Tuesday, November 18, 2014

MICA: My Intelligent Communication Accessory

  •         Provide alerts and notifications and many more features.
  •         Will come in two styles - black water-snake skin and white water-snake skin.
  •         You can prioritize the contacts from whom you will receive information on bracelet.
  •         You can control the information that filters into the bracelet via an online portal.

MICA: My Intelligent Communication Accessory is a bracelet designed by computing giant Intel and New York-based fashion retailer Opening Ceremony.
MICA collaboration between Opening Ceremony and Intel, celebrates the conglomeration of intelligence with fashion statement and it’s time for the women to go techy without compromising their style.
Priced at $495 the device will provide alerts and notifications, including SMS messages, calendar reminders, meeting alerts and other notifications sent directly to the wrist display. Rather than carry a display at the top of the bracelet, MICA is designed for women to glance at and swipe notifications from the insides of their wrists. Also, two-way wireless data communication through a 3G cellular radio will be available without the need to pair with a smartphone. The device can charge wirelessly or using a USB cable.  And users will be able to set up VIP contact lists to filter who can reach them via the bracelet.
The device has its own mobile connection, meaning it doesn’t have to be paired with a phone, and comes with two years of free AT&T Inc. data service.
Crafted from premium finishes, 18k gold coating and a curved sapphire glass touchscreen display MICA will come in two styles -- one will have black water-snake skin, pearls from China, and lapis stones from Madagascar, while the other style will include white water-snake skin, tiger's eye from South Africa, and obsidian from Russia. The cuff-style device opens via a clasp and has a 1.6-inch sapphire touchscreen that sits at the bottom of the wrist.
The device will be introduced officially at Opening Ceremony's spring/summer 2015 fashion show on Sunday, during Fashion Week in New York







Messaging
Discrete on wrist messaging, calendar, and event vibration-based notifications. Respond quickly with customizable messages.

Priority Notifications
Assign the “important contacts” you receive notifications from.

Calendar
See your upcoming Google and Facebook appointments and respond to requests.

Time to Go
Intelligent reminders powered by TomTom let you know when it’s time to leave for your next appointment.

What’s Near Me
Access Yelp search and ratings to find restaurants, shopping, and establishments nearby.

Connected by AT&T
MICA is connected by AT&T’s mobile broadband network and includes two years of wireless service with the device purchase.
Battery Life
Up to two days of battery life
Remote Access and Security
Remote access, locking, and device locator
You can control the information that filters into the bracelet via an online portal, accessible via computer or smartphone. There you can change the background patterns of the device’s display screen, load up your Gmail accounts, connect your Google and Facebook calendars, and log in to your Yelp account.



Monday, July 21, 2014

RETINA SCAN : PASSWORD IN YOUR EYE

  • bio-metric identifier known as a retinal scan is used to map the unique patterns of a person's retina
  • uses the unique patterns on a person's retina to identify them
  • The pattern of variations is converted to computer code and stored in a database.
  • retinal patterns may be altered in cases of diabetesglaucoma or retinal degenerative disorders
  • the retina typically remains unchanged from birth until death



Authentication is the process of verifying that a person is indeed who they claim to be.
Biometric authentication refers to using a physiological characteristic to perform that verification. Biometrics offer some security advantages over other authentication methods, for example an eye cannot be stolen like a key card or forgotten like a PIN or a password, and biometrics cannot be shared between individuals. At the time of enrollment, documents or other means are used to identify the individual, and the biometric measure is captured and stored for future comparison.
We forget our highly secretive combinations, so we frequently have them reset and sent to our cellphones and alternative email addresses. We come up with clever jumbles of letters and words, only to mess up the order. We sit there on the login screen, desperately punching in a code we should know by heart.
biometric identifier known as a retinal scan is used to map the unique patterns of a person's retina.
The idea for retinal identification was first conceived by Dr. Carleton Simon and Dr. Isadore Goldstein 
A retinal scan, commonly confused with the more appropriately named "iris scanner", is a biometric technique that uses the unique patterns on a person's retina to identify them. The biometric use of this scan is used to examine the pattern of blood vessels at the back of the eye.
The blood vessels within the retina absorb light more readily than the surrounding tissue and are easily identified with appropriate lighting. A retinal scan is performed by casting an unperceived beam of low-energy infrared light into a person’s eye as they look through the scanner's eyepiece. This beam of light traces a standardized path on the retina. Because retinal blood vessels are more absorbent of this light than the rest of the eye, the amount of reflection varies during the scan. The pattern of variations is converted to computer code and stored in a database.



