First, it looks at all the characters in the sentence it wants to guess the language for. Thanks to QChar, we can easily find which writing system/script the characters belong to, and that allows us to filter out a bunch of languages. The list of possible languages from this is sorted by longest substring; this means that if you write a sentence in one script (for example latin), and then have a single word in for example cyrillic, it will consider latin languages first.
Wink adds touchscreen-based home automation hub
The Relay runs a version of Android on an unstated processor, and duplicates the Wink Android app on its 4.3-inch multi-touch display. Wink lists only WiFi, Bluetooth, and ZigBee as supported protocols, with no mention of Z-Wave or other wireless radios. However, Wink suggests the Relay replaces all features of the Hub, stating that “Relay will automatically connect with all Wink App Ready products, from light bulbs to garage door openers, as well as Wink App Compatible products that use the Wink Hub to connect.” The company also says that Relay supports 100 products from 15 trusted brands that already work with Wink.
Exynos DRM Driver Gets Updated For Linux 3.18
While there hasn't been much to report on lately as it pertains to the open-source Exynos DRM driver, it continues to be updated and maintained by Samsung's staff.
As a late pull request (given the new early cut-off for DRM code) was sent in and accepted for updating the Exynos DRM in the Linux 3.18 kernel.
Kali NetHunter turns Android device into hacker Swiss Army knife
One of the tools we've leaned on heavily in some of our lab testing of software privacy and security is Kali Linux. The Debian-based operating system comes packaged with a collection of penetration testing and network monitoring tools curated and developed by the security training company Offensive Security. Today, the Kali developer team and Offensive Security released a new Kali project that runs on a Google Nexus device. Called NetHunter, the distribution provides much of the power of Kali with the addition of a browser-driven set of tools that can be used to launch attacks on wireless networks or on unattended computers via a USB connection.