Tuesday, 28 May 2013

iCloud



Apple introduced iCloud in iOS5 as a service to allow applications to store data on Apple’s servers and have it synchronized across all devices used by the same person (via their Apple ID). It also has a backup component. This document describes how to use some of the iCloud APIs provided by Apple to store and retrieve data from their servers, with C# samples for storing small key-value data pairs and for storing documents. It also discusses how iCloud Backup can influence the design of your application. The iCloud storage API in iOS5 allow applications to save user documents & application specific data to a central location and access those items from all the user’s devices. iCloud helps you store your photos, music, apps, documents, calendars and more. It’s an easiest way to manage your content. Apple has built iCloud functionality directly into many of their apps and iOS5. When you take a photo from your iPhone, it can automatically synchronize with iCloud, and be pushed to your iPad and Mac.

You can stop worrying about keeping all of your devices in sync once they are all linked to your iCloud account. Once you connect your device to the internet via a wired or Wi-Fi connection, all of your files will be automatically synchronized. The Backup feature allows you to store your personal data, along with music apps and books purchased from iTunes. You can restore all of your data directly to your device from iCloud, or move it to any new devices you buy. Apple has opened up development to third-party developers, which means that there will eventually be iCloud compatible apps for Windows aside those developed by Apple. Eventually iCloud development could spread to other platforms including Linux, Android, and BlackBerry. If you switch back and forth between a Windows PC and your Mac, it will not be long before you can keep both of them in sync with iCloud. You get 5GB of backup space for free, and there will likely be different pricing tiers based on how much data you want to store in iCloud. For $24.99 a year you get the Scan and Match feature, which scans your iTunes music library and adds any songs that are available in the iTunes library to your iCloud account. It does not matter if you purchased the songs from iTunes, from another music store, or ripped the CDs. All songs added to your iCloud account using the Scan and Match feature will be at 256kbps (DRM-free AAC files) regardless of the quality of your original track. There is a limit of 25,000 songs, but iTunes purchases do not count against that limit

iCloud Backup


While backing up to iCloud isn’t a feature that is directly accessed by developers, the way you design your application can affect the user experience. Apple provides iOS Data Storage Guidelines for developers to follow in their iOS applications. The most important consideration is whether your app stores large files that are not user-generated (for example, a magazine reader application that stores hundred-plus megabytes of content per issue). Apple prefers that you do not store this sort of data where it will be backed-up to iCloud and unnecessarily fill the user’s iCloud quota. Applications that store large amounts of data like this should either store it in one of the user directories that is not backed-up (eg. Caches or tmp) or use NSFileManager.SetSkipBackupAttribute to apply a flag to those files so that iCloud ignores them during backup operations. This article introduced the new iCloud feature included in iOS 5. It examined the steps required to configure your project to use iCloud and then provided examples of how to implement iCloud features.

The key-value storage example demonstrated how iCloud can be used to store a small amount of data similar to the way NSUserPreferences are stored. The UIDocument example showed how more complex data can be stored and synchronized across multiple devices via iCloud. Finally it included a brief discussion on how the addition of iCloud Backup should influence your application design.






Photostream:

Photo Stream is a service supplied with the basic iCloud service which allows users to store the most recent 1,000 photos on the iCloud servers up to 30 days free of charge. When a photo is taken on a device with Photo Stream enabled, it is automatically uploaded to the iCloud servers; from there, it is automatically pushed to the rest of the user's registered devices. The service is also integrated with Apple TV, allowing users to view their recent photos wirelessly on their HDTV. With Photo Stream, you can take a photo on one iOS device and it automatically appears on all your other devices, including your Mac or PC. Import new pictures to your computer from a digital camera, and iCloud sends copies over Wi-Fi to your iPhone, iPad, and iPod touch. You can even view recent photos on your big-screen TV via Apple TV. There’s no syncing, no email attachments, no file transfers. Your pictures are just there — on whichever device you happen to have handy.



Take a photo on an iOS device. Or import a photo from your digital camera to your computer. iCloud automatically pushes a copy of that photo over any available Wi-Fi or Ethernet connection to the Photos app on your iOS devices, iPhoto or Aperture on your Mac, and the Pictures Library on your PC. You can even view your Photo Stream album on your Apple TV. So you can show off your shots to friends and family from whichever device you’re using at the time.1000 of your latest photos. With you all the time.iCloud manages your Photo Stream efficiently so you don’t run out of storage space on your iPhone, iPad, or iPod touch. If you have Photo Stream enabled on your iOS device, every single photo you take appears in a special Photo Stream album that holds your last 1000 photos.

You can delete any photos you don’t want from the Photo Stream.1 To touch up a photo or keep a favorite shot permanently, simply save it to your Camera Roll. iCloud stores new photos for 30 days, so you have plenty of time to connect your iOS device to Wi-Fi and make sure you always have your most recent shots handy.1000 photos on your devices: New photos appear on your iPhone, iPad, or iPod touch in a rolling collection of your last 1000 photos.Save your best shots: If you take a photo you really love and want to make sure it stays on your iPhone, iPad, or iPod touch, you can save it from your Photo Stream to your Camera Roll.All your photos on your Mac or PC: Your computer automatically keeps all the photos that come through your Photo Stream.Master photo library. On your Mac or PC.

