Best gap year tech: from Torino to Tokyo, these gadgets will help you have a great time

If you’re planning a gap year or packing for the trip of a lifetime, you’ll want to cram as many creature comforts into your backpack as possible, not to mention some tech on which to record and share some phenomenal views and bragging rights. We’re rounded up some near-essentials (aside from a huge backpack and warm coat) to make travelling easier and more exciting, whether you’re trekking through jungles and camping in the wild or catching trains and seeing the sights of Europe. Just don’t forget your toothbrush.

Sure, you’ll need a massive rucksack for lugging your worldly possessions from hostel to hostel, but it won’t be much use for sightseeing in a busy metropolis. Thankfully, there’s the Wolffepack that comes in many forms, including the ‘Capture’ for photographers that keeps all your tech, money and passport safe and sound.

Designed to allow users to reach into their bag without the hassle of unstrapping and taking it off, the backpacks all come with a  clever ‘orbital trapeze’ system that allows a wearer to swing the pack from their back to their front effortlessly. While this is a time saver, it’s also great if you want to keep your bag where you can see it on a sketchy street or busy train.

The Capture holds 26 litres and comes with a removable camera pod, three compartments, tripod clip, laptop sleeves and waterproof rain cover. With Carbon fibre, Kevlar and Dyneema cords, it’s also built to withstand the wildest of adventures.

GoPro HERO5 Action Camera

While serious photographers seldom travel without an SLR, the GoPro is brilliant for people on the go and perfect for recording bike rides and scenes you’ll want to remember in years to come. The HERO5 Black is dubbed the ‘best GoPro ever’ and supports video resolutions up to 4K at 30 frames per second, video stabilisation and stereo audio recording, as well as professional quality 12MP photos.

A simple one button control and two-inch touch display makes operating it a breeze and it’s waterproof without a housing up to 33 feet – great for recording a white water rapids ride or trip to a waterfall. Once users have recorded their envy-enduring footage, the HERO5 can auto-upload their photos and videos to the cloud for safe keeping and share it easily online. It makes bragging easy.

Cat S30 smartphone

You may be surgically attached to your iPhone or top-of-the-range Android in the city, but we all know dropping these handsets can prove to be an expensive mistake. Instead, why not invest in the Cat S30 handset. Built to be work in extreme environments, the water, dust and shockproof smartphone is designed to survive a 1.8-metre drop test and has an easy grip design as well as 12 hours talk time and up to 19 days standby – perfect if you’re staying in the back-of-beyond (or have mislaid your charger).

Price: £239.99 | Buy Cat S30 smartphone

Griffin Survivor Extreme

A tablet is a godsend when you’re pushed for space, working as a map, address book, novel, games console and internet café if you’re lucky. But they can be delicate, making a ruggedized case a sensible investment. Griffin Technology makes an array of ‘Survivor’ cases for different models, including the iPad Air 2 (pictured) to protect their backs and screens.

The new ‘Survivor Extreme’ is built to enable the iPad4 mini to survive drops onto concrete of up to 6.6-feet, cushioning falls within the impact-resistant shell. Its slide on design all but eliminates the air gap between touchscreen and the screen guard for extra protection, while its sealed shell protects the device from mud and water.

Price: £69 | Buy Griffin Survivor Extreme

ThermaCELL ProFLEx Heavy Duty Heated Insoles

Whether you’re trekking at high altitudes or staying in a drafty hostel, your toes can get chilly, especially once the sun has set. ThermaCELL ProFLEx Heavy Duty Heated Insoles heat up a user’s feet and can be controlled using a smartphone with a Bluetooth connection. The accompanying app lets users warm their feet to a chosen temperature. When this is reached, the insoles temporarily turn off before switching on again.

They’re cushioned to make walking boots more comfortable and include removable, replaceable extended life batteries so users can swap them out without having to wrangle their insoles out of their shoes or boots. One charge taking just two hours provides up to 8.5 hours of warmth. There are Bluetooth Pocket Warmers too for people who want heat on demand in a more flexible package.



