Thursday, 31 January 2013

ROBOTS AND ANDROIDS


For hundreds of years people have had a dream that they could create mechanical helpers for man. 

Robots have come a long way since the day the first robot was built in 1927. Nowadays, these machines are used as surgery robots, service robots, and military robots. It is startling to learn that scientists are now trying to make robots human-like by infusing emotions and expressions onto them. However, eyebrows are raised about their misuse too. An android is a robot or synthetic organism designed to look and act like a human, especially one with a body having a flesh-like resemblance.  Until recently, androids have largely remained within the domain of science fiction, frequently seen in film and television. However, advancements in robotic technology have allowed the design of functional and realistic humanoid robots. It is hardly surprising that man should create robots 'in his own image'

What is a Robot?

What is a robot? It has become increasingly difficult to define exactly what a robot is given the rapid developments that are occurring in the science and business of robotics. Even Joseph Engelberger, often credited as the “Father of Robotics,” was said to have once remarked, "I can't define a robot, but I know one when I see one.”Various encyclopedias describe robots as anything from a “mechanism guided by human controls” to “a machine that looks like a human being and can perform various complex acts of a human being”. More technically, the Robot Institute of America (1979) defines a robot as “a reprogrammable, multifunctional manipulator designed to move material, parts, tools, or specialized devices through various programmed motions for the performance of a variety of tasks."



What is an Android?

Androids, on the other hand, are humanoid robots built to realistically look and act like humans. This has unsurprisingly caused some controversies, especially in the case of fembots or gynoids (from the Greek word "gyn" meaning woman), whose aesthetic attributes and functions may be considered insulting to real women, while at the same time providing the prospect of human-like company to men. It has been argued that humanoid robots are not attempts to recreate humans, but are instead designed to work with them as well as for them through interactions in typical, everyday environments. Once this goal is fully achieved, then we can look forward to adding another definition for the word “robot.” So, a humanoid robot is a robot that can work with people.


An human looking Android 

So what, anyway, is the difference between a robot and an android?

 Well, although the terms are often interchanged or confused, a robot can be described as a machine which is capable of doing a job which would normally have been done by a human. An ordinary filter coffee machine would be too simple to fall into that category, but one with a timer which wakes you up to a fresh cup in the morning has the beginnings of a robot to it. More to the point, machines which can act autonomously, or semi-autonomously, can definitely be called robots. Whereas an android, or anthropomorphic droid, is a robot which looks humanoid and can operate in a human environment.


Future of Robots



Today we have semi-autonomous robots—surgery robots, service robots, and military robots that are used in various industries viz. automotive, electronic petrochemical and military operations. Android robots are the future. Scientists are trying to make them look realistic. Also, there are initiatives. Underway to give them natural effects and human expressions. Though practically, robots cannot have emotions, scientists now want to create an illusion that they are thinking machines. There are many benefits of using robots and I will touch upon a few of them. 
                     Robots are also fast becoming the companions to children and old people. These machines can talk and work as reminders. There are robots with screens with which parents can watch and guide their children. With advances in technology, it is expected that in the next 10-15 years robots will replace human beings in childcare. This can be serious because, then there will be more social exclusion and such a child might become a total social misfit. But we must always remember that their misuse can cause human life an enormous damage, to such an extent that we cannot even imagine.

Finally I would like to conclude by saying "In the future, our lives will be full of robots"

Friday, 11 January 2013

Apple has plans to launch cheap IPhones

Here comes a news cost-conscious customers have been waiting for! According to several media reports,Apple is planning "cheapo" version of iPhone for price-sensitive markets like India and China.
Trying hard to compete with its arch smartphone rivalSamsung, Apple may launch a smaller and cheaper version of its flagship device 'iPhone' this year.
"The cheaper phone could resemble the standard iPhone, with a different, less-expensive body," a Wall Street Journal report said.
According to BloombergBusinessweek, Apple had been working on a more affordable smartphone since at least February 2011 and is weighing retail prices of Rs.5,265.96 ($99) to Rs.7,925.53 ($149) for a device that would debut in late 2013, at the earliest, according to the person, who asked not to be named because the negotiations are private. Apple has even spoken to at least one of the top U.S. wireless carriers about its plans.
However, WSJ reports that Apple could still decide to scrap the plan. But, if the reports turn out to be true then it could be a "big strategy shift" for Apple. Apple products were never intended for "mass-market" and the company always tried to woo upper-class customers.
Is iPhone on the way of becoming another Blackberry?