Keeping a complete set of your photos on your Mac is as simple as turning on Photo Stream in iPhoto or Aperture. Every new photo you take appears in a Photo Stream album just as it does on your iPhone, iPad, and iPod touch. But since your Mac has more storage than your iOS device, it automatically imports every picture from your Photo Stream into your photo library so you can edit, delete, and share the ones you want. Want to get the photos you’ve taken on your point-and-shoot or DSLR camera into your Photo Stream to view on all your other devices? The photos you import to your library from a camera or SD card are automatically uploaded to your Photo Stream. If you have a PC, you can auto-import and upload pictures, too. Just turn on Photo Stream, grab a camera, and start shooting.Make your photos a big deal with Apple TV.With Photo Stream and Apple TV, you can view your recent photos on your HDTV for some truly entertaining reality television.2 So you can, say, take pictures during your daughter’s softball game, then watch a photo play-by-play with the family gathered around the big-screen TV

References

http://www.apple.com/iphone/features/
http://www.quora.com/Whats-the-difference-between-the-cloud-cloud-computing-and-iCloud

E-Ball Technology



A new concept of pc is coming now that is E-Ball Concept pc. The E-Ball concept pc is a sphere shaped computer which is the smallest design among all the laptops and desktops. This computer has all the feature like a traditional computer, elements like keyboard or mouse., dvd, large screen display. E Ball is designed that pc is be placed on two stands, opens by pressing and holding the two buttons located on each side of the E-Ball pc , this pc is the latest concept technology. The E-Ball is a sphere shaped computer concept which is the smallest design among all the laptops and desktops have ever made. This PC concept features all the traditional elements like mouse, keyboard, large screen display, DVD recorder, etc, all in an innovative manner. E-Ball is designed to be placed on two stands, opens by simultaneously pressing and holding the two buttons located on each side. After opening the stand and turning ON the PC, pressing the detaching mouse button will allow you to detach the optical mouse from the PC body. This concept features a laser keyboard that can be activated by pressing the particular button. E-Ball is very small, it is having only 6 inch diameter sphere. It is having 120×120mm motherboard.

E Ball concept pc don't have any external display unit,it has a button when you press this button a projector will pop and it focus the computer screen on the wall which can be adjusted with navigation keys. If there is no wall then it has a paper sheet holder that divides into three pieces like an umbrella just after popping up,and it will show desktop on the paper sheet. Also, the E-Ball PC supports a paper holder and the paper sheet on the holder could act like a screen where you can watch movies or something. This concept PC will measure 160mm in diameter and it was designed for Microsoft Windows OS, sorry about the others. For the moment there is no word on pricing or when it’s going to be available, however, I am sure that everybody would like to see a small spherical PC like this one

Elements of E-Ball


Aren’t you tired of your PC? By his ugly shape and the way that it looks? Well, this is exactly what designer Apostol Tnokovski was feeling when he decided to create the smallest PC ever made. It’s not going to be like a PDA, it’s going to be a PC with all conventional components (mouse, keyboard, normal screen). The concept PC is called E-Ball and it’s shaped like a sphere because in Tnokovski’s opinion this is the best shape in nature and it draws everybody’s attention.E-Ball will feature a dual core processor, 250-500GB HDD, 2GB of RAM, integrated graphic card and sound card, 2 x 50W speakers, HD-DVD recorder, wireless optical mouse and laser keyboard, LAN and WLAN card, modem, Web cam and integrated LCD projector.



It contains wireless optical mouse and laser keyboard, and LCD projector.It has around 350-600GB of Hard Disk Drive.It contains 5GB RAM. It has two 50W speakers. It has LAN and WLAN card and a Web cam. When you want to carry it around you can easily “pack it” into a ball. This is a futuristic concept, and this, I think, is how the future computers will look like. This device has an optical keyboard and an holographic display. So you don’t have a physical keyboard and no monitor! Still, the mouse is physical but it fits in to the computer when you want to carry it around. The bad thing about using a virtual keyboard is that you need a smooth surface, otherwise I don’t know how will you be able to use it. It is strange enough to call this device a computer, because it is so small, but as far as I know it doesn’t lack any hardware part and tends to be a future machine found in any house or office. I don’t know exactly how this computer will be powered but I think it will have a powerful battery so you will have a great stand by time.



Working of E-Ball :

E Ball concept pc don't have any external display unit,it has a button when you press this button a projector will pop and it focus the computer screen on the wall which can be adjusted with navigation keys. If there is no wall then it has a paper sheet holder that divides into three pieces like an umbrella just after popping up,and it will show desktop on the paper sheet. Also, the E-Ball PC supports a paper holder and the paper sheet on the holder could act like a screen where you can watch movies or something. This concept PC will measure 160mm in diameter and it was designed for Microsoft Windows OS, sorry about the others. For the moment there is no word on pricing or when it’s going to be available, however, I am sure that everybody would like to see a small spherical PC like this one.





E-Ball concept pc has a laser keyboard that is fully a concept keyboard that is visible when the pc is in working. The keyboard is not physical - it is interpreted by lasers that appear after you press the respective button. It recognizes your fingers with the help of an IR sensor when you are typing at a particular place, while the mouse is a pop out wonder making this an exiting piece of technology.

The software interface of E-Ball concept pc is highly stylized with icons that can be remembered easily that support all type of windows operating system. E-Ball concept pc work very easy while you are making video presentations, listening music watching large screen movies, and chatting on the net.

