July 22, 2012

infotoall: CONTROLLING THE MOUSE WITH YOUR EYE

infotoall: CONTROLLING THE MOUSE WITH YOUR EYE: Most of the user of the computer suffer pain in the wrist or in fingers due to over usage of pc or laptops by infront of them whole day b...

infotoall: MODEM

infotoall: MODEM: The main function of modem is to convert the digital to analog signal(modulation) and analog to digital signal (demodulation) for the c...

CONTROLLING THE MOUSE WITH YOUR EYE


Most of the user of the computer suffer pain in the wrist or in fingers due to over usage of pc or laptops by infront of them whole day by typing and moving the mouse. Due to this some of the user gets muscular pain etc. The research scholars of imperial college in London have found out a solution to this problem that is controlling the mouse with your eye.
                             A small device is used for this purpose which is called as GT3D device. This device consists of a pair of glasses (like the coolers) that user must wear when you need to move the mouse with eye. And also two fast control cameras are used to keep track of your eye. The camera constantly records the movement of the pupil and moves the cursor to the direction where it points to. This device is on the development stage so the scholars demonstrated the effective usage of the device by a pong game. They also demonstrated how the surfing in net could be done using this system. The previous version devices of GT3D has some disadvantage such as you need to look on an icon for a prolonged period of time inorder to open the application of the icon, due to this when you stare on the desktop screen for some time then this automatically opens. Inorder to avoid this problem  GT3D device is sensitive so that just a look at that opens the application and they have attached the 3d facility so that the camera could detect whether your are just looking simply on desktop screen  or the user  need to open the application. The cost of this GT3D device is much cheaper (40$) than the other system input that we use.



MODEM


The main function of modem is to convert the digital to analog signal(modulation) and analog to digital signal (demodulation) for the communication between the server that provides the internet and the computer which uses those data. Modem stands for modulation and demodulation.


TYPES OF MODEM :
External Modem: This is a modem separated from the system unit in the computer case. It is connected to the serial port of the computer by means of a cable. It is connected to the telephone  jack by another cable.
Internal Modem: An internal modem is a circuit board that can be added to the system.
Standard Modems: Most modems used today are  standard modems. These modems are usually operated by commands entered from a  keyboard. Users control the functions a modem through the keyboard. Modems may use different command languages to control their functions, but most modems (called "Hayes compatible") use a popular language developed by a company "Hayes Microcomputer Products, Inc." The command ATDSX4, for example, indicates that pay attention (AT), dial stored telephone number (DS), and then display the progress of the call (X4).
Intelligent Modems: Intelligent modems are also called advanced modems. These modems can accept new instructions and then respond to the commands while transmitting data and information. These can be done by microprocessor chips and internal read only memory (ROM) contained in the modem. Of course, these modems are more expensive.
Short-Haul Modems: Short- haul modems are devices that transmit signals through the cable . They are also are called modem eliminators, because they do not require an external power source. They are also called line drivers that can send data for a distance of more than one mile. This type of modem can be used within or across several buildings in a company or a university campus.
Wireless Modems: Wireless modems transmit the data signals through the air instead of by using a cable. They sometimes are called a radiofrequency modem. This type of modem is designed to work with wireless local area networks namely wifi.
Even in the cell phone that we use today has modem the modems are used for surfing in the internet etc.This modems also does the same work of modulation and demodulation but the circuit of this modem is much smaller than the normal modem

June 04, 2012

TAJMAHAL IS NOT BUILD BY SHAJAGAN



                   The most majestic building of the India is the tajmahal. It is a symbol of love for the lovers and a historical monument in the Indian histoy.The history says that it was built by  Shah Jahan  for his lovely wife mum taj as a token of love. The taj may be remodeled by Shah Jahan or Shah Jahan may have changed the history to his way but the fact is that it was designed and built by someone else.                                                                                                                            
The reasons why the Tajmahal was not build by  Shah Jahan  are
1.At the top of the Tajmahal there is a home sign(kalash) .The kalash are mostly build in Hindu temple and it is made up of yempon(that is made up of 5 metals namely gold ,silver bronze and two other metals .This kalash  are built so that it can hold the earth’s magnetic field. In the tajmahal kalash you could see a kumbam (the pot that consist of coconut at the top of the pot), this are mostly used by Hindus in their marriages as a sign of good hopes for the Hindus. Then why is this  kalash and kumba in the tajmahal. This arise  slight drought in our mind that who built taj.
 2.There is a well inside the tajmahal. What is the need for the well inside tajmahal ? If the well is for their personal use there is the river to their reach so they could have done some other way instead of well. Actually in  Hindu temple they build well  for drawing water for their spiritual activities since the river water is not holly for their  divine act to their god.

