Posts

Showing posts from September 27, 2020

Smart Mask for translating eight languages ​​made in Japan

Image
Smart Mask for translating eight languages ​​made in Japan The Corona Virus (Covid-19) epidemic has changed people's daily lives. One of those changes is the daily use of the mask. When the mask became a must-have item in daily life, a Japanese robot company took it as an opportunity. Donat Robotics has created a smart face mask using the opportunity. The mask not only covers the face but also translates into eight languages. The company said the mask was created to make it easier to communicate in situations where social coverage is required due to the coronavirus. The mask can amplify the user's voice and translate spoken language into eight different languages. The company's CEO, Taisuki Ono, said the mask was designed to be a standard face mask. He said it was important to make it easier to breathe, but that it was not a priority to protect against the coronavirus. According to him, it is made of white plastic and silicone. It has a microphone connected, which is connec...

Smart suitcase for the blind

Image
Smart suitcase for the blind IBM Tech has teamed up with four other companies to build prototype suitcases. This suitcase is a suitcase based on artificial intelligence technology. The company claims that the suitcase will guide the blind. The company has also partnered with companies such as Alpine, Mistubishi, Omron, and Shimizu to make smart suitcases. Behind it was a statue of IBM's Iko Asakawa, who himself is blind. This suitcase guides the visually impaired and the camera and sensors in it warn of obstacles in the way. A smart suitcase based on AI technology helps to reach the destination by scanning the user's current location and map data. The suitcase guides by speaking and giving the vibration on its handle. This way the user can easily find the shops on the way. According to the Next Web Report, this suitcase lets users know in advance about problems with the help of cameras and distance sensors. The number of blind people could reach 115 million by 2050, according t...

A headset to scare away a child

Image
A headset to scare away a child Virtual reality headsets have been provided in the hospital to reduce the fear of children. These headsets are worn on the ears of a frightened child when he goes to the hospital for treatment. A seven-minute film is shown wearing a headset before treatment. It shows a film by a rabbit who treats patients in the virtual world. The main purpose of using a headset is to reduce the anxiety of the hospital by showing the simplicity of the medical process in the child. The headset is on display at Dubai's longest-running Arab health exhibition. The child has a terrible fear of the hospital. Most children do not want to go to the hospital. They are scared of hospital medicines and needles. In such cases, medical treatment is difficult. But this headset has made it easier for nurses to draw blood and inject. The most stressful and frightening situation for a child and the process that reduces that stress was discussed at the Los Angeles Children's Hospi...

Three apps that teach programming

Image
Three apps that teach programming This is the age of technology. Now mobile and computer are in everyone's hands. These materials are also needed today. With such content, we can also make video calls and play games. It is possible to get such features from these materials only because of apps and software. Such software is created with the help of programming languages. Brothers and sisters, nowadays you are definitely using a mobile or computer. So it is important to know about such technologies. What is programming for you today? How is it prepared? And information about some of the apps that create programming languages. Programming language The programming language is how a computer works. Is a generated code. Many programming languages create such code. For example: c +, c ++, c #, java, python. Software is created only after writing more than a thousand lines of code. In fact, learning a programming language is difficult. It is also called the language of the future. But, it...

Round smartphone in 2020

Image
Round smartphone in 2020 The circular (circular phone) smartphone in CES 2020 has attracted a lot of attention. The US startup unveiled the smartphone at CES this week. The other product in the exhibition held in Las Vegas is a very diverse variety of products. It costs  $700. The 2G mobile phone with this type of design came earlier in 2016. The 3.5-inch round-shaped mobile has a nine-operating system with a touch screen. The mobile has a 13-megapixel camera on the front and back. Especially this mobile is made for people with small hands. This dual SIM mobile has the feature of 2 headphone jacks. It uses 2GB of RAM, 16GB of storage, and a 2,000mAh battery. According to Christina Sawyer, CEO of Circle Company, some work is being done to fit various other gaming apps into this circle. The Circle phone has a different system than the Apple iPhone and Samsung brands.

