Thursday, October 1, 2009

World Wide Telecom Web (WWTM) aka Spoken Web

Web changed the way we use to connect with each other, share information. On internet, u can find any information within a sec. Wait a second, I said "You". What type of people included in "You". Its interesting. Yeah,"You" includes only literate people, student, teachers, business-man, doctors ....bla bla. Don't you think that its kinda of biasing, Information is that everyone wan teither its literate or illiterate. People living in developing countries or rural areas facing problem of getting right information at the right time. Illiterate people don't have IT knowledge, so finding information on web is impossible for them. Moreover, devices that communicate with web are expensive.

But again Web comes to solve this problem.Its not WWW, its WWTM (World Wide Telecom) aka Spoken Web. WWTM is analogous to WWW.
Its concept lies in VoiceSites, Voicelinks, HSTP, and T-Browser. Voicesites contain user information in voice format. A person aware of Mobile can create its voicesites by just interacting with automated system. e.g Gaurav Garg ( don't mind :D)a villager, got some electric problem. He is a very guy :P. He don't have much time to go at electrician house to call him. Now here WWTM comes in picture, electrician will create a voice sites, carrying basic information like his work timings, rates etc. Gaurav has nothing to do now, just call at his no (VoiNumbers) , find out information, if he likes, he fixes an appointment and done.
VoiceSite similiar to Websites, containing information . VoiceLinks, like Hyperlinks, connecting different VoiceSites to each other. HSTP Hypersearch Transfer Protocol analogous to HTTP, makes possible to navigate across the voicesites. T-Browser to browse VoiceSites.

Find more in this video .....


Maemo 5

Maemo 5 from Nokia, User Interface that all together changes user experience. Bringing whole computer on mobile device. I would it beats all its rival. Maemo 5 is based on open source Linux, uses Mozilla engine in its browser. It can handle multitasking like any other computer. What else you want??


Nokia Maemo 5 official Site

New Wave on Internet (Google Wave)

Google wave, is open collaborative social-software. Like a Wave, it will hit every type users. Its better to listen wat its creator say.

Hidden 7th Kingdom of our World!!

I'm writing after a very long time or u can say I'm compiling, It doesn't matter at all :P. I don't write like true bloggers used to do.

Until now, U are aware of only 6 six kingdoms (Animalia, Plantae, Fungi, Protista, Archaea, Bacteria) on earth ( Biology guys must be aware of that). kevin Kelly introduced the 7th hidden kingdom. This kingdom evolve just like others. But, no one ever noticed that.

Knowledge of this kingdom is passed from generation to generation. Like other kingdoms, species were wiped out, but for only good. New species came and will come over the time, only for better future. Now, you must be wondering what i'm talking about. You must be relating with some concept of computer science or biology. But its not true, its much bigger than that. Its a superset of all.

Its called "Technology". Yeah, U heard rite. Technology is the the 7th Hidden Kingdom of our universe. Tech evolve like other kingdom. Species i.e techs, born, live and dead. Take any example, war weapons like from arrows to nuclear weapons , communication devices , transportation medium like bullock cart to jets, ferrari's (My fav F1 Team :D). Kevin Kelly , futurist, thinker, biologist, proposed this.

If you want further information, Just watch Kevin's video on TED

Monday, February 23, 2009

Man-in-the-middle attack sidesteps SSL

Most websites use an encrypted connection to transfer sensitive information, including usernames, passwords, and credit-card numbers, over the Internet. In a presentation given this week at Black Hat DC, a computer-security conference in Washington, DC, an independent security researcher named Moxie Marlinspike unveiled a tool that can hijack secure connections and trick users into sending sensitive information in the clear.

The attack relies on the fact that most communication over the Internet takes place insecurely. Connections become secure when needed, using the Secure Socket Layer (SSL) protocol. The beginning of the URL shown in a Web browser's address bar reveals what kind of connection has been established. If the address starts with "http," the connection is standard and unencrypted. If it starts with "https," then the connection between the user and the website is encrypted.

But most users do not bother to type in "https" to establish a secure link. Instead, they rely on a website redirecting them to a secure connection when needed. "People only tend to access the secure protocols through the insecure protocols," Marlinspike says.

Marlinspike has developed a software tool called sslstrip that interferes with a website's attempt to direct the user toward that secure communications channel. Sslstrip can be used once an attacker has infiltrated a network to watch passing traffic for anything that might redirect the user to a secure connection--for example, a login button that links to an "https" URL. When the tool sees that information, it strips out the link to the secure page and replaces it with an insecure one. The tool then sits between the user and the website's server, passing information back and forth. But before passing on information to the server, it encrypts it, so that the Web server has no idea that anything is wrong.

Supercharged File Sharing

Cooperating with file-sharing networks could avert congestion.

As Internet service providers (ISP) struggle with increasing traffic from peer-to-peer file-sharing networks, some have resorted to simply throttling this data, attracting ire from both users and regulators. Under a scheme that should be rolled out early next year, some ISPs plan to take a different approach: cooperating with file-sharing networks so that they share data more effectively.

The new scheme is called Provider Portal for Applications (P4P), and it's a voluntary, open standard that requires ISPs to share some information about how their networks are laid out. Initial tests have shown that the P4P framework can dramatically speed up download times for file sharers while also reducing the bandwidth costs for ISPs.