3.In the book “a real story of tajmahal” it is said that the taj was an ancient temple and shajagan harassed the people and remodel the temple as tomb for his wife. 
4. During the Mughal Empire some of the English writer wrote about the Indian culture heritage and monuments but they did not write about the   Tajmahal which plays an important role in the history of India .Only the Indian writers who were under the influence of shajagan only wrote about the Tajmahal. Why was it so.
  5.The OM sign are used  by Hindus in the starting a new work as the symbol of good hope and they believe that all the activities will be done successfully. So what is the need of the OM sign in the tajmahal.

6.When we look into the Muslims history they did not name any monuments as mahal except the Tajmahal. Then why did  Shah Jahan named it so?
7.Actually the tajmahal was anciently named as Tejamahal,Teja refer to the light of the world but later it may have been changed as Tajmahal.
This report  justifies that the tajmahal was not build by  Shah Jahan  But this monument is a great  treasure to India .

May 28, 2012

ALL ENGINEERS MUST SEE THIS

             Most of the engineering collage in tamil nadu send their students out of the collage or they torcher  them to study by keeping special class till 8am to 6pm.If this continue in  our contry then most of the people will be affected mentally and they will be depressed.The eng students are not treated properly and the collage tells them to be just a book warm.Then how will our country get technically skilled professional.So our govt must concern this as a serious issue and take steps .Other ways our country future is in threat

May 21, 2012

20 GOOGLE SECRETS

Google is clearly the best general-purpose search engine on the Web.But most people don't use it to its best advantage. Do you just plug in a keyword or two and hope for the best? That may be the quickest way to search, but with more than 3 billion pages in Google's index, it's still a struggle to pare results to a manageable number.


But Google is an remarkably powerful tool that can ease and enhance your Internet exploration. Google's search options go beyond simple keywords, the Web, and even its own programmers. Let's look at some of Google's lesser-known options.



Syntax Search Tricks



Using a special syntax is a way to tell Google that you want to restrict your searches to certain elements or characteristics of Web pages. Google has a fairly complete list of its syntax elements at



www.google.com/help/operators.html



. Here are some advanced operators that can help narrow down your search results.



Intitle: at the beginning of a query word or phrase (intitle:"Three Blind Mice") restricts your search results to just the titles of Web pages.



Intext: does the opposite of intitle:, searching only the body text, ignoring titles, links, and so forth. Intext: is perfect when what you're searching for might commonly appear in URLs. If you're looking for the term HTML, for example, and you don't want to get results such as



www.mysite.com/index.html



, you can enter intext:html.



Link: lets you see which pages are linking to your Web page or to another page you're interested in. For example, try typing in



link:http://www.pcmag.com





Try using site: (which restricts results to top-level domains) with intitle: to find certain types of pages. For example, get scholarly pages about Mark Twain by searching for intitle:"Mark Twain"site:edu. Experiment with mixing various elements; you'll develop several strategies for finding the stuff you want more effectively. The site: command is very helpful as an alternative to the mediocre search engines built into many sites.



Swiss Army Google



Google has a number of services that can help you accomplish tasks you may never have thought to use Google for. For example, the new calculator feature



(www.google.com/help/features.html#calculator)



lets you do both math and a variety of conversions from the search box. For extra fun, try the query "Answer to life the universe and everything."



Let Google help you figure out whether you've got the right spelling—and the right word—for your search. Enter a misspelled word or phrase into the query box (try "thre blund mise") and Google may suggest a proper spelling. This doesn't always succeed; it works best when the word you're searching for can be found in a dictionary. Once you search for a properly spelled word, look at the results page, which repeats your query. (If you're searching for "three blind mice," underneath the search window will appear a statement such as Searched the web for "three blind mice.") You'll discover that you can click on each word in your search phrase and get a definition from a dictionary.