Retinal Scan technology maps the capillary pattern of the retina, a thin (1/50th
 inch) nerve on the back of the eye. To enroll, a minimum of five scans is
required, which takes 45 seconds. The subject must keep his head and eye
motionless within ½” of the device, focusing on a small rotating point of green
light. 320 – 400 points of reference are captured and stored in a 35-byte field,
ensuring the measure is accurate with a negligible false rejection rate
Eyeglasses and contact lenses present no problems to the quality of the image,
and the system further tests for a live eye rather than, say, a lens with an image
printed on it, by checking for the normal continuous fluctuation in pupil size.



The human retina is a thin tissue composed of neural cells that is located in the posterior portion of the eye. Because of the complex structure of the capillaries that supply the retina with blood, each person's retina is unique. The network of blood vessels in the retina is not entirely genetically determined and thus even identical twins do not share a similar pattern.


Although retinal patterns may be altered in cases of diabetesglaucoma or retinal degenerative disorders, the retina typically remains unchanged from birth until death. Due to its unique and unchanging nature, the retina appears to be the most precise and reliable biometric, aside from DNA. Advocates of retinal scanning have concluded that it is so accurate that its error rate is estimated to be only one in a million.
Retinal scanners are typically used for authentication and identification purposes. Retinal scanning has been utilized by several government agencies including the FBICIA, and NASA

Advantages
Low occurrence of false positives
Extremely low (almost 0%) false negative rates
Highly reliable because no two people have the same retinal pattern
Speedy results: Identity of the subject is verified very quickly

Disadvantages
Measurement accuracy can be affected by a disease such as cataracts
Measurement accuracy can also be affected by severe astigmatism
Scanning procedure is perceived by some as invasive
Not very user friendly
Subject being scanned must be close to the camera optics
High equipment cost

Refrences:



Thursday, June 5, 2014

D DAY



  • D day: unnamed day set for beginning something offensive.
  • Best known D Day: 6th June, 1994.
  • The Normandy landings were the largest amphibious operation in history.
  • It marked the beginning of the end for Hitler and the Nazis
  • Movies directed on D Day: The longest day and Saving Private Ryan




Considering the dictionary meaning of the team “D Day” , “D Day” is the unnamed day on which an operation or an offensive is to be launched or a day set for beginning something.









In the military, D day is the day on which the combat attack or offensive attack is to be initiated.
The terms D day and H hour are used for the day and hour on which a combat attack or operation is to be initiated. They designate the day and hour of the operation when the day and hour have not yet been determined, or where secrecy is essential. For a given operation, the same D-Day and H-Hour apply for all units participating in it. When used in combination with numbers, and plus or minus signs, these terms indicate the point of time preceding or following a specific action. Thus, H−3 means 3 hours before H-Hour, and D+3 means 3 days after D-Day. (By extension, H+75 minutes is used for H-Hour plus 1 hour and 15 minutes.) Planning papers for large-scale operations are made up in detail long before specific dates are set. Thus, orders are issued for the various steps to be carried out on the D-Day or H-Hour minus or plus a certain number of days, hours, or minutes. At the appropriate time, a subsequent order is issued that states the actual day and times.



The best known D-Day is June 6, 1944 — the day of the Normandy landings — initiating the Western Allied effort to liberate mainland Europe from Nazi occupation during World War ||. However, many other invasions and operations had a designated D-Day, both before and after that operation

Do you realize that by the time you wake up in the morning 20,000 men may have been killed?
Churchill to his wife the night before D-Day











The Normandy landings were the largest amphibious operation in history. In one day, 175,000 troops landed on the Normandy coast crossing English Channel, with the help of more than 5,000 ships, crewed by 195,700 personnel from the Allied navies and merchant navies.
 The fighting continued for 10 weeks until 19 August.
 

After the defeat in Normandy, the German forces in Western Europe were so reduced that the American, British, Canadian, Polish and Free French armies advanced to capture Paris by 22 August and Brussels by 1 September.

There are 17, 769 British war graves in the whole of the Normandy battle zone.

Without D-Day, Adolf Hitler would have deployed many more divisions to resist the Red Army. He would have had more time to develop, and deploy, his modern weapon of terror, the V2. The war might have continued indefinitely.

At the very least, the Iron Curtain which was established in central Europe in the late 1940s might have been built 600 miles to the west, between Britain and the continent.
The significance was that a successful landing in Normandy paved the way for the Allies to liberate all the Occupied Countries of Europe. (They all did it too, except for the Soviet Union who kept the countries it "liberated" for itself).

It marked the beginning of the end for Hitler and the Nazis as the Russians were racing to Germany from the East and the rest of the Allies were doing the same from the West and also through Italy.

Once a beach head was successfully established and men and supplies started pouring in to mainland Europe, Germany was finished - it was only a matter of time.

