Posts

Showing posts from September, 2021

SKINPUT TECHNOLOGY

Image
Touch screens may be popular both in science fiction and real life as the symbol of next-gen technology, but an innovation called Skinput suggests the true interface of the future might be us “Skinput” turns body into touch screen interface. The founders of this great technology  is Microsoft and Carnegie Mellon University. By the way, what do skinput technology mean?....           Skinput is a technology that appropriates human body for acoustic transmission, enabling the skin to be utilized as an input surface.           This technology allows human hand and arm as touch screens, by sensing various low-frequency vibrations and sounds that are generated by touching different part of the hand or arm.           These signals are sensed using various sensors worn on the arm in the form of arm band. "The arm band is a crude prototype, the next generation could be made considerably smaller – likely easily fitting into a wristwatch." From there it's fairly simple to

NEW FEATURES OF BOOTSTRAP v5.0

Image
NEW FEATURES OF BOOTSTRAP v5.0 What is Bootstrap? Bootstrap is originally a blend of CSS and JavaScript code that you can use to create dynamic websites. It is an efficient tool for front-end design that consists of HTML and CSS design templates. These include components like forms, buttons, navigations, modals, typography, and other interface elements. Everyone knows that updated versions would have slight changes or might have additional features. Same to that, Bootstrap v5.0 also has some changes and additional features. So let’s start uncovering what’s changed in Bootstrap v5.0. Drop for jQuery Support: The end of jQuery support is especially meant to reduce the source file size and improve the loading times. As JS based languages are at their peak these days, jQuery has lost its popularity. And moreover Developers are using virtual DOM, instead of DOM directly. Enhanced JavaScript: While Bootstrap drops support for jQuery, Bootstrap5 creators show much interest in enhancing the Ja

INTRODUCTION TO CYBER SECURITY

Image
A computer hacker is the name given to the tech- folks on both sides of the internet battlefront. Bad guys or “black hat” hackers are the ones trying to break into computer systems, steal data, and install harmful software. The “white hat” hackers are cyber security heroes that develop ways to catch bad guys and stop malicious programs from doing damage. That’s interesting nomenclature, right? The world of cyber security helps us to understand the dangers and how to protect ourselves from black hats of the world. Lets learn the proper   definition of cyber security. Cybersecurity is the practice of protecting critical systems and sensitive information from digital attacks. Also known as information technology (IT) security, cybersecurity measures are designed to combat threats against networked systems and applications, whether those threats originate from inside or outside of an organization.     FACTORS AFFECTING CYBER SECURITY: ·          Human factors: Technology impact, hu

SELD-DRIVING CARS

Image
SELF DRIVING CARS: So there you are, it’s a rainy night and you’ve called a taxi. Strangely, the driver doesn’t talk but you arrive at the address, Now you want to pay cash and run away screaming.OMG, There is no driver in the car. WAIT WAIT WAIT..This is not a horror movie but the near future of self-driving cars. We don’t know what the future holds but we do know that previous generations had high hopes for what lay ahead. As a new period of massive change is upon us, it’s really hard to notice what is developing over our heads to the inner data spaces being explored by the phones in our pockets. Sure, it’s scary. Self-driving cars could take away jobs from drivers and give machines more power than some ever thought possible . Even so, it’s interesting to see what is actually true and what about these technological wonders has been exaggerated. Let’s quickly head on to our topic. A self-driving car (sometimes called an autonomous car or driverless car) is a vehicle that uses a combin

Virtual Private Network

Image
VIRTUAL PRIVATE NETWORK A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Applications running across a VPN may benefit from the functionality, security, and management of the private network. It provides access to resources inaccessible on the public network and is typically used for telecommuting workers.  From a user perspective, the resources available within the private network can be accessed remotely. TYPES OF VPN: Remote access: A host-to-network configuration is analogous to connecting a computer to a local area network. This type provides access to an enterprise network, such as an intranet. Site to site: A site-to-site configuration connects two networks. This configuration expands a network across geographically disparate offices, or a group of offices to a data center installation. Extranet

DEEP LEARNING

Image
  Deep learning, a buzz in the artificial intelligence field, is the subset of machine learning. It plays a major role from search engines to self driving cars that demand high computational power. The data is the “fuel” of deep learning. It’s a reality, as we have already said, and together with the great computing power, one of the reasons why automatic learning has gained relevance in recent years .What is meant by deep learning?..   Deep learning is nothing but a subset of machine learning, which is essentially a neural network with three or more layers. These neural networks attempt to stimulate the behavior of human brain, allowing it to learn from large amounts of data. Deep learning drives many Artificial Intelligence applications that improve automation, performing analytical and physical tasks without human intervention. Remember the word “accuracy”. Deep learning achieves recognition accuracy at higher levels than ever before. It has two main reasons for its achievement