This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.


This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.


This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.


This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.


This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

Showing posts with label Computer. Show all posts
Showing posts with label Computer. Show all posts

Monday, 30 January 2017

Values of Cloud Computing

Take the case of a midsized tire manufacturer. It spends millions to move to the public cloud to reduce IT costs by 30 percent. Once migrated, it discovers these additional values from the cloud:
  • The ability to speed time-to-market.There’s no longer any waiting for hardware and software to be procured and configured, which can takes months. Instead, IT can spin up servers needed to support a new product line in hours or add capacity to accommodate expanding the business.
  • The ability to deal with near-perfect information. Moving to the cloud typically means consolidating enterprise data. In doing so, you can understand much more about past patterns in the business and use that to better extrapolate the future of the business. In the case of the example tire company, it understands how to change what tires are manufactured in a year, based on buying patterns over the last several years. Although predictive analytics has been around for a while, it didn’t become affordable until cloud computing came along.
  • The ability to go digital to the last mile.There is a lot of talk these days about digital enablement. The public cloud provides a platform for digital enablement that’s both quick to build and dirt-cheap. That tire company can now do inventory automatically using RFID and send delivery trucks optimized routes before they leave the warehouse.
The problem with strategic cost savings is that enterprise management needs to experience it themselves and learn how to change their businesses around the use of cloud computing (or any beneficial technology, for that matter).

It’s great that the tactical cost savings are a sufficient motivation for migrating to the cloud. But don’t stop there once you have migrated. There’s so much more value for you to gain once you’re on the cloud.

Monday, 23 January 2017

Hiring IT IOT Infrastructure

Here’s what you need to know:

Employees want something that’s as modern and simple to use as their smartphones. Today, they’re bringing their own software into the workplace, which means enterprise versions need to mimic simple, easy-to-use tools as much as possible.

Conversely, management has a long priority list for selecting mobile technology solutions. According to a recent study, security and reliability of the software or network are the top requirements, closely followed by ease of use and integration into existing infrastructure.
All of it adding up to a full-scale technology Tug of War, with IT stuck in the middle.

Choices bring challenges
When it comes to smartphones, keep this mind: IT Managers often consider purchasing them for employees, due to familiarity and overall value.

Those devices however, don't always have all the “bells and whistles” you need to take care of business.
System compatibility is a big issue. So is dependability.

Enterprise devices? The consensus is that they’re clunky, complicated and expensive. But they work much better than smartphones from an application and integration standpoint. Plus, they’re far more durable, resulting in better TCO and ROI.

Now you can see why IT is caught in a crossfire.

What they really need is a device that stands for everything a business wants and everything employees need.

The solution is at hand

Fortunately, Zebra’s got it all covered, with their incredible touch computer built for Retail: The TC51.
This leading-edge mobile device features Android, the world’s most popular operating system. Management gets all the benefits of purpose-built Zebra technology, software and services. Employees get design quality and ease of use that’s more often associated with their favorite consumer devices.

IOT Larger Points

My larger point is that all the devices which were compromised had two things in common; they were consumer devices built on tight profit margins (hence the free/open source code) and the designers "hoped" that users would change the default password on the device when they were installed.  So here we have have two failings of human beings (not technology); building cheap products and assuming end users understand technology and how to protect their own security.  Couldn't see that coming.

So why is this fiasco such a tipping point in IoT history?  Well first of all we all now know it can happen and affect a lot of other people who are going to take action, second, there is now no excuse for device designers not to take security seriously, even if they have a tight budget.

Just to show that this isn't wishful thinking on my part I have seen evidence of this in September when we (I was at AspenCore at that time) asked embedded/IoT hardware designers what their major concerns were right now and for the first time we saw Security as #1. Although one cautionary note is that "Cost" was #2 and very close.

So here is my closing thought,  IoT security is on everyone's mind now and free software combined with asking users to change their passwords may not be the best choice for securing devices in a world of constant cyber attacks.  More on this in my next blog and feel free to comment and share.