Facebook has introduced a feature to chat between Instagram and Messenger

Image
Facebook has introduced a feature to chat between Instagram and Messenger Facebook on Wednesday announced plans to allow Instagram and Messenger users to chat with each other. Instagram users will now be able to experience different types of messaging as soon as the new option is updated. Like Messenger, you can change the chat color, react through emoji, watch videos together, delete messages, and other features. At the same time, such users will have the option to chat with friends who use Facebook. Apple will provide the information. These features will be available in Instagram's inbox as soon as the user agrees to update. With Crush Platform Messaging Interoperability, users will be able to chat with their friends and family on the world's two largest social networks through the same messaging app and use other chat apps. According to Facebook, the new interoperability will work whether Instagram users have a Facebook account or not. Facebook plans to add its WhatsApp to t...

Photos of 'Couple Challenge' started appearing on porn sites!

Image
Photos of 'Couple Challenge' started appearing on porn sites! In the last few days, many trends have been running on social media in the name of the challenge. In which, as a couple challenges, users are posting photos with their partners on social media. In the name of Couple Challenge, users are disclosing their personal information. Based on this, there is a lot of risks that a hacker can target. Be careful if you are also posting a photo with your smiling partner on Facebook, Instagram, and Twitter including the hashtag Couple Challenge. This is not just a hashtag, but a web of cybersecurity experts hacking hackers to gather personal information. It's okay to take selfies. Posting it on social media can also be considered natural. But if you are posting your picture and personal information on a hashtag trend on social media, it may not be a challenge for others but a challenge to your own life. This trend is not only in Nepal but also in neighboring countries like Indi...

The number of free Linux learners has exceeded one million, will you take it too?

Image
The number of free Linux learners has exceeded one million, will you take it too?  Most of us know that Linux is an operating system like Microsoft Windows. As an alternative to Windows, most individuals and organizations are using Linux on computers and laptops. Its use is also increasing as Linux is more trusted than Windows in terms of security. Based on this system, the company has been providing various courses for free worldwide for a long time. It is mentioned that the number of trainees through the 'Introduction to Linux' training course conducted by the Linux Foundation has exceeded one million. The foundation has just launched a new course in the form of the sixth series. At the beginning of the sixth series of the course, the number of participants has been mentioned to have exceeded one million. The course helps the students to work in various distributions of Linux using graphical interface and commands. This course has been helping those who want to work in the IT...

Misuse of social media, falling into the trap of the law

Image
Misuse of social media, falling into the trap of the law Have you ever teased or humiliated someone using social media or electronic media? Or have you insulted someone electronically by saying yes? If you do, you may be subject to severe penalties. For the sake of fun, yes, he is my man. The 'Information Technology Bill 2075', which was introduced by the government in the federal parliament and has been under discussion since Wednesday, has defined such acts as a punishable offense. The government has presented the bill in the federal parliament to make electronic media decent, dignified, and systematic. The bill clearly defines the use of social media or electronic systems as a punishable offense to constantly harass or tease another person. Some are even prohibited from humiliating, discouraging, insulting, or reprimanding others. If such an act is committed, the offender will be fined up to Rs. 1 million or five years imprisonment or both depending on the amount of the offe...

Transfer Hotmail and Yahoo Emails to Gmail

Image
Transfer Hotmail and Yahoo Emails to Gmail  People used Yahoo and Hotmail a lot in the early days. But with the advent of Gmail, the use of these email services has been declining. If you've switched from Yahoo or Hotmail to Gmail, you probably have old data in those emails. If you want to transfer data from those emails to Gmail, here's an easy way to do that. Gmail is the most used email service in the world. Today, more than 1.8 billion people are using Gmail. It has features like Google Drive Integration, Email Schedule Feature, Advanced Search, Spam Block, Confidential Mode, etc. Let's get started with how to transfer data from any other email service to Gmail. From Yahoo to Gmail It's very easy to transfer data from Yahoo Mail to Gmail. To do this, you first need to login to your Gmail account on the desktop. If you're doing it over the phone, log in to Gmail in a web browser. After logging in, you need to go to Gmail settings. Click on the Account & Impor...

Photos can be a malware attack!

Image
Photos can be a malware attack!  How sensitive are you to the security of your device? If you are very sensitive, you will not open a file or attachment from anywhere so easily. You are always aware of the dangers of various types of cyberattacks such as phishing attacks or scams. Therefore, before opening or downloading a file, you need to make sure at the outset about the person and purpose of sending it. But even if someone sends you a picture, you pay the same attention to Rs Of course, when it comes to photos, you're not so focused on security. Just take the photo lightly and open it. Save to your album. But in reality, it is an unhealthy practice. If those images are also melancholy, the result is just as deadly. It damages your device and steals data. The latest example of this is the Instagram vulnerability revealed by the cybersecurity company Checkpoint this week. In which it was revealed that any crafted picture can hijack the entire Instagram account. However, Facebook ...

