Tuesday 25 December 2012

Android-powered 'iPhone' on sale?

Hang on….before you reach to any conclusion after reading the headline, I would like to clarify that it's not Apple's iPhone. A Brazilian company IGB Eletronica SA is selling Android-based iphones in Brazil. Interestingly, IGB owns the rights to the word 'iphone' in Brazil.

The first model, called 'iphone Neo One', is a low-powered dual-SIM smartphone running Android 2.3 Gingerbread and features a single core 700MHz processor, a 3.7-inch display, and a 5 megapixel camera.

IGB was formed this year after the restructuring of Gradiente Eletronica SA, which had applied for rights in Brazil to register its products under the name IPHONE in 2000, while Apple came up with its first smartphone under the iPhone brand in 2007. Also, in 2008 the company secured rights to the name from a local regulator of patents.

So, are you happy to see this interesting merger of iPhone and Android???
 

Wednesday 14 November 2012

Intel, Qualcomm may invest in Sharp

US-based chipmakers Intel and Qualcomm are reportedly in talks to jointly invest about Rs.2,000 crore (30 billion yen ($378 million)) in Japanese electronics manufacturer Sharp Corp.
"Sharp is expected to reach an agreement as early as the end of this month with Qualcomm, while talks with Intel are less concrete amid the chipmaker's unclear financial picture," Reuters quoted an unidentified source as saying. However, another report from The Asahi Shimbun suggests that Intel and Sharp have already entered into alliance talks over joint development of components for smartphones and other electronics products. Negotiations between the two companies are on whether Intel can develop a CPU specifically for Sharp's new IGZO technology—a new liquid crystal display that offers higher resolutions and low power consumption in touchscreens displays. 
Last week, Fitch Ratings downgraded Sharp's credit to junk on Nov. 2 saying, "Fitch does not foresee any meaningful operational turnaround in the company's core business over the short- to medium-term."


 

Wednesday 7 November 2012

New tech may double smartphone battery life

A team of engineers is working towards extending the battery life of smartphones – one of the biggest concerns smartphone users have today.
Massachusetts-based Eta Devices, a company co-founded by two MIT electrical engineering professors Joel Dawson and David Perreault, have come up with an alternative amplifier technology that can extend smartphone battery life, reports Phys.org.
  The engineers call their approach "asymmetric multi-level outphasing (AMO)." It is able to "intelligently" select, among voltages that can be sent across the transistor, the one that minimises power consumption. In 2009, Dawson and Perreault, along with SungWon Chung, Philip Godoy, Taylor Barton, and Everest Huang, wrote a paper to describe AMO, calling it a new outphasing transmitter architecture in which "the supply voltage for each power amplifier can switch among multiple levels."The AMO modulation technique was found to increase overall efficiency over a much wider output power range than the standard LINC system while maintaining high linearity. "This architecture results in significant efficiency improvement over previous methods." Smartphone battery life, however, is not first in line for Eta Devices, which has been working on their concept, reaching various "milestones" along the way of their R&D. The company will attempt to prove itself next year in applications for Long Term Evolution (LTE) base stations.They hope to reduce base station energy usage by impressive amounts. In large base stations, the power amplifier takes as much as 67 per cent of the power, with another 11 per cent for air-conditioning.
  "The new amplifier would reduce overall power consumption by half," said Eta Devices CEO Mattias Astrom. The company is expected to launch its product in February at Mobile World Congress in Barcelona. Next will come a chip-scale version of the technology, which is still in development, to increase the battery life of smartphones. The engineers hope for a smartphone chip that can lead to a single-power amplifier to handle the different modes and frequencies used by global standards, including CDMA, GSM, and 4G/LTE.

 

Wednesday 24 October 2012

2nd Green Revolution vital to achieve self-sufficiency in food: PM of INDIA
 Manmohan Singh          
                                     

Prime Minister Manmohan Singh today said the country has achieved a record foodgrain production of 241 million tones (MT) in 2010-11 crop year but stressed on ushering in a second Green Revolution to meet the mounting future domestic food grain demands.
"Production of major crops has been at record levels in the year just over. An estimated total production of 241 million tones in 2010-11 was achieved because of record production of wheat, maize and pulses.
"Oilseed production also set a new record," the PM said, while delivering speech at an ICAR function here.
The estimated 241 MT foodgrain production is higher by 5 MT as announced by the Agriculture Ministry in its third estimate. It is also higher by 23 MT as compared to previous crop year 2009-10.
Crop year runs from July to June.
He said the record foodgrain production has been achieved because of hard work of the farmers and scientists.
But, Singh emphasised that the country needs a second green revolution to further accelerate agri growth and achieve self-sufficiency in food.
He said the total demand for foodgrain of the country is projected to touch 281 MT by 2020-21.
"Meeting this demand will necessitate a growth rate of nearly 2 per cent per annum in foodgrain production," the PM said.
     