As years passes, the computer size is becoming smaller. This ball is known as E-Ball and its design is given by Apostol Tnokovski. He was trying to create the smallest PC in the world when he came across this idea.It is shaped like a sphere because in Tnokovski’s opinion this is the best shape in nature and it draws everybody’s attention. you'll see the pop-out laser mouse, a pico projector inside that illuminates either the wall or a sheet of paper for a screen, and that laser keyboard that would almost certainly be a clumsy input device. Fix that, and find a motherboard that’ll fit inside this palm-sized baby, and Apostol might be onto something here.E-Ball will feature a dual core processor, 250-500GB HDD, 2GB of RAM, integrated graphic card and sound card, 2 x 50W speakers, HD-DVD recorder, wireless optical mouse and laser keyboard, LAN and WLAN card, modem, Web cam and integrated LCD projector.

References

http://www.google.co.in/EBALL
http://www.electronics.howstuffworks.com
http://www.google.com

Google Glass



The emergence of Google Glass, a prototype for a transparent Heads-Up Display (HUD) worn over one eye, is significant. It is the first conceptualization of a mainstream augmented reality wearable eye display by a large company. This paper argues that Glass’s birth is not only a marketing phenomenon heralding a technical prototype, it also argues and speculates that Glass’s popularization is an instigator for the adoption of a new paradigm in human-computer interaction, the wearable eye display. Google Glass is deliberately framed in media as the brainchild of Google co-founder Sergey Brin. Glass’s process of adoption operates in the context of mainstream and popular culture discourses, such as the Batman myth, a phenomenon that warrants attention.

The emergence of Google Glass, a prototype for a transparent Heads-Up Display (HUD) worn over one eye, is significant on several levels. It is the first conceptualization of a mainstream augmented reality wearable eye display playing out in a viral marketing campaign. Google Glass will enable us to capture video, let us interact with personal contacts, and navigate maps, amongst other things. The YouTube concept video “One Day…” that announced its coming on April 4, 2012, has been viewed more than 18 million times . Gracing the face of Diane von Furstenberg, who wore it at New York’s fashion week, it is often strategically trotted out for photo opportunities. It has been provocative enough to scare both Apple and Microsoft, who had been issuing patents for augmented reality products of their own . However, most salient of all is the way Google Glass is framed in media as the brainchild of Sergey Brin, the American computer scientist of Russian descent who co-founded Google. Brin is also celebrated in online articles as a real life “Batman,” who is developing a secret facility resembling the “Batcave”. This paper argues that Glass’s birth is not only a marketing phenomenon heralding a technical prototype, it also suggests and speculates that Glass’s popularization is an instigator for the adoption of a new paradigm in Human- Computer Interaction (HCI), the wearable eye display. Glass’s process of adoption operates in the context of mainstream and popular culture discourses, a phenomenon that warrants attention.

Background


Google Glass is a prototype for an augmented reality, heads-up display developed by Google X lab slated to run on the Android operating system (see Figure 1). Augmented reality involves technology that augments the real world with a virtual component . The first appearance of Glass was on Sergey Brin who wore it to an April 5, 2012 public event in San Francisco. Provocative headlines emerged such as “Google ‘Project Glass’ Replaces the Smartphone with Glasses” and “Google X Labs: First Project Glass, next space elevators?” . A groundswell of anticipation surrounds Glass because it implies a revolutionary transition to a new platform, even though release for developers is only planned for 2013. At the time of our writing this paper, it is not available for consumers who can only see it in promotional materials.





Heads-up eye displays are not new. The Land Warrior system, developed by the U.S. army over the past decade, for example, includes a heads-up eye display with an augmented reality visual overlay for soldier communication. Many well-known inventors have contributed eye display technology, research or applications over the past two decades including Steve Mann (Visual Memory Prosthetic), Thad Starner (Remembrance Agent), and Rob Spence (Eyeborg). Commercially, Vuzix is a company that currently manufactures transparent eye displays.

Science fiction and popular references to the eye display are almost too numerous to list, but most are featured in military uses: Arnold Schwarzenegger’s Terminator from the 1984 film had an integrated head’s up display that identified possible targets, Tom Cruise’s Maverick in Top Gun had a rudimentary display to indicate an enemy plane’s target acquisition and current G-forces, and Bungie’s landmark video game series Halo features a head’s up display that gives the player real-time status updates on player enemy locations, shield levels, remaining ammunition and waypoint information. In most popular culture uses, a head’s up display is transparently overlaid upon the real world. However, in video games, the display is considered to be part of the entire game interface. While many film and television shows are adding HUDs to their storytelling to add a science fiction or futuristic feel, there is a movement in game development away from any artificial HUDs as many consider them to be “screen clutter” and block a player’s view of a created world. The video game Dead Space by Electronic Arts is an exemplar of this new style: traditional game information such as health and ammunition have been woven into character design, allowing for an unobstructed view.



Relevance to HCI Community:

Google is calling for a profound change in computer interactivity with the mainstream introduction of the wearable eye display. This case study explores how this nascent computer platform is undergoing a process of early adoption in creative and alternative ways. Our paper charts this phenomenon by reading the popular culture context that surrounds adoption and the discursive response in the news and media. The path to technology adoption is a much-researched area with established theories as to why people embrace a platform. John B. Horrigan and Ellen Satterwhite analyze adoption and emphasize the social aspect:

It is social support that draws people to adoption, that is, the “demonstration effect” that comes when people see others in their social networks using something new, which in turns helps people understand the value of trying something new. People learn about a new product from people around them; their social networks, in other words, play a key role in helping people discover the utility and usability of an innovation. Google’s approach is to bring Glass into public social networks before it emerges. It generates a culture and a mass mainstream following for Glass as a new HCI platform by mediating how it is introduced to the public. Using an exemplary figure in Sergey Brin, Google makes Glass seem both socially relevant as well as alluring. While relevant research has been conducted on the adoption of “hyped technologies,” , it usually takes a consumer research perspective and does not consider the broader discourses, personas, and popular culture allusions that function in this process.