[Source:- T3]

5 Examples of Brands that Have Truly Mastered Social Media

5 Examples of Brands that Have Truly Mastered Social Media | Social Media Today

Social media fame is the holy grail of the marketing world – we work our butts off for those likes, retweets, and follows. But sometimes it just doesn’t happen.

Part of the problem with the social media landscape in this regard is that it’s just so huge – you’re literally competing with brands from all over the globe in one intense, fast-moving stream. To truly master social media, you need to think outside of the box in order to make yourself stand out and be noticed among the growing crowd.

In this post, we’re going to take a look at some brands that have been able to do just that – and also what we can learn from their success.

1. Airbnb 

Airbnb is a community-driven hospitality company that enables people to list and find vacation homes online. As such, they’re already in a great position for posting visual content. Check out some of their gorgeous Instagram posts:




Visuals plays a huge factor when choosing a vacation home, and these awesome images help Airbnb to stand out as a unique provider in their industry.

In fact, Airbnb’s Instagram mastery was even officially acknowledged this year when they won the 2016 Shorty Awardfor ‘Best Overall Instagram Presence’.

But even on less visual forms of social media, Airbnb work hard at creating a community with their hosts and guests. They tweet about current topics:

They respond to their Facebook comments:

And they’ve also coined their own hashtags: #LiveThere and#BelongAnywhere.

The Stats:

  • Facebook: 3,562,259 likes
  • Twitter: 510K followers
  • Instagram: 13.3 million interactions in 2015

2. Charmin

Charmin is a toilet paper manufacturer. And while that may not be the most exciting product to market, Charmin’s marketing team have truly excelled in the social space.

Charmin raise awareness of their brand on Twitter by creating hashtag marketing campaigns – such as#TweetfromtheSeat and #EnjoytheGo. People love their tongue in cheek humor and this has resulted in the company’s Twitter following skyrocketing.

Here are a few examples of customers getting involved:

The brand will also often ‘hijack’ trending topics, which, done right, can be a great way to gain extra exposure.

The stats:

  • Facebook: 1,037,928 likes
  • Twitter: 74K followers

3. Zendesk

Zendesk is a customer service software company. Yep, that’s right. They’re B2B.

It can be a real struggle for B2B companies to make a lasting impression on social media, but Zendesk nail it with their perfect balance of humor and professionalism.

What does that mean exactly?

Well, they post about business-y topics, but in a humorous way. Check it out:

They are also pretty open with their followers on social media, often asking them questions and giving insights into their business:

This kind of openness captures what social media is all about, and can really help a brand stand out (poetry not intended).

The stats:

  • Facebook: 53,047 likes
  • Twitter: 68.5K followers
  • Instagram: 4,572 followers

4. Nivea

Skincare brand Nivea are very hands on when it comes to social media marketing.

On Twitter, for example, they actively reach out to people who are tweeting about skin problems:

You may have noticed that no hashtags were used in the above tweets. So, what sorcery did Nivea use to find and take advantage of these marketing opportunities?

Easy. They used the Twitter search bar — no magic necessary. The search bar at the top of Twitter isn’t just for #hashtags and @handles, you can actually search for any term and see real-time tweets that include it.

So if, for example, you’re a skincare brand, you could simply search for ‘bad skin’ and click on the ‘Live’ tab to find people tweeting about their bad skin.


Then all you have to do is reply to them to show what an awesome brand you are.

Nivea also use their ‘think outside the box’ marketing style on Instagram, by collaborating with other brands such asSuperdrug. Just a few weeks ago, Nivea took over Superdrug’s Instagram channel for the day.


They posted all about their products and gained themselves added exposure, thousands of likes, and plenty of new followers.

