Tech-Forum

Cyber Bullying

What is Cyber Bullying?

When the internet, cell phones or other digital devices are used to send or post text or images intended to hurt or embarrass another person.Examples of cyber bullying include mean text messages or emails, rumours sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles.

T CyberBullying1

There are two kinds of Cyber Bullying:

  • Direct Attacks- messages sent directly to the victim.
  • Cyber Bullying by Proxy– Using someone else to cyber bully a victim, this proxy may know they are cyber bullying and they may not.

1. Direct Attacks:img 5699d4dd7c9b0

  • Instant Messaging
  • Text Messaging
  • Blogs
  • Websites
  • Emailing Pictures
  • Stealing Passwords
  • Internet Polling- Hot or Not!
  • Hacking or sending spyware

2. By Proxy:

  • Someone else does the dirty work for the main cyber bully.
  • Bullies may hack into the victim’s account or steal their password. They may set up a new account pretending to be the victim.
  • Friends get angry with the victim.
  • This form of cyber bullying is very dangerous because many people are involved, not just the bully and the victim.

img 5699d544a9b90

Bullying V/S Cyber Bullying

1. Bullying:

  • Direct,
  • Physical: Hitting, Punching & Shoving.
  • Verbal: Teasing, Name calling & Gossip.
  • Non-verbal: Use of gestures & Exclusion.

bbb

2. Cyber Bullying:

  • ANONYMOUS.
  • Harassing text messages or emails.
  • Spreading rumours on social networks.
  • Emotional reactions cannot be determined.

cyber_bullying

 

 

 

 

 

 

Why do children Cyber Bullying?

  • Anger
  • Frustration
  • Revenge
  • Entertainment
  • To get Laughs or Reactions
  • Power Hungry
  • Because all motives for bullying are different so are the solutions and responses.cyberbullying

Who does this effect?

  • As hinted at previously, Cyber Bullying only impacts children.
  • Children of all ages can be victims of cyber bullying, Young children, Preteens and Teenagers.
  • Once adults get involved with Cyber Bullying it becomes Cyber Stalking or Cyber Harassment.

Image result for cyber bullying with kidsImage result for cyber bullying with kidsImage result for cyber bullying with kids

Consequences of Cyber Bullying:

  • Anxiety
  • Depression
  • Stress Related Disorders
  • Suicide
  • Withdrawal from Friends and Activities
  • Changes in mood, behaviour and appetite
  • Emotional Distress during and after using technology

hero Cyberbullying

 

Awadhesh Kumar

Jain Software Developers

 

What is Captcha ?

img 56972e634ab64

What is CAPTCHA?

  • CAPTCHA stands for Completely Automated Public Turing test to tell Computers and Humans Apart.
  • A challenge question
  • First used by Altavista in1997 but officially in 2000 by Luis Von .

WHY USED?

Since the dawn of the Internet, people have tried to abuse websites for both sport and profit. As the abuse became profitable, the scale of abuse grew using automated software (sometimes referred to as bots). To prevent bots from overrunning sites with spam, fraudulent registrations, fake sweepstakes entries, and other nefarious things, publishers responded by testing users to see if they were human or not.

CAPTCHA implementations can be found on more than 3.5 million sites globally, and human beings solve CAPTCHA implementations more than 300 million times a day.

img 569730b687364

 

Google Lunches a new reCAPTCHA technology to protect your security and sites from third party to hack.reCAPTCHA is a free service that protects your website from spam and abuse. reCAPTCHA uses an advanced risk analysis engine and adaptive CAPTCHAs to keep automated software from engaging in abusive activities on your site.

img 5697316af0091

Applications:

Captcha have several applications list which are used as-

  • Website Registration
  • Online polls
  • Newsgroups, Blogs etc…
  • Reducing SPAM

 

 

Some Examples of CAPTCHA:

Text Based Captcha-

 

img 569732a9272b2

Graphics based Captcha:

img 569732e09ad8b

  • Advanced security System.
  • Ease of use
  • Creation of values

Audio Based Captcha:

img 56973351b0e8d

Advantages:

Distinguishes between a human and a machine
Makes online polls more legitimate
Reduces spam and viruses
Makes online shopping safer
Diminishes abuse of free email account services

Disadvantages:

Sometimes very difficult to read
Are not compatible with users with disablilities
Time-consuming to decipher
Technical difficulties with certain internet browsers
May greatly enhance Artificial Intelligence

 

 

Awadhesh Kumar

Jain Software Developers

 

 

4G Technology

img 5695dad762fa6

Introduction:

ž4G stands for the fourth generation of cellular wireless standards.