Suppose you want to contact someone and don't have his phone number handy. Google can help you with that, too. Just enter a name, city, and state. (The city is optional, but you must enter a state.) If a phone number matches the listing, you'll see it at the top of the search results along with a map link to the address. If you'd rather restrict your results, use rphonebook: for residential listings or bphonebook: for business listings. If you'd rather use a search form for business phone listings, try Yellow Search



(www.buzztoolbox.com/google/yellowsearch.shtml).









Extended Googling



Google offers several services that give you a head start in focusing your search. Google Groups



(http://groups.google.com)



indexes literally millions of messages from decades of discussion on Usenet. Google even helps you with your shopping via two tools: Froogle

CODE

(http://froogle.google.com),



which indexes products from online stores, and Google Catalogs

CODE

(http://catalogs.google.com),



which features products from more 6,000 paper catalogs in a searchable index. And this only scratches the surface. You can get a complete list of Google's tools and services at



www.google.com/options/index.html



You're probably used to using Google in your browser. But have you ever thought of using Google outside your browser?



Google Alert



(www.googlealert.com)



monitors your search terms and e-mails you information about new additions to Google's Web index. (Google Alert is not affiliated with Google; it uses Google's Web services API to perform its searches.) If you're more interested in news stories than general Web content, check out the beta version of Google News Alerts



(www.google.com/newsalerts).



This service (which is affiliated with Google) will monitor up to 50 news queries per e-mail address and send you information about news stories that match your query. (Hint: Use the intitle: and source: syntax elements with Google News to limit the number of alerts you get.)



Google on the telephone? Yup. This service is brought to you by the folks at Google Labs



(http://labs.google.com),



a place for experimental Google ideas and features (which may come and go, so what's there at this writing might not be there when you decide to check it out). With Google Voice Search



(http://labs1.google.com/gvs.html),



you dial the Voice Search phone number, speak your keywords, and then click on the indicated link. Every time you say a new search term, the results page will refresh with your new query (you must have JavaScript enabled for this to work). Remember, this service is still in an experimental phase, so don't expect 100 percent success.



In 2002, Google released the Google API (application programming interface), a way for programmers to access Google's search engine results without violating the Google Terms of Service. A lot of people have created useful (and occasionally not-so-useful but interesting) applications not available from Google itself, such as Google Alert. For many applications, you'll need an API key, which is available free from

CODE

www.google.com/apis



. See the figures for two more examples, and visit



www.pcmag.com/solutions



for more.



Thanks to its many different search properties, Google goes far beyond a regular search engine. Give the tricks in this article a try. You'll be amazed at how many different ways Google can improve your Internet searching.





Online Extra: More Google Tips





Here are a few more clever ways to tweak your Google searches.



Search Within a Timeframe



Daterange: (start date–end date). You can restrict your searches to pages that were indexed within a certain time period. Daterange: searches by when Google indexed a page, not when the page itself was created. This operator can help you ensure that results will have fresh content (by using recent dates), or you can use it to avoid a topic's current-news blizzard and concentrate only on older results. Daterange: is actually more useful if you go elsewhere to take advantage of it, because daterange: requires Julian dates, not standard Gregorian dates. You can find converters on the Web (such as



CODE

http://aa.usno.navy.mil/data/docs/JulianDate.html



excl.gif No Active Links, Read the Rules - Edit by Ninja excl.gif





), but an easier way is to do a Google daterange: search by filling in a form at



www.researchbuzz.com/toolbox/goofresh.shtml or www.faganfinder.com/engines/google.shtml



. If one special syntax element is good, two must be better, right? Sometimes. Though some operators can't be mixed (you can't use the link: operator with anything else) many can be, quickly narrowing your results to a less overwhelming number.

May 15, 2012

ARCHITECTURE AND WORKING OF ANTIVIRUS


Antivirus is one of the inevitable part of a system, whether at home, office or even on gadgets, the prime concern is that of security of the device, system. But have you ever wondered that how the Antivirus works? In this resource we are having a detailed discussion on the Antivirus Architecture, as well as the algorithms which they follow.

Architecture of an Antivirus Engine

The antivirus engine has a very interesting layeral architecture. There are around five layers; each has its own specialty as well as the functionality attached to it. The first one is the User Interface layer which has the functionality of enabling the interface. The second layer is of the Engine Core, which follows a particular algorithm. The third layer contains File System Interface, File Type Scanner, Memory scanner, Decompression and code emulator. The last but not the least layer is the Hardware.

