Categories
Facts How to

How to delete Facebook posts in bulk?

When we first saw facebook we were forced by our desire to post whatever silly pics we found on our feature phones. Eventually, they come back to haunt our lives. Fortunately, the company has released a feature to delete Facebook posts in bulk.

First, download the latest version of Facebook mobile apps. This bulk archive or delete feature is available only on  Facebook Mobile apps 

These steps to delete Facebook posts apply to all Facebook apps (Android, iOS, and lite)

Here’s how you can do it:

  1. Open the Facebook app on your phone.
  2. Tap the three-dot menu in your profile.
  3. Go to the Activity Log> Manage Activity and tap on the popup that says your post.

4. Once you see the list of your posts, you can select all the posts you want to archive or delete, and hit that option accordingly.

All archived or deleted posts will appear as labels in your post sections. You can tap on those labels to see your archived or deleted posts.

If you accidentally deleted a post, and want to restore it, Facebook will keep your post in the Recycle Bin for 30 days.

There is still no option to delete the post on Facebook’s desktop site. We hope to see this option on desktop sites too. Until then, you can hide all your sins under the carpet through the mobile application.

Categories
Enterprise Secrets How to Trending News

Tips to survive the economic downturn amid COVID-19

In COVID-19 time, the signs point to one thing: We are moving towards another recession. And as a developer, you may be wondering what this means for your job. Here are are some tips on how to survive in an economic downturn.

Unemployment is the highest it has been since the Great Depression, the stock market has suffered a setback, and companies are beginning to cut corners to save money. All signs point to one thing: We are moving towards another recession.

If you have been working in web development or design for some time, you know that fluctuations are a natural part of the business. No industry is protected from the effects of the recession, but some are more resilient than others. Job security is generally high for developers, but this does not mean that you will not be immune to layoffs or pay cuts.

So what can you do to keep you afloat in this economic downturn? Here are five tips to survive during a recession and even thrive.

1. Diversify your skills

When the economy is booming, expertise in a particular aspect of web development can help boost your income and create more value for your employer. According to Pacekel, experts earn twice as much as normal people do.

But in an economic slump, this script blinks on its head. As companies loosen and tighten their belts, they rely more on team members who can act as jacks of all trades. The more versatile you are, the more valuable you will be during times of recession.

Classes on FreeCodeCamp, Treehouse, and uDemy are often good starting points to widen your horizons and acquire new skills.

It takes time to learn a new skill, but it can increase your value to employers or customers, increasing the likelihood that you will be employed in times of financial difficulty. As you increase your skill level, consider adding new work to GitHub and listing your new skills on LinkedIn.

2. Focus on goals and produce results

You are impressed by your craft and the quality of your code, and rightly so. But your employer cares about his business. And when money gets tight, the non-essentials go first.

At home, this may mean cutting back on takeout dinner and movie tickets. However, for your employer or customer, it means not producing a valuable return on your investment.

Make sure you are not.

Take some time to reevaluate your work in light of your company’s or client’s business goals. What kind of results are they expecting? Do you distribute those benefits? Are you making a meaningful contribution to the bottom line?

Focus on contributing content to the company’s short-term and mid-term goals. To reinforce your value, look for concrete indicators of the results you deliver, such as site traffic, user engagement, leads, or sales. Once customers or employers see your value, they will be even more essential when the budget starts shrinking.

3. Budget your time and manage your cash

When money gets tight, focusing on efficiency is more important than ever.

If you are a salaried employee, a waste of time means that your work output is affected. As a result, you become less valuable to your employer.

If you are a consultant, inefficiencies mean fewer clients and less income. The more efficient you are with your time and energy, the more cash you can save for the next recession.

Try using a time tracker and keep a record of the hours you work each day. Note how much time you spend on productive, creative work – such as coding new features or eliminating bugs – versus project management, meetings, and other tasks.

If you are a freelancer, a good accounting tool can help you manage your budget, track your expenses, and maximize your efficiency.

4. Make yourself visible

If you are like most devas, you probably avoid meetings like the plague. But staying in the right meetings and working on important projects is an effective way to ensure the leadership that you are making an active contribution. Aim to make an impact not only on your manager, but their manager.

If you are working from home or on a freelance basis, you may feel a little invisible. But active participation and engagement is nothing complicated.