           
 Stating that the country was spending about 0.6 per cent of its agriculture GDP on agricultural research and development at present, he said this needs to be enhanced by 2-3 times by 2020.
"India needs a second green revolution that is broad-based, inclusive and sustainable," Singh said.
Referring to mounting future domestic foodgrain demands, Singh exhorted the scientists to gear up for the task.
"The enormity of the task ahead is indicated by the fact that during the 10 year period 1997-98 to 2006-07, our foodgrain production grew at an average annual rate of only 1 per cent," he said.
"Although foodgrain production has since regained the requisite momentum and the agriculture sector as a whole is set to grow at 3 per cent per annum during the 11th plan, we can not be complacent," the PM added.

Monday 1 October 2012

HACKING

Hacking definition
                     
Before going to see what is hacking we should now about history Hacking. I mean when does its start's in which it has been implemented at first and who was the founder of hacking.
Hacking is not limited to computers. The real meaning of hacking is to expand the components of any electronic device; to use them beyond the original intentions of the manufacture.
Hacker is a term used by some "a clever programmer" and by others, especially those in popular media, to mean "someone who tries break into computer systems."

What does ethical hacking means?
After entering 21st century we came across a very useful technical term Internet and that was also open for public use but not in the mass while in comparison of past 10 years we are watching everyone hanging around the sites and even some of them became popular for the term hacking being a hacker to make others web pages hack and get unethical access over all the system and information without owner’s interest.
And now we are also talking about Ethical Hacking, so what the term is this? And why we should all bother about it during handling a website or managing other’s property online being a part time or full time employee or the consultant.
If you are interested to get the exact definition of Ethical Hacking that would really not be different than all the following as below and already out there at the Internet
1). Ethical hacking can be defined as a legal access of an Internet geek in any organization and their online property after their own permission to make it all clear that how secure they are or not.
Or you can say the organization takes a test of their security status online or offline by hiring some expert or an individual.
2). Ethical Hackers are the white hat peoples who use their knowledge for the sake of their countrymen and their security basically online. They also work for cyber crime department under the security departments.
 3). Ethical hacking can also be called the term when we get’s access in our own or others account after the recommendations to get that all back what was previously stolen by a hacker.

History of Hacking

 

Hacking is not limited to computers. The real meaning of hacking is to expand the capabilities of any electronic device; to use them beyond the original intentions of the manufacturer. As a matter of fact, the first hackers appeared in the 1960's at the Massachusetts Institute of Technology (MIT), and their first victims were electric trains. They wanted them to perform faster and more efficiently. So, is hacking always bad? Not really. It only depends on how to use it. But it wasn't until a group of these hackers decided to exert their knowledge in the computer mainframes of the MIT.
Bruce Sterling traces part of the roots of the computer underground to the Yippies, a 1960s counterculture movement which published the Technological Assistance Program (TAP) newsletter.TAP was a phone phreaking newsletter that taught the techniques necessary for the unauthorized exploration of the phone network. Many people from the phreaking community are also active in the hacking community even today, and vice versa.

Hacking Types
                    
1) Inside Jobs - Most security breeches originate inside the network that is under attack. Inside jobs include stealing passwords (which hackers then use or sell), performing industrial espionage, causing harm (as disgruntled employees), or committing simple misuse. Sound policy enforcement and observant employees who guard their passwords and PCs can thwart many of these security breaches.

2) Rogue Access Points - Rogue access points (APs) are unsecured wireless access points that outsiders can easily breech. (Local hackers often advertise rogue APs to each other.) Rogue APs are most often connected by well-meaning but ignorant employees.

3) Back Doors - Hackers can gain access to a network by exploiting back doors administrative shortcuts, configuration errors, easily deciphered passwords, and unsecured dial-ups. With the aid of computerized searchers (bots), hackers can probably find any weakness in your network.