žIt is a successor to 3G and 2G families of standards.

žFourth generation mobile communications systems that are characterized by high-speed data rates at 20 to 100 Mbps

Objectives of 4G Technology:

img 5695db33589d9

  • ž4G is being developed to accommodate the QoS
  • žMobile broadband access
  • žMMS
  • žVideo chat
  • žMobile TV like HDTV
  • žDigital video broadcasting
  • žA data rate of at least 100 Mbit/s
  • žSmooth hand off across heterogeneous networks
  • žAn all IP, packet switched network.

ITU Requirement And 4G Technology:

  • žBased on an all-IP packet switched network.
  • žPeak data rates of up to approximately 100 Mbit/s
  • žScalable channel bandwidth, between 5 and 20 MHz, optionally up to 40 MHz
  • ž802.16m standardized by the IEEE (i.e. WiMAX)
  • žLTE Advanced standardized by the 3GPP

    img 5695ddb3efd40

Principles of Technology:

img 5695dc3d251a8

  • žMIMO
  • žOFDM/OFDMA
  • žTurbo principle error-correcting codes
  • žChannel-dependent scheduling
  • žIP V6

Data Rates Table:

img 5695dc6986488

4G Candidate Systems:

  • žLTE Advanced
  • žIEEE 802.16m or WirelessMAN-Advanced
  • ž3GPP Long Term Evolution (LTE)ž
  • žMobile WiMAX (IEEE 802.16e)ž
  • žUMB (formerly EV-DO Rev. C)ž
  • žFlash-OFDMž
  • žiBurst and MBWA (IEEE 802.20) systems

3G Vs 4G:

img 5695de6c38512

3G Technology:

img 5695dea2bc943

  • Predominantly voice driven – data was always add on
  • Wide area cell-based
  • 1800-2400 MHz
  • Circuit and packet switched networks.
  • Combination of existing & evolved equipment.
  • Data rate (up to 2Mbps).
  • Optimized antenna design, multi-band adapters
  • A number of air link protocols, including IP

4G Technology:

img 5695dee32fd8e

  • Converged data and voice over IP
  • Hybrid – Integration of Wireless LAN (WiFi, Bluetooth) and wide area.
  • Higher frequency bands 2-8 GHz
  • Entirely packet switched networks.
  • All network elements are digital.
  • Higher bandwidth (up to 100Mbps).
  • Smarter Antennas, software multi-band and wide band radios
  • All IP (IPv6.0)

Features:

  • žHigh usability: anytime, anywhere, and with any technology
  • žSupport for multimedia services at low transmission cost
  • žPersonalization
  • žIntegrated services

 

Awadhesh Kumar

Jain Software Developers

 

What is Blue Brain?

img 56948a054dd88

  • “Blue brain” `The name of the world’s first virtual brain. That means a machine   that can function as human brain.
  • The main aim is to upload human brain into machine.
  • Is it possible..? Answer is “yes”
  • The IBM is now developing a virtual brain known as the Blue brain. It would be the world’s first virtual brain.

What is Virtual Brain?

img 56948a6159a8d

  1. žWe can say Virtual brain is an artificial brain, which does not actually the natural brain, but can act as the brain.
  2. žIt can think like brain, take decisions based on the past experience, and response as the natural brain can.

Why need Virtual Brain?

žToday we are developed because of our intelligence. Intelligence is the inborn quality that can not be created .Some people have this quality ,so that they can think up to such an extent where other can not reach .

žHuman society is always need of such intelligence and such an intelligent brain to have with. But the intelligence is lost along with the body after the death. The virtual brain is a solution to it.