Friday, 20 January 2017

Full Forms of Computer

Full Forms are:

ALU -  Arithmetic logic unit
ACPI :  Advanced Configuration and Power Interface
AC :  Alternating Current
AM : Amplitude Modulated
AMD : Advanced Micro Devices, Inc.
AMD : Advanced Micro Devices, Inc.
AMI : American Megatrends Inc.
ANSI : American National Standards Institute
APIC : Advanced Programmable Interrupt Controller
APM : Advanced Power Management
ASCII : American Standard Code for Information Interchange
ASIC : Application Specific Integrated Circuit
ASPI : Advanced SCSI Programming Interface
AT : Advanced Technology
ATA : AT Bus Attachment
ATAPI : ATA Packet Interface
ATM : Asynchronous Transfer Mode
BBS : Bulletin Board System
BCC : Block Check Character
BSC : Binary Synchronous Communications
BSD : Berkeley Standard Distribution
BTU : British Thermal Units
BCD : Binary Coded Decimal
BIOS : Basic Input / Output System
BNC : Bayonet Nut Connector
BPS/bps : Bytes/bits Per Second
CAM : Computer Aided Manufacturing
CAD : Computer Aided Design
CAS : Column Address Strobe
CPU - Central Processing Unit
CPI : Clocks Per Instruction
CR - Carriage Return

