the Byte

the Byte is a technical Magazine for IMS Engineering College.

Recent Posts

Secret Of Magia (2015)

No comments


http://i73.fastpic.ru/big/2015/1101/f8/3f6f2bb850654731108d67064def27f8.jpg

Secret Of Magia (2015)
PC Game | Developer: Lunatoid | Publisher: Epic Quest Games | 382 MB
Genre: Action, RPG, Adventure | Language: English | Release Date: 21 August, 2015

Secret of Magia is an action RPG heavily inspired by The Legend of Zelda: A Link To The Past, Arc The Lad, and Secret of Mana. A ruthless tyrant is seizing control of village after village. Rather than prepare for this threat, your town's elders have decided to ignore it.

Isaac Newton

No comments


Secret Life Of Isaac Newton

 

The Other Post

No comments

This is heading



This is some other text

History Of Robotics

No comments
Hello, it’s just me a human, but guess what if it is robot to assist me and you. It’s just a feeling of technology that helps us to create an ability to control and adapt the natural environment and this technology arena does not go beyond of Robotics.
We will be discussing mostly about the scenario of the today’s world or The Robotic World. There’s this saying I saw once, it said : "You are a human who need the reason not a robot who need a decision."
The word robotics derived from the Slavic word 'robota' which means labour. Difficult to guess but it comes from a play called 'Rossum's Universal Robots' by writer 'Karl Capeck' of Czech Republic. Actually the word was firstly adopted by Oxford Dictionary because of Karl’s brother JosefCapeck, so he is basically original originator(make someone fool with this).
It is quite impossible to estimate the date of birth of robotics.Because it has some aspects of its origin from various
mythology and as we know history is boring.By the way historians are unable to derive the origin date of robotics.
It has a long past, so let me bring you from where our civilization started you may use Wikipedia if you want to be a historian. Little discussion kind of boring job- In 1927 the Maschinenmensch ("machine-human") gynoid humanoid robot (also called "Parody", "Futura", "Robotrix", or the "Maria impersonator"), was the first depiction of a robot ever to appear on film was played by German actress, Brigitte Helm in Fritz Lang's film Metropolis.
In 1928, one of the first humanoid robots was exhibited at the annual exhibition of the Model Engineers Society in London. Invented by W. H. Richards, the robot Eric's frame consisted of an aluminium body of armour with eleven electromagnets and one motor powered by a twelve-volt power source. The robot could move its hands and head and could be controlled through remote control or voice control.
Westinghouse Electric Corporation built Televox in 1926; it was a cardboard cutout connected to various devices which users could turn on and off. In 1939, the humanoid robot known as Elektro was debuted at the World's Fair. Seven feet tall (2.1 m) and weighing 265 pounds (120.2 kg), it could walk by voice command, speak about 700 words (using a 78-rpm record player), smoke cigarettes, blow up balloons, and move its head and arms. The body consisted of a steel gear, cam and motor skeleton covered by an aluminum skin. In 1928, Japan's first robot, Gakutensoku, was designed and constructed by biologist Makoto Nishimura. In 1942 the science fiction writer Isaac Asimov formulated his Three Laws of Robotics in his 1942 story "run around". By the way his law are adapted universally now with some changes brought upon in 2009 by IEEE which are following:-
IEEE laws- 1. A human may not deploy a robot without the human-robot work system meeting the highest legal and professional standards of safety and ethics. 2. A robot must respond to humans as appropriate for their roles. 3. A robot must be endowed with sufficient situated autonomy to protect its own existence as long as such protection provides smooth transfer of control which does not conflict with the First and Second Laws.
In 1948, Norbert Wiener formulated the principles of cybernetics, the basis of practical robotics. Electronics evolved into the driving force of development with the advent of the first electronic autonomous robots created by William Grey Walter in Bristol, England in 1948. The first digital and programmable robot was invented
by George Devol in 1954 and was named the Unimate. It was sold to General Motors in 1961 where it was used to lift pieces of hot metal from die casting machines at the Inland Fisher Guide Plant in the West Trenton section of Ewing Township, New Jersey.
As strange as it might seem, there really is no standard definition for a robot. However, there are some essential characteristics that a robot must have and this might help you to decide what is andwhat is not a robot. It will also help you to decide what features you will need to build into a machine before it can count as a robot. A robot has these essential characteristics: 1.Sensing: First of all your robot would have to be able to sense its surroundings. It would do this in ways that are similar to the way that you sense your surroundings. Giving your robot sensors:-light sensors (eyes), touch and pressure sensors (hands), chemical sensors  (nose), hearing and sonar sensors  (ears), and taste sensors  (tongue) will give your robot awareness of its environment. 2.Movement: A robot needs to be able to move around its environment. Whether rolling on wheels, walking on legs or propelling by thrusters, a robot needs to be able to move. To count as a robot either the whole robot moves, like the Sojourner or just parts of the robot moves, like the Canada Arm. 3.Energy: A robot needs to be able to power itself. A robot might be solar powered, electrically powered or battery powered. The way your robot gets its energy will depend on what your robot needs to do. 4.Intelligence: A robot needs some kind of "smarts." This is where programming enters into the picture. A programmer is the person who gives the robot its 'smarts.' The robot will have to have some way to receive the program so that it knows what it is to do.