Sergey Brin has been loosely associated with Batman since the fall of 2011, setting persuasive discursive grounds for actions that Google takes. A compelling character in the narrative that charts this technology’s emergence, the name “Sergey Brin” appears 713 times in the corpus of 1,000 print and online news articles about Google Glass. Often the story concentrates on Brin’s activities, comments, whereabouts, and future expectations amid news of a technology that only exists as an artifact of the press for the public. Rupert Till explains the definition of how an individual must amass popular fame in order to form a “cult of personality”: A celebrity is someone who is well known for being famous, and whose name alone is recognizable, associated with their image, and is capable of generating money. . . For a star to progress to a point where they are described as a popular icon requires their achievement of a level of fame at which they are treated with the sort of respect traditionally reserved for religious figures. In order to be described as a popular icon, a star has to become a religious figure, to develop their own personality cult and recruit followers.

References

Google. Project Glass: One day… YouTube Available at: http://www.youtube.com/watch?v=9c6W4CCU9M4.
http://www.engadget.com/2012/09/14/googleglass-diane-von-furstenberg-new-york-fashionweek-video/
http://www.google.com

Done By

Isabel Pedersen
University of Ontario Institute of Technology
Oshawa, ON, Canada

Douglas Trueman
University of Ontario Institute of Technology
Oshawa, ON, Canada

Airborne Internet



Definition of Airborne Internet

There's a new type of service being developed that will take broadband into the air. The airborne Internet won't be completely wireless . There will be ground-based components to any type of airborne Internet network. The consumers will have to install an antenna on their home or business in order to receive signals from the network hub overhead. The networks will also work with established Internet Service Providers (ISPs), who will provide their high-capacity terminals for use by the network. These ISPs have a fiber point of presence their fiber optics are already set up. What the airborne Internet will do is provide an infrastructure that can reach areas that don't have broadband cables and wires

Introduction of Airborne Internet


The HALOT Aircraft is under development and flight testing is expected to occur by mid-1998. The aircraft has been specially designed for the HALOT Network with the Communications Payload Pod suspended from the underbelly of its fuselage

The HALOT Aircraft will fly above the metropolitan center in a circular orbit of five to eight nautical miles diameter. The Communications Payload Pod is mounted to a pylon under the fuselage. As the aircraft varies its roll angle to fly in the circular orbit, the Communications Payload Pod will pivot on the pylon to remain level with the ground

The HALOT Network will use an array of narrow beam antennas on the HALOT Aircraft to form multiple cells on the ground. Each cell covers a small geographic area, e.g., 4 to 8 square miles. The wide bandwidths and narrow beamwidths within each beam or cell are achieved by using MMW frequencies. Small aperture antennas can be used to achieve small cells. One hundred dish antennas can be easily carried by the HALOT Aircraft to create one hundred or more cells throughout the service area. If lensed antennas are utilized, wider beams can be created by combining beams through each lens aperture, and with multiple feeds behind each lens multiple beams can be formed by each compound lens.If 850 MHz of spectrum is assumed, then a minimum capacity of one full-duplex OC-1 (51.84 Mbps) channel is available per cell. For example, a single platform reusing 850 MHz of spectrum in 100 cells would provide the equivalent of two, OC-48 fiber optic rings. The elements in the communications payload are shown below. It consists of MMW transceivers, pilot tone transmitter, high-speed modems, SONET multiplexers, packet switch hardware and software, and associated ancillary hardware such as power supplies, processors, etc



Summary


Several companies have already shown that satellite Internet access can work. The airborne Internet will function much like satellite-based Internet access, but without the time delay. Bandwidth of satellite and airborne Internet access are typically the same, but it will take less time for the airborne Internet to relay data because it is not as high up. Satellites orbit at several hundreds of miles above Earth. The airborne-Internet aircraft will circle overhead at an altitude of 52,000 to 69,000 feet (15,849 to 21,031 meters). At this altitude, the aircraft will be undisturbed by inclement weather and flying well above commercial air traffic.Networks using high-altitude aircraft will also have a cost advantage over satellites because the aircraft can be deployed easily -- they don't have to be launched into space. However, the airborne Internet will actually be used to compliment the satellite and ground-based networks, not replace them. These airborne networks will overcome the last-mile barriers facing conventional Internet access options

The HALOT Network is capable of providing high rate communications to users of multimedia and broadband services. The feasibility of this approach is reasonably assured due to the convergence of technological advancements. The key enabling technologies at hand include:
GaAs RF devices which operate at MMW frequencies
ATM/SONET Technology and Components
Digital Signal Processing for Wideband Signals
Video Compression
Very Dense Memory Capacity
Aircraft TechnologyThese technologies are individually available, to a great extent, from commercial markets. The HALOT Network seeks to integrate these various technologies into a service of high utility to small and medium businesses and other mutlimedia consumers at a reasonable cos

Cyber Crime



“Cyber” refers to imaginary space, which is created when the electronic devices communicate, like network of computers. Cyber crime refers to anything done in the cyber space with a criminal intent. These could be either the criminal activities in the conventional sense or could be activities, newly evolved with the growth of the new medium. Cyber crime includes acts such as hacking, uploading obscene content on the Internet, sending obscene e-mails and hacking into a person's e-banking account to withdraw money. Computer crime, or cybercrime, refers to any crime that involves a computer and a network, where the computers played an instrumental part in the commission of a crime. Cyber Crime has nowhere been defined in any statute /Act passed or enacted by the Indian Parliament. The concept of cyber crime is not radically different from the concept of conventional crime. Both include conduct whether act or omission, which cause breach of rules of law and counterbalanced by the sanction of the state .particularly those surrounding hacking, copyright infringement through warez, child pornography and child grooming.