Chinese and North Korean hacker's 'transit' Nepal! Indian concern right or wrong?

Image
Chinese and North Korean hacker's 'transit' Nepal! Indian concern right or wrong? Indian media has published the news that hackers from China and North Korea have made a strong presence in Nepal and are spying on India. According to a recent report by Zee News India, Nepal's KP Oli government is becoming a hub for China's State Security Bureau, Beijing's Intelligence Army, and North Korean cyber and money laundering stage operations. In the news, it has been mentioned that the clear source of Nepal Hub has not been revealed by the 'official source'. Citing sources, North Korean hackers have been working with Chinese intelligence agencies to target the Indian system, disrupting the banking system, and stealing sensitive technology. According to the news, the hackers are trying to hack into the Indian system by injecting special computer programs like Icebug, Hidden Linux, and APT 12. It has also been mentioned that Chinese and North Korean hackers have be...

Easy to bring money for software export to Nepal

Image
Easy to bring money for software export to Nepal Nepal Rastra Bank has made it easier for companies and institutions in Nepal to bring home foreign currency due to their efficiency and expertise. The central bank has made arrangements for the remittance of foreign currency to Nepal from abroad by making it easy to repatriate online and e-commerce transactions. With this arrangement, it will be easier for those who bring money from abroad to stay in Nepal and make software. Earlier, when there was no such arrangement, companies working on software in Nepal used to bring money by showing various purposes and resources. Since most of the companies in Nepal have foreign partner organizations, they used to bring only the required amount here knowing that the work done here would be paid by the company abroad. Despite the recent increase in activities in the field of information technology in Nepal, businessmen have been saying that they have been hit hard by treating goods like exports to b...

Mobile device management system ready, delay in connection due to corona

Image
Mobile device management system ready, delay in connection due to corona In order to make the import, sale, distribution, and use of mobile sets systematic and effective, the software of the mobile device management system to be brought into operation by the Nepal Telecommunication Authority has been prepared. Although the software was ready for the system, which is being constructed at a cost of Rs. NEA spokesperson Min Prasad Aryal said that technicians had to come from Malaysia for additional equipment and its connection but could not come due to the coronavirus. The contract was awarded to a Malaysian company. After the operation of this system, which is accessible to the Customs Department, Nepal Police, and NEA, those who import mobile sets into Nepal should register at the beginning. After putting the IME number there, it is found out whether it is genuine or not according to the database taken by NEA from GSMA. NEA will allow import only after the genuine is set. The NEA is con...

Here are 10 things not to do when entering a password

Image
Here are 10 things not to do when entering a password Many apps and devices require passwords for security. Remembering passwords is not an easy task. It is not possible to keep so many passwords in a copy. We use words that make it easier for us to remember passwords. However, technology experts say that such a simple password is not good or secure for apps and devices. So how to keep your password secure? According to the tech-savvy Indian newspaper Tech-Hindustan Times, the following should be kept in mind when entering a password: 1. Never use the same password on multiple apps or devices. Because if someone hacked one of your apps or devices, they would try to use the same password on others. And, with the same password, everyone has access to it. 2. You should not enter your first name password. The names of parents, siblings, or relatives should not be used. These passwords are easy for others to find. 3. Never use your credit or debit card PIN number or your phone number. 4. Do...

Run WhatsApp? Learn the safe way.

Image
Run WhatsApp? Learn the safe way. WhatsApp is an easy messaging app. Messages are considered quick and easy to make calls. Its use in Nepal has been increasing lately. Lately, insecurity has been increasing in online messaging platforms. Such platforms are as safe as they are handled with care. It is also very safe to take a little precaution easily. 1 Make your profile visible only to those in your contacts WhatsApp allows only those on your contact list to view your profile. To do this, go to Settings and click on Account. Then go to privacy. Once there, there is an option called profile photo. There are three options to see who can see your profile photo. From there, choose 'My Contacts'. This will prevent users who are not on your list from viewing your profile. 2 Block people who don't want to chat We have saved many people's numbers on mobile. But with all of them, we may not want to chat and call on WhatsApp. The number given or taken for personal and temporary w...