 Q:-What is that creates a difference in definition of robot?
Ans:-Well many scientists across the world have their own vision and they do not come to same meaning or definition of robot. Some differentiate with  Automata and  mechatronics (as in Disneyland) and now autonomous digital. 

How To Protect Your Cloud Accounts

No comments
HOW TO PROTECT YOUR CLOUD ACCOUNTS

Today we all have cloud accounts. Our data and information is stored on the servers of different websites. Is this safe to store some private data like bank account numbers, PIN numbers of ATM cards, and many others? Let’s have a look.  
Well,all online services use encryption to protect digital content. These algorithms are very hard to be cracked. In fact, hackers are more likely to breach online security because of our own carelessness.
The main reason is that mostly people use the same passwords for all their accounts. This means if any unauthorized person get into one of accounts, then he will soon have access to all other accounts. So, first step is to create strong passwords and different password for each of the account.

Creating a strong Password
The longer the better is the password. Avoid names, birth dates, pets, phone numbers, favourite film stars, sports person, etc.
Include upper and lower case alphabets, numerals, as well as special characters like @,#,$,%,etc.
Use phrases with words along with special characters and numerals. Use words from two different languages. This will make it easier to remember and harder to guess for any other person.
Example- Rasgulla#is&sweet

How to remember all your Passwords  
Use a dedicated password manager-program that saves all your passwords in encrypted form so that no one, except you, can access them. You will need to remember one master password to access all your passwords.

Two step authentication 

On many online services including Dropbox, Facebook, icloud, Google, Microsoft OneDrive and twitter, you can activate two-step authentication (under password and security settings in your account). With two-step, when you type your password, you will be asked to enter a one-time code that is either sent to your registered e-mail ID or phone number. The unauthorized person will not be able to login in your account. The second benefit is that you are automatically notified on your device or e-mail whenever a break-in attempt has been made on your account, you can change your password immediately.

SOME CLOUD STORAGES WITH SOLID ENCRYPTION

MEGA

Mega is a storage and file-hosting service that offers 50 GB of free online space and the ability to encrypt data before uploading it to its servers.This means that even the cloud storage provider can not view your data. Only the user who has the decryption key, can access and view the uploaded content.                    

TRESORIT

Tresorit provides end-to-end encryption and backup of data stored on your computer. First you will have to install its client software on your PC/Mac and create a free account.The service provides you  with 5 GB of storage and the ability to upload encrypted files from your computer to its servers.
You can choose any folder you want to encrypt and sync-you have to drag-and-drop the  folder
into  the Tresorit dashboard.
These encrypted folders or “Tresors” can be shared securely with others via e-mail.The recipients also have to register with the service to view the folder’s content.