CUI - Composite User Interface
CRT - Cathode Ray Tube
CRC: Cyclical Redundancy Check
CD: Carrier Detect & Compact Disc
CD-R - Compact Disc-Recordable
CD-RW - Compact Disc-ReWritable
CD-ROM - Compact disc read-only memory
CGA: Color Graphics Adapter
CHS: Cylinder Head Sector
COMPUTER - Common Oriented Machine Particularly Used for Trade Education and Research
CMOS: Complementary Metal-Oxide Semiconductor
CSR: Command Status Register
CTS: Clear To Send
DVI - Digital Visual Interface
DVD - Digital Video Disc or Digital Versatile Disc
DAT: Digital Audio Tape
DC: Direct Current
DCD: Data Carrier Detect
DCE: Data Circuit-terminating Equipment
DD: Double Density
DEC: Digital Equipment Corporation
DIP: Dual-In-line Package
DMA: Direct Memory Access
DMI: Desktop Management Interface
DOS: Disk Operating System
DPE: Data Parity Error
DRAM: Dynamic Random Access Memory
DS: Double Sided
DSP: Digital Signal Processor
DSR: Data Set Ready
DTC: Data Terminal Controller
DTE: Data Terminating Equipment
DTR: Data Terminal Ready
EBCDIC: Extended Binary Coded Decimal Interchange Code
EC: Error Check
ECC: Error Check and Correction
ECP: Enhanced Communication Port
ECU: EISA Configuration Utility
EDO: Extended Data Out RAM
EEPROM: Electrically Erasable Programmable Read Only Memory
EGA: Enhanced Graphics Adapter
EIA: Electronic Industries Association
EIDE: Enhanced Integrated Device Electronics
EISA: Enhanced Industry Standard Architecture
EMI: Electro-Magnetic Interference
EMF: Electro-Magnetic Force
EMS: Expanded Memory Specification
EOF: End Of File
EOL: End Of Line
EPP: Enhanced Parallel Port
EPROM: Erasable Programmable Read Only Memory
ESCD: Extended System Configuration Data
ESD: Electro-Static Discharge
ESDI: Enhanced Small Devices Interface
FTP - File Transfer Protocol
FAT: File Allocation Table
FCC: Federal Communications Commission
FDD: Fixed/Floppy Disk Drive
FDDI: Fiber Distributed Data Interface
FDM: Frequency Division Multiplexing
FDX: Full-Duplex Transmission
FE: Front End
FEP: Front End Processor
FF: Form Feed
FIFO: First-In First-Out
FILO: First-In Last-Out
FM: Frequency Modulation
FPGA: Field Programmable Gate Array
FPM: Fast Page Mode RAM
FPU: Floating Point Unit
FRC: Functional Redundancy Checking
FRU: Field-Replaceable Unit
FSF: Free Software Foundation
FSK: Frequency Shifty Keying
GUI - Graphical user interface
GAS: Gallium Arsenide
GFLOPS: Billions of Floating Point Operations Per Second
HTML – Hyper Text Markup Language
HD: High Density / Hard Disk
HDD: Hard Disk Drive
HDX: Half-Duplex Transmission
HFS: Hierarchical File System
HPFS: High Performance File System
IBM - International Business Machines, Indian Bureau of Mines
I/O: Input/Output
IC: Integrated Circuit
IDE: Integrated Device Electronics
IEEE: Institute of Electrical and Electronic Engineers
IMP: Interface Message Processor
IPC: Inter Process Communication
IPX: Inter network Packet eXchange
IRQ: Interrupt ReQuest
ISA: Industry Standard Architecture
ISDN: Integrated Services Digital Network
ISO: International Standards Organization
JFS: Journalized File System
KNI: Katmai New Instructions
KVA: KiloVolt-Amps
LBA: Linear Block Array / Addressing
LCD - Liquid crystal display
LAN - Local area network
LOGO - Language of Graphic-Oriented
LED: Light Emitting Diode
LF: Line Feed
LIM: Lotus/Intel/Microsoft’s Expanded Memory Manager
LRU: Least-Recently Used
LSB/lsb: Least Significant Byte/bit
LSI: Large Scale Integration
LUN: Logical Unit Number
LASER - Light Amplification by Stimulated Emission of Radiation
MAN - Metropolitan area network
MIPS - Microprocessor without Interlocked Pipeline Stages
MSo - Micro Soft Office, Multi system operator
MB/Mb: Mega Bytes/bits
MBR: Master Boot Record
MCA: Micro Channel Architecture
MCGA: Multi-Color Graphics Array
MCM: Multi-Chip Module
MDRAM: Multi-bank RAM
MFLOPS: Millions of FLOating Point Operations per Second
MFM: Modified Frequency Modulated
MHz: MegaHertz
MICR: Magnetic Ink Character Recognition
MIDI: Musical Instrument Data Interface
MIMD: Multiple-Instruction Multiple-Data
MISD: Multiple-Instruction Single Data
MMX: Multi-Media Extensions
MNP: Microcom Network Protocol
MODEM: MOdulator / DEModulator
MOPS: Millions of Operations Per Second
MOS: Metal-Oxide Semiconductor
MP: Multi-Processor
MPP: Massively Parallel Processor
MPS: Multi-Processor System
MSB/msb: Most Significant Byte/bit
MSDOS: Microsoft’s Disk Operating System
SI: Medium Scale Integration