how to connect your Android phone to a computer

Image
Here's how to connect your Android phone to a computer Microsoft's Windows Ten computer operating system has a feature. Which lets you connect your Android phone to the computer. In other words, even when the mobile is missing somewhere, it can be updated in the notification of messages and other things coming to the mobile from the computer. For this, the user has to download the Microsoft application called Your Phone on his mobile. The Android phone that supports the app can be connected to the computer. In this way, after connecting the phone, you can reply to the message coming on the mobile. Photos and files in the mobile app can also be moved to make and receive calls. That is, control of mobile from the computer is possible. What to do for this? Search your phone in the search box of your computer and laptop and click on it. Then choose the phone app and sign in to the Microsoft account. Similarly, download your phone campaign app on mobile. After opening the app, sign ...

Photoshoot in space at a cost of Rs 10 million

Image
 Photoshoot in space at a cost of Rs 10 million American beauty company 'Estee Lauder' is going to launch its new skincare product in space. The company is going to take such a big step for the photoshoot of the new product. The company is preparing to fly ten bottles of its 'Skin Serum' to the International Space Station. For which the company is spending more than Rs 10 million to NASA. According to the Indian newspaper Hindustan Tech, after the products reach space, the astronauts will take photos at the Kapola Control Tower. These photos will be posted on social media later. It is said that one of the ten bottles that have reached space will be put up for auction. With the global epidemic of Covid-19, companies are now launching their brands in a creative way. Many large companies are spending less on old-fashioned advertising and are looking for new ways to attract customers. In this way, 'Estee Lauder' has become the first beauty brand to go into space. Ac...

small robots that can jump and fly like insects and grasshoppers

Image
Small robots that can jump and fly like insects and grasshoppers! Jane Tamil, an assistant professor at Carnegie Mellon University in Pittsburgh, is busy with her lab. She is looking for some questions and answers. His question is - do you need a big robot for big work? Does being big in size mean that the machine is powerful? Are small robots capable of doing the same thing as humans? And is it possible to make a robot that can swim mainly in water, fly in the air and even jump on the roof? Searching for the answer to all these questions, she will soon find the answer. Because now robots shaped like insects and grasshoppers are being developed. Jane believes that small robots can be useful in medical use. She says it can also be useful in drug distribution and general surgery. Small robots can be very helpful to humans in any mine, in search and rescue. "If you have a small insect-sized robot, it will help you do your job easily and safely," Jane told CNN. Small robots work ...

The little girl helped Google find 7 bad apps

Image
The little girl helped Google find 7 bad apps A little girl from the Czech Republic has helped security researchers find seven bad apps in the Google Play Store and Apple App Store. These apps were 'adware apps' featuring wallpapers, music, and other entertainment on mobile. The 'adware app' shows unnecessary advertisements on the mobile and there is a problem to remove it from the mobile after downloading. A little girl discovered a similar app that was being advertised on Tiktak. Security investigators then removed six other bad apps with his help. These apps were especially targeted at children on social media such as Instagram and Tiktak. From there, the little girl found out and informed the Czech Republic's project called 'Avastko B Safe'. Avast is educating children about being safe on online platforms. Avast checked the app after receiving the information. The app was found to show ads on mobile phones and charge users between two and ten dollars to ...

Now new emojis are coming to the keyboard

Image
Now new emojis are coming to the keyboard Nowadays, if we have to send a funny message to someone, we don't just send the word 'message'. Emojis are attached to messages. Lately, emojis are more popular than word messages. We express our feelings through emojis. There is good news for those who enjoy emojis more than words. According to Unicode Consortium, a non-profit organization that sets and monitors emoji criteria, new emojis are now being added to keyboards. The consortium is releasing more than 200 new emojis at once. The consortium said in April that no new emojis would be released until 2022 due to Covid-19. However, the company says the new emoji, which is about to go public, is normal. The emoji is often used to reflect the time of year. One of these is a heart-shaped emoji. Another heart has a fire emoji. The use of which can be expressed mainly jealousy and grief. Currently, the emoji on the keyboard can only be seen in yellow color, a picture, or a pair of peo...

