Wednesday, February 29, 2012

Emerging Technologies 2011-12:

Technology is moving too fast, we see change in products every year with new features or new products with new technologies. 4G, aka 4th Generation in wireless communication systems, an attention getter to every single person related to Networks around the world. 4G wireless technology promises higher data transfer rates and expanded multimedia services. 4G technologies combine WiFi and WiMax. For cellular networks 4G runs at sped ranging from 100 Mbps and for local WiFi speeds ranging from 1 Gbps. It provides framework that merge that existing cellular technology with wireless access systems. The Internet is the driving force for higher data rates and high speed access for mobile wireless users. To achieve that maximum speed 4G technology is being implemented in smart phone and other computing devices.

Semantic Web, a web of data that allow machines to understand that meaning of data or information written over the World Wide Web. Semantic web technologies are making new horizons for the web users. Semantic web data is a part of web data over World Wide Web which is able to process independently of application, domain or any platform. Data stored on webs in the form of documents that cannot be readable or understandable by the computers. User want to search something over the internet, search engine will display all the content whether relevant or irrelevant for user. User have to find again relevant data whereas, in semantic technologies computer reads the word or phrase searched a user using search engine and produce the specific relevant result by the means of artificial intelligence techniques.

In web development area HTML5/CSS both are emerging technologies. HTML5 use the new semantic elements, like Header, Footer, Section, and Aside. Many others, like hgroup, aside, and figure, are logical additions and enhancements to the existing elements of HTML. The special effects in Photoshop design can be converted into web pages in HTML5 without using any JQuery and JavaScript. Audio and video tags in HTML5/CSS make easier for the developers to add audio and video to the web page easiest than ever. They can style theses tags according to their design without any hesitation just like any other normal tag.

For permanent data storage M-Disc technology will be launched in the market soon for commercial purposes. It is a scratch proof disc and can store data for more than 1,000 years into a stone-like metals and metalloids. Normal CDs and DVDs face loss of data in humidity and in high temperature whereas M-Disc is capable to prevent loss of data in such conditions. M-Disc current available storage capacity is 4.78 GB DVD. It cannot be burn in normal writers, 5X stronger laser burners are required to burn M-Disc. But, can be read by normal DVD players as backward compatible technology is used.
Technology is updating in flash, it is hard to keep up with IT trends as it goes a head. But if your are tech savvy there is nothing that can keep you of it.

Monday, February 27, 2012

Install windows7 through pen drive

Here is a small and working tutorial to install windows 7 from a bootable USB or Pendrive. These days most of them have a USB or Pendrive. So why don’t you try this trick. . Installing Windows 7 using a pendrive is very much faster than that from DVD/CD. You just need to follow some small steps to do this. You can keep this pendrive/USB drive for future installation of Windows 7. If you are a beginner or dont want to get messed up by typing in all commands, here is a Free Utility To Create A Bootable USB To Install Windows 7, Vista & Server 2008. This tool will help you to automate the process of bootable pendrive’s and you can install windows 7 from pendrive easily. If not you can follow this guide to install windows 7 from a pendrive.

Make sure you have a Pendrive or USB drive with a minimum of 4 GB space and you have the Windows 7 installation DVD. This tutorial is best suited if you have a Windows 7 DVD with you else you need to change it Link

  1. Format the Pendrive or USB drive in NTFS format first.
  2. From the start menu right click on the command prompt and select “Run as administrator“.
  3. Now type the following commands (Press enter key after each command).
  4. diskpart. This is to open the disk partition program.
  5. Now to show the list of drives type list disk.
  6. You can see disk’s listed there. Note down the disk number of your pendrive eg. Disk .
  7. Now type SELECT DISK X (where X is the number you noted down for the pendrive from step 5)
  8. Now type CLEAN.
  9. Now type the following commands by pressing enter after each one.
  10. CREATE PARTITION PRIMARY
  11. SELECT PARTITION 1 (Assuming your pendrive/ USB drive is 1).
  12. ACTIVE
  13. FORMAT FS=NTFS
  14. ASSIGN
  15. EXIT(Now the disk partition program will exit). Now we need to give some more commands.
  16. Now insert the Windows 7 Installation DVD and to your DVD drive.
  17. Here i am assuming DVD drive as G and Pendrive as I.(Change it accordingly).
  18. Now type G:CD BOOT
  19. Now type this command BOOTSECT.EXE/NT60 I: to update your USB drive with bootmgr code.
  20. Finally copy all the contents from the Windows 7 DVD to your Pendrive. Make sure you don’t cause any errors.
  21. Plug / Insert your pendrive to your PC and restart the system.
  22. Now Enter the Bios system accordingly by pressing the key delete.(This may vary some times it will be F2 or F12. It depends on the type of your system. Any how during the start up your system will display which key to press to enter the Bios).
  23. Now select the USB/ Pendrive as the first boot driver.(Set the first boot priority to USB drive.).
  24. Now save the settings in Bios and restart and you will be able to Install Windows 7 using that pendrive.