Tuesday, 25 December 2012

Android-powered 'iPhone' on sale?

Hang on….before you reach to any conclusion after reading the headline, I would like to clarify that it's not Apple's iPhone. A Brazilian company IGB Eletronica SA is selling Android-based iphones in Brazil. Interestingly, IGB owns the rights to the word 'iphone' in Brazil.

The first model, called 'iphone Neo One', is a low-powered dual-SIM smartphone running Android 2.3 Gingerbread and features a single core 700MHz processor, a 3.7-inch display, and a 5 megapixel camera.

IGB was formed this year after the restructuring of Gradiente Eletronica SA, which had applied for rights in Brazil to register its products under the name IPHONE in 2000, while Apple came up with its first smartphone under the iPhone brand in 2007. Also, in 2008 the company secured rights to the name from a local regulator of patents.

So, are you happy to see this interesting merger of iPhone and Android???
 

Wednesday, 14 November 2012

Intel, Qualcomm may invest in Sharp

US-based chipmakers Intel and Qualcomm are reportedly in talks to jointly invest about Rs.2,000 crore (30 billion yen ($378 million)) in Japanese electronics manufacturer Sharp Corp.
"Sharp is expected to reach an agreement as early as the end of this month with Qualcomm, while talks with Intel are less concrete amid the chipmaker's unclear financial picture," Reuters quoted an unidentified source as saying. However, another report from The Asahi Shimbun suggests that Intel and Sharp have already entered into alliance talks over joint development of components for smartphones and other electronics products. Negotiations between the two companies are on whether Intel can develop a CPU specifically for Sharp's new IGZO technology—a new liquid crystal display that offers higher resolutions and low power consumption in touchscreens displays. 
Last week, Fitch Ratings downgraded Sharp's credit to junk on Nov. 2 saying, "Fitch does not foresee any meaningful operational turnaround in the company's core business over the short- to medium-term."


 

Wednesday, 7 November 2012

New tech may double smartphone battery life

A team of engineers is working towards extending the battery life of smartphones – one of the biggest concerns smartphone users have today.
Massachusetts-based Eta Devices, a company co-founded by two MIT electrical engineering professors Joel Dawson and David Perreault, have come up with an alternative amplifier technology that can extend smartphone battery life, reports Phys.org.
  The engineers call their approach "asymmetric multi-level outphasing (AMO)." It is able to "intelligently" select, among voltages that can be sent across the transistor, the one that minimises power consumption. In 2009, Dawson and Perreault, along with SungWon Chung, Philip Godoy, Taylor Barton, and Everest Huang, wrote a paper to describe AMO, calling it a new outphasing transmitter architecture in which "the supply voltage for each power amplifier can switch among multiple levels."The AMO modulation technique was found to increase overall efficiency over a much wider output power range than the standard LINC system while maintaining high linearity. "This architecture results in significant efficiency improvement over previous methods." Smartphone battery life, however, is not first in line for Eta Devices, which has been working on their concept, reaching various "milestones" along the way of their R&D. The company will attempt to prove itself next year in applications for Long Term Evolution (LTE) base stations.They hope to reduce base station energy usage by impressive amounts. In large base stations, the power amplifier takes as much as 67 per cent of the power, with another 11 per cent for air-conditioning.
  "The new amplifier would reduce overall power consumption by half," said Eta Devices CEO Mattias Astrom. The company is expected to launch its product in February at Mobile World Congress in Barcelona. Next will come a chip-scale version of the technology, which is still in development, to increase the battery life of smartphones. The engineers hope for a smartphone chip that can lead to a single-power amplifier to handle the different modes and frequencies used by global standards, including CDMA, GSM, and 4G/LTE.

 

Wednesday, 24 October 2012

2nd Green Revolution vital to achieve self-sufficiency in food: PM of INDIA
 Manmohan Singh          
                                     

Prime Minister Manmohan Singh today said the country has achieved a record foodgrain production of 241 million tones (MT) in 2010-11 crop year but stressed on ushering in a second Green Revolution to meet the mounting future domestic food grain demands.
"Production of major crops has been at record levels in the year just over. An estimated total production of 241 million tones in 2010-11 was achieved because of record production of wheat, maize and pulses.
"Oilseed production also set a new record," the PM said, while delivering speech at an ICAR function here.
The estimated 241 MT foodgrain production is higher by 5 MT as announced by the Agriculture Ministry in its third estimate. It is also higher by 23 MT as compared to previous crop year 2009-10.
Crop year runs from July to June.
He said the record foodgrain production has been achieved because of hard work of the farmers and scientists.
But, Singh emphasised that the country needs a second green revolution to further accelerate agri growth and achieve self-sufficiency in food.
He said the total demand for foodgrain of the country is projected to touch 281 MT by 2020-21.
"Meeting this demand will necessitate a growth rate of nearly 2 per cent per annum in foodgrain production," the PM said.
     