1 hour limit for free Google Meet users

Image
1 hour limit for free Google Meet users Millions of people around the world are still working from home due to the coronavirus epidemic and various restrictions. Video conferencing platforms are becoming very helpful to make work from home easier. Along with Zoom, Google's Google Meet, Microsoft Teams, and Facebook Messenger's Messenger Rooms are becoming very popular. Keeping in mind the interests of millions of working people around the world working from home, many video streaming platforms are providing maximum service for free. Search engine company Google has also been providing its Google Meet service completely free of cost. Google Meet allows users to have video conferencing for as long as they want. But Google is shutting down such unlimited free meetings from September 30. After September 30, free Google Meet users will be able to have a maximum of 60 minutes of video conferencing. After September 30, free users will be able to make video calls for only 60 minutes at...

Record downloads of TikTok and WeChat in the US before closing

Image
Record downloads of TikTok and WeChat in the US before closing The US government has been ticking and debugging Chinese apps in the US since Sunday Restricting download. The popular WeChat and TikTok apps in the US will not be available on the Google Play Store and App Store from Sunday, and US users are already in a hurry to download these apps. The TikTok app was downloaded 247,000 times in a single day in the United States on Friday, up 12 percent from Thursday, according to the Sensor Tower, a website that tracks mobile apps. Similarly, the download rate of Vichat has increased by 150 percent on Friday as compared to Thursday. WeChat has been downloaded 10,000 times in the US on Friday. This is the highest number of downloads in a single day since October 2019. Among the free apps available on the iPhone in the United States, WeChat jumped from 1385th place on Friday morning to 100th place by Friday afternoon. This is the first time this year that it has managed to be among the top...

Have a habit of forgetting passwords?

Image
Have a habit of forgetting passwords? Do this. Remembering passwords is probably the biggest challenge and hassle for everyone these days. There are many passwords from social networks like Facebook, Gmail, Twitter, Instagram to a digital wallet, and mobile banking. If one account is hacked, you need to have a different password to keep the other account safe. For security reasons, passwords need to be changed from time to time. This makes it difficult for anyone to remember all those passwords. In this case, you must have the experience of having to enter a new password from the forgotten password option when forgetting the password. There are some platforms (especially in Nepal) where you can create a new password from the forgotten password option like an iron Chura. You can find many such password manager apps that eliminate this kind of hassle. But today we are telling you about an app that you can use for free. When you search for a password manager in Google Play Store, you will...

iCloud is safer than Facebook for photo sharing

Image
iCloud is safer than Facebook for photo sharing You may have taken a lot of photos on your smartphone. Of course, you want to share those pictures with friends and family. Many people use Facebook and Instagram to share their photos. But many have been caught in data scandals this year. People are worried about their privacy after the Cambridge Analytica earlier this year and the hack in October 2018 affected 30 million people. Those who consider their photos to be sensitive personal data are even more afraid to upload photos to such sites. There are other means of sharing. In this article, we are writing about the security of sharing photos from iCloud. If you have an iPhone, you can be largely free from security risks. Instead of Facebook or Instagram, you can share photos with your friends and family from Apple's iCloud. Built-in the cloud that only works for Apple devices, it also works for devices other than Apple on the web. The biggest advantage of using iCloud is that it is...

How easy is it for the police to access the encrypted chat of WhatsApp?

Image
How easy is it for the police to access the encrypted chat of WhatsApp? After the death of Bollywood actor Sushant Singh Rajput, an investigation was started against his girlfriend Riya Chakraborty on the issue of drug use. The Bureau of Narcotics Control is now looking into the possibility of a suicide investigation into drug abuse. Meanwhile, Bollywood's A-list actress Deepika Padukone is also using cannabis like hash and weed, according to her WhatsApp message. As the news came out, people began to question how easy it was for agencies to access our WhatsApp messages. We have made it clear that we will provide end-to-end encrypted messaging services with privacy in mind. How did Deepika Padukone's chat get leaked? After the death of Sushant Singh Rajput, it was revealed that many Bollywood actors were using drugs. The link was with Sushant Singh Rajput's former talent manager Jaya Shah. Jaya Shah was also investigated in the ongoing investigation after Sushant's deat...

Happy Birthday, Google!

Image
 Happy Birthday, Google! Today is the 22nd birthday of Google, the world-famous search engine. Google has created a special kind of doodle for its special day. At first glance, this Google doodle looks like a birthday party from the 1990s. The doodle includes all of Google's alphabet. In which the first letter of Google is shown in front of the screen of a laptop and the remaining five letters are shown in a frame. The search engine Google was started in the year 1998. It was developed by Larry Page and Sergey Brin, two Ph.D. students at Stanford University in California, USA. Larry Page and Sergey Brin named Google Backbarb before it was officially unveiled. Over time, its name changed to Google. From which the world has become familiar with it now. It was developed as a means of sharing all kinds of information on the Internet around the world. For years, Google's birthday has been celebrated on different dates. Google's birthday was celebrated on September 7, 2005. Even ...