Working of an Antivirus Engine


Whenever we attach any external drive into our system, the very first step we perform is the security of the system. We try to scan the drive, which so ever is attached by using antivirus we have installed on our system.

1. In order to understand how antivirus engine works, it is very necessary to understand the basic architecture and details so that when the one runs on the system, each and every detail can be analyzed.

2. It is not so evident that every time we have a new version of a particular Antivirus engine, then the core is made from the scratch, it is sometimes revised from the earlier one, so the load is minimized.

3. The antivirus engine contains an Engine core, the second layer is dedicated to the file system interface, scanner and emulators.

4. The engine core has the functionality to intact the entire software together. In order words it acts as a sticky substance which is ready to call the desired module, when required.

5. The basic requirement is to have a scan engine, some prefer to have third party scan engines and it is very clear that they are not considered as part of the framework.

6. But some of the most popular and genuine used software's have their own scan engines. The Scanner used in these scan engines are their own scanner.

7. There are generally two scanning algorithms, one is a heuristic based and other is signature. The scan string based technologies search in the given file and looks for a particular matching string.

8. When the scanner founds the already defined or predefined strings then the necessary actions are performed by the engine.

9. When following heuristic based scanning algorithms, the string is not looked but we look for certain instruction or commands in the files.

10. In order to understand better, when certain codes is encrypted then we tend to find decryption code, instructions by following the heuristic scanning algorithms.

11. So when we select a particular file or folder, then it passes through number of steps, which includes submitting a file to scan engines, scanning based on algorithms and then appropriate actions are performed.

12. The processing of file is one of the most important phase of any antivirus engine. We have certain modules which are designed appropriately.

13. The Random Access Memory is generally accessed by the scanning blocks, there are memory scanners which perform the appropriate actions on the memory.

14. We have emulators and its function is similar to any other emulator. It creates its own virtual environment. There are several benefits of having an emulator attached to it.

15. The emulator has the ability to determine which action will be performed and what effect can be there on the whole system, if the malware is allowed to run.

16. Another important module which runs after a particular time interval and acts is the update module. Every day new definitions are created and that has to be added in the database as well.





May 14, 2012

HIDE A FOLDER WITHOUT THE CMD


Step 1 : Rename any folder with extension {645FF040-5081-101B-9F08-00AA002F954E}
For eg,
If u’ve a folder with name “Anything”
press F2,
then type, “Anything.{645FF040-5081-101B-9F08-00AA002F954E}”
and Press Enter.
Step 2 : To get back to its original form,
Make a new batch file with any name and type
“ren Anything.{645FF040-5081-101B-9F08-00AA002F954E} Anything” .

May 13, 2012

trendsetter:
2 Sides of INDIAN Cyber Law or IT Act of INDIA
 C...
: 2 Sides of INDIAN Cyber Law or IT Act of INDIA   Cyber laws are meant to set the definite pattern, some rules and guidelines that defin...

HOW DOES RECAPTCHA WORKS

   Here in this article you will be able to see how to use reCAPTCHA in a proper manner and it helps the user to make good security for their websites. Mainly the people does not know the use of reCAPTCHA and they unnecessarily avoids it and their websites or blogs will be hacked or attacked in minutes.

Introduction


reCAPTCHA is free service which helps to digitize newspapers, books, tv shows etc. CAPTCHA is a program which tells that whether the user is a human or a computer. When we get into different pages approximately of registration forms we can see that at the bottom there will be colourful images with text. Most of the websites use CAPTCHA as a tool for protecting from spamming. The computer will not be able to read text, but humans can read the text so the people will not be able to hack into sites which is having CAPTCHA. Daily around 200 millions CAPTCHA are solved by human beings and in ten seconds we are spending our time and these type of puzzles will take around 15 lacs hours to complete the work. reCAPTCHA does exactly the same by giving some effort to solve CAPTCHA as online reading books.

Why human beings are not making positive effort of CAPTCHA's?


