Social Icons

Wednesday, June 09, 2010

What material Laptops are Made of?

1. Ever wondered what a typical laptop is made up of and where does all that material source to.......read on...it is interesting to know the effort......


China: ABS, PMMA, Epoxy, PVC, Polyoxymethylene, PP, SBR, elastomer, PET, Magnesium Germanium, Terbium

Russia: Steel, Ferrite, Ruthenium

Chile: Copper

South Korea: Glass, Cadmium

Australia: Titanium,Nickel

Peru: Indium

India: Barium

Khaidarkhan: Mercury

Canada: Aluminium, Uranium

South Africa: Cadmium, Chromium, Platinum, Manganese

Japan: Stainless Steel, Selenium

Brazil: Silicon, Tantalum

Zimbabwe: Lithium

Congo: Cobalt

Mexico: Bismuth

Tajikistan: Antimony

2. Thanks http://www.sourcemap.org

Tuesday, June 08, 2010

Prisoners all set to est BPO : A first from Cherlapally Central Jail

1. In a country where media,politicians,government, bureaucrats,actors,sportsman etc etc and most of the citizens are busy baking power and minting money,this is one news that could do HINDUSTAN proud.

2. In a bold & really unique experiment,likely to be the first of its kind in our country,there will soon be BPO units with the inmates as employees. This is a unique development and Cherlapally Central Jail in Hyderabad@Andhra Pradesh is the first prison throughout the country to have such a unique facility in its premises.These BPO units will have educated convicts serving out their terms. A public-private partnership was signed up between the prison authorities and the Bengaluru based IT firm, Radiant Infosystems.As many as 250 inmates will be enrolled in the BPO unit and they will be later shortlisted according to their qualifications. Most of the inmates are matriculates and graduates. The shortlisted inmates will then be given training by experts and then absorbed by the BPO company into their Jail unit. For starters, the convicts working there will not have any access to phones as in the case of a normal call centre. They will be mostly involved in bank-related data entry and transfer work.

3. "We found that large number of convicts are willing to work on computers. So, I thought these prisoners can made use of and they can be put on computer-based jobs," said Gopinath Reddy, Director General For Prisons, Andhra Pradesh.

4. This is really positive contribution I feel....although a percent of readers may tend to opine about QoS etc...but...worth a start and Idea....

Monday, June 07, 2010

XINGYUN : World's Fastest Computer

1. "Experts say one second of its work may take a whole day for a dual-core personal computer"

2. Such is the astonishing ..or I say beyond imagination power of this officially disclosed SUPERCOMPUTER named "Xingyun" from China that runs at more than one quadrillion (one thousand million million) calculations per second.

3. XINGYUN is now the server of ‘Dawn 6000’ which has been jointly developed by Dawning Information Industry Co. Ltd, Chinese Academy of Sciences Calculation Institution and the South China Supercomputing Centre. It has been developed for DNA sequencing and for cloud computing.

4. Perhaps there is no end to improvement.....tomorrow will come up with much much higher speeds then XINGYUN......wait and watch.....

Monday, May 31, 2010

SHADOWS IN THE CLOUD

1. First time I heard this term...i thought its abt some movie...some crime thriller or may be some novel or book...but when I actually came to know about this...it was exploring a whole new world....this is abt a 60 pg brief on how cyber security can compromise you and your organisation secrets....wonderfully compiled...easy to understand...easy english....gr88888 ...


3. Must read for IT Security enthusiasts!!

Tuesday, May 11, 2010

I M IN "CHIP"- MAY MONTH EDITION 2010

1. Don't get me wrong for those of you who read only I M IN "CHIP"...i m not inside the regular chip...but have been able to find space in MAY edition of the Chip - India's Most Trusted Guide To Gadgets And Technology.Scanned copy attached.


2. Thanks CHIP

Monday, May 03, 2010

EAVES DROPPING RISK : EMR

1. Imagine someone sitting in a van outside a person's house can read the EMR that is emanating from the user's laptop computer inside the house and reconstruct the information from the user's monitor on a different device. Different devices have different levels of susceptibility to Tempest radiation. A handheld calculator gives off a signal as much as a few feet away, and a computer's electromagnetic field can give off emissions up to half a mile away. The distance at which emanations can be monitored depends on whether or not there are conductive media such as power lines, water pipes or even metal cabinets in the area that will carry the signals further away from the original source.

2. This problem is not a new one; defence specialists have been aware of it for over twenty years.Information on the way in which this kind of "eavesdropping" can be prevented is not freely available. Equipment designed to protect military information will probably be three or four times more expensive than the equipment likely to be used for processing of non-military information.Until recently it was considered very difficult to reconstruct the data hidden in the radiated field, and it was therefore believed that eavesdropping on digital equipment could only be performed by professionals with access to very sophisticated detection and decoding equipment. As a result, digital equipment for processing information requiring medium or low level protection, such as private and business information, is not protected against eavesdropping of this kind.

3. The EMR that is emitted by electric devices contains the information that the device is displaying or storing or transmitting. With equipment designed to intercept and reconstruct the data, it is possible to steal information from unsuspecting users by capturing the EMR signals. The U.S. government originally began studying this phenomenon in order to prevent breaches in military security. The government was using the technology to their advantage during WWII and realized that they needed to protect themselves against others using the same tactics against them. The name Tempest, or Tempest radiation originated with the U.S. military in the 1960s as the name of the classified study of what was at the time called "compromising emanations."

4. Today the phenomenon is more commonly referred to as van Eck phreaking, named after Wim van Eck, the Dutch computer scientist who brought it to general attention in 1985 when he published his paper "Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?," in which he demonstrated that the screen content of a video display unit could be reconstructed at a distance using low-cost home-built equipment - a TV set with its sync pulse generators replaced with manually controlled oscillators.

5. Van Eck phreaking is a major security concern in an age of increasing pervasive computing. High-security government agencies are protecting themselves by constructing safe rooms that through the use of metallic shielding block the EMR from emanating out of the room or by grounding the signals so that they cannot be intercepted. It is possible, though costly, for individual users to shield their home computer systems from EMR leakage.


Thursday, April 15, 2010

Computer EASTER EGGs

1. Whats an easter egg post doing here? Well even this has an IT context.In the computer world this refers to an un documented lineament that is in a program that the makers of that program placed in the program for additional fun and credits. Easter Eggs are in no way destructive to any software or hardware within the computer and are usually meant for fun. For example an interesting computing easter egg is given below

- Type "=rand(200,99)"(without quotes) into the MS word and watch as around 567 pages get filled with random text!!

2. Thanks http://www.computerhope.com & Digit magazine subscriber edition.

Wednesday, April 07, 2010

Thursday, April 01, 2010

HOW TO HYPER LINK IN COMMENTs AT BLOGGER?

1. I was recently commenting at a blogpost and wanted 2 place a hyperlink..but could not find any option while right clicking or from any where.Thus googled and found this simple two step procedure here

Wednesday, March 31, 2010

DATA RECOVERY FROM RAM?

1. If any one can just throw some light or post a link to any matter that exists on the web pertaining to limitations/possibilities of recovery of data from RAM inside a computer?

2. Thanks.


Powered By Blogger