Labels

in Facebook of What a phone and mobile This on you are smartphone Do internet Android IT workforce Nepal app your robot from iPhone Machine Learning Python use will company computer for account can data does password twitter with Apple these Instagram Whatsapp YouTube digital feature media not Tiktok like machine new ChatGPT China be by free why an out people search website without work Future India ML corona features find online or public that video Elon Musk Microsoft One apps has information million social user users way year Intelligence Laptop US billion education history home make market protect service Bitcoin Have Machine Learning Future Nepali Now Operators Scientists Wi-Fi Windows chrome code cyber download hacking money network photos tips videos world Amazon Artificial Intelligence Future Avoid Cryptocurrency If Know Learning TV Things artificial being browser human malware many need netflix photo smart software study system there update which 10 15 Beginners Buy Deep Learning Here Privacy Who about battery business chat digital marketing down hacker marketing millions number phones security sent virus want when work force Agriculture Bug Deep Did Earth GPS Gmail Google Maps Kaggle Keep NASA RAM Top Windows 11 World Cup Xiaomi address after as at camera career cloud dangerous difference drive earn easy email going job jobs language life look may message news old open price really search engine settings storage store such two used version watch windows 10 working 14 2020 2022 4 5 6 7 Cambridge Dark Web GB GPT Global Health-care Lite Messages More Oppo Pakistan PayPal Print Pro QR Risk SEO Samsung So Some TensorFlow Than Tutorial Type Types Vision Ways WiFi Zoom advertising also attack been best better biggest blue brain change chip comments country created cyber attacks electricity eyes fake files first football function game get go government hacked hackers hidden hours image install lost medical misused monitor moon once pay percent play problem processing program quantum robots scan science send share signal space stay story take their them thousands time tricks up using water web where while wireless workers 000 5G AI Education Alan Musk America Analytica Applications Army Blockchain Bounty CCTV COVID-19 Chat GPT Choose Clean Close Clubhouse Computer Vision Content Crypto DL Developer Docs Electric Explain Factory Finally Gemini Google chrome Google drive Healthcare Help I IBM Keras Kernels Large Lifestyle Looking MDMS Mac Maps Models Musk Natural Ncell Net Notebooks PC Preparing Reasons Russia SEE SIM SMS Save Scikit-Learn Skills SpaceX Stephen Hawking Telegram Tesla Theme Therefore Thinking VPN Variables Word WorldLink ability accounts ads airplane all any available aware background bandwidth bank beneficial between blocked bring bully cable call captions capture care cause charge chatbots check come coming companies complete computers consumption copyright corona-virus courses create currency cyber security dataset datasets days delete deleted deleting details developed device dislike doctor documents doing domain don't due during dynamic energy engine engineer engineering exactly found fraud full gadgets games getting given good got guest handle his humans iOS iPhone 14 iPhones important including increase industry its keyboard launch law learn listen live manager map meaning megapixel memory messenger mind mode model month months movies much name nonsense nuclear opening over own phishing physics porn post posts prevent problems product production programming protection quickly real-world reduce reward robotics run safe same scandal show site smartphones sold someone speaking spyware stuck students subscription systems target techology television tick today topics torrent traffic trillion universe upload verification voice war was weakest women worldwide years & 'Buy the Dip' 'HDR' 'I' 'Mr. Beast' 'Professional Mode' 'football intelligence' 'hidden' 'refill station' (IoT) (LLM) (NLP) 1 100 10:10 10th 12 145 16 17 19 2 200 2007 2024 25 35 3D 40 4000 48 4K 5 P's 60 7 C's 8 @everyone on A17 AI Tool AI ethics API AR Adjust Adobe Adopt Adsense Adsense Supports Africa Alexa Ali Baba Altman Amazon Jungle Amazon Prime Ambani American Anaconda Android 11 Android TV Android phone Annoyed Appoints Arithmetic Art Art through NFTs Artficial Intelligence Artificial neural Artuficial Intellegence Ashika Tamang Assignment Assistant Astronauts Astronomy Atrificial Inteligence Attacks Audiobooks Augmented Reality Australia Auto-GPT AutoML Avatar 2 Bachelors Banned Bard AI Because Before Bernie Sanders Big data BigQuery Bill Gates Bitwise Blind Blockchain Developer Blockchain Technology Books Brave Brave Browser Brazil C charger CPU CPU temperature CTEVT