           
 Stating that the country was spending about 0.6 per cent of its agriculture GDP on agricultural research and development at present, he said this needs to be enhanced by 2-3 times by 2020.
"India needs a second green revolution that is broad-based, inclusive and sustainable," Singh said.
Referring to mounting future domestic foodgrain demands, Singh exhorted the scientists to gear up for the task.
"The enormity of the task ahead is indicated by the fact that during the 10 year period 1997-98 to 2006-07, our foodgrain production grew at an average annual rate of only 1 per cent," he said.
"Although foodgrain production has since regained the requisite momentum and the agriculture sector as a whole is set to grow at 3 per cent per annum during the 11th plan, we can not be complacent," the PM added.

Monday, 1 October 2012

HACKING

Hacking definition
                     
Before going to see what is hacking we should now about history Hacking. I mean when does its start's in which it has been implemented at first and who was the founder of hacking.
Hacking is not limited to computers. The real meaning of hacking is to expand the components of any electronic device; to use them beyond the original intentions of the manufacture.
Hacker is a term used by some "a clever programmer" and by others, especially those in popular media, to mean "someone who tries break into computer systems."

What does ethical hacking means?
After entering 21st century we came across a very useful technical term Internet and that was also open for public use but not in the mass while in comparison of past 10 years we are watching everyone hanging around the sites and even some of them became popular for the term hacking being a hacker to make others web pages hack and get unethical access over all the system and information without owner’s interest.
And now we are also talking about Ethical Hacking, so what the term is this? And why we should all bother about it during handling a website or managing other’s property online being a part time or full time employee or the consultant.
If you are interested to get the exact definition of Ethical Hacking that would really not be different than all the following as below and already out there at the Internet
1). Ethical hacking can be defined as a legal access of an Internet geek in any organization and their online property after their own permission to make it all clear that how secure they are or not.
Or you can say the organization takes a test of their security status online or offline by hiring some expert or an individual.
2). Ethical Hackers are the white hat peoples who use their knowledge for the sake of their countrymen and their security basically online. They also work for cyber crime department under the security departments.
 3). Ethical hacking can also be called the term when we get’s access in our own or others account after the recommendations to get that all back what was previously stolen by a hacker.

History of Hacking

 

Hacking is not limited to computers. The real meaning of hacking is to expand the capabilities of any electronic device; to use them beyond the original intentions of the manufacturer. As a matter of fact, the first hackers appeared in the 1960's at the Massachusetts Institute of Technology (MIT), and their first victims were electric trains. They wanted them to perform faster and more efficiently. So, is hacking always bad? Not really. It only depends on how to use it. But it wasn't until a group of these hackers decided to exert their knowledge in the computer mainframes of the MIT.
Bruce Sterling traces part of the roots of the computer underground to the Yippies, a 1960s counterculture movement which published the Technological Assistance Program (TAP) newsletter.TAP was a phone phreaking newsletter that taught the techniques necessary for the unauthorized exploration of the phone network. Many people from the phreaking community are also active in the hacking community even today, and vice versa.

Hacking Types
                    
1) Inside Jobs - Most security breeches originate inside the network that is under attack. Inside jobs include stealing passwords (which hackers then use or sell), performing industrial espionage, causing harm (as disgruntled employees), or committing simple misuse. Sound policy enforcement and observant employees who guard their passwords and PCs can thwart many of these security breaches.

2) Rogue Access Points - Rogue access points (APs) are unsecured wireless access points that outsiders can easily breech. (Local hackers often advertise rogue APs to each other.) Rogue APs are most often connected by well-meaning but ignorant employees.

3) Back Doors - Hackers can gain access to a network by exploiting back doors administrative shortcuts, configuration errors, easily deciphered passwords, and unsecured dial-ups. With the aid of computerized searchers (bots), hackers can probably find any weakness in your network.

