Thursday, 13 December 2018

India to lead hybrid cloud adoption globally... in the next two                                             years                                             


          The adoption of hybrid cloud workloads in India will more than triple to 43% from 13% in the next twenty-four months, according to a Nutanix report released today. 

The report, “The Nutanix Enterprise Cloud Index” compiled by Vanson Bourne says that India will lead globally in hybrid cloud usage and adoption over the next two years. 

Notably, the report adds that more than half of Indian respondents see all their needs are being met by public cloud services

As billions more people, places and things become connected to the internet, and more and more enterprises move their systems, software and processes to cloud providers, the need to connect, communicate, manage and align these varying components take on a new perspective. Hybrid infrastructure does all of these things. By driving hybrid adoption, India’s enterprises look set to keep the country at the centre of the global economy,” said Saxena. 



Is the cloud the next thing for long-term data retention?


Is the cloud the next thing for long-term data retention? Looking at the key vendors in the space






               For any organisation in this era, there is a realization on how data is critical for business needs and operations.
An enormous amount of data has been produced already after the disruption of cloud computing into various types of organisation, be it education, finance, healthcare or manufacturing. Today, organisations are more concerned about the data which has been developed in the last 15 to 20 years due to the surge of IT infrastructure.
This data and applications are probably not being used actively, but it is important to organisations as this data contains critical information, having compliance requirements around it. Security of old data (unstructured content, applications, virtual machines) is becoming crucial for the organisation. There has to be a cost effective and reliable archiving solution to store and secure data while gaining rapid access when needed.
In the past, IT management used to save the data in tape drives or on premises data centres without any filtering. But the data demands have drastically changed.
Even more data will be produced in the next five to seven years as more digitally connected devices become part of business operations. Data will be fuel for any business as they will abstract analytical information to get ahead of the competition or to be aligned with consumer demands. This digital transformation is not just to acquire new technology enhancement but to save CAPEX and OPEX every time when the data centre moves ahead in innovations.
As data grows, edge computing architecture will enable data centre systems to get closer to digital devices for processing of information (machine learning/analysis) and only a small set of information will be pushed to the cloud or private data centre.
How will organisations deal will past data when real-time data will also need to get archived for reference? How will organisations deal with data in hybrid cloud or a multi-cloud model where private and public cloud will be utilized for different data processing purposes? Will there be automation available for constantly syncing data based on archival methods that will get integrated in an archival strategy? What about the security from external breaches or physical damages to archival systems?
There are various vendors who have developed solutions to address these needs. Organisations have different choices to select a solution which fits their requirements and can be customized as per the budget. In this post, I have taken a look at data archival solutions from leading vendors like Rubrik, Cohesity and Zerto. Let’s evaluate their solutions.
Cohesity’s solutions allow you to leverage both cloud and tapes to archive the data based on the organisation's requirements. The solution they call cloud-native is where, apart from tapes, archival is possible on public clouds, private clouds, Amazon S3-compatible devices and QStar managed tape libraries. The solution enables IT management to define workflow policies for automated backup and archival. It consists of two Cohesity products: Cloud Archive & Data Protect.
Cloud Archive allows to leverage public cloud for long term data retention, while Data Protect helps to reduce long term retention and archival cost with its pay as you go cost model.




Sunday, 11 November 2018

Nokia Morph Technology



Nokia Morph Technology

        Nokia Morph Technology is useful for computer science students for giving presentation. Download full report with reference links on similar topic.

Image result for Nokia Morph Technology


                                 Nokia Morph Technology Seminar Report
Introduction                                                                                                                                                                                                                                              
Morph technical concept can develop mobile devices with some advantages:
–         It can be flexible and transparent and highly seamless.
–         It can auto services like cleaning and self preserving.
–         It’s batteries might be charge with solar in built charger, long lasting and fast to charge.
–         Inbuilt sensors can help us to know about the environment of around us and give us the better choices. 
In addition this devices cost could be less and it could include more functionality in much small  space. 

