Social Icons

Sunday, June 27, 2010

Why not leapfrog 3G TO 4G?

1. It has actually been veri long hearing about Indian Government trying/deciding to start the 3G Spectrum allocation. Finally few decisions have been made in last few weeks and something has been done in a limited capacity.Now till the time this limited capacity becomes ready to take on fully operational 3G Services across India,3G will be without doubt an obsolescent and old technology at global level.The amount of infrastructure,investment,time and loads of effort that will be sucked in by this 3G setup is likely to go in waste considering the thirst everywhere to be at par with the latest in communication.3G may look good today when we are not aware of 4G Technology.For those who are interested to know about 'G' family in brief,pls click here.

2. So,still when the exhaustive details on spectrum auction are awaited,why not leap frog to 4G thus vamoosing the extraordinarily delayed 3G for attaining higher data speeds to finally allow users in India to experience the "state of art speeds".

Friday, June 25, 2010

PANOPTICLICK : Your Browser Finger Print

1. The development and growing interest in hacking and retrieving info from browsers has been gaining significant importance today when security is BAAP of all priorities in any IT field.Today surfers are warned that even with cookies deleted and disabled,advanced fingerprinting techniques could be used to identify them.In an attempt to check and test browsers,THE ELECTRONIC FRONTIER FOUNDATION has come up with a site at http://panopticlick.eff.org/ which tests your browser to see how unique it is based on the information it will share with sites it visits.

Friday, June 18, 2010

INTEL : UPCOMING PROCESSOR'S

1. At an earlier post here, I had discussed about the upcoming OSs incl Barrelfish,Midori,Helios etc likely to be introduced by Microsoft in near future.....now some thing from leaked (which valve actually faltered …no one knows?) source on the net about processors from INTEL,three quad-core Clarksfield processors, the i7-720QM, i7-820QM and i7-920XM, clocked at 1.6GHz, 1.73GHz and 2GHz can be expected by the end of this year

2. Low voltage chips including 25W 2.26GHz Core i7-660LM,1.46GHz Core i7-680UM and 1.33GHz Core i5-560UM with an overall aim to enhance the battery life while end Dec 2010 will see high-end Core i7-680UM that starts at 1.46GHz and speeds up to 2.53GHz and a 1.33GHz / 2.13GHz Core i5-560UM, plus a 25W 2.26GHz Core i7-660LM low-voltage chip will also see the year 2010. All these will have on-die Intel HD Graphics .

3. Another 32nm "Huron River" is likely to make it to the user shores by early 2011 which will single handedly handle WiMAX, WiDi and Intel Bluetooth alongside new concept dubbed Zero Power ODD which promises a power-saving sleep mode for optical disks drives.

Wednesday, June 16, 2010

'Microrings' - Ultimate Wireless Communication

1. Researchers based in Purdue University have developed a miniature device capable of converting ultrafast laser pulses into bursts of radio-frequency signals, a step toward making wires obsolete for communications in the homes and offices of the future.Such an advance could enable all communications, from high-definition television broadcasts to secure computer connections, to be transmitted from a single base station, said Minghao Qi, an assistant professor of electrical and computer engineering.The team fabricated tiny silicon "microring resonators," devices that filter out certain frequencies and allow others to pass. A series of the microrings were combined in a programmable "spectral shaper" 100 microns wide, or about the width of a human hair. Each of the microrings is about 10 microns in diameter.


2. Thus a single base station would be sort of a computer by itself, perhaps a card inserted into one of the expansion slots in a central computer. The central computer would take charge of all the information processing, a single point of contact that interacts with the external world in receiving and sending information."There is no end to improvement......as i say.....just when we thought WiFi is the end of home trouble shootings for easy connectivity...this goes many steps ahead.....

WiFi Amplified 10 times : Here comes WiGig™

1. WiFi,the term that has revolutionised our lives at home with ease of access and mobile internet connectivity is all set to receive a major boost in speed when the 60GHz frequency band comes into operation. Wi-Fi Alliance® confirmed an alliance with WiGig™ to expand the current WiFi band range. Current WiFi technologies will remain, with the new 60Ghz range coming in to compliment these already existing technologies. 60 GHz device connectivity will be an exciting enhancement to the capabilities of today's Wi-Fi technologies. It will expand the utility of Wi-Fi, used by hundreds of millions of people every day.The goal - to bring 7Gbps wireless connectivity to users!!!!