The stats: 

  • Facebook: 18,810,448 likes
  • Twitter: 14.9K followers
  • Instagram: 17.6K followers

5. NASA [Mars Curiosity]

Space travel, science – it isn’t for everyone. But cute, personified robotic rovers, everyone loves those, right?

Well, it certainly seems that way, judging from the social media success of NASA’s Curiosity Mars Rover.

NASA has set up social media accounts for Curiosity, and posts first-person updates from the rovers big adventure:

This is a really great technique from NASA to gain more brand exposure, and therefore more public interest in their missions.

Seeing as it worked so well for Curiosity, NASA’s space probe, Juno, now also has its own social accounts where you can view updates from its mission to Jupiter:

The stats:

  • Facebook: 1,238,803 likes
  • Twitter: 3.38M followers

Final Thoughts

Five very different brands with very different social media marketing tactics, I’m sure you’ll agree?

The great thing about taking a look at brands that have truly mastered social media (once you get past the insane envy) is that they all use techniques that can be adopted and mastered by any brand.

Yes, you can try the Nivea “search and help” and you can master the Charmin hashtag marketing campaign. All you have to do is test, analyze and refine.

The more time and effort you put into social media, the more you will get out of it.



[Source:- Socialmediatoday]

Turkey Kurdish wedding bomber ‘may not have been child’

Women gesture as they kneel by a grave at a cemetery during the funeral for the victims of last night's attack on a wedding party that left 50 dead in Gaziantep in south-eastern Turkey near the Syrian border on August 21, 2016.

Turkey’s Prime Minister Binali Yildirim says authorities do not know if a suicide bomber who attacked a Kurdish wedding killing 54 people was a child.

President Recep Tayyip Erdogan said after Saturday’s attack in Gazantiep that the bomber was 12-14 years old.

Turkey has linked the bomber to so-called Islamic State (IS), but Mr Yildirim said “a clue has not yet been found concerning the perpetrator”.

His statement came as Turkey’s military targeted IS militants in Syria.

Television reports said howitzers had been used against IS near the border town of Jarablus.

Turkish artillery had also hit US-backed Syrian Kurdish YPG positions north of Manbij in Syria, broadcaster NTV said.

A coalition including YPG has been pushing IS out of Syrian towns, including Manbij, recently.

Turkey views the YPG as an extension of the Kurdistan Workers Party (PKK), a Turkish-Kurdish rebel group fighting for autonomy since the 1980s.

Speaking to reporters after a cabinet meeting on Monday, Mr Yildirim said the earlier statement identifying the attacker as a child was a “guess” based on witness accounts.

Most of the victims were children, media reports say.

Twenty-nine victims of the attack, which took place on Sunday, were under the age of 18, reports said, with one official saying 22 were under the age of 14.

Thirteen of those killed were women, Turkish media said. Sixty-six people are still in hospital, 14 of them in a serious condition, Dogan news agency reported.

One woman lost four children in the attack, the Haberturk newspaper reported. Emine Arhan told the title “if it wasn’t for my only surviving child, I would have killed myself”.

Imag copyrightTWITTER

Another victim was a nine-year-old girl who had stayed on at the party to see the bride after her parents had left, according to the Vatan newspaper.

A disproportionately large number of women and children were killed in the attack because it targeted henna night, a part of the celebration attended mainly by women and children, says BBC Monitoring’s Turkey analyst Pinar Sevinclidir.

Image copyrightAFP
Image captionGraves were dug at a nearby cemetery to accommodate the victims
Image copyrightAFP
Image captionFunerals were held on Sunday for those victims identified so far

Hurriyet newspaper said the type of bomb, which contained scraps of metal, was similar to those used in previous attacks on pro-Kurdish gatherings.

Prosecutors said a search was also under way for two people believed to have accompanied the suspected attacker to the wedding party but who left before the blast.

Gaziantep, near the Syrian border, is known to contain several IS cells.