CV Cases Casting Changed ChatGBT Chery Chinese Citroën C5 Cloud Factory Cloud Factory Nepal Club House Colab Command Comparison Compute Concatenate Contactless Contactless payment system Copilot Couple Challenge Crash test Create your first Project on Python Crossover Cup DNS DRS Gaming Dark mode Datalab Deep Fake Deep Learinig Deep Learning with Python Deep Neural Networks Deepfake Demat Dept Development Development in predictive analytics Didn't Digital avatars Discontinuing Do not Dodge Dogecoin DuckDuckGo E-task EA ETF EU Earbuds Earth 2 Earthquake Edge Computing El Salvador Elected Electric Vehicles Electrical Elon Embedded Application Embedded Application (EA) Emoji Estimators Ethical Hacking Euro NCAP European Even Everyone Evolve Explained Explosion Express WiFi FPS Facebook Messenger Facebook's Facets Fears Federal Reserve System Finance Firefox FiveG Fixed wireless Follow Forge Fraud Call Freefire Freelancing GIF Git Gold Google Chat Google Cloud Google Meet Google Play Music Google Plus Google Plus code Google Workspace Google search Green room Greenroom. Spotify Guest Mode HDMI Happy Birthday Health sector Here's Holi Honest Honeygain Huawei Hyundai ID IMD IP ISP Identify Implementing Includes Increasing Indonesia Inflation InfoSec Input Inspiration Installation Integrated circuit Intel Intelligent Internet of Things (IoT) Introduction Iranian Island Isn't JBL JPG JPMorgan Chase & Co Jack Ma January Japan JavaScript Jio Joker Virus Jungle Jupyter Jupyter Notebooks Keys Korean LAN LLM LP Large Language Models Launch of better autonomous systems Lee Kun-hee Library Line Linux Logical Lucky MDMS Nepal ML Engine MSN MaAfee Mark Zuckerberg Max Meet Membership Mero Share Metaverse Microsoft Office Microsoft Teams Military Military weapons Mobile Operating System Module Mouse Mukesh Ambani Music Must NEA NFT NFTs Natural language processing (NLP) Nepal. radio mapping Nepali businesses Nepali game Nepali youth Nepalis NetTV Neural Network Neural Networks New Technology No Nokia North Korea Note Object Detection Open-source Opera Operating PDF PNG PPT PUBG Pandas Paytm Pendrive Photoshoot Pi Network Pip Plan Play Store Pokémon Pokémon Go Police Premium Preparations Prerequisite Prime Pro's Process Process discovery Pycharm Pyenv Python Programming Python Tutorial Python Tutorials Python for Beginners Python on Windows Quick Draw RCS Race Radically Ransomware Rashtra Bank Reboot Recommender Recommender Systems Redmi Reinforcement Reinforcement learning Reliance Reliance Jio Remove. bg Revolution Rice that grows for years once planted Rises Robot Sophia Roles Ronaldo Routine of Nepal Banda S&P 500 S&P Global Ratings SD Scale Scaling Scikit Screen Pinning Selection Seven Shorts Singapore Sitting SixG Snapchat Sophia South Korea Space X Spam Stable Coin Starlink Steve Jobs Stock market String Success Sun Sundar Pichai Supermarket Supervised Supervised Learning Supervised Machine Learning Supply Chain Attack Supports Swift TIFF Telecom TensorBoard TensorFLow Hub Thes Tiktok stop Time Travel Tool Training Data Transforming Trojan Truecaller Trump Trusting Type-C US Congress USA USB United States Unnecessary Unsupervised Unsupervised Learning Unsupervised LearningUnsupervised Machine Learning Unsupervised Machine Learning Upcoming Upcoming Technology Urges Using a drone VPNs VR Vehicles Virtual reality Virtualenv Visualize WWW Wait Walkthrough Walmart WeChat Wha What are Assignment Operators in Python What are Comparison Operators in Python What are Logical Operators in Python What are Operators in Python What are the basic laws of quantum physics What is What is Chat GPT What is Google Adsense What is Pycharm What is Python What is String in Python What is Variable in Python Whose Wi-Fi 6 Wikipedia WordPress Wrangling data Write X8 series XAI XOR XSS Ziglar Zipty Zuckerberg admin advertisers again age agency agricultural ai beauty air aircraft aired alert algorithm almost along alpha alternative analytics ancient angles announcement announces another answer answering antivirus anyone anything appear appearance appliances approaching approaching science meaning apps. google article artificial blood vessels arts associated attention audience automatic automatically autonomous avatars back backed ban bans bar basic batteries becoming beginner benefit benefits bitcoin mine bitcoins black block boarding bogged book bought box brand break brings broadband brought browsing bug bounty build but buttons buying bypass cable internet cables calculus calls cameras campaign can't cancer cannot car cards careeer carry cave center challenge channel charger charging chat.com cheap checkmarks chess child children choose. a class clicking climbers clock club coding colleges color