4) Viruses and Worms - Viruses and worms are self-replicating programs or code fragments that attach themselves to other programs (viruses) or machines (worms). Both viruses and worms attempt to shut down networks by flooding them with massive amounts of bogus traffic, usually through e-mail.

5) Trojan Horses - Trojan horses, which are attached to other programs, are the leading cause of all break-ins. When a user downloads and activates a Trojan horse, the hacked software (SW) kicks off a virus, password gobbler, or remote-control SW that gives the hacker control of the PC.

6) Denial of Service - DoS attacks give hackers a way to bring down a network without gaining internal access. DoS attacks work by flooding the access routers with bogus traffic (which can be e-mail or Transmission Control Protocol, TCP, packets).

Classifications

 

Several subgroups of the computer underground with different attitudes use different terms to demarcate themselves from each other, or try to exclude some specific group with which they do not agree. Eric S. Raymond advocates that members of the computer underground should be called crackers. According to (Clifford R.D. 2006) a cracker or cracking is to "gain unauthorized access to a computer in order to commit another crime such as destroying information contained in that system”. These subgroups may also be defined by the legal status of their activities.

White hat

A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. The EC-Council, also known as the International Council of Electronic Commerce Consultants has developed certifications, courseware, classes, and online training covering the diverse arena of Ethical Hacking.
Black hat
A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal”. Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network. They choose their targets using a two-pronged process known as the "pre-hacking stage".

Differences Between White Hat And A Black Hat Hacker

The difference between black hat and white hat hackers is that white hat hacker uses their skills and knowledge as a way to defend someone from attackers. That means that white hat hackers offer their services to corporations, public organizations and educational institutions.
These services include a complete revision of their computer network security, implementation of new security systems (they may be hardware or software), user training and future recommendations. All these measures will be able to combat unauthorized hacking; black hat hackers, however, will continue trying
.

What is Hacktivism?
                          
Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist.
Hacktivism is the use of computers and computer networks as a means of protest to promote political ends. The term was first coined in 1996 by a member of the Cult of the Dead Cow hacker collective named Omega. hacking as "illegally breaking into computers" is assumed, and then hacktivism could be defined as "the use of legal and/or illegal digital tools in pursuit of political ends". These tools include web site defacements, redirects, denial-of-service attacks, information theft, web site parodies, virtual sit-ins, typo squatting and virtual sabotage. If hacking as "clever computer usage/programming" is assumed, and then hacktivism could be understood as the writing of code to promote political ideology: promoting expressive politics, free speech, human rights, and information ethics through software development.
A hacktivist uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause. For example, one might leave a highly visible message on the home page of a Web site that gets a lot of traffic or which embodies a point-of-view that is being opposed. Or one might launch a denial-of-service attack to disrupt traffic to a particular site.

How To Prevent Hacker Attacks

 

Hackers are always looking for a way to get into computers of other persons. It can be something as simple as phising confidential information (like credit card or bank account numbers) to complex hacking routines that use your computer as a repository for illegal content (like music or movies with copyright).

Unfortunately there is no magical software to prevent hackers; and it will never exist. It doesn't matter how much money or resources you invest in designing the perfect system, someone will find the way to crack it. Even the biggest government agencies like NASA, CIA and NSA have been victims of hackers.

Computer hacking and the laws

                        

Computer hacking is illegal and carries a possible sanction of imprisonment. Computer hacking has been thrown into the public eye recently with increasing allegations that certain newspapers hired private investigators to hack into people’s phones and computers in order to obtain stories that would sell.
An increasing concern to all governments around the world is the role of what is known as cyber attacks. Cyber attacks occur when an individual or group of individuals hack into the computer system of a company, association or even government department and attempts to paralyze the system.
The motivation for carrying out a cyber attack can be vast; groups can range from those seeking information to sell on, to interest groups looking to bring down whole companies, and even terrorist groups looking to paralyze government departments.
It is on account of the vast increases in cyber attacks in recent years that government spending has increased dramatically in a bid to protect national security information. Enforcement is taking place, but we have to wonder if computer hacking laws are really having any effect against cyber hacking. This article will show what is being done against cyber crime.

Effectiveness of Computer Hacking Laws

 

Like any other law, the effectiveness must be determined by its deterrence. While there will always be those that want to see if they can do it, and get away with it (any crime), there are always the many more who may not do something if they are aware of its unlawfulness - and possible imprisonment.