CONCLUSION

To use internet and cloud accounts efficiently, do not share your passwords with any person.
Choose strong passwords and different passwords for different account.
                                                                                 
                                                                                                                 Posted By-
                                                                                                                 ROHIT CHAUDHARY
                                                                                                                             CS 2 III YEAR
                                                                                                                             www.scitechinfo.in  

SOCIAL MEDIA

No comments

What   do   you  think   about   social media?   What it has importance  i n today’s era?
Is  it  something  which  has changed our lives?  Let’s have a look upon  it.
Social media is the social interaction among people in which they create, share or exchange information and ideas in virtual communities and networks.
Social media depends on mobile and web-based technologies to create highly interactive platforms through which individuals and communities share, create, discuss, and modify user-generated contents. They create substantial and pervasive changes to communication between organizations, communities, and individuals.
Social media differ from traditional media (Print media, Electronic media,etc) in many ways, including quality, reach, frequency, usability, immediacy, and permanence.  Internet users continue to spend more time with social media sites than any other type of site. At the same time, the total time spent on social media in the U.S. across PC and mobile devices increased by 37 % to 121 billion minutes in July 2012 compared to 88 billion minutes in July 2011.

Here are few types of social media:
1.Collaborative projects  (For example, Wikipedia)
2.Blogs and microblogs  (For example, Twitter and Tumblr)
3.Content communities  (For example, YouTube and DailyMotion)
4.Social networking sites  (For example, Facebook)


Virality on Social Media
Some social media sites have greater virality - that is, users are more likely to reshare content that has already been posted on the site by another user, to their social network. Many social media sites provide specific functionality to help users reshare content - for example, Twitter's retweet button, or Tumblr's reblog function. This is of particular interest for viral marketing for businesses, but also for nonprofit organisations and activists.

Some features of Social Media
1.Quality: In industrial (traditional) publishing, the typical range of quality is substantially narrower than in unmediated markets. The distribution of quality has high variance: from very high-quality items to low-quality also.
2. Reach: Industrial media typically use a centralized framework for organization, production, and dissemination, whereas social media are by their  nature more decentralized, less hierarchical, and distinguished by multiple points of production and utility.
3. Frequency: The number of times an advertisement is displayed on social media platforms.
4. Accessibility: The means of production for industrial media are typically government and/or corporate (privately owned). Social media tools are generally available to the public at little or no cost.
5. Usability: Most social media production requires only modest reinterpretation of existing skills. Anyone with access can operate on social media.
6.Immediacy:  Social media is  capable of virtually instantaneous responses.
7. Alterable:  Social media can be altered almost instantaneously by comments or editing.
Internet usage effects
1.Consumers continue to spend more time on social networks than on any other category of sites—roughly 20 % of their total time online via PC and 30 % of total time online via mobile.
2.Facebook  remains the most-visited social network in the U.S. via PC (152.2 million visitors), mobile apps (78.4 million users) and mobile web (74.3 million visitors).
3.51% of people aged 25–34 used social networking in the office, more than any other age group.
4.While the computer is still the primary device used to access social media despite dropping 4% in usage in 2012, the last year saw a significant increase in usage, most notably through tablets from 3% to 16%, internet enabled TVs from 2% to 4%.
5. In November 2011, it was reported Indians spend more time on social media than on any other activity on the Internet.


Advantages of Social Media

§      Social networks are new way of staying in touch with the whole world.
§      It is now easier to keep in contact with old friends and colleagues. 
§      The professional networking site LinkedIn even allows users to request introductions to business people who are known to their contacts. LinkedIn is a particularly valuable business tool, over 200 million people are members, including hiring managers from many top companies. Your profile is designed to function as an online resume, detailing your education, career history (with recommendations from your colleagues), and creative portfolio.
§      Freelancers can find contacts via professional groups on LinkedIn and Twitter, while business owners can make use of the large user bases of Facebook and Twitter to market their products and services.
§    Online communities can be very diverse and expose you to many new viewpoints, ideas, and opinions that you may not be familiar with.


Disadvantages Of Social Media
§       Public sharing of private lives has led to a rethinking of our current conceptions of privacy.
§      Social networking sites allow seemingly trivial gossips to be redistributed to a worldwide audience, sometimes a rumour is shared.
§      The one potential risk of social networking cited most often is that of hacking. Incidents of profiles and accounts are being hacked.
§      While social media can help people / companies create good image, it can also be used to tranish an image with false claims. A viral social media post talking how a product can cause problems can lead to huge losses to a firm.
§      All over the world social media websites are used to get up close and personal without even revealing the true identity. 

