Tech-BLOG

Google paying $1+ billion to Apple Inc

http://utbblogs.com/jainglobal/uploads/2014/05/Google-Apple.jpg

Google paying $1+ billion per year to keep Google search bar on iPhone

When Microsoft denied Google appeal to assign google search as default option on Windows operating systems ,Google made a deal with Apple and paying around $1+ billion every year .Payment also based on revenue generated from Google ads clicks from apple iphone devices .

 

Google Inc. took this step after getting sued from Oracle Inc. for using their java while developing android .

 

Special court ordered Google to pay part of revenue they generates from every partnered company on their projects .

 

Sohil Jain

Logical thinker !

Jain Software Developers

What is Holography?

History of Holography:

  • Invented in 1948 by Dennis Gabor for use in electron microscopy, before the invention of the laser.
  • Leith and Upatnieks (1962) applied laser light to holography.
holograms

Conventional vs. Holographic photography:

Conventional: 

  • ¨2-d version of a 3-d scene
  • ¨Photograph lacks depth perception
  • ¨Film sensitive only to radiant energy
  • ¨Phase relation (i.e. interference) are lost

Hologram: 

  • ¨Freezes the intricate wave front of light that carries all the visual information of the scene
  • ¨To view a hologram, the wave front is reconstructed
  • ¨View what we would have seen if present at the original scene through the window defined by the hologram
  • ¨Provides depth perception
past, present and future of holograms

Hologram Properties:

  • If you look at these holograms from different angles, you see objects from different perspectives, just like you would if you were looking at a real object.
  • They usually just look like sparkly pictures or smears of color.
  • If you cut one in half, each half contains whole views of the entire holographic image.
holography

Hologram Construction:

  • Laser : Red lasers, usually helium-neon (HeNe) lasers, are common in holography
  • Beam splitter: This is a device that uses mirrors and prisms to split one beam of light into two beams.
  • Mirrors: These direct the beams of light to the correct locations.
  • Holographic film: Holographic film can record light at a very high resolution, which is necessary for creating a hologram. It’s a layer of light-sensitive compounds on a transparent surface, like photographic film.

Hologram Working:

img 56a1bf300a4ab

Holography Reconstruction:

img 56a1bf80d102f

What is Laser:

Lasers produce monochromatic light — it has one wavelength and one color. Because of the need for coherent interference between the reference and object beams

laser pointerimg 56a1c0b62e383

Hologram:Some Applications:

  1. Authentication.
  2. Virtual Display.

 

Awadhesh Kumar

Jain Software Developers

 

What is Artificial Intelligence?

Image result for artificial intelligence

img 56a069824e658

Introduction:

  • Artificial intelligence(AI) is technology and a branch of computer science that studies and develops intelligent machines and software.
  • Here intelligent system means a system that perceives its environment and learn through experience like human beings.
  • In 1955, John McCarthy coined the term “Artificial Intelligence”.

 

Intelligence:

  • Intelligence is the ability to learn about, to learn from, to understand about, and interact with one’s environment.
  • Intelligence is the faculty for understanding.img 56a069c0caab3

“Intelligence is not to make no mistakes but quickly to understand how to make them good” -(German Poet )

 

Core Parts of AI:

  • Knowledge
  • Reasoning
  • Problem solving capabilityimg 56a06a0295a0e
  • Perception
  • Learning
  • Planning
  • The ability to manipulate and move objects

How does AI Works:

Artificial intelligence works with the help of :

  • Artificial Neurons   (Artificial Neural Network)
  • Scientific theorems (If-Then Statements, Logics)

http://guardianlv.com/jainglobal/uploads/2014/03/Robots-The-Possibilities-of-Artificial-Intelligence-650x406.jpg220px

What is Neural Networking:

Artificial neural networks are  composed of interconnecting  artificial neurons (programming constructs that mimic the properties of biological neurons).

