Subscribe:

Pages

Saturday, August 1, 2009

Chatterbot

A chatterbot is a computer program designed to simulate an intelligent conversation with one or more human users via auditory or textual methods. Though many appear to be intelligently interpreting the human input prior to providing a response, most chatterbots simply scan for keywords within the input and pull a reply with the most matching keywords or the most similar wording pattern from a local database. Like any person, chatterbots seem to have a sort of personality which is expressed by their answers. The top chatterbots are Elbot, Talk-bot, Yabberwacky, Eugene, Alice, and Alan. A chatterbot is a conversation simulator done as a computer program which gives the appearance of conversing with a user in natural language.

IP Multimedia Subsystem (IMS)

IP Multimedia Subsystem (IMS) is a generic architecture for offering multimedia and voice over IP services, defined by 3rd Generation Partnership Project (3GPP). IMS is access independent as it supports multiple access types including GSM, WCDMA, CDMA2000, WLAN, Wire line broadband and other packet data applications. Existing phone systems (both packet-switched and circuit-switched) are supported. IMS will make Internet technologies, such as web browsing, e-mail, instant messaging and video conferencing available to everyone from any location. It is also intended to allow operators to introduce new services, such as web browsing, WAP and MMS, at the top level of their packet-switched networks.

Earth Simulator

Earth Simulator is the fastest supercomputer in the world. NEC had first built this Japanese machine. Earth simulator uses Parallel Vector Architecture to achieve a peak performance of 40 F Flops. This system configured in 640 nodes of 8 vector processors each connected together by crossbar switch. Each node has a shared memory of 16 GB (total 10 TB). This Japanese machine was built to analyze climate change, including global warming, as well as weather and earthquake patterns. Earth simulator has the power to create a “virtual planet earth” using its large processing capability. The vector processor used in this is fabricated in a single chip with 0.15-micron CMOS technology.



More details :

See full size image

ZFS Filesystem

ZFS: the last word in file systems Most system administrators take the limitations of current file systems in stride. After all, file systems are what they are: vulnerable to silent data corruption, brutal to manage, and excruciatingly slow. ZFS, the dynamic new file system in Sun\'s Solaris 10 Operating System (Solaris OS), will make you forget everything you thought you knew about file systems. It offers: Simple administration ZFS automates and consolidates complicated storage administration concepts, reducing administrative overhead by 80 percent. Provable data integrity ZFS protects all data with 64-bit checksums that detect and correct silent data corruption. Unlimited scalability As the world\'s first 128-bit file system, ZFS offers 16 billion billion times the capacity of 32- or 64-bit systems. Blazing performance ZFS is based on a transactional object model that removes most of the traditional constraints on the order of issuing I/Os, which results in huge performance gains

More details :

See full size image

Holographic Versatile Disc

Holographic Versatile Disc (HVD) is an optical disc technology still in the research stage which would greatly increase storage over Blu-ray and HD DVD optical disc systems. It employs a technique known as collinear holography, whereby two lasers, one red and one blue-green, are collimated in a single beam. The blue-green laser reads data encoded as laser interference fringes from a holographic layer near the top of the disc while the red laser is used as the reference beam and to read servo information from a regular CD-style aluminium layer near the bottom.

Intel Virtualization Technology

Virtualizing a computing systems physical resources to achieve improved sharing and utilization. Full virtualization of all system resources—including processors, memory, and I/O devices—makes it possible to run multiple operating systems on a single physical platform. Virtualization has been there in the form of emulation software But Intel has given birth to a new technology called Intel virtualization technology(VT) which will allow OSes to run natively on the hardware. In a non-virtualized system, a single OS controls all hardware platform resources. An Intel virtualized system includes a new layer of software, the virtual machine monitor (VMM) or hypervisor. The VMM\'s principal role is to arbitrate accesses to the underlying physical host platform\'s resources so that multiple operating systems (which are guests of the VMM) can share them. The VMM presents to each guest OS a set of virtual platform interfaces that constitute a virtual machine (VM). Intel Virtualization Technology can be very useful for uptime and security purposes. If there are five copies of Redhat running Apache . if the fifth one goes down we can simply pass incoming requests to the other four while the fifth is reloading. Thus increasing the uptime.If we save \'snapshots\' of a running OS, we can reload it every time something unpleasant happens like hacking, Viruses. Reload the image from a clean state and patch it up, quick. We can simply load, unload and save OSes like programs. VT-x and VT-i are the first components of Intel Virtualization Technology, a series of processor and chipset innovations soon to become available in IA-based client and server platforms.

CELL PHONE VIRUSES AND SECURITY

Cell phones have become powerful and sophisticated computing devices and are moving toward an always on form of networking. However, such powerful networked computers are also at risk for a new class of malware, including viruses, worms and trojans specifically designed for a mobile environment. This seminar topic covers a taxonomy of attacks against mobile phones that shows known as well as potential attacks. Understanding existing threats against mobile phones helps us better protect our information and prepare for future dangers. Security experts are finding a growing number of viruses, worms, and Trojan horses that target cellular phones. Security researchers attack simulations have shown that before long, hackers could infect mobile phones with malicious software that deletes personal data or runs up a victim\'s phone bill by making toll calls. The attacks could also degrade or overload mobile networks, eventually causing them to crash, financial data stealing, and Risk factors for smart phones. Mobile-device technology is still relatively new, and vendors have not developed mature security approaches. An introduction to security concerns in mobile appliances. To counter the growing threat, antivirus companies have stepped up their research and development. In addition, vendors of phones and mobile operating systems are looking for ways to improve security. Recent innovations and emerging commercial technologies that address these issues are also incorporated in the topic