combat common communicate compensates compete competing computer mouse computer science concept connect cons control controls controversies could countries credit crisis criteria crore crores crowdsourcing culture cyberattack d about damaged danger dark data center data science dating apps day debit dedicated delete data depression destination devices diary die different digit digital cameras digital land digital privacy disappeared discovered discovery displaced display document dog dollars doodle door downloads dream drone drug trafficking e features e-Rupee e-books e-passport e-sewa eBooks ePassport each earn money from Nepal easier eating economy edit effective electronic else email server emails emerged emergency emojis employee employees end enough espionage etflix ethics except excessive excuse existence expected expire extracts eye face app facial verification facts family far farm fax fdown.net fee feet fiber fight file film final five flying foldable food footprint forced foreigners forever forget forgotten form formats foundation free upgrade frequency freshman from search fruit game tips gamer gas geometry gets gives glasses goes good content goods google docs gossip granted great groups growing had hall hand handy happen happy harmful he head headphones headset heater hobby human brain human intelligence human trafficking hundreds hurting hydrogen hype iCloud iPhone 12 Pro illegal data illicit trade image processing processor impair inbox incidents income increased incur insecure instrument interest internal storage internet speed into intranet introduced invented invention invest investment invites jack join journalists journey kit known laboratory lakh languages last later latest launched launching lawmakers laws leak leaks legalize let letter letters light likes link lives loaded location locked longest lose loss love machine vision made main main features makes man manage management system mango marketplace martial mask matches measuring meetings melting meme meta microphone middle million. downloads mine mistake mistakes mobile number moble moment monitors most mountain move movie moving mute name-x naming near necessary neural neural networking new code new look new windows news anchor night mode non notes notifications now.gg nuclear energy obscene official offline open source opened operate operated operating system opposed optic optical fiber optimization option other others outbreak oversold owner page paid pandemic paper participant participate passports password. passwords patent pattern paying payment pen drive permanent permission person personal phone confidential picture pictures pirated placed planting platform platforms political popular popularity port possible practice predictive pregnant prepared principles private prize processor product key programmatically programming languages project prompt property pros protected proxies proxy quantum computer quantum internet quires quota r daily radio rain rainy season rate reach reading ready real reason rebranding record recovery reform refresh refrigerator regarding registered registration regulators relationship released remain remove removes removing replace report requiring reset residence resolution responsibilities restaurants returned revenue review rings risks risky road robotic dog rocket room rooms round ruin rules running safely safety sale satellite saving say saying says scary schedule scheme schools screen screens search engines searched secret secretly secure selectric cars selfie sell semi-final semiconductor sending series server services shared ships shocked shortage should shoulders shuffled shuts shutting sidebar simple since sites sky sleeping smartblock smartly social engineering hacking software. tech solve somewhere soon source sources space center space debris spaceships special spectrum speed spend spending sponsors sports spying star starship start starting starvation steps stocks stolen stop stories strategy streaming student studying subject subscribers suggested suggestions suitable suitcase surface surprised t are tag tagging talent talk teach team technlogy technoloy technonlogy telecommunication terminology test text they think thousand thread threat to through throwaway timer tinder toilet too took topic tossing touch pad tracking trackpad trading transact transport travel trending trends trip turn turns tweets unbuyable unemployed unemployment unpleasant unregistered unsafe unseen upgrades useful uses various very view viral virtual virtual currency virtual world vishing visit visiting vulnerabilities warning waterproof weapons web design websites week well went were wet willing woman works workspace world war worrie worth written wrong young
Show more