WASHINGTON: The craze of Android is increasing rapidly among mobile users. It is obvious because it provides us a wide range of applications that we all are fond of and and the most of the best smartphones in the world are running on it. But have you thought that it can have unknown drawbacks also? This article is specially written to aware all the user with its negative side. [Read more…]
Honeypots are an information system resource whose value lies in the unauthorized or illicit use of that resources.
In other words, “A server that is configured to detect an intruder by mirroring a real production system. It appears as an ordinary server doing work, but all the data and transactions are phony. Located either in or outside the firewall, these are used to learn about an intruder’s techniques as well as determine vulnerabilities in the real system.” [Read more…]
Tele-immersion is designed and developed to allow users in geographically distributed sites to collaborate in real-time in a shared simulated environment. This enterprise has engaged the skills of researchers in a variety of disciplines, including computer vision, graphics and network communications.
Tele-Immersion (TI) is defined as the integration of audio and video conferencing, via image-based modeling, with collaborative virtual reality (CVR) in the context of data-mining & significant computation. [Read more…]
3 Dimensional printing is a process of making three-dimensional solid objects from a digital model. 3 Dimensional Printing is a process under development at MIT for the rapid and flexible production of prototype parts, end-use parts, and tools directly from a CAD model. 3D printing is achieved using additive processes, where an object is created by laying down successive layers of material. 3D printing is different from traditional machining techniques as they mostly rely on the removal of material by drilling, cutting etc.
This concept is widely accepted on a very large scale. In a traditional or fat-client environment, applications are stored locally, and data is stored centrally. Whenever we have to open a file, the entire file is transferred to the local PC, with the results being saved back across the LAN/WAN to the central storage area. Server/client architecture handle this process slightly differently, but processing still takes place at the local PC. [Read more…]
BrainGate technology is a branch of science defining how computers and the human brain can mesh together. It is a brain implant system. The sensor, which is implanted into the brain, monitors brain activity in the patient and converts the intention of the user into computer commands or to the subject’s desired movement. [Read more…]
During the past decade, many different computer systems supporting high-performance computing have emerged. Cluster computing is a form of computing in which a group of computers is linked together so that they can act like a single entity. Clusters are usually deployed to improve performance and availability over that of a single computer while typically [Read more…]
Before talking about Ethical Hacking, let’s discuss what hacking is. Hacking can be defined as the practice of modifying the features of a system, in order to accomplish a goal outside of the creator’s original purpose. In general words, hacking is unauthorized use of computer and network resources. Some other specialists refer it to the hobby or profession of working with computers. [Read more…]