Movies directed on D Day: The longest day and Saving Private Ryan

Tuesday, March 18, 2014

CLOUD COMPUTING: THE HUB OF STORAGE SPACE



  • Its like third party database to store your information.
  • Can support any type of information... audio, video etc.
  • Cloud is nothing but the collection of various computers, servers and data storage systems
  • Examples : Box, Google Drive, DropBox etc.


Cloud computing refers to saving data to an off-site storage system maintained by a third party. Instead of storing information to your computer's hard drive or other local storage device, you save it to a remote database. The internet provides the connection between your computer and the database.
On the surface, cloud storage has several advantages over traditional data storage. For example, if you store your data on a cloud storage system, you'll be able to get to that data from any location that has Internet access. You wouldn't need to carry around a physical storage device or use the same computer to save and retrieve your information. With the right storage system, you could even allow other people to access the data, turning a personal project into a collaborative effort.

Some cloud storage systems are small operations, while others are so large that the physical equipment can fill up an entire warehouse. The facilities that house cloud storage systems are called data centers.
At its most basic level, a cloud storage system needs just one data server connected to the Internet.
Client when wants to store information on server send data over the server through web based interface and can access the same stored information whenever, wherever required through the same web based interface indeed there in an internet connection. Its like client interacting with the database being maintained by the third party at some distant location but all the access authorities are with the client itself.











Cloud is nothing but the collection of various computers, servers and data storage systems that create the "cloud" of computing services.
So the client side system ,be it is the desktop, laptop or even the phone serve as the front end and the back end is the “cloud” the third party database i.e. servers, systems where all of your data is getting stored and this front end and back end are connected via internet called middleware.
Implementing cloud computing requires lots of space as the owner of the backend need to ensure the availability of data of the client at any required point of time. These backend servers can also fall prey to the technical failure so to avoid losing data ,client’s data is stored over multiple servers also known as redundancy so that if one server fails, the client can still successfully retrieve data .

5 of the best free cloud storage and their features:

Google Drive: 
Free storage: 5 GB
Max file size allowed: 10 GB
Desktop apps: Windows, Mac
Mobile apps: Android, iOS coming soon

DropBox :
Free storage: 2 GB (Get more space through referrals.)
Maximum Storage: 18GB to 32 GB
Max file size allowed: 300 MB via browser, unlimited via desktop
Desktop apps: Windows, Mac, Linux
Mobile apps: Android, iOS, BlackBerry


Apple iCloud:
Free storage: 5 GB
Max file size allowed: 25 MB for free users, 250 MB for paid users
Desktop apps: Windows, Mac
Mobile apps: iOS only

Microsoft SkyDrive:
Free storage: 7 GB
Max file size allowed: 2 GB
Desktop apps: Windows, Mac
Mobile apps: iOS, Windows Phone

Box:
Free storage: 5 GB
Max file size allowed: 25 MB
Desktop apps: Windows, Mac
Mobile apps: Android, iOS, BlackBerry









Tuesday, January 7, 2014

WHY QWERTY PATTERN ?

  • Devised by Christopher Latham Sholes.
  • Originally letters were arranged in alphabetic order.
  • Alphabetic order causes keyboard stroke become tangled.
  • Also leading to staining the document frequently.
  • QWERTY arrangement leads to splitting up of commonly used keys to avoid jamming.
  • Alphabets which are mostly used are accessed fast following the QWERTY pattern.
  • same layout is nearly optimal for pure speed, as it tends to cause the fingers and hands to alternate.


Still used to this day, the QWERTY layout was devised and created in the early 1870s by Christopher Latham Sholes, a newspaper editor and printer who lived in Milwaukee.
The first model constructed by Sholes used a piano-like keyboard with two rows of characters arranged alphabetically.

Originally, the characters on the typewriters he invented were arranged alphabetically, set on the end of a metal bar which struck the paper when its key was pressed. 
the characters on the typewriters were arranged in alphabetical order; Letters that placed close together on the keyboard became tangled with one another as the operator had learned to type at speed, forcing the typist to manually unstick the type bars. This also caused staining the document frequently and jams in typewriter machine.

Initially in 1870s, An associate suggested using nice trick by splitting most commonly keys to speed up typing, so that they also don’t get tangled very often. Rearrangement of keys introduced the word QWERTY, the most commonly used modern-day keyboard layout.


The logic behind such an arrangement is that the alphabets which are most needed can be accessed fast.

QWERTY layout was designed to let people type as quickly as possible, without jamming a mechanical typewriter. As it happens, this same layout is nearly optimal for pure speed, as it tends to cause the fingers and hands to alternate.
A simple A to Z layout, would really slow down people as it would overload some weaker fingers and waste the stronger ones. It would also tend to require more side-to-side motion. Considerable wrist strain is also thought of.

This arrangement is now widely accepted.