Making yourself visible – even just by being active in zoom meetings or on Slack – you can keep your finger on the pulse of what is going on. Better yet, it will keep relevant and top of the stack with those who work with you. You never know that someone might need your help. Make sure you top their list when the time comes.

5. Make people’s lives easier

Teammates and clients like to work with people who solve more problems than they create. So you need to make people’s lives easier.

Get your work done well and on time, and do a light QA before checking in your code so that you can uncover any obvious issues. Listen when others need to vent. Take the initiative to get more work done, especially tasks that can reduce the burden of peers who work more.

While all of this may seem obvious, you would be surprised how much some dev’s try. Doing this goes a long way to move you from optional to essential.

The most important thing is to evaluate your work and your strategy. Some of the changes you conduct can make you recession-proof, and even help you during an economic recession.

You will also be helping yourself by helping others during a recession. Positioning yourself as an industry leader, a hard worker, and a flexible contributor will help you emerge from a stronger recession than ever before.

Categories
Enterprise Secrets Gadgets How to

Proxy or VPN: Ways to keep your private data to yourself

If you want to add an extra layer of security to your privacy while browsing using a Proxy or VPN is the way to go.

Where privacy is always a concern for the digital jungle. But these devices allow you to remain anonymous. Most countries prohibit people from browsing digital content that is “sensitive”.

Governments send detailed instructions to your internet operator regarding the same. This makes it completely impossible for you to access those sites.

But VPNs and proxies provide a back door through which you can continue to access them. Although they have some similar characteristics, they are completely different from each other. Let’s see how.

Why do you need a proxy?

Proxies are nothing but online servers. when you browse content on the Internet they connect you to the server of the website you are accessing.

Imagine Proxy as a middle man. You send a request to the server and it will bring the information you need. While doing so, it will protect all your personal information from being exposed.

There are two main reasons why proxies are popular. They remove all geographical barriers from your path. Most membership plans do not allow you to use them when you cross the area that specifies your plan.

Using a proxy server, you can trick them into believing that you are still in the area you promised. The second reason is that people use proxies to hide their device’s IP when using the Internet.

This is because the proxy handles all your Internet traffic and does not store information on your device.

What does a VPN do?

If you are reading this, then you probably know that VPN stands for virtual private networks. To put it simply, VPN’s work is no different from a proxy.

The VPN hides your IP address from websites you browse in the same way as proxies. It also allows you to mask your geographical details.

So you can continue to use content that is specific to an area you do not normally have access to.

So what is different?

If they both serve the same purpose then why do they have different names for it? let’s find out. Although VPNs and proxies bring the same value to the table, their functionality is different.

A proxy only helps mask your internet traffic for the applications you use. Whereas a VPN can mask your entire operating system from the network and help you stay hidden.

When considering their security aspects, it is always advisable to use a VPN than a proxy. Proxies can help you circumvent geographical constraints and there is no denying it.

But at the end of the day, your information is still being stored in another server. It is still vulnerable to data theft. If you prefer full data protection then a VPN would be best.

Downside of using a VPN

We saw how a VPN works better than a proxy when considering data encryption. But there is a catch that almost all VPN users will not pay attention to.

Real-time data encryption is a complex task that will take up a large part of your broadband speed. The location you choose can also be a factor that affects your speed.

If your choose premium version should solve most of these problems.

When compared to a proxy, a VPN service provides a ton of useful features. This includes providing DNS leak protection and server options from around the world.

In Conclusion

Most proxy servers are free with limited access. If you need masked web browsing and want your geo-restrictions removed, you can choose a proxy.

But if you need a wide spectrum to get on top of anonymous browsing, then opting for a VPN service is your best option.

Categories
AI Future Technology How to

Latest text generator through voice and Open AI

Open AI has quietly unveiled the latest incarnation of its title-grabbing text generator: the GPT-3. The research lab initially stated that its predecessor’s ability to spread disinformation made it too dangerous to share. The decision warned journalists of imminent robot apocalypse – generating very useful publicity for the GPT-2. Now, Open AI has unveiled its elder brother. And it is very big. The language model in the GPT-2 has 175 billion parameters – 10 times over 1.6 billion, which was considered heavy upon its release last year. GPT-3  ‘s research paper has also outgrown GPT-2 from 25 to 72 pages. We haven’t got through the whole thing yet, but after flicking through have spotted some striking stuff.

