Author: Jain Software

What is Hawk-Eye?

By Author – Rishabh Sontakke   Hawk-Eye is a computer system used in numerous sports such as cricket, tennis, Gaelic football, badminton, hurling, Rugby Union, association football, and volleyball, to visually track the trajectory of the ball and display a profile of its statistically most likely path as a moving image. The Sony-owned Hawk-Eye system was developed in the United Kingdom by Paul Hawkins. The system was originally implemented in 2001 for television purposes in cricket. The system works via…

Parasitic Computing

By Author – Samata Shelare   It is a generalized problem format into which more specific tasks can be mapped, this opens up the possibility of using the communication protocols provided by Internet hosts as a massive distributed computer. Whats more, the computers that participate in the endeavor are unwitting participants?from their perspective, they are merely responding (or not) to TCP traffic. Parasitic computing is especially interesting because the exploit doesnt compromise the security of the affected computers, it piggybacks…

HACKABALL – MOST ENGAGING UX FOR DIGITAL EDUCATION

By Author – Shubhangi Agrawal   Lifehack (or life-hacking) refers to any trick, shortcut, skill, or novelty method that increases productivity and efficiency, in all walks of life. The term was primarily used by computer experts who suffer from information overload or those with a playful curiosity in the ways they can accelerate their workflow in ways other than programming. One of the most amazing life hacks is Hackaball. Hackaball is a computer you can throw that allows children to…

Indian Regional Navigation Satellite System

By Author – Samata Shelare   India is looking forward to starting its own Navigational system. At present most of the countries are dependent on Americas Global Positioning System (GPS). India is all set to have its own navigational system named Indian Regional Navigation Satellite System (IRNSS). IRNSS is going to be fully functional by mid of 2016. IRNSS is designed to provide accurate position information throughout India. It also covers 1500 km of the region around the boundary of…

Hydrogen: Future Fuel

By Author – Rishabh Sontakke   Hydrogen fuel is a zero-emission fuel when burned with oxygen. It uses electrochemical cells, or combustion in internal engines, to power vehicles and electric devices. It is also used in the propulsion of spacecraft and might potentially be mass-produced and commercialized for passenger vehicles and aircraft. Hydrogen lies in the first group and first period in the periodic table, i.e. it is the first element on the periodic table, making it the lightest element….

Li-Fi Technology

By Author – Rashmita Soge   Li-Fi is a technology for wireless communication between devices using light to transmit data. In its present state only LED lamps can be used for the transmission of visible light. LiFi is designed to use LED light bulbs similar to those currently in use in many energy-conscious homes and offices. However, LiFi bulbs are outfitted with a chip that modulates the light imperceptibly for optical data transmission. LiFi data is transmitted by the LED…

Google Driverless Car

By Author – Rashmita Soge   Introduction to Car: The Google Driverless Car is like any car, but: It can steer itself while looking out for obstacles. It can accelerate itself to the correct speed limit. It can stop and go itself based on any traffic condition. It can take its passengers anywhere it wants to go safely, legally, and comfortably. What is Google Driverless Car? A driverless car (sometimes called a self-driving car, an automated car or an autonomous…

Bluejacking

By Author – Rishabh Sontakke   What is Bluejacking? Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, etc. Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to 100 meters with powerful transmitters. Origin of Bluejacking- This bluejack phenomenon started after a Malaysian IT consultant named Ajack posted a comment on a mobile phone forum. Ajack told IT Web…

Enterprise Resource Planning

By Author – Prankul Sinha   Introduction: ERP is usually referred to as a category of business-management software that an organization can use to collect, store, manage and interpret data from these many business activities. ERP provides a continuously updated view of core business processes using common databases maintained by a database management system. ERP systems track business resources?cash, raw materials, production capacity?and the status of business commitments: orders, purchase orders, and payroll. The applications that make up the system…

Attacks on Smart Cards

By Author – Samata Shelare   When hit by an APT attack, many companies implement smart cards and/or other two-factor authentication mechanisms as a reactionary measure. But thinking that these solutions will prevent credential theft is a big mistake. Attackers can bypass these protection mechanisms with clever techniques. Nowadays, adversaries in the form of self-spreading malware or APT campaigns utilize Pass-the-Hash, a technique that allows them to escalate privileges in the domain. When Pass-the-Hash is not handy, they will use…

Request a Free Estimate
Enter Your Information below and we will get back to you with an estimate within few hours
0