Posts

Showing posts from April, 2016

sensor analytics

Sensor data analytics are the next frontier of information technology. With experts predicting that the volume of sensor data will vastly surpass data from social media over the next decade, enterprises are eager to find out how sensor data analytics can help drive business performance in the years to come. It is the statistical analysis of data that is created by wired or wireless sensors. A primary goal of sensor analytics is to detect anomalies. The insight that is gained by examining deviations from an established point of reference can have many uses, including predicting and proactively preventing equipment failure in a manufacturing plant, alerting a nurse in an electronic intensive care unit (eICU) when a patient's blood pressure drops, or allowing a data center administrator to make data-driven decisions about heating, ventilating and air conditioning (HVAC). Because sensors are often always on, it can be challenging to collect, store and interpret the tr

software-defined WAN

Software-defined WAN  is an approach to designing and deploying an enterprise wide area network (WAN) that uses software-defined networking (SDN) to determine the most effective way to route traffic to remote locations.It shifts traffic monitoring and management from physical devices to the application itself, capitalizing on SDN's flexibility and agility. Intelligence is abstracted into a virtual overlay -- enabling a secured pooling of both private and public connections and permitting automation, centralized network control, and agile, real-time traffic management over multiple links. This model enables a network administrator to remotely program edge appliances via a central controller, reducing provisioning times and minimizing or eliminating the need to manually configure traditional routers in branch locations. SD-WAN products and services vary by vendor, but many enable hybrid WAN -- dynamically routing traffic over both private and public links, such as leased Multiproto

Day 12

Image
The great myth of our times is that technology is communication.                           - Libby Larsen    

Day 11

Image
Science and technology revolutionize our lives, but memory, tradition and myth frame our response.                                 - Arthur Schlesinger (Historian)                       Artificial intelligence will reach human levels by around 2029. Follow that out further to, say, 2045, we will have multiplied the intelligence, the human biological machine intelligence of our civilization a billion-fold. Read more at: http://www.brainyquote.com/quotes/keywords/artificial_intelligence.html Artificial intelligence will reach human levels by around 2029. Follow that out further to, say, 2045, we will have multiplied the intelligence, the human biological machine intelligence of our civilization a billion-fold. Read more at: http://www.brainyquote.com/quotes/keywords/artificial_intelligence.html Artificial intelligence will reach human levels by around 2029. Follow that out further to, say, 2045, we will have multiplied the intelligence, the human biological machi

Write an application to print x and y co-ordinate on 7 segment after touch ....

/* This Project shows kernel coding in C and this will be run after attaching with a hardware device */    #include <stdlib.h> #include <stdio.h> #include <fcntl.h> #include <unistd.h> #include <sys/ioctl.h> #include <linux/input.h> #define  NODE_EXP                         "/dev/7seg_led"  /* Device name */ #define  SEG_7_LED_ON                  1   #define  SEG_7_LED_WRITE            2 #define  SEG_7_LED_CLEAR           3 #define  SEG_7_LED_OFF                4 int main() {     int fd;     char buff[256] = "Name";     int i,rb,m;     int exp_dev= 0; /* exp_dev is file descriptor */     int ret,res= 0;  /* return value of system call */     struct input_event ev;     struct input_absinfo ab;   //absolute info//     if ((fd = open("/dev/input/touchscreen0", O_RDONLY)) < 0)     {      printf ("Error Opening the Device\n");      return 1;     }       ioctl(fd, EVIOCGNAME(sizeof(bu

ransomware

Ransomware is malware for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. Ransomware spreads through e-mail attachments, infected programs and compromised websites. A ransomware malware program may also be called a cryptovirus, cryptotrojan or cryptoworm. Attackers may use one of several different approaches to extort money from their victims: After a victim discovers he cannot open a file, he receives an email ransom note demanding a relatively small amount of money in exchange for a private key. The attacker warns that if the ransom is not paid by a certain date, the private key will be destroyed and the data will be lost forever. The victim is duped into believing he is the subject of an police inquiry. After being informed that unlicensed software or illegal web content has been found on his computer, the victim is given instructions for how to pay an electronic fine. The malware sur