Twitter Officially Giving 280 Characters To Tweet

Yes you heard right, now Twitter is not limit to 140 characters its increase up-to 280 characters. Twitter is the biggest Social networking website is expanding its character limit.

We – and many of you – were concerned that timelines may fill up with 280 character Tweets, and people with the new limit would always use up the whole space. But that didn’t happen. Only 5% of Tweets sent were longer than 140 characters and only 2% were over 190 characters. As a result, your timeline reading experience should not substantially change, you’ll still see about the same amount of Tweets in your timeline. For reference, in the timeline, Tweets with an image or poll usually take up more space than a 190 character Tweet, said in blog.

Support Languages:

Twitter said that those who tweeted in languages like Japanese, Korean and Chinese were able to express around double the amount of information in a single character, compared with users who spoke English, Spanish, Portuguese or French, for example.

Uber AI Labs release Pyro- A Deep Probabilistic Programming Language

UBER PyroIn order to Achieve the goal of providing transportation that is reliable to everyone, it requires optimization and effortless prediction at every turn that comes the way. Where, the opportunities and challenges range from matching drivers to riders to suggesting routes, finding sensible pool combinations, or even creating the next generation of intelligent vehicles, to find a solution to these, Uber comes up with the combination of a rich expertise of data scientists, engineers and other users with inculcating the techniques of artificial intelligence (AI). “We are exploring a tool-first approach that will enable us and others to make the next generation of AI solutions.”, Says the Uber Team.

After sharing the fruitful outputs of its research into both artificial intelligence and self-driving cars in general, Uber is now releasing a new programming language called Pyro, a flexible, scalable programming library built on PyTorch that aims in helping the developers to create probabilistic models for research in AI and is a tool to unify the best of Bayesian modeling, modern deep learning, and software abstraction: It is truly a universal, modern, and a deep probabilistic programming language we can say.

Pyro, that is the first public project released by Uber AI Labs, was designed with a motive to make it easier to train computers to infer outcomes. “Pyro is a tool for deep probabilistic modeling, unifying the best of modern deep learning and Bayesian modeling,” wrote Noah Goodman, the member of Uber AI Labs.

The Notable four design Principles that were kept in mind to be satisfied during the creation of Pyro, that is an alpha release were:

  • Universal: The language is a universal PPL that means that it can represent any computable probability distribution.
  • Scalable: It scales to large data sets with little overhead when compared to hand-written code.
  • Flexible: The language aims for automation when the user wants it and control when needed by the user. This is accomplished through high-level abstractions to express generative and inference models, while, on the contrary allowing experts easy-access to customize inference.
  • Minimal: It is maintainable, agile and is implemented with a small core of composable, powerful abstractions.

Pyro is said to touch on interesting aspects in PPL research may it be dynamic computational graphs, deep generative models or even programmable inference. By open sourcing Pyro, it is expected that the scientific world gets encouraged to collaborate on making AI tools more flexible, open, and easy to use. Also, it is hoped that the current version of Pyro, to all the probabilistic modelers who want to leverage large data sets and deep networks, will turn out be of most interest.

Since Pyro is still in its initial state, and Even though, it is still useful for research, when we talk about improvement and changes in the programming language, it is expected to change very rapidly as it is further engaged with deep learning and communities the probabilistic programming. The Possible directions for improving and extending Pyro are many, but their highest-priority directions Include:

In the Long term, it is hoped that the crucial directions of the development of Pyro will be driven by the priorities and applications of the emerging Pyro community. Now, All that is yet to see is where Pyro will come to fruition.

About Artificial Intelligence

We now understand how very complex and even apparently intelligent phenomena, such as genetic coding, the immune system, and low-level visual processing, can be accomplished without a trace of consciousness.

But this seems to uncover an enormous puzzle of just what, if anything, consciousness is for. Can a conscious entity do anything for itself that an unconscious (but cleverly wired up) simulation of that entity couldn’t do for itself?

~ Dan Dennett

Nintendo Revealed Why There Are Holes On Famicom Cartridges

Famicom cartridges are much different from their American counterparts, but there was one particular difference that has been a mystery for years. Instead of indentations that were used to snap the cart in place, Famicom cartridges have holes. Surprisingly, this is something that Nintendo never explained, until now. In an interview with Japanese website Afternoon News, they revealed that the Famicom cartridges had holes on the top because “they were just part of the design”. Here’s the conversation in full:

Afternoon News: ‘I believe there are holes on the top of [Famicom] cartridges. Do you know what kind of meaning they had?’

Nintendo: ‘Yes, to be honest, they were just part of the design.’

Afternoon News: ‘Um, these aren’t holes made during the molding or the assembly?’

Nintendo: ‘That’s correct. They’re just [part of the cartridge’s] design.’