MTBF: Mean Time Between Failure
N/C: No-Connect
NBS: National Bureau of Standards
NEMA: National Electrical Manufacturers Association
NFS: Network File System
NFU: Not-Frequently Used
NMI: Non-Maskable Interrupt
NMOS: Negatively doped Metal-Oxide Semiconductor
NOP: No OPeration NRU Not-Recently Used
NSF: National Science Foundation
NVRAM: NonVolatile Random Access Memory
OCR: Optical Character Recognition
ODI: Open Data link Interface
OEM: Original Equipment Manufacturer
OS: Operating System
OSF: Open Software Foundation
OSI: Open Systems Interconnect
PAL/PLA: Programmable Array Logic / Logic Array
PB: Push Button
PBX: Private Branch eXtender
PC: Personal Computer, Program Counter
PCB: Printed Circuit Board
PCI: Peripheral Component Interconnect
PCM: Pulse Code Modulation
PCMCIA: Personal Computer Memory Card International Association
PE: Processor Element
PFF: Page Fault Frequency
PGA: Professional Graphics Array
PGA: Pin Grid Array
PIC: Programmable Interrupt Controller
PIO: Programmed Input / Output
PIROM: Processor Information ROM
PLCC: Plastic Leaded Chip Carrier
PLL: Phase Locked Loop
PM: Preventive Maintenance
PMOS: Positively doped Metal-Oxide Semiconductor
PnP: Plug-and-Play
POST: Power On Self Test
PPP: Point-to-Point Protocol
PQFP: Plastic Quad Flat Pack
PROM: Programmable Read Only Memory
PSTN: Public Switched Telephone Network
PTE: Page Table Entry
QAM: Quadrature Amplitude Modulation
QFP: Quad Flat Pack
QIC: Quarter Inch Cartridge
RAM - Random-access memory
RAID: Redundant Arrays of Inexpensive Disks
RAMDAC: Random Access Memory Digital to Analogue Converter
RAS: Row Address Strobe
RCA: Radio Corporation of America
RCC: Routing Control Center
RFC: Request For Comments
RFI: Radio Frequency Interference
RI: Ring Indicator
RISC: Reduced Instruction-Set Computer
RLL: Run Length Limited
RMS: Root Mean Squared
RMW: Read Modify Write
ROM: Read Only Memory
RPC: Remote Procedure Call
RPM: Rotations Per Minute
RTC: Real Time Clock
RTS: Request To Send
SAM: Sequential Access Memory
SASI: Shugart Associates Standard Interface
SCSI: Small Computer Systems Interface
SD: Single Density
SDLC: Synchronous Data Link Control
SDRAM: Synchronous Dynamic RAM
SDRAM DDR: Double Data Rate SDRAM
SDRAM BDDR: Bi-Directional Strobed DDR SDRAM
SE: Systems Engineer
SEC: Single Edge Contact
SFF: Small Form Factor
SGRAM: Synchronous Graphics RAM
SMS - Short Message Service
SIMD: Single-Instruction Multiple-Data
SIMM: Single Inline Memory Module
SIPP: Single Inline Pinned Package
SISD: Single-Instruction Single-Dat
SLIP: Serial Line Internet Protocol
SMD: Surface Mount Device
SMT: Surface Mount Technology
SNA: System Network Architecture
SNR - Signal to Noise Ratio
SO/SOL - Small Out Line
SOIC - Small Outline Integrated Circuit
SPOOL - Simultaneous Peripheral Operation On Line
SPT  Sectors Per Track
SPU - Single Processor Unit
SRAM - Static Random Access Memory
SS - Single Sided
STDM - Synchronous Time Division Multiplexing
STN - Super Twisted Nematic
STU - Streaming Tape Unit
SVGA - Super Video Graphics Array
TCM - Trellis Code Modulation
TCP/IP - Transmission Control Protocol / Internet Protocol
TDM - Time Division Multiplexing
TI - Texas Instruments
TIA - Telecomm Industry Association
TLB - Translation-Look aside Buffer
TPI - Tracks Per Inch
TSR - Terminate and Stay Resident
TTL - Transistor-Transistor Logic
UAE - Unrecoverable Application Error
UART - Universal Asynchronous Receiver/Transmitter
UDP - User Datagram Protocol
UMB - Upper Memory Block
UNIX - A trademark used for a computer disk operating system
UPS - Uninterruptible power supply
USL - UNIX System Labs
UUCP - UNIX to UNIX Copy Program
VIRUS - Vital Information Resources Under Seize
VDU - Visual Display Unit
VBE - Video BIOS Extensions
VCR - Video Cassette RecorderVESA: Video Enhanced Standards Association
VGA - Video Graphics Array
VLB - VESA Local Bus
VLIW - Very Long Instruction Word
VLSI - Very Large Scale Integration
VM - Virtual Memory
VME - Versa Module Euro-card
VRAM - Video Random Access Memory
VRT - Voltage Reduction Technology
VTR - Video Tape Recorder
WAN - Wide area network
WATS - Wide Area Telephone Service
WD - Western Digital
WORM - Write Once - Read-Many
WRAM - Window Random Access Memory
WS - Wait State
WWW - World Wide Web
XGA - eXtended Graphics Array
XMS - Extended Memory Specification
XOR - Exclusive-OR
XT - eXtended Technology
ZIF - Zero Insertion Force