2. How does this happen? Basically transfer speeds that are 'turbo boosted'. Today maximum data transfer speeds are in the region of about 150 Mbps. Bringing in this new technology will boost that figure to anywhere between 1 Gbps to 7 Gbps. That is about 10 times faster than the norm today. On the flipside, higher frequency waves don't have the range of current lower frequencies, and the 60 Ghz band travels in a straight line, meaning one would need line of sight between two devices to transfer data.

3. Estimates are that this technology will be available in devices that have dual-band or tri-band capabilities, in approximately two years. These devices will most likely have the ability to switch between the current 2.4 Ghz or 5 Ghz, and the 60 Ghz band.

"GOOGLE STREET VIEW" - FIGHTING PRIVACY ISSUES

1. Ever heard of google's street view application...m sure many of you must have...for those who have not heard of it...in brief it refers to a technology featured in Google Maps and Google Earth that provisions isometric views from various positions along many streets in the world. Launched on May 25, 2007 the application displays images taken from a fleet of specially adapted cars. Areas not accessible by car are sometimes covered by Google tricycles. On each of these vehicles there are nine directional cameras for 360° views at a height of about 2.5 meters, GPS units for positioning and three laser range scanners for the measuring of up to 50 meters 180° in the front of the vehicle. There are also 3G/GSM/Wi-Fi antennas for scanning 3G/GSM and Wi-Fi hotspots.

2. No about the fighting issue that i have reffered in the subject topic.Now whether it is a facility for the world base users to utilize viewing live views of streets world vide or it is an attempt to log in to the private data of the users across.....yess...I repeat it is the private data of the users avaiable from the open WiFi signals from their home computers and laptops.The intresting thing is that Google has accepted this collection of data from unencrypted wireless networks....and they have put the blame on a masoom software engineer.Google says the massive furore over Wifi snooping by Street View cars was all the fault of one software engineer.In an interview ,CEO Eric Schmidt said the whole affair came about because a software engineer inserted unauthorised code into the Street View system software. The man is now under investigation internally by the company as per posts on google blog.


3. Now what ever answer that google may come up with in form a mistake or simply putting the blame on that software engineer(...where was the Software Testing deptt and QC then otherwise?),the point that I intend putting accross is that just take care of envryting your WiFi router.Google has at least accepted the fact and mistake and they are taking measures to rectify it...but it will not be always like that.....there are so many mis adventurists present all around that looking around that unencrypted wireless networks for misuse.....just read this post again to avoid becoming a target like others.

Saturday, June 12, 2010

Mobiles & Brain Cancer : WHO Speaks.

1. In an earlier post at http://anupriti.blogspot.com/2009/10/radiation-effects-ur-mobile-quantified.html,wherein the sad and bad effects of using mobiles on brain and health,the quantified SAR ie specific absorption rate were discussed.There is good news for those who always feared using mobile phones for standing at a risk to gain brain cancer in the long run.The WHO study on links between mobile phone use and certain types of brain cancer has proved inconclusive.The researchers said that even though there could be possible health risks from heavy mobile phone use, nothing conclusive has been found as yet.

2. The long ten year study of about 13,000 people focused on both healthy users of mobile phones and those with two types of brain cancer - glioma and miningioma tumors. There were suggestions of an increased risk of glioma, and much less so meningioma, in the users with highest decile (10 per cent) of cumulative call time, in subjects who reported phone use on the same side of the head as their tumor. Strangely though, the study declares these 10 per cent to be people who use their phone to call for more than 30 minutes a day. These stats seem seriously doubtable. Going by it, almost everyone we know is in that 10 percent.

3. However, the study has been criticized, as biased, because mobile phone companies provided 25 percent of the funding.Actually...now it is more then 15 years when the world has been actively using mobiles...more so in india in last 10 years....had it been the other way...how much of the human populi in the world would have been effected by now....

Where does your Website Rank in the web?

