Connect with us

Real Estate Technology

Spice up your presentations with Google GIF data

(TECHNOLOGY NEWS) Turn your presentations from drab to fab using Google GIF data.

Published

on

RESO

Google’s making data fun

You can now visualize data in an instant with Google’s Data GIF Maker. The tool was launched by Google News Lab primarily as a resource for journalists to compare search data.

bar
However, it’s available for anyone to use and make simple GIFs.

visual learners

The Data GIF Maker is Google’s way to integrate news into the age of mobile phones. Many people consume news from their cell phone or tablet so every online source must be responsive and minimal enough to understand quickly.

Here lies the reason behind making the new tool so simple.

Data visualizations do not need to be complicated or intricate to be effective. People want something that looks good on their screen. They want to take in the information clearly and then move on to the next thing.

Although Google says there is room for both this type of data consumption and a more complex version, they are catering to an audience that reads news on the go.

How it works

The Date GIF Maker is not limited to journalists. Anyone can get started by simply thinking of two things to compare. The process is about as minimal as the design itself. You use Google Trends to explore hot news topics, which allows you to search any two terms over a specified time.

Trends will pull up the average number of searches over time and you will transfer that information into the GIF Maker.

Just make sure to include the search terms, values and title that will explain your data. After you click “Launch GIF” the tool will create a GIF for you to view and download. The brightly colored GIF shows the two terms and values at the bottom as it moves back and forth.

GIFs for everyone

The best things about the Data GIF Maker is that you don’t have to only use relevant search terms. You can plug in anything to retrieve the data. It’s perfect to make understandable visuals for a work presentation or to just mess around on your own.

Google has made it as straightforward as possible which is how information should be laid out. There is no need to add extra flourishes in these GIFs.

#GifData

Natalie is a Staff Writer at The Real Daily and co-founded an Austin creative magazine called Almost Real Things. When she is not writing, she spends her time making art, teaching painting classes and confusing people. In addition to pursuing a writing career, Natalie plans on getting her MFA to become a Professor of Fine Art.

Real Estate Technology

KRACK is the wifi vulnerability Y2K wishes it was

(TECHNOLOGY NEWS) It was recently discovered that there is a vulnerability in all wifi networks, know how to keep your information from slipping through the KRACK!

Published

on

krack internet wifi

A security researcher has discovered a new vulnerability that affects literally all WiFi networks – and now that they know about it, it won’t be long before hackers know about it too.

The vulnerability, discovered by security researcher Mathy Vanhoef, lies within the WPA2 encryption used by all WiFi devices and routers. It’s called KRACK, which stands for Key Reinstallation Attacks.

By taking advantage of KRACKs, a hacker can snatch up data that we previously thought was encrypted and totally safe, including credit card numbers, passwords, messages in chat and email, and photographs. A hacker could even hack into your devices with cameras and get a live stream into your home.

They can also inject ransomware or malware into your device.

Security experts are urging all device makers and internet service providers (ISPs) to release updates to patch over KRACKs as soon as possible. In the meantime, there are a few suggestions for how you can protect yourself.

First of all, make sure all of your devices and routers are updated, and turn on auto-updates so that if any new KRACK patches come in, you’ll be sure to get them right away. If you got a router from your ISP, you should call them and bother them until they release a security patch for KRACKs.

In the meantime, use your router’s user guide to find the administrative options and make sure everything is up to date and that you have the strongest privacy settings selected.

If your ISP is slow to respond, you might consider using an Ethernet cable to connect to the Internet, since KRACKs are only a problem with WiFi networks.

You can also disable WiFi on your smartphone and use your cellular data instead – although this could get expensive if you pay extra for cellular. You should also pull you Internet of Things devices, especially ones with cameras and assistants like Alexa, off of WiFi until your ISP has a KRACK patch.

It also helps to access the web through encrypted websites whenever possible.

Many sites offer either unencrypted access (HTTP) or encrypted access (HTTPS). You can download an extension called HTTPS Everywhere that tells your browser to automatically use encrypted access whenever available.

It’s available for Chrome, Firefox, and Opera.

Lastly, be aware that Android devices 6.0 or later are more vulnerable to KRACKs attacks than other devices. Good luck, and keep your information from slipping through the KRACKs!