Image result for artificial intelligence

Structure of Biological Neuron:

img 56a06bc6e1373
An Artificial Neuron:

img 56a06c17b8957

Turing Test:

  • The Turing testis a test of a machine’s ability to exhibit intelligent behaviour equivalent to, or indistinguishable from, that of an actual human.
  • The test was introduced by Alan Turingin his 1950 paper “Computing Machinery and Intelligence,”

Test Setup-

Person A (actually a computer) and Person B both say that they are human. Person C tries to find out whether Person A or Person B is the computer or the human.

img 56a06cbc8c68b

Examples of Artificial Machines:

  • Deep Blue was a chess-playing computer developed by IBM. On May 11, 1997, the machine, played chess with world champion Garry Kasparov.
  • MYCIN: is an expert system for treatment of blood infection.

Advantages:

  • It can help improve our way of life.
  • Use of robots for heavy construction, military benefits or even for personal assistance at private home.
  • There will be less injuries and stress to human beings.
  • Many of our health problems now have possible solutions with the use of Artificial Intelligence.
  • Scientists have been using AI to test theories and notions about how our brain works.artificial intelligence risk reward now labs

Disadvantages:

  • If robots start replacing human resources in every field, we will have to deal with serious issues like unemployment.
  • One of the major disadvantages of intelligent machines is that they cannot be ‘human’. We might be able to make them think. But will we be able to make them feel?
  • Apart from these concerns, there are chances that intelligent machines overpower human beings.

Awadhesh Kumar

Jain Software Developers

Gi-Fi Technology

https://mgitecetech.files.wordpress.com/2011/07/gifi.jpg

 

Introduction of GiFi:

  • GI-FI means gigabit wireless.
  • Worlds first transceiver integrated on single chip.
  • Operates on 60ghz on the CMOS process.
  • Allows wireless transfer of audio and video data at upto 5GB per second.
  • Transfer data within an indoor environment usually within a range of 10ms.
  • Man behind Gi-Fi is Professor Stan Skafidis of Melbourne university.

Evolution of GiFi:

img 569f16d7cae97

Why GiFi:

The reason for pushing into Gi-Fi technology is because of

  • slow rate,
  • high power consumption,
  • low range of frequency operations of earlier technologies i.e. Bluetooth and Wi-Fi’s.

Gi-Fi Access Devices:

img 569f17399373d

 

Application of GiFi:

  • In wireless PAN networks.
  • Inter-vehicle communication system.
  • Huge data file transfer.
  • Office appliances.
  • Video information transfer.

Awadhesh Kumar

Jain Software Developers

 

Li-Fi(Light Fidelity) Technology

             Li-Fi (Light Fidelity) is a bidirectional, high speed and fully networked wireless communication technology similar to Wi-Fi. The term was coined by Harald Haas and is a form of visible light communication and a subset of optical wireless communications (OWC).

img 569dc4623a095

What is LiFi:

LI-FI is transmission of data through illumination ,sending data through a LED light bulb that varies in intensity faster than human eye can follow-

img 569dc46ec932a

History:

The technology truly began during the 1990’s in countries like Germany, Korea, and Japan where they discovered LED’s could be retrofitted to send information.  Harald Haas continues to wow the world with the potential to use light for communication.

img 569dc49f2ed9b

LI FI

Present Scenario:

img 569dc4ebacc23

1.4 Million

img 569dc53ea2042

5 Million

  • Radio Spectrum is congested but the demand for wireless data double each year .Every thing, it seems want to use wireless data but the capacity is drying up.
  • So what can carry this excess demand in the future

WHO CAN REPLACE RADIO WAVES FOR WIRELESS COMMUNICATION ?

img 569dc5d483493

How Li-Fi Works:

operational procedure is very simple, if the led is on, you transmit a digital 1, if its off you transmit a 0. The LEDs can be switched on and off very quickly, which gives nice opportunities for transmitting data. Hence all that us required is some LEDS and a controller that code data into those LEDs.

working of li fi technology

Why Only VLC:

img 569dc6aacd0e1

  • Gama rays cant be used as they could be dangerous.
  • X-rays have similar health issues.
  • Ultraviolet light is good for place without people, but otherwise dangerous for the human body.
  • Infrared, due to eye safety regulation,can only bse used with low power.
hence we left with the only the visible-light spectrum.