The term ‘cyber crime’ is a misnomer. This term has nowhere been defined in any statute /Act passed or enacted by the Indian Parliament. The concept of cyber crime is not radically different from the concept of conventional crime. Both include conduct whether act or omission, which cause breach of rules of law and counterbalanced by the sanction of the state.


Reasons for Cyber Crime


A Resistive Touch Screen panel comprises several layers, the most important of which are two thin, transparent electrically-resistive layers separated by a thin space.



These layers face each other, with a thin gap between. One resistive layer is a coating on the underside of the top surface of the screen. Just beneath it is a similar resistive layer on top of its substrate. One layer has conductive connections along its sides, the other along top and bottom.
Capacitive:

Hart in his work “ The Concept of Law” has said ‘human beings are vulnerable so rule of law is required to protect them’. Applying this to the cyberspace we may say that computers are vulnerable so rule of law is required to protect and safeguard them against cyber crime. The reasons for the vulnerability of computers may be said to be:

a) Capacity to store data in comparatively small space-

The computer has unique characteristic of storing data in a very small space. This affords to remove or derive information either through physical or virtual medium makes it much more easier.

b) Easy to access-

The problem encountered in guarding a computer system from unauthorised access is that, there is every possibility of breach not due to human error but due to the complex technology. By secretly implanted logic bomb, key loggers that can steal access codes, advanced voice recorders, retina imagers etc. that can fool biometric systems and bypass firewalls can be utilized to get past many a security system.

c) Complex-

The computers work on operating systems and these operating systems in turn are composed of millions of codes. Human mind is fallible and it is not possible that there might not be a lapse at any stage. The cyber criminals take advantage of these lacunas and penetrate into the computer system.

d) Negligence-

Negligence is very closely connected with human conduct. It is therefore very probable that while protecting the computer system there might be any negligence, which in turn provides a cyber criminal to gain access and control over the computer system.

e) Loss of evidence-

Loss of evidence is a very common & obvious problem as all the data are routinely destroyed. Further collection of data outside the territorial extent also paralyses this system of crime investigation.


Mode and Manner of Committing Cybercrime:

Unauthorized access to computer systems or networks / Hacking-

This kind of offence is normally referred as hacking in the generic sense. However the framers of the information technology act 2000 have no where used this term so to avoid any confusion we would not interchangeably use the word hacking for ‘unauthorized access’ as the latter has wide connotation.

Theft of information contained in electronic form-

This includes information stored in computer hard disks, removable storage media etc. Theft may be either by appropriating the data physically or by tampering them through the virtual medium.

Email bombing-

This kind of activity refers to sending large numbers of mail to the victim, which may be an individual or a company or even mail servers there by ultimately resulting into crashing.

Data diddling-

This kind of an attack involves altering raw data just before a computer processes it and then changing it back after the processing is completed. The electricity board faced similar problem of data diddling while the department was being computerised.

Salami attacks-

This kind of crime is normally prevalent in the financial institutions or for the purpose of committing financial crimes. An important feature of this type of offence is that the alteration is so small that it would normally go unnoticed. E.g. the Ziegler case wherein a logic bomb was introduced in the bank’s system, which deducted 10 cents from every account and deposited it in a particular account.

Denial of Service attack-

The computer of the victim is flooded with more requests than it can handle which cause it to crash. Distributed Denial of Service (DDoS) attack is also a type of denial of service attack, in which the offenders are wide in number and widespread. E.g. Amazon, Yahoo.

Virus / worm attacks-

Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worms, unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory. E.g. love bug virus, which affected at least 5 % of the computers of the globe. The losses were accounted to be $ 10 million. The world's most famous worm was the Internet worm let loose on the Internet by Robert Morris sometime in 1988. Almost brought development of Internet to a complete halt.

Logic bombs-

These are event dependent programs. This implies that these programs are created to do something only when a certain event (known as a trigger event) occurs. E.g. even some viruses may be termed logic bombs because they lie dormant all through the year and become active only on a particular date (like the Chernobyl virus).

Trojan attacks-

This term has its origin in the word ‘Trojan horse’. In software field this means an unauthorized programme, which passively gains control over another’s system by representing itself as an authorised programme. The most common form of installing a Trojan is through e-mail. E.g. a Trojan was installed in the computer of a lady film director in the U.S. while chatting. The cyber criminal through the web cam installed in the computer obtained her nude photographs. He further harassed this lady.

Internet time thefts-

Normally in these kinds of thefts the Internet surfing hours of the victim are used up by another person. This is done by gaining access to the login ID and the password. E.g. Colonel Bajwa’s case- the Internet hours were used up by any other person. This was perhaps one of the first reported cases related to cyber crime in India. However this case made the police infamous as to their lack of understanding of the nature of cyber crime.

Web jacking-

This term is derived from the term hi jacking. In these kinds of offences the hacker gains access and control over the web site of another. He may even mutilate or change the information on the site. This may be done for fulfilling political objectives or for money. E.g. recently the site of MIT (Ministry of Information Technology) was hacked by the Pakistani hackers and some obscene matter was placed therein. Further the site of Bombay crime branch was also web jacked. Another case of web jacking is that of the ‘gold fish’ case. In this case the site was hacked and the information pertaining to gold fish was changed. Further a ransom of US $ 1 million was demanded as ransom. Thus web jacking is a process where by control over the site of another is made backed by some consideration for it.