For making the knowledge of humans into an accessible section, we are making projects from different areas by digitizing books which were written before computer age. The pages of book are scanned and then converted into a technique known as Optical Character Recognition. Converting into a text is really useful, so that we will get images which are stored in books and which are difficult to store in devices, taking effort to download and which cannot be searched properly. OCR technique is not proper to use every time.
reCAPTCHA uses the books in a proper way, thus digitizing books by sending words which cannot be read by computers in web and it will be in the form of CAPTCHA's and human beings can read the text in a proper manner. Each word cannot be read by OCR and it will be placed on a image and it will be used as a CAPTCHA. Most of the OCR programs will give you an alert on the words which cannot be read properly . The word which cannot be read by the OCR will be given to a user in different styles and conjunction with other words and answer will be known. User will be prompted to read both word and if the user can solve it, then system shows that answer is a correct one. System will then give it to other people to test whether original answer is correct or not.
When we are running a website and it is having any problems which are related to spam, then you can put the 6yhbeyu7eumreCAPTCHA on your site. For word press applications and mediawiki applications, there are some plugins which allows to use reCAPTCHA without writing any code. For common web applications such as PHP, there are many easy to write codes for giving best solutions for your life.
.

Security


reCAPTCHA is having good security installed in a proper manner and when compared to other CAPTCHA's they use some improper texts which can be attacked by a hacker in an easy manner. Most of other image comparing programs like 'MAPTCHA' are easily attacked in an easy style. reCAPTCHA uses 2 layers to protect the user by making good images. Normally the computer will not be able to read this image and it gives suggestions to users and they will make proper point.

How exactly the reCAPTCHA works?



They will first start to scan a book having many words. Then they will extract word which will not be able to ready by the OCR technique and the words are shown as improper texts and this mainly depends upon the author or the book or quality of scanning mechanism. To make good security they are then providing with some lines or wrapping mechanisms, so that it cannot be read in an easy manner. Mainly the CAPTCHA is taken from the book having two words which is having distorted texts.

WEBSITE THAT CHANGED THE WORLD


Wikipedia


Date started- 15/1/2001.

Founder- Jimmy Wallace, Larry Sanger.

Languages- 240.

Wikipedia is one site that provides every information under the sun on anything. Once you search for anything on the internet using a search engine the first link you come across is that of Wikipedia. There were a number of online encyclopedias before Wikipedia but all of them had only limited information and they were not user friendly. But all that changed ever since Wikipedia came. This site is the number one information providing site on the internet. This site can be accessed by anyone anywhere. The number of people using and contributing at this site is increasing day by day. This site is not only in English, but supports 240 languages worldwide today.

Facebook


Date started- 4/2/2004.

Founder- Mark Zuckerberg.

Face is the most famous social networking website today. In the USA this site even more popular than Google. The number of users who have Facebook profiles run into millions. There are people who are addicted 24 hours on this site! However Facebook was not the first social networking site. Facebook has changed the way people are interacting with the world today. There are a number of third party applications which can be added to Facebook enhancing its charm. Facebook is popular because it has been changing with times.

Twitter


Date started- 2006

Founder- Evan Williams, Jack Dorsey and Biz Stone.

Twitter users range from a common citizens, politicians, rich men, poor men etc. In just 140 words you can be connected to the world. One can connect to celebrities, Politicians and famous people using this site and they respond. This was unthinkable years back. Twitter has blurred the lines between the so called 'high class' and 'low class'. Now famous people want to connect to the local people using twitter. Information on any issue or topic spreads like wildfire on twitter. Twitter has become a part of life today.

You tube


Date stared- February 2005.

Founder- Chad Harley, Jawed Karim and and Steve Chen.

You tube has changed the norms of entertainment. Before this site there was no other online video sharing site on the internet at such a large scale. When You-tube started, India was facing low bandwidth and people thought that this site would not become popular because of this problem. People were reluctant to upload videos in India at that time, being limited by bandwidth. But Indian ISPs provide very good bandwidth today and You tube has reached popularity levels. Today even large videos can be uploaded in a short amount of time and people can watch their favorite clips on You tube.

Google


Date started- 4/9/1998.

Founder- Sergey Brin and Larry Page.

Every person knows what Google is, the name is enough. There is hardly an internet user who does not know what Google is. Google means 'search'. No matter what you do on the internet, chances are that you may be visiting this search engine at least once a day. Even those who do not use Google frequently tend to use the services offered by Google like Gmail, reader, blog-spot, Picassa, You tube and Orkut.

Amazon


Date started- 1994.

Founder- Jeffrey P Bezos.

Amazon is an online purchasing site. You can purchase a commodity of your choice online by logging onto this site. Payment is made by credit card. The product is delivered to your home. Amazon has changed the way people shop today. An increasing number of people are using this site for purchasing stuff online. Now there are a number of online shopping sites but Amazon is the most famous of them all.