Afternoon News: ‘Then, the holes on the front and the back of Irem’s cartridges are also design?’

Nintendo: ‘That’s correct. Similarly, that’s the design.’

Is Sex Really Exercise?

You don’t need a scientist to tell you that sex can be a full-tilt, sweat-drenched workout. But how many calories does a good romp really burn? In a recent study, researchers at the University of Québec at Montréal measured energy expended during sex versus running, and found that we get our hearts pumping and muscles cranking enough during sex for it to be considered moderate exercise.

The researchers recruited 21 healthy, active, heterosexual couples in their early 20s to jog on treadmills at about 65 percent of their maximum heart rates for 30 minutes. While running, they wore lightweight armband monitors that measure energy expenditure in calories and exercise intensity in METs, or metabolic equivalent of task.

Next, the couples were asked to have sex once a week for a month while wearing the same armbands to track their calories and intensity during sexual activity. The duration of the sex varied, but the average session across all couples for the month was about 25 minutes.

On average, the men burned 9.2 calories per minute while jogging (or about 230 calories for a 25-minute jog) and had a mean intensity of 8.5 METs, compared to 4.2 calories per minute (105 calories per session) and 6 METs during sex. Women burned a little less, logging 7.1 calories per minute and 8.1 METs on the treadmill, and 3.1 calories per minute and 5.6 METs during sex.

Unsurprisingly, jogging for a half-hour taxed everyone’s bodies more than having sex – but the researchers were impressed at how much energy these people exerted during sex. According to study author Antony Karelis, the participants burned enough calories and reached high enough intensities for sex to be considered “moderate intensity” exercise, the equivalent of walking briskly. While it’s not on the level of doing wind sprints or 30-lap pool sessions, sex can be a legit form of exercise, says Karelis.

Sex is good for you, but it isn’t always exercise: Karelis points out that sometimes sex isn’t hot and heavy and doesn’t always last long, so you can’t count every quickie as a moderate workout. “Sex should not replace regular exercise,” Karelis says. “Rather, sex and exercise should both be incorporated into your routine on a regular basis. Studies show that each improves health, so the combination of the two leads to a greater quality of life.”

Microsoft ends support for Office & Outlook 2007, users encouraged to upgrade

Starting this week on October 10th, Microsoft’s Office 2007 suite of programs have begun to transition out of support and users are being encouraged to migrate to either the Office 365 service or Office 2016.

One of the major reasons for users to upgrade is the discontinuation of support for the RPC over HTTP (Outlook Anywhere) protocol which is currently used in Outlook 2007 to communicate between Outlook for Windows and Exchange. The reason for the discontinuation of support for this protocol is because its successor, MAPI over HTTP, boasts significantly higher levels of security and allows for multi-factor authentication in Office 365.

“MAPI over HTTP was not backported to Outlook 2007 or earlier versions. If you’re using Outlook 2007, you will be in an unsupported state on October 31, 2017. If you want to continue to access Exchange Online mailboxes through the Office 365 portal (, we recommend that you move to a current version of Outlook that is under mainstream support, or use Outlook on the web,” the official Microsoft faq recommends. “Additionally, make sure that you don’t have any Outlook add-ins or third-party apps that rely on the RPC over HTTP protocol to connect to Office 365 data.”

Still using Windows 10 version 1511? Upgrade it to a newer release before October 10

Microsoft is currently busy with the development of the Fall Creators Update, the next Windows 10 release. Although Windows 10 is the last version of the Windows operating, the older versions of Windows 10 will be soon no longer supported. As a result, you will need to upgrade your machine to a newer and supported version of Windows 10.

When Microsoft announced the Windows 10 Creators Update, the company also confirmed that the first Windows 10 feature update ‘November Update’, version 1511 will reach the end of servicing on October 10, next week.

Microsoft recommends that the users should upgrade their machines to a newer version of Windows 10 operating system, otherwise the machines will be vulnerable to hacks. Microsoft still continues to offer updates to the original version of Windows 10 and it is likely that the Windows 10 version 1511 will still be updated but it wouldn’t be the company’s priority.

Microsoft has also revealed that the Windows 10 version 1511 end of service impacts the following editions of the operating system:

  • Windows 10 Home
  • Windows 10 Pro
  • Windows 10 Education
  • Windows 10 Enterprise

If you are still using the older version of Windows 10, you should upgrade your machine before October 10. You can head to Settings > Security & Updates > Windows Update to install the latest updates. Alternatively, you can download the ISOs and perform a clean install.

Windows 10 Fall Creators Update is coming on October 17 with major improvements such as Fluent Design. Microsoft is improving Windows 10 with every new release and it is recommended that the users should keep their devices up-to-date.

