Subscribe:

Pages

Sunday, September 27, 2009

Cryptography

Security of information results from the need for Private transmission of messages. It is very essential that Security coverage should be provided to the computer systems, including to security to communication channels

Cryptography means hidden writing. Cryptography is used to protect information to which illegal access is possible and where other protective measures are inefficient

The
basic idea in cryptography is to take a message in ordinary language, called plain text. This is transformed in some way to produce cipher text. The cipher text can now be sent to the correspondent. He uses another transformation to recover the plain text from the cipher text. The plain text is encrypted or hidden by the first transformation to obtain the cipher text. The cipher text is decrypted by another transformation to obtain the plain text once again. After encryption, cipher text can be transmitted over a data link or stored in a file

Carbon nanotubes

“Carbon nanotubes can in principle play the same role as silicon as in electronic circuits”.

Although the electronics industry is already pushing the critical dimensions of transistors in commercial chips be-low 200 nanometers (billionths of a meter)- 400 atoms wide-engineers face large obstacles in continuing the miniaturization.

Within this decade, the materials and processes on which the computer revolution has been built will begin to hit fundamental physical limits.

Two major problems have so far thwarted attempts to shrink metal wires further.

1. There is as yet no good way to remove the heat produced by the devices, so packing them in more tightly will only lead to rapid overheating.

2. As metal wires get smaller, the gust of electrons moving through them becomes strong enough to bump the metal atoms around, and before long the wires fail like blown fuses

CLUSTERING TECHNOLOGY

The world of commerce relies on highly available information systems to run and manage core business operations such as data warehousing, online transaction processing, and decision support system solutions. Likewise, the worlds of science and engineering also rely on high-performance computing to provide solutions and solve problems,. No matter how fast or available today’s computers are, tomorrow’s applications will invariably demand more. A stage has been reached where stand-alone computers can no longer provide the required levels of availability and reliability. Today’s challenge involves not just providing high availability and optimal performance, but doing so flexibly and inexpensively. Clustering Technology should prove to be a possible solution to address a broad range of system availability and performance requirements.

A Cluster is a parallel or distributed system consisting of independent computers that cooperate as a single system. Generally speaking, clusters offer a way to utilize computer resources more productively in comparison to when the same number of machines in working standalone – the total result is greater than the sum of the separate parts. Clustering Technology aims at providing continuous high availability of resources despite processor and communication failures.

CELLULAR TECHNOLOGY

As we head into the 21st century, wireless communications are becoming a household name. Currently there are over 60 million cell phone subscribers in the world. It is not the cost of the cell phone device that counts but the cost of using it .as a result, the cellular phone infrastructure is being optimized to allow calls to be placed as inexpensively and reliably as possible. Today more than ever, cellular companies are looking for ways to bring down the cal cost to achieve even higher market penetration, especially in metropolitan areas.

Cell phones are available with an incredible array of functions. Depending on the cell phone model, you can store contact information, make task or to-do lists, keep track of appointments and set remainders, use the built calculator for simple math, send or receive email, get information (news, entertainment, stock quotes) from the internet, play simple games, and integrate other devices such as personal digital assistants (PDA), mp3 players, and GPS receivers.

We are going to explore the advent of analog cellular, security flaws and fixes, as well as the dawning of a new age with the proliferation of digital cellular technology.

Friday, September 18, 2009

MIDI

MIDI is an acronym that stands for musical instrument digital interface. It is means for instruments to communicate to each other and or computers. MIDI can do many things one of the most popular things is sequencing. A sequencer is any hardware or software that allows recording music into memory. We can do things with good sequences that we can’t do even with the most expensive multi-track tape recorders, such as transposing without changing tempo and sound quality. Likewise we can large the tempo without affecting these patch or sound quality. MIDI can allow creating ensembles using two or more instruments and/or computers with many of today’s computers, wee can download songs and play them in our computer internally using a “MIDI Player” if we don’t like the downloaded MIDI song completely we can edit to our liking with a sequencer. MIDI will allow playing an instrument that normally would not know how to play. For example, a MIDI guitar will allow a guitar player to enjoy the sound of other instruments, such as a piano it can be as blessing for people who either have only one band or can only process one hand at a time.

Asymmetric digital subscriber line(ADSL)

Asymmetric digital subscriber line is the new modem technology to converge the existing twisted pair telephone lines into the high-speed communications access capability for various services. In reality ADSL is a modem technology used to transmit speeds of 1.5 to 6 Mbps under current technology. ADSL is designed to support different speeds in each directions at distances of upto 18000 feet. Because the speeds requested are typically to access the internet , most users look for higher download speeds and lower upload speeds. Therefore , the asymmetrical nature of this service meets those demands.

HAVi

An average household nowadays contains many very complicated devices. Many of them are home entertainment devices related to handling different audio or video data. These devices are computers in essence, but just more specialized in their features than a home PC. Home networking has become very popular nowadays since a normal household might contain several PCs that need to use shared resources like printers or file shares. Home audio and video devices like VCR, TV, amplifier, tuner, DVD, CD player and set-top-box form a similar interconnected network (see Figure 1). Why couldn’t these miniature computers also make use of each other’s features and even control each other to make everything easier for the consumer?


Major consumer electronics, software, semiconductor and computer manufacturers think that this should be possible and have decided to make it happen. The manufactures, namely Grundig, Hitachi, Panasonic, Philips, Sharp, Sony, Thomson and Toshiba along with now over30 other participants, have formed a non-profit organization called HAVi (Home Audio Video Interoperability) for promoting the development of interoperable consumer products. The goal of HAVi organization is to provide a standard open architecture for intelligent audio and video devices to interoperate with each other regardless of manufacturer, operating system, CPU or programming language used for implementation (HAVi, Inc., 2001a).The first beta version of the HAVi standard version 1.0 was published in December 1998while the final 1.0 version was released in December 1999. The current version of the specification is 1.1 (HAVi, Inc., 2001b) and it was published in May 2001.