What is Data Visualization?

Posted in

There are a number of tools you can use to make your own display when you need to organize information:

- LivePlasma is a tool that lets you find music and movies that are similar to your favorites. If you enjoy Bon Jovi as a musician or a movie like Gladiator, simply enter the information in the data visualization tool. It then opens a large number of other films or music that shares common factors with the original data. It will show a giant "molecule-like" structure that is connected through a number of factors to other things that you can enjoy.

- Swarm is a data visualization tool that can be used with Digg. There are hundreds of users and the stories flying around the screen of this tool, users are able to 'Digg' a story. They are then taken to the story and connected to it for a short time, and you will find that this service is ideal for finding stories with excellent user interface.

- Research Chronology is a tool that helps track the patterns of student research. The tool uses Delicious bookmarks that have been marked throughout the semester, and helps connect your different research avenues.

- TwittEarth is a tool that lets you see where all the tweets from around the world are coming from. The tool displays the world as a giant 3D globe, and the location of the tweets are highlighted in real time on the map. You can find new tweeters to follow, or you can just sit back and enjoy the incredible software that displays the latest data visualization.

- Tag Galaxy Flickr labels shown in the style of a solar system with several planets and stars to the labels on the questions. The star is the label you want, and planets are the labels associated with the original search.

- Twingly Screensaver is a fascinating tool that lets you see the blogosphere all over the world in real time. The screen saver shows the activity of bloggers from around the world, since then, and the constant progress of blog activity makes for a truly amazing display.

Optical Transceiver Modules

Posted in Labels:

Fine fiber optic transport of waves of data sent over optical transceiver modules. Transport modules and receiving optical signals. Under the Multi-Source Agreement these form factors are built by companies. Specific standards must be met in their building. Transfer rates are what are used to classify optical transceivers together. Each supports speeds of 1 Gbps to 10 Gbps. Factors known as SFP GBIC module and is 1 Gbps. These factors support a larger than 4 Gbps transmission up to 100Mbps.Modules known as XENPAK, XFP, SFP and X2 + supports speeds up to 10 Gbps of transport. Find a reputable dealer and full knowledge of the optical transceiver modules will be useful when it comes time to make your purchase. You have questions and concerns of networks, therefore, find a fiber network provider with experience will be crucial. You have to have all the information possible to make the right decision when choosing manufacturers and its modules.

Credit Card RFID Technology

Posted in Labels:

As more credit card issuers offer "contactless card processing credit processing," a growing concern and debate over RFID technology is generated. RFID technology or RFID, allows the payment of credit to be read without manual input or physically swipe the card through a reader. RFID cards are facing a special reader and the information is transmitted via radio frequency.

How does RFID technology

not a radio frequency chip embedded in each card with RFID technology. The chip can be read by a POS terminal with a special reader designed to retrieve information from the account of the integrated chips.

The history of RFID

JP Morgan Chase credit cards introduced radio frequency in 2005, calling it "technology to open and close." They had the option to be used as regular cards (passed through the traditional credit terminal processing in the starting line), or the use of radio frequency technology by shaking in front of a special reader for contactless payments.Today, all card issuers offer RFID technology, including MasterCard, Discover, Visa and American Express.

Benefits of RFID sensors

To minimize accidental processing as people walk by readers, the card has to be within 4 inches of the reader.


Posted in


The 5 Most Dangerous Domains

Posted in Labels:

The Public Interest Registry (DNS) that is headquartered in Washington DC is responsible for managing the domain. "Org" will introduce more security measures in the web addresses that end in this domain, but it is hoped that others, such as ". com" or. "net" to follow.In its latest computer security company McAfee has brought out statistics that reveal the most dangerous domains of the network. They are best used by browsers and are suffering the most from the technology used Trustedforce inseguridad.MacAfee focused on protecting businesses and their database that collects data from over 150 sensors located in 120 countries. Read More

GSM Vs CDMA Technology

Posted in Labels:

In cellular service there are two main competing network technologies: Global System for Mobile Communications (GSM) and Code Division Multiple Access (CDMA). Some moving companies included are: Sprint PCS, Cingular Wireless, Verizon and T-Mobile among others. Understand the difference between GSM and CDMA will allow the consumer to choose a company that uses the most appropriate network technology needs.

The Asociacón GSM is an international organization founded in 1987 dedicated to providing, developing and overseeing the global standard for wireless GSM. CDMA is a standard designed by Qualcomm in the United States has been the dominant network standard for North America and parts of Asia. However, GSM networks continue to make inroads in the U.S., CDMA networks are moving in other parts of the world.

There are points on both sides that firmly believe their own GSM or CDMA architecture is superior to another brand. Consumers requiring more information lend as much interest to the investment that will make the following recommendations can be helpful.

Coverage: The most important factor is to get a service that is in areas where it is to use the phone. Seeing the maps of the competitors and coverage in your area, you will discover if it is GSM or CDMA service indicates that you need.

Data transfer rate: The development of technology in cell phones is very continuous and markings must meet the needs of the user who buys these brands, some progress would be the streaming video devices, podcast receivers and email devices electronic, speed is important for those who not only use the phone to make calls. CDMA has been traditionally faster than GSM, though both technologies continue to compete in this subject over the years. Both boast "3G" or third generation technologies.

EVDO, also known as CDMA2000, CDMA is the answer to the speed requirements of consumers who need it has a download speed of 2 megabits per second, although some reports indicate that reached speeds are around 300 -700 kilobits per second (kbps). This is comparable to DSL base. As of fall 2005, EVDO is deployed. But this device is not available for all phones, it requires a phone with CDMA2000 and ready reference.