Green Computing



Green computing, green IT or ICT Sustainability, refers to environmentally sustainable computing or IT. In the article Harnessing Green IT: Principles and Practices, San Murugesan defines the field of green computing as "the study and practice of designing, manufacturing, using, and disposing of computers, servers, and associated subsystems—such as monitors, printers, storage devices, and networking and communications systems — efficiently and effectively with minimal or no impact on the environment."The goals of green computing are similar to green chemistry; reduce the use of hazardous materials, maximize energy efficiency during the product's lifetime, and promote the recyclability or biodegradability of defunct products and factory waste. Research continues into key areas such as making the use of computers as energy-efficient as possible, and designing algorithms and systems for efficiency-related computer technologies.

Green computing is the environmentally responsible use of computers and related resources. Such practices include the implementation of energy-efficient central processing units (CPUs), servers and peripherals as well as reduced resource consumption and proper disposal of electronic waste (e-waste). One of the earliest initiatives toward green computing in the United States was the voluntary labeling program known as Energy Star. It was conceived by the Environmental Protection Agency (EPA) in 1992 to promote energy efficiency in hardware of all kinds. The Energy Star label became a common sight, especially in notebook computers and displays. Similar programs have been adopted in Europe and Asia.



What is a thin client?


A thin client (sometimes also called a lean or slim client) is a computer or a computer program which depends heavily on some other computer (its server) to fulfill its traditional computational roles. This stands in contrast to the traditional fat client, a computer designed to take on these roles by itself. The exact roles assumed by the server may vary, from providing data persistence (for example, for diskless nodes) to actual information processing on the client's behalf.



Thin clients occur as components of a broader computer infrastructure, where many clients share their computations with the same server. As such, thin client infrastructures can be viewed as the amortization of some computing service across several user-interfaces. This is desirable in contexts where individual fat clients have much more functionality or power than the infrastructure either requires or uses. This can be contrasted, for example, with grid computing.

Thin-client computing is also a way of easily maintaining computational services at a reduced total cost of ownership.
The most common type of modern thin client is a low-end computer terminal which concentrates solely on providing a graphical user interface to the end-user. The remaining functionality, in particular the operating system, is provided by the server.

Thin clients have their roots in multi-user systems, traditionally mainframes accessed by some sort of terminal computer. As computer graphics matured, these terminals transitioned from providing a command-line interface to a full graphical user interface, as is common on modern thin clients. The prototypical multiuser environment along these lines, UNIX, began to support fully graphical X terminals, i.e., devices running X server software, from about 1984. X terminals remained relatively popular even after the arrival of other thin clients in the mid-late 1990s. Modern UNIX derivatives like BSD and GNU/Linux continue the tradition of the multi-user, remote display/input session. Typically, X server software is not made available on thin clients; although no technical reason for this exclusion would prevent it.

Windows NT became capable of multi-user operations primarily through the efforts of Citrix Systems, which repackaged NT 3.5.1 as the multi-user operating system Win Frame in 1995. Microsoft licensed this technology back from Citrix and implemented it into Windows NT 4.0 Terminal Server Edition, under a project codenamed "Hydra". Windows NT then became the basis of Windows 2000 and Windows XP. As of 2011 Microsoft Windows systems support graphical terminals via the Remote Desktop Services component.

The term thin client was coined in 1993 by Tim Negris, VP of Server Marketing at Oracle Corp., while working with company founder Larry Ellison on the launch of Oracle 7. At the time, Oracle wished to differentiate their server-oriented software from Microsoft's desktop-oriented products. Ellison subsequently popularized Negris's buzzword with frequent use in his speeches and interviews about Oracle products. Size comparison - traditional Desktop PC vs. Clientron U700



Client Simplicity:

Since the clients are made from low-cost hardware with few moving parts, they can operate in more hostile environments than conventional computers. However, they inevitably need a network connection to their server, which must be isolated from such hostile environments. Since thin clients are cheap, they offer a low risk of theft in general, and are easy to replace if stolen or broken. Since they do not have any complicated boot images, the problem of boot image control is centralized to the server.

On the other hand, to achieve this simplicity, thin clients sometimes lag behind thick clients (PC Desktops) in terms of extensibility. For example, if a local software utility or set of device drivers are needed in order to support a locally attached peripheral device (e.g. printer, scanner, biometric security device), the thin client operating system may lack the resources needed to fully integrate the needed dependencies. Modern thin clients attempt to address this limitation via port mapping or USB redirection software. However, these methods cannot address all use case scenarios for the vast number of peripheral types being put to use today.



Thin Clients has many advantages, so different people define thin clients in different way basing one of its advantage. Below are the few common definitions & sentences people often use to define thin client. Simply, Thin Client is nothing but a computer, but with very less configuration (specifications /capacity / power), still users can able to run all the latest Operating Systems and Applications (software), with the help of SERVER Computer which is connected to it through LAN Means, In Thin Clients you need not to install any OS or Applications, you have to install Only in SERVER where all thin clients are connected to it, all the OS and Applications will run on server and results are displayed in Thin Clients (user computers) Several users can run the same program simultaneously, but the program only needs to be loaded once with a central server. In Traditional PC, We have to Install OS and Applications Locally and use its Local Resources (CPU, Ram, HDD) for its Processing and Storing, where as in Thin Client you need not install any OS or Applications in Thin Client, but you can access OS and Applications from SERVER.