Brain Simulation:

img 56948c8fc0a69

Normal Brain VS Simulated Brain-

  • Normal Brain-
  1. INPUT: žThrough the natural neurons
  2. INTERPRETATION: žBy different states of the neurons in the brain.
  3. OUTPUT:ž Through the natural neurons.
  4. PROCESSING: žThrough arithmetic and logical calculations.ž
  5. MEMORY:ž Through permanent states of neurons
  • Simulated Brain-
  1. INPUT: žThrough the silicon chip or artificial neurons
  2. INTERPRETATION: žBy a set of bits in the set of register .
  3. OUTPUT: žThrough the silicon chip.
  4. PROCESSING: žThrough arithmetic and logical calculation and artificial intelligence
  5. MEMORY: žThrough Secondary memory

Artificial Neural Network of Brain:

img 56948c04db224

Uploading Human Brain:

  1. žThe uploading is possible by the use of small robots known as the Nanobots
  2. žThese robots are small enough to travel through out our circulatory system. They will be able to monitor the activity and structure of our central nervous system.
  3. žThey will be able to provide an interface with computers that is as close as our mind can be while we still reside in our biological form.
  4. žNanobots could also carefully scan the structure of our brain, providing a complete readout of the connections.
  5. žThis information, when entered into a computer, could then continue to function as us.
  6. žThus the data stored in the entire brain will be uploaded into the computer.

 

Hardware & Software Requirement:

1.A super computer

2.Memory with a very large storing capacity

3.Processor with a very high processing power

4.A very wide network.

5. 100 kilowatts power consumption.

6.A program to convert the electric impulses from the brain to input signal, which is to be received by the computer, and vice versa.

7.Very powerful Nanobots to act as the interface between the natural brain and the computer

 

Disadvantages:

   Further, there are many new dangers these technologies will open. We will be susceptible to new forms of harm.

  1. We become dependent upon the computer systems.
  2. Others may use technical knowledge against us.
  3. Computer viruses will pose an increasingly critical threat.
  4. The real threat, however, is the fear that people will have of new technologies. Clear evidence of this type of fear is found today with respect to human cloning.

 

Awadhesh Kumar

Jain Software Developers

What is Cloud Computing?

 

Cloud storage is a cloud computing model in which data is stored on remote servers accessed from the internet, or “cloud.” It is maintained, operated and managed by a cloud storage service provider on a storage server that is built on virtualization techniques.

Benefits of Cloud Storage:
1. Flexibility

Cloud-based services are ideal for businesses with growing or fluctuating bandwidth demands. If you want to increase, its easy to scale up your cloud capacity. Likewise, if you need to decrease again, the flexibility will be baked into the service.

2. Disaster recovery

Businesses of all sizes should be investing in robust disaster recovery, but for smaller businesses that lack the required cash and expertise, this is often more an ideal than the reality. Cloud is now helping more organizations buck that trend.

3. Automatic software updates

The beauty of cloud computing is that the servers are off-premise, out of sight and out of your hair. Suppliers take care of them for you and roll out regular software updates.

4. Work from anywhere

By using cloud computing, if you have got an internet connection you can work from anywhere. And with most serious cloud services offering mobile apps, youre not restricted to which device youve got to hand.

img 569348813ade5

  • Cloud Computing is a general term used to describe a new class of network-based computing that takes place over the Internet.
  • Cloud computing is a synonym for distributed computing over a network and means the ability to run a program on many connected computers at the same time.
  • These platforms hide the complexity and details of the underlying infrastructure from users and applications by providing very
  • Simple graphical interface or Applications.
  • Cloud Computing is the result of evolution and adoption of existing
  • Technologies and paradigms.