Hotmail


Date started- 4/7/1996.

Founder- Shabeer Bhatia and other Microsoft members.

Today youngsters and new internet users may not be much familiar with Hotmail. But hotmail was perhaps the first company offering free email services to users years ago. Initially email services were not free and even the free email accounts offered by hotmail were not easy to get. Hotmail started the revolutionary webmail based email service and made email easy to use, making it possible to access email from any computer. Microsoftsubsequently purchased hotmail in 1996. Now hotmail has been replaced by Microsoft live mail. Hotmail still brings about nostalgia in some.




May 08, 2012

ENCRYPTION


In this 21st century we have moved into a digital world where most of use the Email for data transmission. Some of us don’t like to share our data in the internet with the unauthorized people  but only to a specific people .So we need a specific technology to keep our data secure from the unauthorized people  this is called as encryption.. Encryption is a technique or a process where the data is encoded using different methods so that one cannot access the data until unless he has got the key to unlock the encryption. And the process of bringing back to the original form is called decryption.

TYPES OF  ENCRYPTION:

                         Cryptography is the study of  keeping the digital  data secure. Initially the encryption is based on replacing the alphabets with different symbols and the decryption where also based on the same. As we are in the fast moving world we cannot use this older type of encryption because  its slow .So the cryptographer improved the encrypting technique .Modern computer security encryption systems can be classified into two categories.
·  Symmetric-key encryption
·  Asymmetric-key encryption
Modern encrypting technique are far more complex than the older one and the combination key in  encryption are based on algorithms.

SYMMETRIC-KEY ENCRYPTION:

In the symmetric-key encryption the encryptor has a unique key which helps in encrypting the data that is to be transmitted .The receiver also has the same key for decryption of data. Each transition has a unique key for transmitted data. The 56 bit data encryption standard was the first encryption algorithm in the Symmetric-key encryption. This was developed byUnited States for the encryption and decryption of data. This were easily hacked so they created a 128bit advance encryption standards. This are still used in data security of email ,atm encryption and many more.

ASYMETRIC-KEY ENCRYPTION:

Asymmetric-key encryption is little bit similar  to the previous one but the code for encrypting the data is different from the decrypting key.In digital signatures, has of the message is calculated first and then it is used as privatekey or senders code . Public key or receiver key is compared first and then the private key is used to decode the data.

SSL AND TLS:

SSL stands for Secure Socket Layer, TLS stands for Transport layer Transport layer security. Both the SSL and TLS are the encryption protocol.. SSL and TLS both uses asymmetric or public key encryption technique to encrypt the network connection segments. Basic and foremost SSL technique was developed by Netscape for providing transport layer security. SSL became very popular among all browsers and web servers as it was very efficient to transfer the sensitive data .Later their wear upgrades in the SSL and  then the TLS were released.If you have noticed while making bank transfers, the http changes to https once you login to the bank's official website. Https uses the TLS technique to make the data transfer more secure. TLS checks three important things before transacting and they are whether the certificate of website is a valid one or not, secondly it checks whether the certificate belongs to the corresponding trusted website or not, and third one is whether the sending website does have a valid relationship with the received certificate or not. Once all above things are verified, then one computer generates asymmetric key and sends it to the other computer.

CONLCLUSION:

     Some of the hackers  will hack any type of encryption. So in this case data could not be kept secured so the research are going on the field of encryption.



CLOUD COMPUTING:


CLOUD COMPUTING:

                  Current trend we come across  in the day to day life is cloud computing .In cloud computing - Cloud refers to network in which all the computers are connected by the means of internet .In the cloud computing all the resources and files are shared among the systems and they are rendered to the user as a service.

FEATURES:

·         In the cloud computing the software need not to be installed or downloaded from the internet sites. Instead the software can be used directly by choosing what u need. This saves the downloading time and the initialization time. This also saves your valuable memory space because it consumes less or no memory space for the software to be used. 
·         The pirated products can be avoided. Since the software company release their product in the cloud computing basis the piracy is avoid to a greater extend
·          Pay for what you use is one of the main objective of this technology .The user are charged only for what they use. So the user and the companies get a satisfaction.
·         This service are provided 24*7 so that it can be used anywhere and at any time.
·         For the security of each individuals they are provided with an user id and a password. So that their privacy can be secured.