Continue Reading

Real Estate Technology

Dot coms are on their way out when it comes to Realtors’ sites

(TECHNOLOGY NEWS) NAR is making moves to secure their Realtors sites with .Realtor and .realestate authentications.

Published

on

dot com .realtor

dot realtor

The National Association of Realtors (NAR), the governing body of American realtors, has offered the .REALTOR domain to those who are members and has extended its initial kick off program until 2018.

bar
Currently, members of NAR can acquire a .REALTOR for one free year, as well as branded domain email and website creation. After the first year, REALTORS will pay $39.95 for their domain. NAR is also working on acquiring the domain .realestate for those in its membership as well.

Pile on the pros

This change can affect the online presence of a realtor in many number of ways. Because the .realtor domain is strictly policed by NAR and top level domain (TLD) registration group Internet Corporation for Assigned Names and Numbers (ICANN), this allows for a certain amount of trust and credibility to be made with a future customer. Due to the NAR’s deal with ICANN, those who use .REALTOR has that his or her domain registration tied to their National Realtors Database System (NRDS) ID number.

NAR states that this process is similar to the verification process for a .gov or .edu address.

Another reason for the decision to layers of around the strict TLD verification is the protection of the NAR brand, as well as the word realtor. Laypeople frequently confuse the terms “realtor” and “real estate agent,” unaware of the fact that only a member of the NAR is officially a realtor, and licensed non members who sell property are actually real estate agents.

In 2015, .REALTOR was the fastest growing TLD that had authentic websites, i.e. not domains bought for the purpose of scalping.

The NAR is also the largest trade association in the United States, with 1.2 million members. The TLD process for the NAR made history by being the first brand using this type of verification that was previously only afforded to governmental bodies and educational institutions.

Added security

The internet is a vast superhighway of changing parts, and the modification of TLD is a selling point for enhancing a brand.

NAR is offering a service by allowing the TLD to be another source of credibility for its members, a perk few other trade organizations can match.

#DOTrealtor

Continue Reading

Real Estate Technology

Are your phone settings giving hackers a free pass to your life?

(TECHNOLOGY NEWS) If you are one to leave your bluetooth on 24/7 you might want to rethink. Doing so leaves you vulnerable to all sorts of hackers.

Published

on

bluetooth hackers

Bluetooth connectivity

Bluetooth is meant to keep you connected. By enabling it, your devices can sync up to one another without even being prompted. However, in this case, what is easier for you is typically also easier for hackers.

bar
Hackers are incessant and if they want to, can find a way in. But that doesn’t mean that you should hand them an all access pass.

Peace out privacy

With every technological advance, comes some relinquishment of privacy. When you use social media to share your experiences, it’s an open invitation for the world to know where you live, who you’re friends with and what you do.

Newsletters and email accounts require you to share personal information just to use their services.

Bluetooth is no different. Researchers from the group Armis have discovered a way for hackers to infiltrate your devices simply by having Bluetooth enabled.

They call it borne, Blueborne

No, Blueborne is not exactly like James Bond, but it does have the power to mysteriously infiltrate your devices. Researchers found that it takes less than 10 seconds for hackers to gain access to your devices through Blueborne.

You don’t even need to be using Bluetooth.

All it takes is for it to be on. Blueborne scans surroundings to find devices with Bluetooth enabled, and then is used to hack into such devises. From there, hackers gain control over the device and can steal data. Once one device is hacked, it can spread to another device, giving hackers the chance to access multiple devices without increasing their distance.

Prevent hackers

Samsung Galaxy, Google Pixel, iPhones, iPads, car audio systems as well as Android and Microsoft products are all vulnerable to a Bluetooth cyberattack. One line of defense is to make sure that devices are updated.

Last week, Google and Microsoft created security patches so that owner can update and secure their devices.

Just don’t do it

However, if there is one take away from the discovery of Blueborne it is this: don’t keep your Bluetooth on. Think of Bluetooth the same way as you think of locking your car. It’s obvious that not locking your car makes it easier for people to steal it. The same goes with Bluetooth.

The best way to prevent a cyberattack is to be aware of when Bluetooth is enabled, and to make sure it is off when not in use.

#BlueBorne

Continue Reading

Emerging Stories

Get The Real Daily
in your inbox

subscribe and get news and EXCLUSIVE content to your email inbox