Skip to main content

All About UPI

UPI stands for Unified Payments Interface. It is a payment mode developed by the National Payments Corporation of India. UPI is a payment system that allows you to transfer money between any two parties. As compared to NEFT, RTGS, and IMPS, UPI is far more well-defined and standardized across banks. This means that you can use UPI to initiate a bank transfer from anywhere in just a few clicks! The benefit of using UPI is that it allows you to pay directly from your bank account. The hassle or need to type in the card or bank details goes away with UPI. You can use UPI to transfer money to your family, friends, or even between your own bank accounts. The much wider use of UPI comes when you have to pay different merchants. mPIN in UPI Another benefit of using UPI is that you can do away with the need to wait for an OTP and enter it to complete the money transfer. The mPIN is a 6-digit passcode that you must enter every time you need to make a transaction. The mPIN is highly val

Top NEWS of the Week 11th July to 18 July

Top NEWS of the Week 11th July to 18 July 


1. WhatsApp Encrypted Cloud Backups Being Tested for Android:

Popular instant messaging platform WhatsApp is testing the technology to independently encrypt chat backups in the cloud. The Facebook-owned service revealed that the system has been enabled in its most recent Android beta update. According to WABetaInfo, opting in for the beta build should keep chat history and media securely backed up, with the significant caveat that if a user forgets their passcode or loses the 64-digit recovery key, then they'll be locked away permanently because even WhatsApp can't get in then. Those who are ok with being on their own in that aspect, can get in the beta test group or wait for this to be available to everyone.


2. WhatsApp banned 2M accounts

Due to spam & Bulk messages send by the business


3. Windows 365 Price Details Revealed, Microsoft Set to Make Multiple Configurations Available on August 2

The Verge reports that Microsoft revealed the pricing of one of the Windows 365 subscription options during an Inspire session post the announcement. The company showed a screenshot that mentioned a monthly subscription of $31 (roughly Rs. 2,300) for the configuration that comprises two CPUs, 4GB of RAM, and 128GB storage. It will be a part of the Windows 365 Business option that is meant for businesses with fewer than 300 users.


4. iPhone 13 Series Tipped to Come With Wi-Fi 6E Support This Year:

iPhone 13 series is expected to launch in September year and is expected to come with Wi-Fi 6E support for the 6GHz band and increased range, a new report says. The latest Apple smartphone is expected to come with upgraded cameras, particularly the wide-angle lens, and expanded mmWave support to more regions.
A DigiTimes report cites industry sources to say Apple will incorporate Wi-Fi 6E technology into its new iPhones this year, and the technology is expected to become a standard feature of both iOS and Android smartphones in 2022.


5. The OnePlus Nord 2 5G is riding high on AI and AR:

there is a new OnePlus coming to town soon. And it comes from the Nord side. Yes, after the success of the Nord 5G in 2020 and Nord CE 5G launched this year, OnePlus is now bringing us the sequel of the original Nord, the Nord 2. Of course, as this phone comes from OnePlus, there is more to the Nord 2 5G than just an impressive spec sheet and eye-catching design (those are a bit of a given when it comes to OnePlus now).

  • Display
    6.43-inch


    Processor
    MediaTek Dimensity 1200


    Front Camera
    32MP


    Rear Camera
    50MP + 8MP + 2MP


    RAM
    8GB


    Storage
    128GB


    Battery Capacity
    4500mAh

    OS
    Android 11


6. Japanese Researchers Set New Internet Speed World Record Using Optical Fibre

In the abstract of the paper titled, Demonstration of World Record: 319 Tb/s Transmission over 3,001 km with 4-core fiber, researchers said that besides C- and L-bands that are usually used for high-data-rate and lang-haul transmission, the team also utilized the transmission bandwidth of S-band, which had remained underutilized beyond the single-span transmission.


7. Apple was the number three worldwide smartphone vendor in the second quarter of 2021, according to smartphone shipment estimates shared today by Canalys.


Apple's iPhone sales were surpassed by smartphone sales from Samsung and Chinese smartphone maker Xiaomi, with Xiaomi surpassing Apple and taking the number two spot for the first time.
Samsung was the most popular smartphone vendor with a 19 percent market share and 15 percent growth, while Xiaomi earned a 17 percent market share thanks to an 83 percent growth in smartphone sales during the quarter. Apple was responsible for 14 percent market share, followed by Oppo and Vivo with 10 percent each.
Xiaomi's growth is thanks to overseas business, with the company increasing shipments by more than 300 percent in Latin America, 150 percent in Africa, and 50 percent in Western Europe. Xiaomi is known for selling more affordable smartphones, and its average selling price is around 75 percent cheaper than Apple's iPhones.

Comments

Popular posts from this blog

Zero-day vulnerability: What it is, and how it works

A zero-day exploit is when hackers take advantage of a software security flaw to perform a cyberattack. And that security flaw is only known to hackers, meaning. Software developers have no clue about its existence and have no patch to fix it. This is why, when a zero-day attack is detected, it needs to be mitigated immediately. In other words, there are “zero days” to fix vulnerability because it’s already been exploited. Here, we’re zeroing in on the zero-day concept, including just what is a zero-day exploit, and how to avoid them. 1. Zero-day definitions: What is zero-day? The term “zero-day” refers to a newly discovered software vulnerability and the fact that developers have zero days to fix the problem because it has been — and has the potential to be — exploited by hackers. Sometimes written as 0-day, zero-day definitions run the gamut: A zero-day vulnerability , also known as a zero-day threat, is a flaw in security software that’s unknown to someone interested in mitig

All About Web 3.0

Article Duration: 15 min Now you can listen to this article via Spotify click on the player below: Imagine a new type of internet that not only accurately interprets what you input, but actually understands everything you convey, whether through text, voice, or other media, one where all content you consume is more tailored to you than ever before. We are at the tipping point of a new phase in the web’s evolution. Some early pioneers call it Web 3.0. Arguably, there are a few early-stage Web 3.0 applications that already exist today, but until the new internet becomes fully embedded in the web infrastructure, their true potential cannot be observed. Definition: What Is Web 3.0? Web 3.0 is the upcoming third generation of the internet where websites and apps will be able to process information in a smart human-like way through technologies like machine learning (ML), Big Data, decentralized ledger technology (DLT), etc. Web 3.0 was originally called the Semantic Web by World Wide Web in

15+1 Ways to Hack-Proof your Smartphone

If you’re wondering “how to block hackers from my phone,” or what you’ve come to the right place. In this article, we’ll cover seven easy-to-follow tips that will help you to protect your phone from hackers. Key Notes Keep up to date – and don’t open up holes yourself. Be careful of what you install. Review what’s already on your phone. Make it hard for intruders to get in. Be prepared to track and lock your phone. Don’t leave online services unlocked. Adopt an alter ego. Beware of open wifi. Lock individual apps. Get a warning when your phone goes walkies. Keep an eye on things behind the scenes. Keep Your Tracking and Remote Locking Settings On. Install Security Software Tools on Your Mobile Device. Be Judicious About What You Download and Install on Your Phone. Protect Yourself from SIM Swapping. Additional Tips on How to Protect Your Phone from Hackers. 1. Keep up to date – and don’t open up holes yourself: When it comes to protecting yourself against hackers, step one is always to