LAXIM:

img 569dc7d381119

LUXIM is a privately owned clean tech company based in Sunnyvale, California which was founded in 2000.

LAXIM Products(Li-Fi):

img 569dc83c76352

  • Luxim offers three unique products for use in technical lighting.
  • LIFI4KP is intended for visible light applications including general microscopy, machine vision, and inspection.
  • LIFI4KT is a broadband source that includes both UVA and visible region of the spectrum.
  • LIFI4KU is a mercury source with strong spectral emission lines down to 320 nm for UV curing, fluorescence imaging, and UV printing.

 

 Potential Application of Li-Fi:

Li Fi technology is still in its infancy .However some areas where it seems perfectly applicable are:-

TRAFFIC LIGHTS:

  • Traffic lights can communicate to the car and with each other.
  • Cars have LED-based headlights, LED-based cack lights, and cars can communicate with each other and prevent accidents in by exchanging information.

INTRINSICALLY SAFE ENVIRONMENT

  • Visible Light is more safe than RF, hence it can be used in places where RF can’t be used such as petrochemical plants , airplanes etc.

PUBLIC INTERNET HOTSPOTS:

  • There are millions of street lamps deployed around the world.
  • Each of these street lamps could be a free access point.

 

Awadhesh Kumar

Jain Software Developers

 

 

 

 

What is Blue Jacking?

img 569c790996259

Know Bluetooth Technology:

žBluetooth is a wireless networking standard created for personal area networks (PANs). Is was founded in 1994,as wireless data transmission technology using radio transmissions.žBluetooth is a cable replacement technology.

žBluetooth is an IEEE standard under the denomination of 802.15 WPANs.žž Bluetooth provides cheap connection between two or more devices.žžBluetooth has a short range of approximately 10 meters up to 25 meters.žžBluetooth offers low speeds of approximately 1Mbps.

What is Blue Jacking:

img 569c7b9b23b3d

žBlue jacking exploits a Bluetooth device’s ability to discover other nearby devices to send unsolicited messages.žThe unsolicited message is then displayed on the victim’s device, potentially causing confusion or at least annoyance. Actually blue jacking allows individ

uals to send business cards anonymously using Bluetooth wireless technology. Bluejacking does not involve the removal or alteration of any data from the device. These business cards often have a clever or flirtatious message.

Features of Blue Jacking:

  • žBluejacking does not involve the removal or alteration of any data from the device.ž
  • žA bluejacker normally send only a text message, but now it has now become possible to send images or sounds also.ž
  • ž Bluejacking exploits a Bluetooth device’s ability to discover other nearby Bluetooth devices.

 

How to Blue Jacking Done:ž

žIt is done with the help of OBEX protocol.ž

žTo choose the recipients of bluejacks, senders complete a scan using their mobile phones to search for the available Bluetooth-enabled devices in the immediate area.ž

žA bluejacker then picks one of the various available devices (that have their Bluetooth on), composes a message within the body of the phone’s contact interface, then sends the message to the receiver and stays close to the receiver to observe any reactions expressed by the person.ž

žThe message is sent via vCard functionality. It has a name field for bluedating or bluechat to another Bluetooth enabled device.žž

žIt also allows phone users to send business cards secretly using Bluetooth. These business cards can even contain clever or flirtatious messages instead of simply the phone number and name.ž

žBluejackers look for the receiving phone to ping or to react.

http://www.oracle.com/ocom/groups/public/@otn/documents/digitalasset/144926.gif

img 569c7d53d6e9d

Fig. 1 how the sender sends the bluejack message

img 569c7d6b8c337

Fig. 2 what does receiver sees on the screen as it receives the bluejack message

Advantages of Blue jacking:ž

  • žUsually, a bluejacker will only send a text message, but with modern phones it’s possible to send images or sounds as well.
  • žWe can easily transfer data from mobile to laptop or from mobile to mobile in a short period.
  • žWe can even enjoy music by wireless headphones through Bluejacking.

