Sunday 3 March 2013

Volvo's permanent high beams keep other drivers in the shade  (slideshow)


Credit: Volvo/ Gizmag

Rather than dimming your headlights, why not cast a shadow to protect the drivers of oncoming cars?  That's what Volvo's new headlights do!

Works for cars you are following too.

One question though: what does the system do when there are many sources of light, as in a city? Perhaps a default shadow similar to a conventional low beam.

http://www.gizmag.com/volvo-active-high-beam-control/26445/     / dazzle dazzled car high beams dip headlamps potentially dangerous Geneva Motor Show Volvo Active High Beam Control mechanical system headlamps actively selectively shields oncoming cars being followed lights high beams continually dazzling suddenly darkened road illuminate road everywhere car approaching opposite direction approached behind see sides road confidently stay in control camera already installed rear-view mirror car detection auto braking system camera detects other car calculates area shaded 1.5-degree margin Active Beam Control system activates tiny cylinder different sized metal pieces shade selected area proper degree renewed Active High Beam Control technology enhance visibility Prof. Lotta Jakobsson, Senior Technical Specialist Safety at Volvo Cars Safety Centre /

Evernote resets user passwords after being hit by “coordinated” hack

Yes, Evernote's system has been hacked. No, there is no evidence that any data you may have stored with them has been compromised. Your passsword is protected by one way encryption, so the password reset is precautionary only.

http://arstechnica.com/security/2013/03/evernote-resets-all-user-passwords-after-coordinated-breach-attempt/     / 50 million users reset login credentials site's site security team detected security breach exposed password data other personal information security notice published Evernote precautionary password reset investigation evidence stored content being accessed changed lost breach breached advisory payment information accessed user information usernames cryptographically protected passwords e-mail addresses  accessed passwords stored protected one-way encryption technical terms hashed salted digital break-in technique more time-consuming to crack security team time breach passwords password weak weaker crackers crack cracking strong stronger precaution necessary precaution reset account sign signing in automated prompt site release releasing updates application applications app apps password change process /