Bigger and better?

GPT-3 can perform an impressive range of natural language processing tasks — without needing to be fine-tuned for each specific job. It’s now capable of translation, question-answering, reading comprehension tasks, writing poetry — and even basic math:

The model can perform three-digit addition and subtraction. Credit: OpenAI

It’s also pretty good at bettering correcting English grammar:

Credit: Open AI

GPT-2 also seems to have improved upon the vaunted writing ability of its predecessor. The research team tested its skills by asking evaluators to distinguish its works from those created by their humans. The one they found most convincing was a thorough report on a historic split of the United Methodist Chuch:

The evaluators were most impressed by this article on a church split. Credit: Open AI

However, my favorite example of its writing was the one that humans found the easiest to recognize as made by a machine:

Joaquin’s shape-shifting claims didn’t convince the critics. Credit: Open AI

That report may not have convinced the reviewers, but it certainly showed some flair and a capacity for the surreal. By comparison, here’s an example of a GPT-2-penned article that Open AI previously published:

GPT-2 did a decent job reporting on the discovery of talking unicorns. Credit: Open AI

GPT-3’s ability to generate multiple paragraphs of synthetic material that people find difficult to distinguish from human-written text … raises concerns in this regard. However, the system is unlikely to take the jobs of two-bit hacks, for now, thank God. Not because it lacks the skill — it’s just too damn expensive.

That’s because the system needs enormous computation power. The CEO of AI communications firm Hyperia, Elliot Turner explained:

“Reading the OpenAI GPT-3 paper.  Impressive performance on many few-shot language tasks. The cost to train this 175 billion parameter language model appears to be staggering: Nearly $12 million dollars in computing based on public cloud GPU/TPU cost models (200x the price of GPT-2)”

That should also reduce its powers to be used for evil, as presumably, the only people who could afford it are, er, nation-states, and multi-national corporations.

For now, we’ll have to wait and see what happens when the model’s released to the public

Categories
AI Future Technology How to Science

Using your Voice as Passwords: May become reality

How efficient is it to use voice recognition as a password? Let’s find out. Smartphones are getting smarter and faster with each passing day and so is their safety.

People love it when they include new features to unlock their brand. Apple shook the world with its FaceID when it debuted.

The USA and China are so advanced in technology that they can recognize your face even when you are wearing a mask.

It seems that Face ID will maintain its awe for at least the next few years. But using voice recognition as a password is also able to achieve the same importance.

A new feature of Google Assistant

Google Assistant

Google is slowly sliding a new feature in its AI assistant. Before we proceed to this discussion, you should know that it is not yet universally available.

But there is a chance that all your payments and purchases may soon be certified with a voice match. You can find this feature on both Android and iOS in a very short time.

Right now Google plans to limit this feature to only one function. It may be able to make Google Play purchases and also take restaurant orders.

Is it a new thing?

No matter what feature it is, it has been among us for a few years now. Google tried to implement a voice match in Google Pixel 2 and its home speakers.

It was back in 2017. But this was not so accurate so Google did not yet want to use voice recognition as a password since it can only match your voice with personal content and nothing more.

Each time it recognizes your voice it can boot up your personal calendar, email, and other similar things. Google is working really hard to achieve its voice recognition accuracy.

The future

Futurists predict that future payments may be fully automated. If you want to certify a payment, all you have to do is say “pay $10”.

You do not need to manually type in card numbers and struggle to get a one-time password. Voice authentication does not require any new hardware, it reduces cost which makes it scalable.

Thumbprint or facial recognition requires hardware improvements. While with your voice, you can achieve this with some software updates as well.

This not only reduces the cost but also reduces the time required for its implementation.

So what’s holding it back?

Any technology that makes its way into our lives has a downside. Using voice recognition as a password is hard to achieve.

The user can set up the feature in a quiet environment that may not work when he tried to access it in noise. Some users try to sound correct when installing.

But recording in a natural voice and place is the only way for you to get the best possible result. The system might detect your voice when you are sick or when you are old and your voice becomes deeper.

The conclusion

We are still a long way from using voice recognition as a password. But this is something that we can actually accomplish. As impossible as it sounds, we are really close to making it a reality.

No technology is perfect when in debuts. But with time and user feedback, voice authentication can completely change our perception of security.