 

TYPES OF CLOUD COMPUTING-

  1. Public Cloud Accessed by any subscriber with an internet connection and access to the cloud space.img 5693487308e27
  2. Private Cloud – A private cloud is established for a specific group or organization.?
  3. Community Cloud – Shared among two or more organizations that have similar cloud requirements.
  4. Hybrid Cloud – A hybrid cloud is essentially a combination of at least two clouds.img 5693485727fcc

CHOOSING A CLOUD PROVIDER-?img 569348252711b

  1. Software as a Service –A SaaS provider gives subscribers access to both resources and applications. Examples of SaaS include Google Apps, Casengo, TradeCard, Salesforce etc.
  2. Platform as a Service -A PaaS provider gives subscribers access to the components. Examples of PaaS include Cloud Foundry, Force.com, Engine Yard, Mendix, and Google App Engine etc.
  3. Infrastructure as a Service?It deals with primarily with computational infrastructure. Examples of IaaS include Google Compute Engine, HP Cloud, and ReadySpace etc.

 

 

ADVANTAGES OF CLOUD COMPUTING:?

  • Lower computer costs:

You do not need a high-powered and high-priced computer to run cloud computing’s web-based applications.

  • Improved performance:

With few large programs hogging your computer’s memory, you will see better performance from your PC.

  • Reduced software costs:

Instead of purchasing expensive software applications, you can get most of what you need most cloud computing applications today, such as the Google Docs suite.

DISADVANTAGES:

  • Requires a constant Internet connection
  • Does not work well with low-speed connections
  • Stored data might not be secure
  • Stored data can be lost

 

Awadhesh Kumar

Jain Software Developers

Open Source Softwares

img 568df243a9605

Whats is Open Source Softwares?

  • Open source software(OSS) is computer software that is available in source code form.
  • Open source software generally allows anyone to create modifications of the software, port it to new operating systems and processor architectures, share it with others or, in some cases, market it.
  • A report by the Standish Group states that adoption of open-source software models has resulted in savings of about $60 billion per year to consumers

Definition:

Open source doesn’t just mean access to the source code. The distribution terms of open-source software must comply with the following criteria:

  • Free Redistribution
  • Source Code
  • Derived Works
  • Non-Discriminative
  • Distribution of License
  • Technology-Neutral
  • Non-Restrictive

 

img 568df2a8e58f9

 

 

 

 

 

 

 

 

 

History:

  • The free software movement was launched in 1983.
  • The Open Source Initiative (OSI) was formed in February 1998 by Eric S. Raymond and Bruce Perens.
  • The open source label came out of a strategy session held on April 7, 1998 in Palo Alto in reaction to Netscape’s January 1998 announcement of a source code release for Navigator (as Mozilla).

Development Tools:

Revision Control Software:

 

  • Concurrent Versions System (CVS)
  • Subversion(SVN)
  • GIT

COMPILER, TESTER AND DEBUGGER

  • Tinderbox
  • Bugzilla
  • GNATS

Communication Software

  • Xchat
  • Pidgin

 

 

 

img 568df4239645d

 

Awadhesh Kumar

Jain Software Developers

 

 

 

 

Direct Attach Storage (DAS)

Introduction:

DAS is a type of storage that is connected directly to the server which enables quick access to the data but only through the server.

Direct-attached storage (DAS) is a basic level storage in which the host computer holds the storage devices or these can be connected to one server at a time. Networked workstations can access the data only through the host. DAS was the first storage model that gained widespread acceptance and is widely used. Even though networked storage models are gaining popularity, DAS still finds takers because it is easy to deploy and has a low initial cost of deployment. It helps if you have an idea of what your data availability needs are at present and what they will be in the future.

Storage System:

DAS is the most basic storage subsystem that provides block-level storage, and it’s the building block for SAN and NAS. The performance of a SAN or NAS is ultimately dictated by the performance of the underlying DAS, and DAS will always offer the highest performance levels because it’s directly connected to the host computer’s storage interface. DAS is limited to a particular host and can’t be used by any other computer unless it’s presented to other computers over a specialized network called a SAN or a data network as a NAS server.

img 568b5568407cb

There are the three basic types of storage.

  • Direct Attached Storage (DAS),
  • Storage Area Network (SAN),
  • Network Attached Storage (NAS)

DAS is the basic building block in a storage system, and it can be employed directly or indirectly when used inside SAN and NAS systems. NAS is the highest layer of storage and can be built on top of a SAN or DAS storage system. SAN is somewhere between a DAS and a NAS.