1. An interesting free info site for to see what you have done with your website and what you need to do to increase performance of traffic and readers to your website is listed below. The site uses a combination of tools to solve issues or tweak your best techniques used in your web design and content.

2. The name of the site is http://truxtertech.com/siteworth.

Friday, June 11, 2010

Google and Caffeine : The Secret Link

1. A little over year ago ,Google unveiled a “secret project” of “next-generation architecture for Google’s web search“ which was supposed to include crawling, indexing, and ranking changes. While the biggest visible changes in Microsoft’s relaunched search engine, Bing, was user-interface related, Google’s secret project was supposed to be only infrastructure related and proposed no UI changes.

2. Thus after an year of the unveiling,Google is now getting faster and more comprehensive with a new Web indexing system called "Caffeine.As per the Google Blog Post's , the project now stands on completion stage and now "provides 50 percent fresher results for Web searches".


3. The old indexing architecture was based on several layers, some of which were refreshed at a faster rate than others; the main layer would get updated every couple of weeks.To refresh a layer of the old index, entire web was analysed, which meant there was a significant delay between when we found a page and made it available to the user. With Caffeine, the web is analysed in small portions and search index is updated on a continuous basis.Thus more improvement on existing setup....that I say "there is no end to improvement"

Wednesday, June 09, 2010

Securelist.com : Informative attempt by Kaspersky Labs

1. Kaspersky has come up with the launch of a veri informative site on IT security with lots of articles and updates on various types of viruses/malwares etc.You can access the same by clicking here.

2. One interesting section by the name of "Internal threats" is available which should prove popular in future and also "Kaspersky Security Bulletin".

What material Laptops are Made of?

1. Ever wondered what a typical laptop is made up of and where does all that material source to.......read on...it is interesting to know the effort......


China: ABS, PMMA, Epoxy, PVC, Polyoxymethylene, PP, SBR, elastomer, PET, Magnesium Germanium, Terbium

Russia: Steel, Ferrite, Ruthenium

Chile: Copper

South Korea: Glass, Cadmium

Australia: Titanium,Nickel

Peru: Indium

India: Barium

Khaidarkhan: Mercury

Canada: Aluminium, Uranium

South Africa: Cadmium, Chromium, Platinum, Manganese

Japan: Stainless Steel, Selenium

Brazil: Silicon, Tantalum

Zimbabwe: Lithium

Congo: Cobalt

Mexico: Bismuth

Tajikistan: Antimony

2. Thanks http://www.sourcemap.org

Tuesday, June 08, 2010

Prisoners all set to est BPO : A first from Cherlapally Central Jail

1. In a country where media,politicians,government, bureaucrats,actors,sportsman etc etc and most of the citizens are busy baking power and minting money,this is one news that could do HINDUSTAN proud.

2. In a bold & really unique experiment,likely to be the first of its kind in our country,there will soon be BPO units with the inmates as employees. This is a unique development and Cherlapally Central Jail in Hyderabad@Andhra Pradesh is the first prison throughout the country to have such a unique facility in its premises.These BPO units will have educated convicts serving out their terms. A public-private partnership was signed up between the prison authorities and the Bengaluru based IT firm, Radiant Infosystems.As many as 250 inmates will be enrolled in the BPO unit and they will be later shortlisted according to their qualifications. Most of the inmates are matriculates and graduates. The shortlisted inmates will then be given training by experts and then absorbed by the BPO company into their Jail unit. For starters, the convicts working there will not have any access to phones as in the case of a normal call centre. They will be mostly involved in bank-related data entry and transfer work.

3. "We found that large number of convicts are willing to work on computers. So, I thought these prisoners can made use of and they can be put on computer-based jobs," said Gopinath Reddy, Director General For Prisons, Andhra Pradesh.

4. This is really positive contribution I feel....although a percent of readers may tend to opine about QoS etc...but...worth a start and Idea....

Monday, June 07, 2010

XINGYUN : World's Fastest Computer

1. "Experts say one second of its work may take a whole day for a dual-core personal computer"

2. Such is the astonishing ..or I say beyond imagination power of this officially disclosed SUPERCOMPUTER named "Xingyun" from China that runs at more than one quadrillion (one thousand million million) calculations per second.