References

1) Aducent Inc

Bluetooth Network Security



Abstract of Bluetooth Network Security



Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless local area network (WLAN) devices, for instance, allow users to move their laptops from place to place within their offices without the need for wires and without losing network connectivity.

Ad hoc networks, such as those enabled by Bluetooth, allow users to:

 Data synchronization with network systems and application sharing between devices.

 Eliminates cables for printer and other peripheral device connections.

 Synchronize personal databases.

 Provide access to network services such as wireless e-mail, Web browsing, and Internet access.

However, risks are inherent in any wireless technology. The loss of confidentiality and integrity and the threat of denial of service (DoS) attacks are risks typically associated with wireless communications. Specific threats and vulnerabilities to wireless networks and handheld devices include the following:

 All the vulnerabilities that exist in a conventional wired network apply to wireless technologies.

 Malicious entities may gain unauthorized access to an agency‟s computer network through wireless connections, bypassing any firewall protections.

 Sensitive information that is not encrypted (or that is encrypted with poor cryptographic techniques) and that is transmitted between two wireless devices may be intercepted and disclosed.

 Sensitive data may be corrupted during improper synchronization.

 Data may be extracted without detection from improperly configured devices.

Security Aspects in Bluetooth


The Bluetooth-system provide security at two level-
 At Link layer
 At Application layer

Link layer security

Four different entities are used for maintaining security at the link layer: a Bluetooth device address, two secret, keys, and a pseudo-random number that shall be regenerated for each new transaction.

The four entities and their sizes are summarized in Table-






L2CAP: enforce security for cordless telephony.

RFCOMM: enforce security for Dial-up networking.

OBEX: files transfer and synchronization.


The encryption key in Bluetooth changes every time the encryption is activated, the authentication key depends on the running application to change the key or not. Another fact regarding the keys is that the encryption key is derived from the authentication key during the authentication process. The time required to refresh the encryption key is 228 Bluetooth clocks which is equal to approx. 23 hours. RAND or the random number generator is used for generating the encryption and authentication key. Each device should have its own random number generator. It is used in pairing (the process of authentication by entering two PIN-codes) for passed keys in the authentication process.

Security modes in Bluetooth

In Bluetooth there are three security modes which are:

 Mode 1: Non-secure.
 Mode 2: Service level security
Trusted device
Un-trusted devices
Unknown devices

 Mode 3: Link level.

The trusted device is a device that has been connected before, its link key is stored and it‟s flagged as a trusted device in the device database. The un-trusted devices are devices that have also previously connected and authenticated, link key is stored but they are not flagged as a trusted devices.

The unknown devices are the devices that have not connected before. In Bluetooth service level we have three type of service in regard to the security:

 Services that need authentication and authorization: this is automatically granted to the trusted devices but for the un-trusted devices manual authentication is required.

 Services that need authentication only: in this case the authorization process is not necessary.

Attack Tools & Programs

 Hardware Used: Dell XPS, Nokia N95, Nokia 6150, Hp IPAQ HX2790b.

 Operating Systems: Ubuntu, Backtrack, Windows Vista, Symbian OS, windows mobile.

 Software used: Bluebugger, Bluediving, Bluescanner, Bluesnarfer, BTscanner, Redfang, Blooover2, Ftp_bt.

 Dell laptop with windows vista to be broken into and for scanning then with Linux to attempt attacks. Pocket pc for being attacked, and one mobile for attacking one for being attacked.

Body Motion Information Collection



Abstract

This project is utilizes multiple- Knot network technology to gather multiple -point accelerations information's.

PURPOSE:


This paper deals with the Numerous experiment data indicate it gather accurate information about human body which reflect the truthfully human body motions and this paper is process or transmit it to advanced comprehensively analyzed and this is widely used in such fields are health recovery training, physical exercises, computer games controlling. And here some mathematical calculations about the acceleration component information such as motional track and dynamic process will be gotten for this platform

Description:

Any human body motion, from its beginning to the end, the acceleration of every part of the mobile limbs or other parts of human body is keeping changing. If certain motion is repeated, then its acceleration changing regularity is also very also very close. Therefore if a three-axis acceleration sensor is put on some typical point of measured limbs or other body parts, then the three acceleration components X_Y_Z of that typical point in the motion process can be collected accurately.

Then by mathematical calculation about the acceleration components information such as the motional track and dynamic process about that point will be gotten.

From comprehensive analysis of the data gathered about several typical points detailed information about the measured human body motions is obtained so that motion information is digitalized.

This motion information collection platform uses multi-knot internet technology to
Collect the acceleration information of multiple typical points simultaneously, and process or transmit it to advanced computers to be comprehensively analyzed, thus this platform can be widely used in such fields as health recovery training, physical exercises, computer games controlling

TECHNOLOGY:

Micro-Electro-Mechanical Systems (MEMS) is the integration of mechanical elements, sensors, actuators, and electronics on a common silicon substrate through microfabrication technology. While the electronics are fabricated using integrated circuit (IC) process sequences (e.g., CMOS, Bipolar, or BICMOS processes), the micromechanical components are fabricated using compatible "micromachining" processes that selectively etch away parts of the silicon wafer or add new structural layers to form the mechanical and electromechanical devices.
MEMS promises to revolutionize nearly every product category by bringing together silicon-based microelectronics with micromachining technology, making possible the realization of complete systems-on-a-chip . MEMS is an enabling technology allowing the development of smart products, augmenting the computational ability of microelectronics with the perception and control capabilities of micro sensors and micro actuators and expanding the space of possible designs and applications

RESULT:


By this controller we get the information according to motion of the body.