What She’s Actually Thinking About During Sex

The most prevalent thought for both men and women during sex is a fairly obvious one: “How am I doing?” But this question leads to very different thought processes for the sexes. “While you’re worrying about how long you’ll be able to last, she’s worrying that things are taking too long on her end,” says Emily Morse, a sex and relationship expert and host of the top downloaded podcast Sex with Emily. You can thank the orgasm gap: While the average man reaches climax in about five to seven minutes, a woman, on average, requires at least 20 minutes of direct stimulation. But there’s more to it than that. Here, taken from the experts, are some of the more prevalent thoughts you could expect her to be having.

“Am I taking too long?”

Many women worry that they’re taking too long to reach orgasm and/or that their partner will orgasm before they do. “Women sometimes take longer to get aroused and therefore take longer to orgasm, particularly if they aren’t receiving enough persistent, direct clitoral stimulation — otherwise known as the orgasm gap. Promescent, an OTC spray, is one way men can extend their latency time and prolong intercourse, particularly if they have a partner who generally takes longer to reach orgasm than they do (which is most men),” says Ian Kerner a psychotherapist and sexuality counselor.

Jack, her more handsome co-worker.

Women fantasize more than men do during sex, and many don’t fantasize about the act they’re engaging in or the person they’re having sex with. “This isn’t because they’re bored or disinterested — rather, it helps to quiet the parts of the brain that are associated with anxiety and outside stressors. It’s been shown that women, unlike men, need to turn off parts of their brain in order for the rest of their body to turn on, and fantasizing — even if it’s not about you — is a great way to do that,” says Dr. Kerner.

Flaws with her own body. 

Women in general suffer from an epidemic of body-image dissatisfaction. Too many women feel as though their bodies are flawed. During sex, rather than focusing on what they are feeling, they worry about what our partner thinks of our body: Does s/he see this wiggle here, this stretch mark there, the way my boobs flop over there? “We try to hide our body (only having sex in the dark, keeping clothes on during sex, only getting undressed under the covers), sometimes we avoid having sex in positions that could be unflattering, etc. All of this compromises a woman’s pleasure because when our heads are filled with worries and anxieties, we aren’t present in the current moment. When we are busy worrying about how to position the sheets in a way that will flatter our belly or hide our thighs, we aren’t attuned to the pleasurable physical sensations of our partner’s touch, and this can interfere with our ability to derive satisfaction from the sexual experience,” says Alexis Conason, Psy.D., Licensed Psychologist (

Your scorecard.

“During intercourse women often think about their man’s performance, what he’s doing that feels good and what doesn’t,” says Dr. Fran Walfish, Beverly Hills child, parenting, and relationship psychotherapist, author, The Self-Aware Parent, and co-star of Sex Box on WE tv. Frequently, women (and men) fantasize about other people and various behaviors that titillate and excite their fire. “Although I am a proponent of open, honest, direct communication, I strongly urge people not to tell their partners their personal bedroom fantasies during intercourse. All it does is fuel jealousy, rivalry, competition, and low self-esteem in your partner, creating a wedge between you and your beloved.”

When it’s going to end. 

“This is especially true when they weren’t really into it in the first place, but agreed to engage, hoping that they would get in the mood,” says Rhonda Milrad, a relationship therapist, and founder and CEO of Relationup.

Top 5 Linux distributions for ethical hackers

Hacking and security penetration, by nature, require an in-depth understanding of the systems and platforms you’re infiltrating. And whether you plan to do some ethical hacking on your own time, or you work for an Information Security team tasked with beefing up the protection of an organisation, the outcome is the same.

You need to have quite a lot of knowledge to build upon, and that means working directly with some of the most secure – and insecure – software around. Wouldn’t you know it — there is a variety of Linux distributions perfect for ethical hacking, security audits and penetration testing. If you know where to look, the distros can help you develop the skills and experience needed to make a living as an ethical hacker. Linux offers full control, flexibility, added power and customisation.

The key element there being, of course, that you know where to look. To help, we’ve put together a list of some of the best Linux distributions for ethical hackers, security analysts and IT professionals.

Parrot Security OS

If you’re a fan of Debian, then you’ll feel right at home with the Parrot Security OS. It is both cloud-friendly and versatile, which is unique to this type of software. But what makes Parrot Security OS so valuable to hackers is the suite of computer forensics, cryptography, ethical hacking and pen testing tools bundled within. At its core, the platform is a healthy mix of Frozenbox OS and Kali Linux, with more of an emphasis on cybersecurity and its resulting data, obviously.

As you’d expect from a Linux distro, it’s highly customisable. You can not only tailor the system to your liking but also change its appearance, tools and core components as well. More importantly, there is an incredibly active community behind the distro that you can turn to for help. It’s perfect for software development and wireless (air-based) security testing.