CONCLUSION
Social networking is indeed boon for human race because it is bringing people closer and letting them communicate with each-other without any fear and barrier. But still one needs to be cautious of what level of personal information they are providing on social sites and how much time they are spending on it.

                                                                             Posted By:      
                                                                             ROHIT CHAUDHARY
                                                                             CS-2 3rd YEAR
                                                                             rohitchaudhary29@gmail.com
                                                                             website: www.scitechinfo.in




                                                                                     

No comments

Cloud C
omputing 

 It is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet).  

Overview

Cloud computing relies on sharing of resources to achieve coherence and economies of scale. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services.

Cloud computing, or in simpler shorthand just "the cloud", also focuses on maximizing the effectiveness of the shared resources. Cloud resources are usually not only shared by multiple users but are also dynamically reallocated per demand. This can work for allocating resources to users.

For example, a cloud computer facility that serves European users during European business hours with a specific application (e.g., email) may reallocate the same resources to serve North American users during North America's business hours with a different application (e.g., a web server). This approach should maximize the use of computing power thus reducing environmental damage as well since less power, air conditioning, rackspace, etc. are required for a variety of functions. With cloud computing, multiple users can access a single server to retrieve and update their data without purchasing licenses for different applications.

History

The origin of the term cloud computing is unclear. The expression cloud is commonly used in science to describe a large agglomeration of objects that visually appear from a distance as a cloud and describes any set of things.

In analogy to above usage the word cloud was used as a metaphor for the Internet and a standardized cloud-like shape was used to denote a network on telephony schematics and later to depict the Internet in computer network diagrams. With this simplification, the implication is that the specifics of how the end points of a network are connected are not relevant for the purposes of understanding the diagram. The cloud symbol was used to represent the Internet as early as 1994, in which servers were then shown connected to, but external to, the cloud.

References to cloud computing in its modern sense can be found as early as 1996, with the earliest known mention to be found in a Compaq internal document.
The popularization of the term can be traced to 2006 when Amazon.com introduced the Elastic Compute Cloud.

In the 1990s, telecommunications companies, who previously offered primarily dedicated point-to-point data circuits, began offering virtual private network (VPN) services with comparable quality of service, but at a lower cost. By switching traffic as they saw fit to balance server use, they could use overall network bandwidth more effectively. They began to use the cloud symbol to denote the demarcation point between what the provider was responsible for and what users were responsible for. Cloud computing extends this boundary to cover all servers as well as the network infrastructure.
In early 2008, Eucalyptus became the first open-source, AWS API-compatible platform for deploying private clouds.

 In July 2010, Rackspace Hosting and NASA jointly launched an open-source cloud-software initiative known as OpenStack. The OpenStack project intended to help organizations offer cloud-computing services running on standard hardware. The early code came from NASA's Nebula platform as well as from Rackspace's Cloud Files platform.

On March 1, 2011, IBM announced the IBM SmartCloud framework to support Smarter Planet. Among the various components of the Smarter Computing foundation, cloud computing is a critical piece.

On June 7, 2012, Oracle announced the Oracle Cloud. While aspects of the Oracle Cloud are still in development, this cloud offering is posed to be the first to provide users with access to an integrated set of IT solutions, including the Applications (SaaS), Platform (PaaS), and Infrastructure (IaaS) layers.

Characteristics

The National Institute of Standards and Technology's definition of cloud computing identifies "five essential characteristics":

On-demand self-service

. A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider.

Broad network access. 

Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, tablets, laptops, and workstations).

Resource pooling.

 The provider's computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand.

Rapid elasticity.

 Capabilities can be elastically provisioned and released, in some cases automatically, to scale rapidly outward and inward commensurate with demand. To the consumer, the capabilities available for provisioning often appear unlimited and can be appropriated in any quantity at any time.

Measured service. 

Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service.

How cloud computing works..



Application