Disadvantages of Blue jacking:

  • žIncrease in the availability of Bluetooth enabled devices, these devices have become vulnerable to virus attacks and even complete takeover of devices through a Trojan horse program.ž
  • žThese may even cause irritation in any person as these are just unwelcomed messages or some jokes.ž
  • žThey can annoy anyone very easily.

Usages of Blue Jacking:ž

http://tecnologyc.com/jainglobal/2011/03/blue-jacking.jpg

žIt can be used in malls for advertisement purposes. As you cross their shop, you can get a message or any latest scheme they are providing on that day, etc.ž

žThey can be used at railway station to give you information about various general rules and about train timings, etc. Someone can even annoy you by sending useless messages. So, it is advisable to keep it off at these public places.ž

ž It can also be used at café, restaurant, cinema, mobile phone shop or at any electronic shop to provide you various information regarding them but any other random person can also send you the Bluejack messages and hence can even annoy you.

 

žHow to prevent yourself from Blue Jackers:

žPhone owners who receive bluejack messages should refuse to add the contacts to their address book. This means they must be fully ignored.ž

žDevices could be set in the non-discoverable, hidden or invisible mode in the menu. They are not prone to bluejacking.ž

žYou can turning off your Bluetooth device off at certain public areas like various shopping centers, coffee shops, movie theaters, bars and clubs, public transport vehicles, phone, at various electronic stores and even in parks.

ž

žhttp://www.onlytechtalks.com/techtalks/jainglobal/uploads/2009/05/bluetooth-hack.jpg

 

 

Awadhesh Kumar

Jain Software Developers

ž

ž

Cyber Bullying

What is Cyber Bullying?

When the internet, cell phones or other digital devices are used to send or post text or images intended to hurt or embarrass another person.Examples of cyber bullying include mean text messages or emails, rumours sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles.

T CyberBullying1

There are two kinds of Cyber Bullying:

  • Direct Attacks- messages sent directly to the victim.
  • Cyber Bullying by Proxy– Using someone else to cyber bully a victim, this proxy may know they are cyber bullying and they may not.

1. Direct Attacks:img 5699d4dd7c9b0

  • Instant Messaging
  • Text Messaging
  • Blogs
  • Websites
  • Emailing Pictures
  • Stealing Passwords
  • Internet Polling- Hot or Not!
  • Hacking or sending spyware

2. By Proxy:

  • Someone else does the dirty work for the main cyber bully.
  • Bullies may hack into the victim’s account or steal their password. They may set up a new account pretending to be the victim.
  • Friends get angry with the victim.
  • This form of cyber bullying is very dangerous because many people are involved, not just the bully and the victim.

img 5699d544a9b90

Bullying V/S Cyber Bullying

1. Bullying:

  • Direct,
  • Physical: Hitting, Punching & Shoving.
  • Verbal: Teasing, Name calling & Gossip.
  • Non-verbal: Use of gestures & Exclusion.

bbb

2. Cyber Bullying:

  • ANONYMOUS.
  • Harassing text messages or emails.
  • Spreading rumours on social networks.
  • Emotional reactions cannot be determined.

cyber_bullying

 

 

 

 

 

 

Why do children Cyber Bullying?

  • Anger
  • Frustration
  • Revenge
  • Entertainment
  • To get Laughs or Reactions
  • Power Hungry
  • Because all motives for bullying are different so are the solutions and responses.cyberbullying

Who does this effect?

  • As hinted at previously, Cyber Bullying only impacts children.
  • Children of all ages can be victims of cyber bullying, Young children, Preteens and Teenagers.
  • Once adults get involved with Cyber Bullying it becomes Cyber Stalking or Cyber Harassment.

Image result for cyber bullying with kidsImage result for cyber bullying with kidsImage result for cyber bullying with kids

Consequences of Cyber Bullying:

  • Anxiety
  • Depression
  • Stress Related Disorders
  • Suicide
  • Withdrawal from Friends and Activities
  • Changes in mood, behaviour and appetite
  • Emotional Distress during and after using technology

hero Cyberbullying

 

Awadhesh Kumar

Jain Software Developers

 

What is Captcha ?

img 56972e634ab64

What is CAPTCHA?

