Saturday, 28 March 2015

DIGITAL SIGNATURE



                                                               DIGITAL SIGNATURE
Digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document in order to provide more security than their handwritten counterparts.
A digital signature is the electronic equivalent of a handwritten signature, verifying the authenticity of electronic documents offering far more inherent security a digital signature is intended to solve the problem of tampering and impersonation in digital communications.



Digital signature ensure integrity of documents, secure electronic tracking and storage, scale to accommodate high volumes of documents, enhance security and ensure compliance, reduce costs
Digital signatures can provide the added assurances of evidence to origin, identity and status of an electronic document, transaction or message, as well as acknowledging informed consent by the signer.
Digital signatures have the same legal significance as the more traditional forms of signed documents

By adopting digital signature processes, companies are able to reduce waiting time, save money, provide copies to all parties, create archives, increase security through digital encryption, and meet compliance requirements.


Friday, 27 March 2015

REMOTE SENSING



REMOTE SENSING
Remote sensing is the science of obtaining of an object or areas in the earth surface and in atmosphere and oceans by means of propagation of signals.
Remote sensing allows the communication with the satellites with other medium and transmits signals in a wide area without make physical contact with the object such as its wireless. The information can be accessed after being propagated (electromagnetic radiations).

Remote sensors collect data by detecting the energy that is reflected from Earth. These sensors can be on satellites or mounted on aircraft. Sensor are placed in such away can link one node to other simultaneously.
Remote sensors collect data in the form of images and provide specialized capabilities for manipulating, analyzing, and visualizing those images.

Remote sensors can be categorized into two parts
·         Passive Sensors
·         Active Sensors
PASSIVE SENSORS
Passive sensors are responsible to respond for external stimuli and record radiation that is reflected from earth’s surface. These are usually comes from sun and used to collect data during daylight hours.
Therefore passive sensors produce the natural radiation and that is emitted or reflected by the objects to the surrounding areas. Examples of passive sensors it include Radiometers, Infrared, photography and change-coupled device.

Wednesday, 25 March 2015

BIOMETRIC





BIOMETRICS
Biometrics is the technique of the identification and authentication of the digital signature. This will assure the security in the accessing of information that uses physical and logical access control.
A bio metrical factor is a behavior or physiological characteristics of unique to a subject as a biometric factor is used instead of the username or account ID as an identifier requires a one-to-many search
There are many types of biometric factors
        Finger print
        Face Scans
        Iris Scans
        Retina Scans
        Palm Scans
        Heart/Pulse patterns
        Voice patterns
         Signature dyamics
         Keystroke Pattern
       

A biometric device must be able to read information that is very minute, such as the variations in then blood vessels in a person’s retina or the tones and timbres in their voice. This is mostly preferred such as most people are basically similar, the level of detail required to authenticate a subject often results in false negative and false positive authentications.
Biometric devices are rated for their performance against these two negative authentication conditions. Most biometric devices have a sensitivity adjustment so they can be tuned to be more or less sensitive. 

When a biometric device is too sensitive, a Type 1 error occurs. A Type 1 error occurs when a valid subject is not authenticated. The ratio of Type 1 errors to valid authentications is known as the False Rejection Rate (FRR).

Sunday, 22 March 2015

BACKUP FILE



BACKUP OF FILES
Back up of files is the method of copying files that can be preserved in case the equipment failure or affected physical such as broken.
The data from the storage device are supposed to be secured are keep properly in the sense can be used when needed or for memory.
In such the data are protected by storing duplicate files on different location on the same drive or different drive in a computer.



Back up will help when the computer is corrupted and by using the external storage you can get your data easily or when the virus affect the drive you can back up and recover your data.
Most of the Microsoft windows provide the simple way of making the back where you can follow the steps on back up your file.


Back up your files can be done easily by following the instruction
  1. Open Backup and Restore by clicking the Start button, clicking Control Panel you will get welcome to the backup or restore wizard
  1. Clicking System and Maintenance, and then clicking Backup and Restore. 

Saturday, 21 March 2015

VIRTUAL SERVER




VIRTUAL SERVER
A virtual server is the web server that share the number of computer resources with other servers, it can run the different software programs and manipulate the computer information with the high integrity and good performance on processing resources.
Virtual server has an ability of hosting more than one domain name on the same computer with the low cost

Virtual server is widely used by internet hosting service that are referred to a virtual machine and by using virtual server in a company or an individual a web site may own domain name, internet protocol address and admin their file directories, add e-mails accounts and address assignments, assign multiple domain names, manage their own logs and statics and maintain password
Users of virtual server they do not manage the hardware aspects of running server and effectively share the cost of expensive line connections to the internet

Virtual Server allows its users to utilize or create applications and handle the traffic, like a normal server.
Virtual Servers doesn’t use the entire resources on its host computer, they can be dedicated for individual client server applications. Each of the company uses the virtual servers as their client and allow easy share of resources.
Virtual servers hosting and how they actually work on the shared environment. It is a known fact that thousand and more number of users tend to use a server at a time.