SCSISmall computer system interface is one of the oldest forms of storage interfaces traditionally used in server or workstation class computers.

PATAParallel advanced technology attachment (originally called ATA and sometimes known as IDE or ATAPI) was the most dominant desktop computer storage interface from the late 1980s until recently, when the SATA interface took over.

SATASerial advanced technology attachment is the official successor to PATA. So far, there have been two basic versions of SATA, with SATA-150 and SATA-300.

SASSerial Attached SCSI is the latest storage interface that’s gaining dominance in the server and storage market. SAS can be seen as a merged SCSI and SATA interface, since it still uses SCSI commands yet it is pin-compatible with SATA.

FC — Fibre channel is both a direct connect storage interface used on hard drives and a SAN technology. FC offers speeds of 100, 200, and 400 MB/s.

Flash — Flash memory isn’t a storage interface, but it is used for very high-end storage applications because it doesn’t have the mechanical latency issues of hard drives.

RAM — Random access memory is also not traditionally seen as a storage medium, but it can be used as an ultra-fast storage device.

API:

img 568b57937ba7d

Working:

img 568b57c787015

BackUp Solution:

Data De-Duplication

Continuous Data Protection

Tape Drives

Tape Libraries

img 568b581815129

Disk to Disk

Storage Management Solutions

Benefits:

  • The key difference between Direct Attached Storage (DAS) and NAS is that DAS is simply an extension to an existing server and is not networked while NAS sits on a network as its own entity; it is easier to share files with NAS.
  • Availability of data might potentially be increased . if it provides built-in RAID & Clustering capabilities.

Limitations:

  • Not suitable for data intensive applications.
  • Low data transfer rate.
  • Limited scalability.
  • Highly initial cost.

Applications:

1.File/Print server

2.Application specific server

3.Video Imaging

4.Graphical image store

5.Centralized file sharing

6.File system mirroring

7.Snap shot critical data

8.Replacement of traditional backup methods

 

 

Awadhesh Kumar

Jain Software Developers

 

Upcoming Latest Android Version- Android 6.0 Marshmallow

I know that everyone using and enjoying Android Lollipop 5.1.2 but today, I introducing about the upcoming latest android version that is Android 6.0 Marshmallow. Its is overcome  the all previous bugs and problems and also provide new key features that is improve the quality and improve the calculations power and speedup the smartphone.

img 568614cd880e2

Android Marshmallow release date:

Android Marshmallow was initially announced at Google I/O on May 28, when it was released as the Android M developer preview. Several updates to the preview came out before Marshmallow was officially named on August 17. Google finally unveiled Android 6.0 Marshmallow, alongside the 2015 Nexus devices, on September 29, 2015.

Android Marshmallow Layout and Design:

Home Screen:

Home screen is not more differ from lollipop version, it is same or similar as previous version that appear a google search box (with voice command) but in this version have some new key feature like inside search box have a tag line which is say a user to talk and search.

img 568614ec52b22

 

Lock Screen:

img 56861523e43d9

          The Marshmallow lock screen is almost similar to Lollipop’s that is also provide with expandable notifications and app shortcuts. But where Lollipop had shortcuts in the bottom corners that too you to the camera and dialer, Marshmallow replaces the dialer shortcut with one to Google’s voice search.

Marshmallow version have lots of feature and key points to explain but here I explain only two points to describe Latest version. It has some other key features that’s completely differ from old one-

img 5686155338142

  • App Icons,
  • Lock screen,
  • Animations and Easter Egg
  • Dark theme and rotation support and many more.

 

 Awadhesh Kumar

Jain Software developers

 

 

 

 

Tech-FORUM

[box]A forum devoted to discuss technical stuffs . We welcome you to join this forum and ask anything related to technical world such as computer troubleshooting  ,programming ,latest news ,etc.[/box]

N7 Tech Wallpaper by Hayter

technical support

Request a Free Estimate
Enter Your Information below and we will get back to you with an estimate within few hours
0