Energy Management With Zigbee



Abstract

To slow down the process of global warming, aim at reducing green house gas emission. Reducing energy consumption would reduce CO2 emission effectively

PURPOSE:


The purpose of this project is to developed based on wireless sensor network technology. The developed system is low cost and robust and fully takes the advantages of zigbee

Description:

The environmental sensors embedded with zigbee router modules are distributed to different locations to connect the environmental data .with collected data and preset energy quota the control unit of the proposed system updates the status of each electrical appliance in order to minimize the energy consumption.

Wireless Sensor network (WSN) is a popular solution for energy management solution in building automation. In addition to technical sophistication, greater cost-efficiencies while maintaining high levels of functionality and reliability are high on the priority list for most wireless sensor developer's .while wireless systems reduce the wiring and labor cost in building automation technologies, there is an urgent need to enhance power efficiency and the range of the wireless digital signal transmission. Wireless mesh networking technology is likely to address the issue surrounding wireless signal attenuation and offer better quality wireless signals.

In this project we are using two sections: first section is a transmitter in which we are using LDR and temperature sensor to get the light intensity and temperature that data will communicate with the serial ADC through receiver section using Zigbee (Tran receiver) and another transmitter section in which we are using Temperature sensor and ldr to get the temperature and light intensity through serial; ADC also communication via Zigbee.
At the receiver we are having two switches that with indicate whether transmitter1 or transmitter2 depend upon both sensor threshold value and the particular information is displayed on the LCD

TECHNOLOGY:

Now a day's every system is automated in order to face new challenges. In the present days Automated systems have less manual operations, flexibility, reliability and accurate. Due to this demand every field prefers automated control systems. Especially in the field of electronics automated systems are giving good performance. And this is realized by making use of Zigbee technology for communication. Zigbee is new wireless technology guided by IEEE 802.15.4 Personal Area Network standard. It is primarily designed for the wide ranging controlling applications and to replace the existing non-standard technologies. It currently operates in 868MHz band at a data rate of 20Kbps in Europe, 914MHz band at 40kbps in USA, and the 2.4GHz ISM bands Worldwide at a maximum data-rate of 250kbps

RESULT:


The result of this project to reduce energy management for residential commercial building. The technology of Zigbee represents a wireless network which is highly reliable, networking, secure, low data rate, low power consumption.

Embedded Web Technology ( seminar topic )


Abstract





Embedded Web Technology (EWT) is regarded as the 'marriage' of Web technologies with embedded systems. In other words, the software developed for embedded systems is applied by making use of the Internet.

Embedded technology has been around for a long time and its use has gradually expanded into the PC market. Speed, accuracy, reliability were the reasons why embedded technology entered computers. With an great market size of billions in the next coming years, the future is embedded. Embedded systems contain processors, software, input sensors and output actuators, which work as the controls of a device and are subject to constraints.

These Embedded systems may not have disk drives, keyboards, display devices and are typically restricted in terms of power, memory, GUIs and debugging interfaces.The central building blocks are microcontrollers, i.e. microprocessors integrated with memory units and specific peripherals for the observation and control of these embedded systems.On the other hand, Web technologies employ client-server models.



Introduction


The embedded Web system works on the same principle as that traditional Web request-response systems. Web pages from the embedded system (server) are transmitted to the Web browser (client) , which implements the user interface (Presentation layer). In other cases , the the embedded system dynamically generates the pages to convey the current state of the device to the user at the centralized location. These end users can also use the Web browser to send the information to the embedded system for the configuration and control ofd the device.

Web-enabled devices use the HTTP (Hyper Text Transfer Protocol) standard protocol to transmit Web pages from the embedded system to the Web browser , and to transmit HTML (Hyper Text Markup Languages) form the data from the browser back to the device. The devices require a network interface such as Ethernet ,TCP/IP software , embedded Web server software , and the Web pages (both static and generated) that make up the device- specific GUI.

The HTTP protocol engine takes the request from the Web browser and sends it on the TCP/IP. The HTTP protocol Engine parses the request and sends it to the embedded application for processing. After producing the results , the embedded application generates the HTML code and feeds it to the HTTP Engine , which sends it back to the client using TCP/IP.







Figure 1: Web-enabled devices use the HTTP standard protocol to transmit Web pages from the embedded system to the Web browser, and to transmit HTML form data from the browser back to the device .

Embedded Web Technology is an enabling, or platform, technology. This means that it is relevant to a wide variety of applications, many of which have not yet been identified. We at NASA have promoted EWT through workshops, participation in shows, and one-to-one consultations with our partners.


Embedded Software :

The Internet is the dominant method of information access. People are using universal clients such as Web browsers and email readers to connect to any system, from anywhere, and at any time.

With the use of embedded Internet technology, innovative companies are building products that let people use these same universal clients to manage embedded devices. Using Web or email technologies in a networked device delivers user control with any Web browser or email client. This approach eliminates the need to build custom management applications and provides access to the device using the Internet tools that everyone is familiar with.

Embedded software space is vast and wide open. Newer embedded systems can require different software based applications.

These software based applications are :

Database applications,

Internet applications,

Mobile office productivity tools,

And personal applications.



Developing and running these applications require tools and supporting software platforms. All these embedded software requirements can be broadly classified into "embedded database", "embedded language extensions", "embedded development tools", "embedded applications" and their sub-classification will be a long list of specific areas.