If you don’t have a strong backbone in computer forensics, IT, and security, then you might want to look elsewhere, however. Parrot Security OS is a bit more on the advanced side and requires existing knowledge and skills to utilise.

Kali Linux

Often lauded as one of the best and most coveted operating systems for hacking purposes, Kali Linux is developed and maintained by Offensive Security. They designed the OS as a rewrite of BackTrack, but if that makes little sense to you don’t fret. All you need to know is that it has a strong backbone in security and computer forensics.

Kali is Debian-based, a lot like Parrot Security, but the biggest difference is it is both minimalistic in appearance and much more functional. Out of the box, you have access to over 500 pen testing tools and apps. They are also incredibly flexible and open for further development and enhancements if you want to get your hands dirty.

Of particular note, the tools with Kali Linux tap into platforms like ARM and VMware that you might need or want direct experience with — especially when it comes to security and network penetration. So many professional and commercial suites rely on platforms like this. Therefore, it is a good place to start if you’re jumping into that side of the cybersecurity market.

All in all, Kali Linux is an ideal place to buff up your knowledge and skills and test out existing software and apps that you’re working on.

DEFT Linux

DEFT is an open-source Linux distro built upon Ubuntu, and its interface looks a lot like its brethren. The acronym stands for Digital Evidence and Forensic Toolkit, which is quite fitting.

Like many of the other distros here, DEFT comes bundled with a wide variety of forensics tools and documents or guides that ethical hackers and penetration testers can reference. The guides bundled within are helpful and informative for anyone looking to learn the ins and outs of the system. Once you know how to work with Linux regarding security and penetration, you can work with nearly any OS, including Windows and OS X.

DEFT is available as a live CD, and in early February, the dev team launched a stable version of the latest iteration, called DEFT Zero. It is a redesigned and super lightweight extension of DEFT that is specialised for forensic acquisition and the analysis of digital evidence. It does make use of the LXDE desktop environment and WINE, which allows you to execute and reference Windows tools in Linux.

As you can guess, the DEFT development team focuses on providing useful support to Law Enforcement and related agencies.


Caine is an Ubuntu-based distribution and is currently available as a live disk. Similar to BlackArch, it comes bundled with a huge selection of tools to aid in computer forensics and security analysis. Some of those tools include memory auditors, digital forensics, database analysers and network analysis apps.

The name Caine stands for Computer Aided Investigation Environment. The distro can be run as a portable OS, directly from a bootable USB drive that makes running and deploying the system super convenient.

The community, documentation and resources are not as expanded as some of the other distros discussed here. Nevertheless, Caine is an incredibly useful system for ethical hackers.

BlackArch Linux

BlackArch Linux is another great Linux distro for security researchers, analysts and ethical hackers. It includes just about everything you’d ever need and then some. The distribution is based on the Arch Linux Foundation but has some added spice too. Plus, you can install from over 1,800 BlackArch Linux security tools, all thoroughly tested and updated from a central codebase.

Every day the distro continues to grow, with more tools, more features and more hacking purposes. The system has been designed from the ground up with penetration testers and security researchers in mind. Furthermore, the live ISO comes bundled with a variety of window managers, which are convenient for security penetration and analysis.

Documentation is extensive and available in languages from English to Turkish. BlackArch has a diverse community of developers, as well, that offer some of the best support you’ll find. That’s not an exaggeration either, reach out via the community forums, and you’ll have a response within minutes.

All revisions are pushed via GitHub, as you’d expect, from an open source operating system such as this.

Ethical hackers have plenty of options when it comes to Linux Distributions. If you want one of the best, take a look at these five quality distros.

Linux kernel 4.14 LTS reaches public testing stage

Linus Torvalds has officially kickstarted the development for Linux 4.14 kernel series. To begin the action, the first release candidate (RC) build of the upcoming Linux kernel is now available for public testing.

Torvalds released the final version of Linux kernel 4.13 last week. The most stable and advanced kernel series will be adopted by most Linux distros. Linux 4.14, on the other hand, is set to be debuted as the next LTS (long-term supported) kernel series. It is expected to be live by early November. In the meantime, the first development snapshot is available in a nascent stage.

Linux kernel 4.14 LTS brings an array of improvements. There are various updates to drivers, architecture updates and new documentation. The filesystems, core networking tools are improved as well. “Things don’t look bad, but I hate it when I find issues during the merge window. Admittedly, some of it was simply because we had some unusual activity,” writes Torvalds in a mailing list announcement.

If all the releases are pushed as per the schedule, we can expect the final release of Linux kernel 4.14 LTS by early November. You can download the source tarsal of Linux 4.14 RC1 from the website.