3. XINGYUN is now the server of ‘Dawn 6000’ which has been jointly developed by Dawning Information Industry Co. Ltd, Chinese Academy of Sciences Calculation Institution and the South China Supercomputing Centre. It has been developed for DNA sequencing and for cloud computing.

4. Perhaps there is no end to improvement.....tomorrow will come up with much much higher speeds then XINGYUN......wait and watch.....

Monday, May 31, 2010

SHADOWS IN THE CLOUD

1. First time I heard this term...i thought its abt some movie...some crime thriller or may be some novel or book...but when I actually came to know about this...it was exploring a whole new world....this is abt a 60 pg brief on how cyber security can compromise you and your organisation secrets....wonderfully compiled...easy to understand...easy english....gr88888 ...


3. Must read for IT Security enthusiasts!!

Tuesday, May 11, 2010

I M IN "CHIP"- MAY MONTH EDITION 2010

1. Don't get me wrong for those of you who read only I M IN "CHIP"...i m not inside the regular chip...but have been able to find space in MAY edition of the Chip - India's Most Trusted Guide To Gadgets And Technology.Scanned copy attached.


2. Thanks CHIP

Monday, May 03, 2010

EAVES DROPPING RISK : EMR

1. Imagine someone sitting in a van outside a person's house can read the EMR that is emanating from the user's laptop computer inside the house and reconstruct the information from the user's monitor on a different device. Different devices have different levels of susceptibility to Tempest radiation. A handheld calculator gives off a signal as much as a few feet away, and a computer's electromagnetic field can give off emissions up to half a mile away. The distance at which emanations can be monitored depends on whether or not there are conductive media such as power lines, water pipes or even metal cabinets in the area that will carry the signals further away from the original source.

2. This problem is not a new one; defence specialists have been aware of it for over twenty years.Information on the way in which this kind of "eavesdropping" can be prevented is not freely available. Equipment designed to protect military information will probably be three or four times more expensive than the equipment likely to be used for processing of non-military information.Until recently it was considered very difficult to reconstruct the data hidden in the radiated field, and it was therefore believed that eavesdropping on digital equipment could only be performed by professionals with access to very sophisticated detection and decoding equipment. As a result, digital equipment for processing information requiring medium or low level protection, such as private and business information, is not protected against eavesdropping of this kind.

3. The EMR that is emitted by electric devices contains the information that the device is displaying or storing or transmitting. With equipment designed to intercept and reconstruct the data, it is possible to steal information from unsuspecting users by capturing the EMR signals. The U.S. government originally began studying this phenomenon in order to prevent breaches in military security. The government was using the technology to their advantage during WWII and realized that they needed to protect themselves against others using the same tactics against them. The name Tempest, or Tempest radiation originated with the U.S. military in the 1960s as the name of the classified study of what was at the time called "compromising emanations."

4. Today the phenomenon is more commonly referred to as van Eck phreaking, named after Wim van Eck, the Dutch computer scientist who brought it to general attention in 1985 when he published his paper "Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?," in which he demonstrated that the screen content of a video display unit could be reconstructed at a distance using low-cost home-built equipment - a TV set with its sync pulse generators replaced with manually controlled oscillators.

5. Van Eck phreaking is a major security concern in an age of increasing pervasive computing. High-security government agencies are protecting themselves by constructing safe rooms that through the use of metallic shielding block the EMR from emanating out of the room or by grounding the signals so that they cannot be intercepted. It is possible, though costly, for individual users to shield their home computer systems from EMR leakage.


Thursday, April 15, 2010

Computer EASTER EGGs

1. Whats an easter egg post doing here? Well even this has an IT context.In the computer world this refers to an un documented lineament that is in a program that the makers of that program placed in the program for additional fun and credits. Easter Eggs are in no way destructive to any software or hardware within the computer and are usually meant for fun. For example an interesting computing easter egg is given below

- Type "=rand(200,99)"(without quotes) into the MS word and watch as around 567 pages get filled with random text!!

2. Thanks http://www.computerhope.com & Digit magazine subscriber edition.

Wednesday, April 07, 2010

Thursday, April 01, 2010

HOW TO HYPER LINK IN COMMENTs AT BLOGGER?