GSM's answer is EDGE (Enhanced Data Rates for GSM Evolution), with data rates up to 384 kbps, with speeds reached 70 to 140 kbps. With the addition of technologies that are still in beta that will include UMTS (Universal Mobile Telephone Standard) and HSDPA (High Speed ​​Downlink Packet Access), speeds reportedly increase to about 275-380 kbps. This technology is also known as W-CDMA, but is not compatible with CDMA networks. For this purpose you must use a phone with EDGE technology.

In the case of EVDO, theoretical high traffic can degrade speed and performance, while the EDGE network is more susceptible to interference. Both require a central location within the signal range to get the best speeds, while the performance of the signal decreases with distance.

Mie Scattering technique

Posted in Labels:

Linear scattering may also occur at in homogeneities which are comparable in size with the guided wavelength. These result from the no perfect cylindrical structure of the wave guide and may be caused by fiber imperfections such as irregularities in the core- cladding interface, core- cladding refractive index differences along the fiber length, diameter fluctuations, strains and bubbles. The scattering created by such in homogeneities is mainly in the forward direction and is called Mie Scattering. Depending upon the fiber material, design and manufacture, Mie scattering can cause significant losses. The in homogeneities may be reduced by

-         removing imperfections due to the glass manufacturing process,
-         carefully controlled extrusion and coating of the fiber
-         Increasing the fiber guidance by increasing the relative refractive index difference.Read More

Complexity of Substitution Encryption and Decryption

Posted in Labels:

An important issue in using any cryptosystem is the time it takes to turn plaintext into ciphertext, and vice versa. Especially in the field it is essential that the scrambling and unscrambling do not deter the authorized parties from completing their missions. The timing is directly related to the complexity of the encryption algorithm. For example encryption and decryption with substation ciphers can be performed by direct lookup in a table illustrating the correspondence, like the ones shown in example. One way thinking of this expression is that if one message is twice as long as another, it will take twice as long to encrypt.

Substitution Ciphers of Computing System

Posted in Labels:

Children sometimes devise ‘secret codes’ that use a correspondence table with which to substitute a character or symbol for each character of the original message. This technique is called a monoalphabetic cipher or simple substitution, A substitution is an acceptance way of encryption text. Read More

Cryptanalysis in security system

Posted in Labels:

A cryptanalysts chore is to break an encryption. That is the cryptanalyst attempts to m, deduce the original meaning of a ciphertext message. Better yet, he or she hopes to determine which decrypting algorithm matches the encrypting algorithm, so that other message encoded in the same way can be broken. Thus a cryptanalyst can do any or all of six different things-

Attempt to break a single message

Attempt to recognize patterns in encrypted messages, to be able to break subsequent ones by applying a straightforward decryption algorithm

Attempt to infer some meaning without even breaking the encryption, such as noticing an unusual frequency of communication or determining something by whether the communication was short or long.

Attempt to deduce the key in order to break subsequent message easily

Attempt to find weaknesses in the implementation or environment of use of encryption.

Terminology process

Posted in Labels:

Encryption is the process of encoding a message so that its meaning is not obvious. Decryption is the reverse process, transforming an encrypted message back into its normal, original form. Alternatively the terms encode and decode or encipher and decipher are used instead of encrypt and decrypt. That is we say that we encode encrypt or encipher the original message to hide its meaning. Then we decode, decrypt or decipher it to reveal the original message. A system for encryption and decryption is called a cryptosystem.

The original form of a message is known as plaintext, and the encrypted form is called cipher text. For convenience in explanation, we denote a plaintext message p as a sequence of individual characters p={p1, p2, …..pn}. Similarly cipher text is written as C={c1, c2,…..cm}. for instance, the plaintext message “ I want cookies” can be through  of as the message string { I, w ,a, n, t, c, o, o, k, I, e, s}. it may be transformed into cipher text { c1, c2, ……c14} and the encryption algorithm tells us how the transformation is done.            

Controls in security system

Posted in Labels:

To consider the controls or countermeasures that attempts to prevent exploiting computing system vulnerabilities, we begin by thinking about traditional ways to enhance physical security. In the middle ages, castles and fortresses were built to protect the valuable people and property inside. The fortress might have had one or more security characteristics including-

  • A strong gate or door to repel invaders

  • Heavy walls to withstand objects thrown or projected against them

  • A surrounding moat, to control access

  • Arrow slits to let archers shoot at approaching enemies

   Read More 

Career Criminals

Posted in Labels:

By contrast the career computer criminal understands the targets of computer crime. Criminals seldom change fields from arson or auto theft to computing more often criminals begin as computer professionals who engage in computer crime finding the prospects and payoff good. There is some evidence that organized crime and international groups are engaging in computer crime. Recently electronic spies and information brokers have begun to recognize that trading in companies or individuals secrets can be lucrative. 

What is Amateurs?

Posted in Labels:

Amateurs have committed most of the computer crimes reported to date. Most embezzlers are not career criminals but rather are normal who observe a weakness in a y security system that allows them to access cash or other valuables. In the same sense computer criminals are ordinary computer professionals or users doing their jobs, when they discover they have access to something valuable. When no one objects the amateur may start using the computer at work to write letters maintain soccer league team standings or do accounting.  

Difference between VBScript and Java script

Posted in Labels:

Java Script:
1.      Java script case sensitive
2.      Java Script will be run on client side.
3.      JavaScript will explore in all the browser
4.      JavaScript is  more like c++
5.      JavaScript is client side validation
Example: Var x;

BV Script:
1.      VBScript not case sensitive
2.      VBScript both client  side and server side
3.      VBScript is like VB
4.      VB accept only internet explore
5.      VBScript for server side validation
Dim x
For x=1 to 10
Document. Write x & “<BR>”