Tuesday 18 September 2012

Telecommunication


Telecommunication is the transmission of information.
Telecommunications has been an important part of our culture since the invention of the telegraph in the 1800s. It started as a form of long distance communication. The telegraph provided a way to send messages to people far away, that was faster than sending mail. Over the course of the last century, telecommunications has taken on a whole new purpose and plays a much bigger role in our everyday lives.
In modern times, telecommunications involves the use of electrical devices such as the telegraph, telephone, and teleprompter, as well as the use of radio and microwave communications, as well as fiber optics and their associated electronics, plus the use of the orbiting satellites and the Internet.
A revolution in wireless telecommunications began in the 1900s (decade) with pioneering developments in wireless radio communications by Nikola Tesla and Guglielmo Marconi. Marconi won the Nobel Prize in Physics in 1909 for his efforts. Other highly notable pioneering inventors and developers in the field of electrical and electronic telecommunications include Charles Wheatstone and Samuel Morse (telegraph), Alexander Graham Bell (telephone), Edwin Armstrong, and Lee de Forest (radio), as well as John Logie Baird and Philo Farnsworth (television).
Telecommunication systems work by transferring signals from different nodes until they reach their destinations.

History

Ancient systems

Greek hydraulic semaphore systems were used as early as the 4th century BC. The hydraulic semaphores, which worked with water filled vessels and visual signals, functioned as optical telegraphs. However, they could only utilize a very limited range of pre-determined messages, and as with all such optical telegraphs could only be deployed during good visibility conditions.

Systems since the Middle

In 1792, Claude Chappe, a French engineer, built the first fixed visual telegraphy system (or semaphore line) between Lille and Paris. However semaphore systems suffered from the need for skilled operators and the expensive towers at intervals of 10–30 kilometers (6–20 mi). As a result of competition from the electrical telegraph,

Types of Telecommunication Mediums

 

Radio

According to WCBN, Guglielmo Marconi built his first radio equipment in 1894, and established the world's first radio link in 1899 between England and France. Radio was the first form of telecommunication that served multiple purposes. It provided radio plays and music for entertainment, and newscasts with up-to-date news and information from around the world.


Telephone

        

 telephone-past                                      present
Since the invention of the telephone, devices have dramatically evolved from relatively primitive tools of communication to state-of-the-art mobile multi-communications sources. Gardiner Hubbard formed the first telephone company, the Bell Telephone Company, in 1877. Today the telephone as evolved into the cell phone and is a one-stop hub for all of our communication needs. Cell phones allow you to connect with people on the phone while you stay on the go.

Television

            

 television-past                                          present

According to The History of Television, a German man named Paul Gottlieb Nipkow developed one of the earliest forms of television. As it continued to evolve, there were two different versions being developed: a mechanical version and an electrical version. The mechanical version would eventually be phased out by the electrical. The electrical version was perfected by a 21-year-old inventor named Philo T. Farnsworth in 1927. Over the years, television has become a giant media empire. Today Television has become such an integral part in every human’s life. Television has totally changed our world.


Internet

The most modern means of communication in today’s world. In 1966, a man named Lawrence G. Roberts began developing the idea for an interconnected computer network. According to the Internet Society, it was in October of 1995 that the Federal Networking Council passed a resolution that defined the Internet as "a global information system that is logically linked together by a globally unique address based on the Internet Protocol." The Internet provides you with the opportunity to fulfill all of your communication needs. You can visit sites and listen to the radio, watch your favorite television shows and movies chat with people in a live video chat and stay connected with relatives via email. With the Internet, people in the world are more connected than ever.  Internet is a boon to man if used in a proper way.

Types of Telecommunications used today
There are two primary types of telecommunication networks used today. A LAN, local area network, which is privately owned and which is used for short distances. A LAN is usually used on college campuses or in business settings. The other type is a WAN, wide area network. WANS generally connect many different LANs and cover a very large area. Telecommunication networks can be owned, shared or leased from other companies. It is very expensive for one entity to supply all of the necessary mediums, such as fiber optics; therefore many networks share or lease lines with each other.

Components of Telecommunication

Components are the most essential parts of any communication systems. A telecommunication system has three main components. The first component is a transmitter which is used to send information. The information is sent in the form of electrical signals through some type of medium which makes up the second vital component. The third component is the receiver. This component receives the transmitted data and converts it into a form that is readable and understood. Computers, fiber optics and telecommunication's software consist of these components.