Method of Changing Hidden Windows 7 Themes

Here is an alternative method, how to enable hidden windows 7 themes. If previous methods are not working to then apply this method.
At First Go to Control Panel and then click on folder Options.
Note: -- If Folder options are not available, change the view to large icons at the top-right corner of the screen.
Now click On the View tab and uncheck the box “Hide protected operating system files (Recommended)”. It will show you a warning; avoid this warning and Click Yes.
Now Go to “C:\Windows\Globalization\MCT\” Inside this folder you will see folders with name MCT-XX where XX will be AU, CA etc. These are the country codes in which these themes are automatically available.
                 Inside each MCT-XX you will see a Theme folder, now open it and click on the theme file to unlock it. Once unlocked, the theme will be available to you in personalization option.

Wednesday, 18 January 2017

UK Government releases report on Robotics and Artificial Intelligence

The UK Government's Science and Technology Committee undertook an inquiry into robotics and artificial intelligence. Robotics and Autonomous Systems (RAS) was one of the "Eight Great Technologies" identified by the UK Government.

"Artificial intelligence has some way to go before we see systems and robots as portrayed in the creative arts such as Star Wars. At present, 'AI machines' have narrow and specific roles, such as in voice-recognition or playing the board game 'Go'. But science fiction is slowly becoming science fact, and robotics and AI look destined to play an increasing role in our lives over the coming decades. It is too soon to set down sector-wide regulations for this nascent field but it is vital that careful scrutiny of the ethical, legal and societal ramifications of artificially intelligent systems begins now."

AI Changes Job Revolutions and Companies will happy with Robotics works.They willnot fight with more HR and Human Labour Policies.AI makes Human Thinking and Imotions like Menpower in Factory.

Monday, 19 December 2016

Cloud Computing in Goverment Policies.

Cloud computing is a type of Internet-based computing that provides shared computer processing resources and data to computers and other devices on demand. It is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources (e.g., computer networks, servers, storage, applications and services), which can be rapidly provisioned and released with minimal management effort. Cloud computing and storage solutions provide users and enterprises with various capabilities to store and process their data in third-party data centers that may be located far from the user–ranging in distance from across a city to across the world. Cloud computing relies on sharing of resources to achieve coherence and economy of scale, similar to a utility (like the electricity grid) over an electricity network.

Advocates claim that cloud computing allows companies to avoid up-front infrastructure costs (e.g., purchasing servers). As well, it enables organizations to focus on their core businesses instead of spending time and money on computer infrastructure. Proponents also claim that cloud computing allows enterprises to get their applications up and running faster, with improved manageability and less maintenance,Cloud providers typically use a "pay as you go" model. This will lead to unexpectedly high charges if administrators do not adapt to the cloud pricing model.

In 2009, the availability of high-capacity networks, low-cost computers and storage devices as well as the widespread adoption of hardware virtualization, service-oriented architecture, and autonomic and utility computing led to a growth in cloud computing. Companies can scale up as computing needs increase and then scale down again as demands decrease. In 2013, it was reported that cloud computing had become a highly demanded service or utility due to the advantages of high computing power, cheap cost of services, high performance, scalability, accessibility as well as availability. Some cloud vendors are experiencing growth rates of 50% per year,but being still in a stage of infancy, it has pitfalls that need to be addressed to make cloud computing services more reliable and user friendly.

Today large requirement in Private Goverment Institutions needs requirement of Cloud based Technology instead of Old Filing Paper Systems in Digital India Campaigns.Government of India implements Villages,District level E-Governance Project.It keeps working fast in public domain and transparent and speedy saving benifit to people.