  • CAPTCHA stands for Completely Automated Public Turing test to tell Computers and Humans Apart.
  • A challenge question
  • First used by Altavista in1997 but officially in 2000 by Luis Von .

WHY USED?

Since the dawn of the Internet, people have tried to abuse websites for both sport and profit. As the abuse became profitable, the scale of abuse grew using automated software (sometimes referred to as bots). To prevent bots from overrunning sites with spam, fraudulent registrations, fake sweepstakes entries, and other nefarious things, publishers responded by testing users to see if they were human or not.

CAPTCHA implementations can be found on more than 3.5 million sites globally, and human beings solve CAPTCHA implementations more than 300 million times a day.

img 569730b687364

 

Google Lunches a new reCAPTCHA technology to protect your security and sites from third party to hack.reCAPTCHA is a free service that protects your website from spam and abuse. reCAPTCHA uses an advanced risk analysis engine and adaptive CAPTCHAs to keep automated software from engaging in abusive activities on your site.

img 5697316af0091

Applications:

Captcha have several applications list which are used as-

  • Website Registration
  • Online polls
  • Newsgroups, Blogs etc…
  • Reducing SPAM

 

 

Some Examples of CAPTCHA:

Text Based Captcha-

 

img 569732a9272b2

Graphics based Captcha:

img 569732e09ad8b

  • Advanced security System.
  • Ease of use
  • Creation of values

Audio Based Captcha:

img 56973351b0e8d

Advantages:

Distinguishes between a human and a machine
Makes online polls more legitimate
Reduces spam and viruses
Makes online shopping safer
Diminishes abuse of free email account services

Disadvantages:

Sometimes very difficult to read
Are not compatible with users with disablilities
Time-consuming to decipher
Technical difficulties with certain internet browsers
May greatly enhance Artificial Intelligence

 

 

Awadhesh Kumar

Jain Software Developers

 

 

4G Technology

img 5695dad762fa6

Introduction:

ž4G stands for the fourth generation of cellular wireless standards.

žIt is a successor to 3G and 2G families of standards.

žFourth generation mobile communications systems that are characterized by high-speed data rates at 20 to 100 Mbps

Objectives of 4G Technology:

img 5695db33589d9

  • ž4G is being developed to accommodate the QoS
  • žMobile broadband access
  • žMMS
  • žVideo chat
  • žMobile TV like HDTV
  • žDigital video broadcasting
  • žA data rate of at least 100 Mbit/s
  • žSmooth hand off across heterogeneous networks
  • žAn all IP, packet switched network.

ITU Requirement And 4G Technology:

  • žBased on an all-IP packet switched network.
  • žPeak data rates of up to approximately 100 Mbit/s
  • žScalable channel bandwidth, between 5 and 20 MHz, optionally up to 40 MHz
  • ž802.16m standardized by the IEEE (i.e. WiMAX)
  • žLTE Advanced standardized by the 3GPP

    img 5695ddb3efd40

Principles of Technology:

img 5695dc3d251a8

  • žMIMO
  • žOFDM/OFDMA
  • žTurbo principle error-correcting codes
  • žChannel-dependent scheduling
  • žIP V6

Data Rates Table:

img 5695dc6986488

4G Candidate Systems:

  • žLTE Advanced
  • žIEEE 802.16m or WirelessMAN-Advanced
  • ž3GPP Long Term Evolution (LTE)ž
  • žMobile WiMAX (IEEE 802.16e)ž
  • žUMB (formerly EV-DO Rev. C)ž
  • žFlash-OFDMž
  • žiBurst and MBWA (IEEE 802.20) systems

3G Vs 4G:

img 5695de6c38512

3G Technology:

img 5695dea2bc943

  • Predominantly voice driven – data was always add on
  • Wide area cell-based
  • 1800-2400 MHz
  • Circuit and packet switched networks.
  • Combination of existing & evolved equipment.
  • Data rate (up to 2Mbps).
  • Optimized antenna design, multi-band adapters
  • A number of air link protocols, including IP