Peer-to-peer file sharing has exploded over the past decade, driven by increasing consumer bandwidth and growing demand for large amounts of data. Rather than serve files from a centralized location, file-sharing networks scatter pieces of among thousands of individual computers and help users find and download this data. File sharing now accounts for about 70 percent of all network traffic, and some ISPs have found it hard to deal with the increased load. In August, Comcast was rebuked by the Federal Communications Commission for trying to throttle peer-to-peer traffic on its network.

The new protocol reduces file-trading traffic by having ISPs reveal some internal network information to peer-to-peer "trackers"--servers that are used to locate files for downloading. Trackers can then use this network information to arrange file sharing more efficiently, by connecting computers that are nearer and sharing files at the lowest resource cost to the ISPs involved. As an example, suppose someone running a BitTorrent client tries to download an MP3. As it stands, the file might come from a computer halfway around the world, even if someone next door also happens to have a copy. By using P4P, the tracker knows to connect computers that are closer together, requiring bits to travel less distance.

Sunday, February 15, 2009

3D Desktop Concept

Nokia Morph Concept ..!!

Hot New Technologies That Will Change Everything !!

Memristor: A Groundbreaking New Circuit

Since the dawn of electronics, we've had only three types of circuit components--resistors, inductors, and capacitors. But in 1971, UC Berkeley researcher Leon Chua theorized the possibility of a fourth type of component, one that would be able to measure the flow of electric current: the memristor. Now, just 37 years later, Hewlett-Packard has built one.

What is it? As its name implies, the memristor can "remember" how much current has passed through it. And by alternating the amount of current that passes through it, a memristor can also become a one-element circuit component with unique properties. Most notably, it can save its electronic state even when the current is turned off, making it a great candidate to replace today's flash memory.

Memristors will theoretically be cheaper and far faster than flash memory, and allow far greater memory densities. They could also replace RAM chips as we know them, so that, after you turn off your computer, it will remember exactly what it was doing when you turn it back on, and return to work instantly. This lowering of cost and consolidating of components may lead to affordable, solid-state computers that fit in your pocket and run many times faster than today's PCs.

Someday the memristor could spawn a whole new type of computer, thanks to its ability to remember a range of electrical states rather than the simplistic "on" and "off" states that today's digital processors recognize. By working with a dynamic range of data states in an analog mode, memristor-based computers could be capable of far more complex tasks than just shuttling ones and zeroes around.

When is it coming? Researchers say that no real barrier prevents implementing the memristor in circuitry immediately. But it's up to the business side to push products through to commercial reality. Memristors made to replace flash memory (at a lower cost and lower power consumption) will likely appear first; HP's goal is to offer them by 2012. Beyond that, memristors will likely replace both DRAM and hard disks in the 2014-to-2016 time frame. As for memristor-based analog computers, that step may take 20-plus years.

USB 3.0 Speeds Up Performance on External Devices

The USB connector has been one of the greatest success stories in the history of computing, with more than 2 billion USB-connected devices sold to date. But in an age of terabyte hard drives, the once-cool throughput of 480 megabits per second that a USB 2.0 device can realistically provide just doesn't cut it any longer.

What is it? USB 3.0 (aka "SuperSpeed USB")promises to increase performance by a factor of 10, pushing the theoretical maximum throughput of the connector all the way up to 4.8 gigabits per second, or processing roughly the equivalent of an entire CD-R disc every second. USB 3.0 devices will use a slightly different connector, but USB 3.0 ports are expected to be backward-compatible with current USB plugs, and vice versa. USB 3.0 should also greatly enhance the power efficiency of USB devices, while increasing the juice (nearly one full amp, up from 0.1 amps) available to them. That means faster charging times for your iPod--and probably even more bizarre USB-connected gear like the toy rocket launchers and beverage coolers that have been festooning people's desks.

When is it coming? The USB 3.0 spec is nearly finished, with consumer gear now predicted to come in 2010. Meanwhile, a host of competing high-speed plugs--DisplayPort, eSATA, and HDMI--will soon become commonplace on PCs, driven largely by the onset of high-def video. Even FireWire is looking at an imminent upgrade of up to 3.2 gbps performance. The port proliferation may make for a baffling landscape on the back of a new PC, but you will at least have plenty of high-performance options for hooking up peripherals.

Wireless Power Transmission

Wireless power transmission has been a dream since the days when Nikola Tesla imagined a world studded with enormous Tesla coils. But aside from advances in recharging electric toothbrushes, wireless power has so far failed to make significant inroads into consumer-level gear.

What is it? This summer, Intel researchers demonstrated a method--based on MIT research--for throwing electricity a distance of a few feet, without wires and without any dangers to bystanders (well, none that they know about yet). Intel calls the technology a "wireless resonant energy link," and it works by sending a specific, 10-MHz signal through a coil of wire; a similar, nearby coil of wire resonates in tune with the frequency, causing electrons to flow through that coil too. Though the design is primitive, it can light up a 60-watt bulb with 70 percent efficiency.

When is it coming? Numerous obstacles remain, the first of which is that the Intel project uses alternating current. To charge gadgets, we'd have to see a direct-current version, and the size of the apparatus would have to be considerably smaller. Numerous regulatory hurdles would likely have to be cleared in commercializing such a system, and it would have to be thoroughly vetted for safety concerns.

Assuming those all go reasonably well, such receiving circuitry could be integrated into the back of your laptop screen in roughly the next six to eight years. It would then be a simple matter for your local airport or even Starbucks to embed the companion power transmitters right into the walls so you can get a quick charge without ever opening up your laptop bag.