Virtual server starts to hog a lot of resources of the host computer, then it can cause poor loading of web pages and other such service lagging issues.
This will cause the failure of transfer of network resource and need a times to be accomplish due to this there is recover on it  by utilize the number of powerful server that could facilitate easy loading of web pages and link to the network resource efficient

How to access virtual server
Accessing of virtual server required the operating system on the virtual machine be configured as a part of the network. For example, if you have a virtual machine running on a physical computer that is a member of an Active Directory service domain, you must join the virtual machine to the Active Directory domain to access both the physical computer and any resources in the Active Directory domain.

Friday, 20 March 2015

CYBER POLICE



CYBER POLICE
Now days there is many of criminals that are caused of the development of technology in such away the security of the confidential information must be protected well
Cyber police is the situation where by police secures the information and finding fighting the cyber crime propaganda and monitoring and manipulating the public opinion in many countries.
Each country has the strategy and techniques of secure their country with attack of information in the computer networks.



Internet users have the procedures on implementation of preventive measures in order to reduce possible damage from security incidents and to help them in responding to security threats
At United Kingdom operating an Internet ‘Hotline’ for the public and IT professionals to report their exposure to potentially illegal content online. It works in partnership with the police, Government, the public, Internet service providers and the wider online industry
During the detecting of the threats there is a communication between the police and center of the system and make elaboration on how to solve the problem arise

The information can be captured and direct to other source that will be changed or modified and reach with wrong information.
For the case of enemy of one country to other this security of captured of information must be protected time after time in such away there is encryption of data that will make hacker get a long time number of years to understand
Police force of many developed country are used this technics to protect their country with enemy by protect the networks information and use technology to see their enemy what they planned on how to stopped before it reached.


Thursday, 19 March 2015

WIRELESS COMMUNICATION



WIRELESS COMMUNICATION
Communication now days become a huge advanced and the transfer of data, voice and package are widely improved in a connection cable and wireless.
Wireless communication is the medium of transfer information data without helps of wire, cable or electrical conductors
Electronics device have provided with the capability of transfer signals of communication into wireless such as mobile, computers satellite, Global position system television in such there is no connection from the source of signals to the received device.

Wireless communication is set and the information is transmitted through the air, without requiring any cables, by using electromagnetic waves like radio frequencies, infrared, satellite
The signals can be transferred in short distance and other in long kilometers. The common wireless technology use radio waves that being of short distance travelled.
The capacity of transfer of signals can be designed in the expected distance in such a way there is used of two-way radios, wireless networking, cellular phones and many more

Wireless communication it composed of networks used of radio waves technology in terms of electromagnetic spectrum that are associated with radio waves propagation.
The electromagnetic spectrum is basis on create of electromagnetic field to the coil of antenna that makes the propagation of signals and start to transfer into the distance expected
The access of the wireless between device and device it depend on the connection made between two device or more. This can be maintained with the links to the resource available into the networks.
The connection will be established to a point and join the network the device must be equipped with network adapters and drivers that facilitate to run this process.


Tuesday, 17 March 2015

WIRELESS CHARGING



WIRELESS CHARGING
Wireless charging is the methodology of transmission an electrical current from a power source to a receiving device without the use of a physical connection.
Wireless charging uses an electromagnetic field to transfer energy between two objects through coils. The receiving device can be smartphones, industrial forklift industries and other electronics devices.

 Induction chargers use an induction coil to create an alternating electromagnetic field from within a charging base station, then induction coil in the portable device takes power from the electromagnetic field and converts it back into electrical current to charge the battery.
The technology comes to help easy charge with any charger for a device that has a capability of acquire wireless connection.

Sunday, 15 March 2015

NETWORK PROTOCOLS

 


NETWORK PROTOCOLS
Network protocols are the rules and conventions for communication between network devices. It include the guidelines that regulate the characteristics of network such as access method, types of cabling, speed of data transfer and physical topologies.

Protocols for computer networking all generally use packet switching techniques to send and receive messages in the form of packets.
Network protocols is the mechanisms for devices to identify and make connections with each other, as well as formatting rules that specify how data is packaged into messages sent and received.