CONCEPT OF NOKIA MORPH

       Morph is a concept that shows how future mobile device can be extended and its flexibility allowing the user to transform their mobile into different shapes. It shows the basic functionality that nanotechnology can deliver: flexible materials, transparent electronics and self-cleaning surfaces.
 One day Nanotechnology will lead the market by providing low cost and integrated functionality mobile devices. It is also working to create self cleaning mobile devices and increase its life.
There is various technical areas where nano technology are used  :
Nano-enabled energy
          Enhanced energy harvesting and storage
          Enhanced energy density batteries
          Supercapacitors
          Solar cell research
          Energy Harvesting from RF using wideband antennas and Nems structures

SENSING SURFACES
         The Nano sensors would give power user to examine the environment around them to make their life comfortable by providing the way to examine the air pollution, to gaining insight into the mall traces and process.
1.     NANOSCALE BENEFITS
The large number of parallel sensors  that can be measure both either single one or in a  group.
It use new signal processing pattern, new materials to improve sensor characteristic, stability, resolution,  reliability, and processing response time.
2       PURPOSE SYSTEM
Out purpose system focus on :
            Nanoresonator based on optical sensors
            ZnO nanowire base stain sensors
            For nano based computing use new signal process method   
WORKING AREA OF NOKIA MORPH 
            The new technical device will be inclusive with some new trend technical feature like   Context aware device which can adapt and transfer functionality according to its tasks and it can be available everywhere , easy of understand GUI, flexible with new power source technology etc.


Image result for Nokia Morph Technology   Image result for Nokia Morph Technology  Image result for Nokia Morph Technology

Bluejacking...

Bluejacking

            Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e. for bluedating or bluechat) to another Bluetooth enabled device via the OBEX protocol. Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to 100 meters with powerful transmitters. Bluejacking allows phone users to send business cards anonymously using Bluetooth wireless technology. Bluejacking does not involve the removal or alteration of any data from the device. Bluejackers often look for the receiving phone to ping or the user to react. In order to carry out a bluejacking, the sending and receiving devices must be within 10 meters of one another. Phone owners who receive bluejack messages should refuse to add the contacts to their address book. Devices that are set in non-discoverable mode are not susceptible to bluejacking.
Mobile phones have been adopted as an everyday technology, and they are ubiquitous in social situations as users carry them around as they move through different physical locations throughout the day. As a communicative device, the mobile phone has been gradually taken up in ways that move beyond merely providing a channel for mediated conversation. One such appropriation is bluejacking, the practice of sending short, unsolicited messages via vCard functionality to other Bluetooth-enabled phones. To choose the recipients of bluejacks, senders complete a scan using their mobile phones to search for the available Bluetooth-enabled devices in the immediate area. A bluejacker picks one of the available devices, composes a message within a body of the phone’s contact interface, sends the message to the recipient, and remains in the vicinity to observe any reactions expressed by the recipient.

      Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e., for bluedating or bluechat) to another Bluetooth-enabled device via the OBEX protocol.
Bluetooth has a very limited range, usually around 10 metres (32.8 ft) on mobile phones, but laptops can reach up to 100 metres (328 ft) with powerful (Class 1) transmitters.

Origins
       Bluejacking was reportedly first carried out between 2001 and 2003 by a Malaysian IT consultant who used his phone to advertise Ericsson to a single Nokia 7650 phone owner in a Malaysian bank.[1] He also invented the name, which he claims is an amalgam of Bluetooth and ajack, his username on Esato, a Sony Ericsson fan online forum. Jacking is, however, an extremely common shortening of "hijack', the act of taking over something. Ajack's original posts are hard to find, but references to the exploit are common in 2003 posts.
Another user on the forum claims earlier discoveryreporting a near-identical story to that attributed to Ajack, except he/she describes bluejacking 44 Nokia 7650 phones instead of one, and the location is a garage, seemingly in Denmark, rather than a Malaysian Bank. Also, the message was an insult to Nokia owners rather than a Sony Ericsson advertisement.

Usage
       Bluejacking is usually harmless, but because bluejacked people generally don't know what has happened, they may think that their phone is malfunctioning. Usually, a bluejacker will only send a text message, but with modern phones it's possible to send images or sounds as well. Bluejacking has been used in guerrilla marketing campaigns to promote advergames.

        Bluejacking is also confused with Bluesnarfing, which is the way in which mobile phones are illegally hacked via Bluetooth.

Techopedia explains Bluejacking

    Bluejacking does not involve device hijacking, despite what the name implies. Thebluejacker may send only unsolicited messages. Hijacking does not actually occur because the attacker never has control of the victim’s device. At worst, bluejacking is  an annoyance. Bluejacking exploits a basic Bluetooth feature that allows devices to send messages to contacts within range.

      Bluesnarfing and bluebugging, however, are actual attacks that may result in a user losing control of his device. Although bluejacking, bluesnarfing and bluebugging use Bluetooth as the point of entry, bluesnarfing and bluebugging are far more harmful. Bluejacking can be prevented by setting a device to hidden, invisible or non-discoverable mode.