In a defiant speech on Monday, Turkish Foreign Minister Mevlut Cavusoglu said IS should be “completely cleansed” from the border area with Turkey.

He also announced that Turkey was recalling its ambassador to Vienna because of a demonstration in the Austrian capital by groups associated with the PKK.

Mr Cavusoglu accused Austria of “supporting a terrorist organisation which is attacking Turkey”, according to Austrian paper Der Standard.

Ties between the two countries have been fraught over the past weeks, with Vienna warning that Turkey is heading towards authoritarian rule, and calling for its membership talks with the European Union to be ended.



[Source: BBC]

Computer security: With Boxmate malicious programs have no place left to hide

By preventing unexpected behavior changes, the “Boxmate” approach defends existing embedded systems, mobile devices, and even servers against known and as-yet unknown forms of attack. Computer scientists from the Center for IT Security, Privacy and Accountability (CISPA) at Saarland University will present their method for the first time at the Cebit computer fair in Hannover between March 14 and 18 (Hall 6, Stand D 28).

No matter how well-tested our software may be, hackers keep on finding vulnerabilities to exploit or control systems at will. “The attackers are always one step ahead,” says Andreas Zeller, professor of computer science at Saarland University and researcher at the Center for IT Security, Privacy and Accountability (CISPA). “The core problem of existing security systems is that the attack needs to have been observed at least once to be able to recognize it the next time — and then, you have to update everything again and again.” This threat is particularly prominent in the upcoming “Internet of Things,” where hundreds and thousands of devices can become potential targets.

A new approach called “Boxmate” is now set to prevent other programs from surreptitiously changing their behavior, as this would be part of or a result of a hidden attack, or a backdoor exploit. Developed by Zeller together with graduate students Konrad Jamrozik and Philipp von Styp-Rekowsky, Boxmate systematically generates program inputs in order to investigate the program’s regular behavior. “During this automatic testing, we log which critical data — say locations or contacts — and which critical resources — microphone or Internet access — the program is accessing to perform these tasks,” Zeller explains, “and the test generator ensures that all visible features actually are exercised.”

During production, the program then gets placed into a “sandbox,” an automated watchdog which oversees the operation of the program in question — and which raises an alarm whenever some data is being accessed that was not already accessed during testing. If the program is compromised or exhibits previously unseen malicious behavior, the sandbox will catch and prevent the attack.

The nicest feature of Boxmate, says Zeller, “is that malicious programs no longer have a place to hide.” Indeed, if a program wants to use certain kinds of data later on, it will already have to access it while being tested by Boxmate — and thereby expose what it is doing. “Any hidden functionality will be disabled by the sandbox,” says Zeller, “and this will make it hard for attackers.”

But wouldn’t the sandbox also raise alarms during normal usage? “Our test generator explores behavior so well that during regular usage, we normally have no alarms at all,” says Zeller, who has already tested Boxmate on more than a hundred different apps with his team. Modern mobile systems request authorizations for every access to sensitive data like the camera, contacts, and the microphone. “With Boxmate, we already know from testing that these are being used, and how,” says Zeller.

The current implementation of Boxmate protects apps on Android smartphones. However, the concept can equally be applied on the desktop, servers, or embedded systems, and it requires no changes to existing programs. Zeller has already applied for a worldwide patent for the technology underlying Boxmate, so licensing is already possible. To permanently establish Boxmate as a comprehensive security tool for industry and commerce, Zeller’s research group has now joined forces with industry partner Backes SRT. This Saarland University spin-off has developed, for instance, the “SRT AppGuard” app, a security program available as a free app and already downloaded more than one million times. “Boxify,” the extended, commercial version of AppGuard, works together with Boxmate and will also be presented at Cebit.

Zeller financed the research on Boxmate with funds from an ERC Advanced Grant. He had received the highest award of the ERC in 2011, with his proposal for “SPECMATE — Specification Mining and Testing.”


[Source:- Sciencedaily]