Network protocols contain the set of higher level protocols and low level protocols.
Higher level protocols in the IP family interact more closely with applications like Web browsers
For higher level protocols it include
User defined protocols (UDP)
Hypertext Transfer Protocol HTTP
Transmission control protocols (TCP)
File transfer protocols FTP
Simple Mail Transfer Protocol (SMTP)
Lower level protocols interact with network adapters and other computer hardware.

TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL (TCP/IP)

Transmission Control Protocol it provides a communication service at an intermediate level between an application program and the Internet Protocol.
TCP/IP uses the client/server model of communication in which a computer user (a client) requests and is provided a service (such as sending a Web page) by another computer (a server) in the network.

Friday, 13 March 2015

APLLE WATCH



APPLE LAUNCHE SMART WATCH ON APRIL
Apple company comes with the new technology of the smart watch that launch on 24TH April in 8 countries the US, UK, Australia, Canada, China, France, Germany, Hong Kong and Japan and other later.
Apple Inc comes with the iPhone compatible smart watch iWatch that have a collection features highly polished stainless steel and space black stainless steel cases.


The apple iWatch will be sold first with start of $349 and go as high as $17,000 and it depend on the quality and materials used to made it and will also include a new voice assistant named Cal into the microchip
On April 10 ahead of an April 24 launch, start at Apple and the watch will be distinguished by different combinations of cases and interchangeable bands

The display is designed in such a way it motivate the user that is protected by sapphire crystal there’s a choice of three different leather bands, a link bracelet.
Display made up of sapphire is the hardest transparent material on earth and makes it ideal for protecting the Retina display.
There will be a number of different watch faces to choose from, which can be changed with a long press on the home screen.


Apple iWatch allow the user to read emails, summon Siri, receive calls and track fitness goals on your watch. Facebook alerts, WeChat messages and Twitter trends can also be beamed your wrist without pulling out your smartphone.
This would come to take the market of smartphone where have functionality of performed many activities with it in such all social media can be browsed for instance number of user of Facebook is many around the world.

Due to the ability of sending emails it make some of official work to be done anywhere and business aspect , Ability to receive call made to be more important .

Apple's Watch is designed to be fashionable and functional, available in an array of different color and materials with six different types of watch straps that are easily interchangeable
The cost of the apple watch will depend on the materials made such as aluminum Sport edition "starts at $349 (£299)" and that's for the smaller 38mm version. The 42mm size is slightly more at $399 (£339)

The glossier stainless steel "Watch" collection starts at $549 (£479) and goes up to $1099 (£949), depending on the Apple Watch size and band configuration.
The gold Watch Edition will be in limited supply at Apple Stores and cost a whopping $10,000 (£8,000) to $17,000 (£13,500, AU$24,000)

GIS-GEOGRAPHICAL INFORMATION SYSTEM



GEOGRAPHIC INFORMATION SYSTEM
A geographic information system is a computer system for capturing, storing, checking, and displaying data related to positions on Earth’s surface.
GIS have a capability of showing many different kinds of data on one map and enable people to analyze and understand patterns and relationships.
GIS systems are often used to produce three-dimensional images.GIS technologies allow geographers conduct research and provide the best way of solving obstacles face the people with his environment.

You can compare the location of different sites and relate with each other on the problem face and give scientific way of tackle in the prolonged time. By using of this information you can determine the locations with latitudes and longitudes address.
The system include the data like populations, educations, poverty, quantity of food present, medical treatment different kinds of soil

Wednesday, 11 March 2015

GLOBAL POSITIONING SYSTEM



GLOBAL POSITIONING SYSTEM
Global Positioning System (GPS) is a satellite navigation system that provides location and time information in all weather conditions of the place that you want to reach for a particular purpose at any place of the world.
GPS system provide sight to four or more satellites and critical capabilities to military, civil, and commercial users around the world.
The Global Positioning System (GPS) is a satellite-based navigation system made up of a network of 24 satellites placed into orbit  made up of space segment are orbiting the earth about 12,000 miles above us and are traveling at speeds of roughly 7,000 miles an hour

Global positioning system are wide used in scientific research and engineering activities also for military  in such it allocate the particular area with latitude and longitude with the help of satellite you can reach for purpose of doing that activities you want even the place you wont reach   
This technology enable many activities done where by satellites carry very stable atomic clocks that are synchronized to each other and to ground clocks and continuously transmit their current time and position.
A GPS receiver monitors multiple satellites and solves equations to determine the exact position of the receiver and its deviation from true time

THE STRUCTURE OF GPS

 Global positioning system consists of three major segments which include
·         Space segment (SS)
·         Control segment (CS)
·         User segment (US). GPS 

 GPS receiver uses these signals to calculate its three-dimensional location (latitude, longitude, and altitude) and the current time.
SPACE SEGMENT
Space segment is composed of 24 to 32 satellites in medium Earth orbit and also includes the payload adapters to the boosters required to launch them into orbit.
Space segment is necessary to determine the particular space between one orbit to the other in such its possible for the user to understand where they are supposed to reach and it modified to six orbital planes with four satellites each.