4) Viruses and Worms - Viruses and worms are self-replicating programs or code fragments that attach themselves to other programs (viruses) or machines (worms). Both viruses and worms attempt to shut down networks by flooding them with massive amounts of bogus traffic, usually through e-mail.

5) Trojan Horses - Trojan horses, which are attached to other programs, are the leading cause of all break-ins. When a user downloads and activates a Trojan horse, the hacked software (SW) kicks off a virus, password gobbler, or remote-control SW that gives the hacker control of the PC.

6) Denial of Service - DoS attacks give hackers a way to bring down a network without gaining internal access. DoS attacks work by flooding the access routers with bogus traffic (which can be e-mail or Transmission Control Protocol, TCP, packets).

Classifications

 

Several subgroups of the computer underground with different attitudes use different terms to demarcate themselves from each other, or try to exclude some specific group with which they do not agree. Eric S. Raymond advocates that members of the computer underground should be called crackers. According to (Clifford R.D. 2006) a cracker or cracking is to "gain unauthorized access to a computer in order to commit another crime such as destroying information contained in that system”. These subgroups may also be defined by the legal status of their activities.

White hat

A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. The EC-Council, also known as the International Council of Electronic Commerce Consultants has developed certifications, courseware, classes, and online training covering the diverse arena of Ethical Hacking.
Black hat
A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal”. Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network. They choose their targets using a two-pronged process known as the "pre-hacking stage".

Differences Between White Hat And A Black Hat Hacker

The difference between black hat and white hat hackers is that white hat hacker uses their skills and knowledge as a way to defend someone from attackers. That means that white hat hackers offer their services to corporations, public organizations and educational institutions.
These services include a complete revision of their computer network security, implementation of new security systems (they may be hardware or software), user training and future recommendations. All these measures will be able to combat unauthorized hacking; black hat hackers, however, will continue trying
.

What is Hacktivism?
                          
Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist.
Hacktivism is the use of computers and computer networks as a means of protest to promote political ends. The term was first coined in 1996 by a member of the Cult of the Dead Cow hacker collective named Omega. hacking as "illegally breaking into computers" is assumed, and then hacktivism could be defined as "the use of legal and/or illegal digital tools in pursuit of political ends". These tools include web site defacements, redirects, denial-of-service attacks, information theft, web site parodies, virtual sit-ins, typo squatting and virtual sabotage. If hacking as "clever computer usage/programming" is assumed, and then hacktivism could be understood as the writing of code to promote political ideology: promoting expressive politics, free speech, human rights, and information ethics through software development.
A hacktivist uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause. For example, one might leave a highly visible message on the home page of a Web site that gets a lot of traffic or which embodies a point-of-view that is being opposed. Or one might launch a denial-of-service attack to disrupt traffic to a particular site.

How To Prevent Hacker Attacks

 

Hackers are always looking for a way to get into computers of other persons. It can be something as simple as phising confidential information (like credit card or bank account numbers) to complex hacking routines that use your computer as a repository for illegal content (like music or movies with copyright).

Unfortunately there is no magical software to prevent hackers; and it will never exist. It doesn't matter how much money or resources you invest in designing the perfect system, someone will find the way to crack it. Even the biggest government agencies like NASA, CIA and NSA have been victims of hackers.

Computer hacking and the laws

                        

Computer hacking is illegal and carries a possible sanction of imprisonment. Computer hacking has been thrown into the public eye recently with increasing allegations that certain newspapers hired private investigators to hack into people’s phones and computers in order to obtain stories that would sell.
An increasing concern to all governments around the world is the role of what is known as cyber attacks. Cyber attacks occur when an individual or group of individuals hack into the computer system of a company, association or even government department and attempts to paralyze the system.
The motivation for carrying out a cyber attack can be vast; groups can range from those seeking information to sell on, to interest groups looking to bring down whole companies, and even terrorist groups looking to paralyze government departments.
It is on account of the vast increases in cyber attacks in recent years that government spending has increased dramatically in a bid to protect national security information. Enforcement is taking place, but we have to wonder if computer hacking laws are really having any effect against cyber hacking. This article will show what is being done against cyber crime.

Effectiveness of Computer Hacking Laws

 

Like any other law, the effectiveness must be determined by its deterrence. While there will always be those that want to see if they can do it, and get away with it (any crime), there are always the many more who may not do something if they are aware of its unlawfulness - and possible imprisonment.