CURRENT WORLD AND CLOUD COMPUTING:

              The real time application of the cloud computing can be seen in the form of YOUTUBE. In the YouTube the videos can be seen anywhere and at any time. For the user private security they are given a user id and a password. For seeing the videos the basic software is sufficient and this can be seen anywhere.
        The next one is the Facebook-they provide various services like live chats, online videos and various other application. This are now used widely by a variety of people of different agegroups. The feature of uploading and editing the photos are some of the excellent featured services that they offer.

PROBLEMS OF CLOUD COMPUTING:

There will be some unique system called the database system which loads all the services of that they offer. Some of the hacker try to crack this database for their personal convenience and if they do so then the other user will be in a state that they could not do any of the activities. So in order to sort out this problem  there is a backup system that is if the main system is hacked the backup can be used if that too is hacked then it’s the fate and some alternative ways are their but it takes time.so the user cannot use that to their convenience at that  period of time.

WORKING OF ATM


            When we run short of money we usually go to atm center. But have we ever thought how this magnificent   atm machine works? But answer from most of us is no. The atm is controlled by a host server which controls and co-ordinates the whole transaction process. The host server keep track of the transaction that are done.

WORKING OF ATM(AUTOMATED TELLER MACHINE):

                             The atm machine consists of an atm card reader in which the credit or debit cardar inserted to. The card consists of a coat of a magnetic material and outer plastic covering .The details of the card holder are stored in the card in the form of a magnet strip. When the debit or credit card are inserted into the atm this machine identifies the user and it sends a requesting the password. When the password is entered correctly the atm connects itself with the host. When the amount is entered the information is converted into electronic signals and send the signal to the  again and connect it with the bank data base and then in return the bank sends the information about the transaction, then the host sends this to the atm.
These connections are classified into two major types, that is Leased-line ATM and Dial-up ATM. Both the types use a telephone connection to get connected to the host processor. However, the Leased-line uses a dedicated, point to point telephone connection in order to get connected to the host processor, making it very costly to set it up and maintain it throughout the year. However, Dial-up ATM use an ordinary telephone connection to get connected to the user. Hence, Dial-up ATM is very easy to set up and the maintenance costs are also less compared to Leased-line.
                The atm consists of a sensor that checks the length and the thickness of the currency and differentiates as 100,500 and 1000that come from the safe. The damaged and folded currency are sent to separate section in which the note are placed. Then the notes are sent to the dispenser where the cash could be drawn. The numbers of notes are counted by the special sensors that goes to the dispenser.

May 06, 2012

ADOLF HITLER- man of courage


       The worlds most competitive man in the history of world.The people only see the  negative side of that great legend and the psychologist named him as psycho,in-spite of his great hidden talents.If the world say him as an inefficient leader then the world is a pessimist.
CHILDHOOD:
      In the early stage of  his life he had undergone rational discrimination  ,this is the main reason for his cruel actions in the later part of his life.At the age of 13 he lost his father and he did not  get food once in a day .The poverty struck him and he did not get the basic needs that a human being must get.And at the age of 17 his mother died and he was in the situation that he never ever wish to be.Hitler was interested in drawing so at the age of 17 he became an artist but this did not fetch him for his livelihood ..So he tried to join the armed forces.Hitler was an ordinary soldier in the army but due to his dedication to his job he was promoted as a secret agent .
 POLITICS
               Hitler joined the organization in which their where only eight members ,this organization later turned into a political party.In order to get the people support,He conducted meeting among the members.HITLER wrote catchy pamphlets which drew the people.Due to his mind blowing speech the people turned to his way and this party turned into a huge force,with this influence  he became the leader of his country.
ROLE AS LEADER                 
After he became the ruler he  killed the Jews in many variety of ways.Few such TRICKY TACTICS which he used to kill the people in a fantasy way which i came upon to know that you would be eager to know. He killed the them by stuffing  the people into the room with no air gap even to breathe  bringing them suffocation by also blowing away the Poisonous gas into the room and eventually brought down .But he did all this because of  the torch-er he under went in the childhood .
TRAGIC END:
   At the end of the world war 2 German lost and all the area that Hitler ruled was conquered by others .when the sense graveyard marched upon him  he chose his life companion . Some  of them say that he was finally assassinated and other say that he shoot himself but till now his death is  a mist