Digital technology

Telecommunications is being increasingly dominated by digital technology. A digital transmission carries information in the form of discrete packages of ones and zeros. A computer of some sort will then convert this kind of signal into complex digital information. Previous telecommunications technology, such as the radio, used a continuous analog signal that conveyed information by variations, such as its strength. This type of communication was more subject to distortion and noise interference from other sources.

Telecom Software
As the world of telecom is fast moving from proprietary systems to open standard based systems, a lot of intelligence of networks has shifted to software. The phrase "telecom software", that till very recently, meant applications run by telecom service providers on their computing platforms. Telecom software today broadly means anything from embedded software to content.
Broadly, the telecom software can be classified into three areas, not always mutually exclusive. They are—embedded software, system software, and application software that is used by service providers.
One can classify the nature of development of telecom software work into four categories—development of software for technology systems; the service provider onsite practices including development and integration; product development and services centered around products. But among the four categories the emerging areas seem to be service management, software broadband aggregation platforms.
Almost non-existent a couple of years back, a new breed of telecom software product companies are now targeting the emerging application areas like IP QoS, broadband aggregation, wireless-IP integration, etc.
Telecom towers radiation

With growing concerns over the impact of mobile radiation on human health, telecom towers have to reduce electromagnetic radiation.
Dangers of cell towers have been well-documented over the last decade. Cell tower radiation is indeed hazardous, and more and more people are concerned about it.
Although the telecom industry and federal governments maintain there’s no conclusive evidence of health risks of cell tower radiation, literally dozens of studies world-wide consistently warn us about the dangers.

What will it take to Alert People to the Dangers of Cell Towers?

With so much evidence about cell tower radiation health risks, how is it that governments allow cell phone companies to continue to erect more and more cell towers and antennas? One factor, of course, is that although ever-growing numbers of people are voicing concerns about possible health risks of cells towers, most people want good reception on their phones, wherever they happen to be. And competing cell phone companies are very accommodating; they strive to put up as many cell towers and antennas as they can to keep their far-roaming customers satisfied

 Approaches to Minimize the Risks of Radiation

There are several approaches you can take to minimize the risks of living near cell towers:
1. Avoid or minimize your exposure. If you find your home is surrounded by cell towers and moving isn’t an option, you can find some help from specially-formulated EMF protection paint, shielding fabric or shielding glass or tinting for windows.
2. Use EMF protection devices, such as pendants, chips or other protective devices. Good products will ground you into the earth’s electro-magnetic field to strengthen your biofield. This helps to restore cellular function and strengthen your immune system.
3. Reverse the damage that EMFs have already done. Do this through nutritional support, such as with anti-oxidant supplementation, which can counteract the effects of free radicals caused by EMF exposure.
4. The minimum distance of a tower (with two antennas) should be 35 meter from a residential building.
What are the advantages and disadvantages of telecommunication?
Advantages:
Quick and accessible communication
Lack of travel time
Saves time
Saves gasoline (do not have to drive distance)
More than two people can communicate to one another at the same time
Next "best thing" to being there
Easy to exchange ideas and information via phone and/or fax
World Wide access

Disadvantages:
Remote areas do not have access
Remote areas may not be able to afford necessary equipment
Cannot see whom you are speaking with
Cannot see facial expressions, therefore leads to misunderstandings
Cultural barriers
Poor connections or downed power lines during/after storms
Hazardous effects on public health by telecom towers

Communication in the Future
Communication has grown significantly over the past decades. The world was once unable to carry on conversation using voice telephones. Just as people once rode horses instead of driving vehicles, communications have improved drastically over the years.  
The inceptions of the cellular telephone, wireless internet and other technologies have given people the ability to contact and communicate with others from virtually anywhere in the world and at any time
Communication is a major topic in society. With the many steps that have been taken to bring the world the communication devices of today, it stands to reason that as more and more researchers and scientists work to develop newer devices, the technology of the future could be quite substantial.
Conclusion
Telecommunications have changed the world. The increasing globalization that has spread to almost all parts of daily life is very much a result of the improvement in telecommunications technology. Understanding the basics of telecommunication will help you to better understand the way that the modern world is being changed every day by this technology. People around the world have been brought closer to each other through telecommunications as the planet becomes a "global village." Let’s take this analogy one step further and deduce the future of telecommunications. If computing is embedded in everything and connectivity becomes everywhere, then we can imagine a world in which communication devices are less visible and information flows less intrusively.

If we look at telecommunication, the primary intent has been to communicate across a distance.