Friday, 9 November 2018

Amazon Alexa


Amazon Alexa

             Amazon Alexa, known simply as Alexa, is a virtual assistant developed by Amazon, first used in the Amazon Echo and the Amazon Echo Dot smart speakers developed by Amazon Lab126. It is capable of voice interaction, music playback, making to-do lists, setting alarms, streaming podcasts, playing audiobooks, and providing weather, traffic, sports, and other real-time information, such as news. Alexa can also control several smart devices using itself as a home automation system. Users are able to extend the Alexa capabilities by installing "skills" (additional functionality developed by third-party vendors, in other settings more commonly called apps such as weather programs and audio features). 

            Most devices with Alexa allow users to activate the device using a wake-word (such as Alexa); other devices (such as the Amazon mobile app on iOS or Android) require the user to push a button to activate Alexa's listening mode. Currently, interaction and communication with Alexa are only available in English, German, French, Italian, Spanish, and Japanese. In November 2017, Alexa became available in the Canadian market in English only. 

             As of September 2017, Amazon had more than 5,000 employees working on Alexa and related products.

History

       In November 2014, Amazon announced Alexa alongside the Echo. Alexa was inspired by the computer voice and conversational system on board the Starship Enterprise in science fiction TV series and movies, beginning with Star Trek: The Original Series and Star Trek: The Next Generation.

      The name Alexa was chosen due to the fact that it has a hard consonant with the X and therefore could be recognized with higher precision. The name is also claimed to be reminiscent of the Library of Alexandria, which is also used by Amazon Alexa Internet for the same reason.In June 2015, Amazon announced Alexa Fund, a program that would invest in companies making voice control skills and technologies. The US$100 million in funds has invested in companies including Ecobee, Orange Chef, Scout Alarm, Garageio, Toymail, MARA, and Mojio. In 2016, the Alexa Prize was announced to advance the technology.

     In January 2017, the first Alexa Conference took place in Nashville, Tennessee, an independent gathering of the worldwide community of Alexa developers and enthusiasts. The follow-up has been announced, to be keynoted by original Amazon Alexa / Connected Home product head Ahmed Bouzid.

     At the Amazon Web Services Re:Invent conference in Las Vegas, Amazon announced Alexa for Business and the ability for app developers to have paid add-ons to their skills.
In May 2018, Amazon announced that Alexa will be included into all of the 35,000 new Lennar Corporation homes built this year.

App

A companion app is available from the Apple App Store, Google Play, and Amazon Appstore. The app can be used by owners of Alexa-enabled devices to install skills, control music, manage alarms, and view shopping lists. It also allows users to review the recognized text on the app screen and to send feedback to Amazon concerning whether the recognition was good or bad. A web interface is also available to set up compatible devices (e.g., Amazon Echo, Amazon Dot, Amazon Echo Show)

Functions

            Alexa offers weather reports provided by AccuWeather and news provided by TuneIn from a variety of sources including local radio stations, NPR, and ESPN. Additionally, Alexa-supported devices stream music from the owner's Amazon Music accounts and have built-in support for Pandora and Spotify accounts. Alexa can play music from streaming services such as Apple Music and Google Play Music from a phone or tablet. Alexa can manage voice-controlled alarms, timers, and shopping and to-do lists, and can access Wikipedia articles. Alexa devices will respond to questions about items in the user's Google Calendar. Alexa's question answering ability is partly powered by the Wolfram Language. When questions are asked, Alexa converts sound waves into text which allows it to gather information from various sources. Behind the scenes, the data gathered is then parsed by Wolfram's technology to generate suitable and accurate answers. As of November 2016, the Alexa Appstore had over 5,000 functions ("skills") available for users to download, up from 1,000 functions in June 2016. As of a partnership with fellow technology company, Microsoft's AI Cortana became available to use on Alexa enabled devices as of August 2018, Amazon rolled out a new "Brief Mode," wherein Alexa would begin responding with a beep sound rather than saying, "Okay," to confirm receipt of a command.

Home automation

In the home automation space, Alexa can interact with devices from several manufacturers including Belkin, ecobee, Geeni, IFTTT, Insteon, LIFX, LightwaveRF, Nest , Philips Hue, SmartThings, Wink, and Yonomi. The Home Automation feature was launched on April 8, 2015. Developers are able to create their own smart home skills using the Alexa Skills Kit.
In September 2018, Amazon announces a microwave oven that can be paired and controlled Echo device. It is sold under the AmazonBasics branding.