to human errors, equipment failures, natural disasters, some sort of breach, malfunctions, firmware corruption, software crashes, logical errors and a lot more. The cause can be anything, but as a small business