1. I was recently commenting at a blogpost and wanted 2 place a hyperlink..but could not find any option while right clicking or from any where.Thus googled and found this simple two step procedure here

Wednesday, March 31, 2010

DATA RECOVERY FROM RAM?

1. If any one can just throw some light or post a link to any matter that exists on the web pertaining to limitations/possibilities of recovery of data from RAM inside a computer?

2. Thanks.


Sunday, March 28, 2010

WiFi at home : Take precautions

1. Accessing WiFi at home is no more limited to tech geeks as the simple configuration has made it accessible to even a layman who hardly has any know how of how it works and what are the dangers floating around if he goes with the default settings.The two year back case of a hacker emailing from an open WiFi account in Mumbai reflects the deep dangers associated with such mishaps.Following are a set of desirable config changes any WiFi account holder at home and office whould take care of while configuring.....

Step 1: Change the default password

Step: 2: Change the default IP address

Step 3: Disable the DHCP service

DHCP (Dynamic Host Configuration Protocol) enables remote computers connected to the router to obtain an IP address and join the network without needing to know the IP and router address information. This is a simple and effective way of keeping intruders away. As far as possible, set up the computers on your network with static IP addresses. If you still want to use DHCP to make your own configuration easier, restrict the number of DHCP IP users to the number of computers on your network. For example, if you have five laptops running on the network, limit the DHCP IP addresses to 5 from the default 50.

Step 4: Restrict the network mode

Step 5: Change the default SSID

Step 6: Opt for WPA2 or PSK security over WEP

Step 7: Enable the MAC Filter

Step 8: Use the router’s firewall

Step 9: Use Internet Access Policies

Step 10: Disable remote administration

Step 11: Switch off the router when not in use

Step 12: Disconnect the Internet when not needed

Step 13: Position your router carefully

Step 14: Update the router firmware

Step 15: Scan for signal leaks from time to time

2. Also check out here.Thanks http://www.freealldown.com

Thursday, March 25, 2010

CLEAR PLAY & DVD PLAYERs : E-CENSOR

1. A new technology that can CENSOR ALL POTENTIALLY UNSAVORY SCENES of a movie, making it watchable with children at home is all set to introduce it self to the parents.It invariably happens across the homes when one family sits down to watch a movie on a DVD thinking there’s nothing up ahead likely to cause embarrassment, only to find the stars undressing and making the set of family watching the movie awkward.


2. ClearPlay (patented) comes to the rescue in all such cases.This is an advanced parental control feature that allows filtering of regular DVD movies. ClearPlay is a technology that allows the users to skip over or mute undesirable content such as profanity, graphic violence, and adult content.

3. A ClearPlay-enabled DVD player is required, along with what are called Filter files. These files, which are created by ClearPlay editors, will know where the possibly unwanted content is located, even to the exact frame. This allows the ClearPlay DVD player to block offensive or undesirable content during playback of the DVD. The choice is also made available to watch the film in its original form, by turning the filtering off.


4. ClearPlay allows users to customize what they want to skip. There are twelve categories of content that can be filtered and with four different levels (none, implied, explicit and graphic).These categories include: Violence, Sex, Nudity and Vulgarity. You will also see a list, before the movie starts, of possibly questionable content that ClearPlay will not remove depending on the movie, scene and/or situation.

Wednesday, March 24, 2010

DANGEROUS PASSWORDS

1. According to a recent study,most dangerous passwords used across the cyber fora and continents are listed below :

123456
Tops the list.The study reveals that '123456' is the most ordinarily used password. Imperva found that nearly 1% of the 32 million people it studied were using "123456" as a password.

12345
The second most vulnerable password is 12345

123456789
Stands at a proud 3rd position

PASSWORD
The fourth most vulnerable password is the word 'Password' itself

iloveyou
Another easy one for remembrance and breaking.

princess
Stands at 6th position

Rockyou
The seventh most compromising password is 12345

1234567
Rockyou is followed by 1234567 at No 8

abc123
the last one as per study....

2. How many of you have or had from the list?be carefullllllllllllllllllllllll

3. Thanks Imperva and TOI.
Powered By Blogger