Space segment composed of six planes that are approximately 550 ties relative to the earths equator and being separated by 600 at right ascension of the ascending node.
The angular difference between satellites in each orbit is 30,105, 120 and 105 degrees apart that sum to 360 degrees
CONTROL SEGMENT
The control segment is composed of a master control station, an alternate master control station, and a host of dedicated and shared ground antennas and monitor stations.
The control station monitored all activities done in this segment and yields the desirable result with the help of alternate master control station when failure a host dedicated are required to determine the required position is reached accordingly the shared ground antennae searching that particular signals to reach expected area the monitor station display the target area how far can be reached


USER SEGMENT
User segment is composed of hundreds of thousands of U.S. and allied military users of the secure GPS Precise Positioning Service, and tens of millions of civil, commercial, and scientific users of the Standard Positioning Service display for providing location and speed information to the user
These GPS can determine the area which is not safe and provide an alarm at the station that can be checked and assure there is no attack will arise and disturb the peace, also for the civil activities its necessary to use for social activities to reach area of need solution easily.
The MCS can access U.S. Air Force Satellite Control Network (AFSCN) ground antennas for additional command and control capability and NGA (National Geospatial-Intelligence Agency monitor stations

Monday, 9 March 2015

SOLAR ENERGY AEROPLANE



SOLAR ENERGY AEROPLANE
Technology nowdays has been step forward and the innovation of technology has take over the world markets due to the invest of the resource available
Solar energy aeroplane is the great technology developed with scientist where by the solar power aeroplane cane flight without using fuels instead of using energy generated with the solar panel of the aeroplane
Solar energy aeroplane lead to conserve of an environment where there is no fuel released that pollute atmosphere this is great significance that reach by scientific and help to conserve environment


Solar energy is abundant and infinitely renewable that can be used with the many engine to facilitate their working in such the idea of developed solar energy aircraft comes at the sufficient and requird time
Solar aircraft may have flown so far below your radar that they sound new. A solar airplane could take you for quite an amazing ride.

Sunday, 8 March 2015

CLOUD COMPUTING



CLOUD COMPUTING
Cloud computing is the sharing of computing resources rather than having local server or personal device to handle information and delivery of hosted service over the internet
Cloud computing enables companies to consume compute resources as a utility -- just like electricity -- rather than having to build and maintain computing infrastructures in-house.

Cloud computing involves deploying groups of remote servers and software networks that allow centralized data storage and online access to computer services or resources.
Therefore cloud computing is storage and application that are delivered to an organization's computers and devices through the Internet

Clouds can be classified as public, private, dynamic and hybrid
Public cloud

A public cloud is one based on the standard cloud computing where by  a service provider makes resources, such as applications and storage, available to the general public over the Internet. Public cloud services may be free or offered on a pay-per-usage model

iPAD AIR



iPAD AIR

The iPad Air is the fifth-generation iPad tablet computer designed, developed and marketed by Apple Inc.
iPad Air come with the many features that process more due to have higher CPU performance in such you can do office activities even you in roads or street
iPad Air have the massive power that is fastest and more powerful made up of A8X chip processor and have 64-bit desktop class architecture.


Massive power its most minimal form and have longer battery life in such iPad Air 2 is the most fastest and most powerful iPad ever in part to the M8 motion coprocessor, it still has an incredibly long 10-hour battery life. So you can do more while carrying less.
iPad Air launching apps to playing games, everything is more fluid and responsive. And all your actions — swiping, pinching, zooming, scrolling, and rotating — happen quickly and smoothly.

ROUTER



ROUTER
Router is a device that has an ability of forward packets of data along the network by using the network protocol.
Router facilitate the communication into the number or group of people along the same network such as it connect at least two networks such as two LANs or WANs or a LAN and its internet service provider
Routers are located at gateways the places where two or more networks connect.
Routers may also be used to connect two or more logical groups of computer devices known as subnets, each with a different sub-network address.






Routers use headers and forwarding tables to determine the best path for forwarding the packets, and they use protocols such as ICMP to communicate with each other and configure the best route between any two hosts When a data packet comes in one of the lines, the router reads the address information in the packet to determine its ultimate destination.