4G Technology:

img 5695dee32fd8e

  • Converged data and voice over IP
  • Hybrid – Integration of Wireless LAN (WiFi, Bluetooth) and wide area.
  • Higher frequency bands 2-8 GHz
  • Entirely packet switched networks.
  • All network elements are digital.
  • Higher bandwidth (up to 100Mbps).
  • Smarter Antennas, software multi-band and wide band radios
  • All IP (IPv6.0)

Features:

  • žHigh usability: anytime, anywhere, and with any technology
  • žSupport for multimedia services at low transmission cost
  • žPersonalization
  • žIntegrated services

 

Awadhesh Kumar

Jain Software Developers

 

What is Blue Brain?

img 56948a054dd88

  • “Blue brain” `The name of the world’s first virtual brain. That means a machine   that can function as human brain.
  • The main aim is to upload human brain into machine.
  • Is it possible..? Answer is “yes”
  • The IBM is now developing a virtual brain known as the Blue brain. It would be the world’s first virtual brain.

What is Virtual Brain?

img 56948a6159a8d

  1. žWe can say Virtual brain is an artificial brain, which does not actually the natural brain, but can act as the brain.
  2. žIt can think like brain, take decisions based on the past experience, and response as the natural brain can.

Why need Virtual Brain?

žToday we are developed because of our intelligence. Intelligence is the inborn quality that can not be created .Some people have this quality ,so that they can think up to such an extent where other can not reach .

žHuman society is always need of such intelligence and such an intelligent brain to have with. But the intelligence is lost along with the body after the death. The virtual brain is a solution to it.

Brain Simulation:

img 56948c8fc0a69

Normal Brain VS Simulated Brain-

  • Normal Brain-
  1. INPUT: žThrough the natural neurons
  2. INTERPRETATION: žBy different states of the neurons in the brain.
  3. OUTPUT:ž Through the natural neurons.
  4. PROCESSING: žThrough arithmetic and logical calculations.ž
  5. MEMORY:ž Through permanent states of neurons
  • Simulated Brain-
  1. INPUT: žThrough the silicon chip or artificial neurons
  2. INTERPRETATION: žBy a set of bits in the set of register .
  3. OUTPUT: žThrough the silicon chip.
  4. PROCESSING: žThrough arithmetic and logical calculation and artificial intelligence
  5. MEMORY: žThrough Secondary memory

Artificial Neural Network of Brain:

img 56948c04db224

Uploading Human Brain:

  1. žThe uploading is possible by the use of small robots known as the Nanobots
  2. žThese robots are small enough to travel through out our circulatory system. They will be able to monitor the activity and structure of our central nervous system.
  3. žThey will be able to provide an interface with computers that is as close as our mind can be while we still reside in our biological form.
  4. žNanobots could also carefully scan the structure of our brain, providing a complete readout of the connections.
  5. žThis information, when entered into a computer, could then continue to function as us.
  6. žThus the data stored in the entire brain will be uploaded into the computer.

 

Hardware & Software Requirement:

1.A super computer

2.Memory with a very large storing capacity

3.Processor with a very high processing power

4.A very wide network.

5. 100 kilowatts power consumption.

6.A program to convert the electric impulses from the brain to input signal, which is to be received by the computer, and vice versa.

7.Very powerful Nanobots to act as the interface between the natural brain and the computer

 

Disadvantages:

   Further, there are many new dangers these technologies will open. We will be susceptible to new forms of harm.

  1. We become dependent upon the computer systems.
  2. Others may use technical knowledge against us.
  3. Computer viruses will pose an increasingly critical threat.
  4. The real threat, however, is the fear that people will have of new technologies. Clear evidence of this type of fear is found today with respect to human cloning.

 

Awadhesh Kumar

Jain Software Developers

Request a Free Estimate
Enter Your Information below and we will get back to you with an estimate within few hours
0