Thursday, February 16, 2012

The Future Of Human/ Electronic Skin Technology

Merging and gives access to a new and upcoming technology. This has led to the development of a super thin and highly flexible material like a tattoo, embedded with a wireless electronic chip to be stuck on human skin. It’s applications are many, from monitoring health to even sending commands to human-machine interfaces like video games. The newly developed material/device is easily removable, as easily it’s stuck on the skin surface.

The device is designed to easily blend in with the mechanics of the human skin, where it can resist the natural vigor of twists, turns and stretches of the human skin, yet maintaining the functionality of the wireless circuitry. The research is being led by John A. Rogers, the Lee J. Flory-Founder professor of engineering at the University of Illinois.


http://www.youtube.com/watch?v=Ry0AkDPz5yw&feature=player_embeddedily it’s stuck on the skin surface.

Wednesday, February 15, 2012

Download SpeedBit Video Accelerator Premium Chttp://www.blogger.com/img/blank.gifomplete

the premium version has even more feature added to it. With SpeedBit Video Accelerator Premium, you can accelerate even the HD videos, which is not provided in the free version. Also, get all your favorite iTunes music, music videos, movies, and TV shows even faster. So download and install the premium version.

http://www.speedbit.com/downloads/

4-2 Management scinece Notes

http://www.ziddu.com/download/13514126/13Link-MANAGEMENTSCIENCEA2ZjntuSpecial.pdf.html

Tuesday, February 14, 2012

3-2 2nd mid online bits(I.T.)

Web Technologies
http://www.ziddu.com/download/14264998/WT_StudentsGola.pdf.html
computer Networks
http://www.ziddu.com/download/14264999/CN_StudentsGola.pdf.html
DWDN
http://www.ziddu.com/download/14265000/DWDM_StudentsGola.pdf.html
remaining bits will be updated

Strange Security: Hackers Could Set Your Printer on Fire from a Distance

It takes a creative mind to turn an otherwise innocent gadget into a looming security threat, but what's a hacker if not exactly that? You might not be particularly concerned that your printer could spell your demise, but a research team at Columbia University has demonstrated that not only can vulnerable printers be hacked remotely to snag personal information like credit card and Social Security numbers - they could even be made to self destruct...literally.

The research team, helmed by Columbia Professor Salvatore Stolfo and student Ang Cui, demonstrated the design flaw in a number of models of LaserJet printer manufactured by Hewlett Packard. They showed how infiltrating a printer remotely and flooding it with commands could overheat the part of a printer that dries ink, causing it to smoke, melt down, and potentially even start a fire. In another test, the group swiped a Social Security number from a scanned document and auto-published it to a Twitter feed, all by controlling the compromised device remotely.

To show how real the threat is, the team reverse-engineered the printer software - essentially breaking it down and building it back up. They discovered that the automated firmware updates on some older models essentially left the devices wide open. Firmware is the software that controls the internal workings of an electronic device, and it needs to be updated occasionally. The printers in question scan for new firmware through an automated process known as a remote firmware update, but they aren't discerning about what they download. By skipping a critical step for security known as digital signing, the calling card of safe, manufacturer-approved software, any able hacker could push malicious software onto a device by disguising it as a firmware update attached to a print request.

After lacing a document with malicious code, a hacker could install a custom built version of operating software in roughly 30 seconds. And as printers operate on such remedial software (compared to a computer or a smartphone), the bait and switch would be impossible to detect without dismantling the infected device. Once compromised, there's no simple way to un-hack a printer.

The researchers briefed HP on the vulnerability last week, and the company is likely scrambling to come up with a fix that will address the exploit. HP claims that post-2009 models require the crucial digital signature step, and pointed out that since the hack applies to laser printers, which are more common in office settings for bulk black and white printing, many home users would be unaffected. The researchers are now looking into printer models made by other manufacturers, and expect to be able to replicate the hack well beyond HP's pre-2009 LaserJet line.

While the hack might be alarming, the security community has been well aware of firmware loopholes like this one for years now. According to Brandon Creighton, a security researcher at Veracode with over a decade of experience, "You can find published research going back at least ten years. At the same time, the study they're presenting is significant because they've done the work in building a proof-of-concept exploit that actually demonstrates the vulnerabilities. That's a fair amount of effort, and most people don't do that."

And printers aren't unique targets: home routers, Voice Over IP (VoIP) devices, and ISP cable and DSL boxes are among the gadgets potentially exposed to the same method. While nothing is failproof, keeping your devices up to date with software directly from the manufacturer's website is a good measure against clever expllips)like(this one.

Seminars,Projects preferred websites

www.chennaisunday.comLink