Official Blog

Google Driverless Car

By Author – Rashmita Soge   Introduction to Car: The Google Driverless Car is like any car, but: It can steer itself while looking out for obstacles. It can accelerate itself to the correct speed limit. It can stop and go itself based on any traffic condition. It can take its passengers anywhere it wants to go safely, legally, and comfortably. What is Google Driverless Car? A driverless car (sometimes called a self-driving car, an automated car or an autonomous…

Bluejacking

By Author – Rishabh Sontakke   What is Bluejacking? Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, etc. Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to 100 meters with powerful transmitters. Origin of Bluejacking- This bluejack phenomenon started after a Malaysian IT consultant named Ajack posted a comment on a mobile phone forum. Ajack told IT Web…

Enterprise Resource Planning

By Author – Prankul Sinha   Introduction: ERP is usually referred to as a category of business-management software that an organization can use to collect, store, manage and interpret data from these many business activities. ERP provides a continuously updated view of core business processes using common databases maintained by a database management system. ERP systems track business resources?cash, raw materials, production capacity?and the status of business commitments: orders, purchase orders, and payroll. The applications that make up the system…

Attacks on Smart Cards

By Author – Samata Shelare   When hit by an APT attack, many companies implement smart cards and/or other two-factor authentication mechanisms as a reactionary measure. But thinking that these solutions will prevent credential theft is a big mistake. Attackers can bypass these protection mechanisms with clever techniques. Nowadays, adversaries in the form of self-spreading malware or APT campaigns utilize Pass-the-Hash, a technique that allows them to escalate privileges in the domain. When Pass-the-Hash is not handy, they will use…

Digital India: A Planning towards future or Enforcement of Technology

A lot has been done till date by the government of India with the Digital India plan, the idea behind this plan was definitely to just improve ourselves as to digital world and to adopt the changes as the world is changing so not to lack behind. It is mentioned in the website of digital India, that Digital India has a vision transform India into a digitally empowered society and knowledge economy. But my main concern is after the two…

Artificial Eye

By Author – Rishabh Sontakke   An artificial eye is a replacement for a natural eye lost because of injury or disease. Although the replacement cannot provide sight, it fills the cavity of the eye socket and serves as a cosmetic enhancement. Before the availability of artificial eyes, a person who lost an eye used to wore a patch. An artificial eye can be attached to muscles in the socket to provide eye movement. Today, most artificial eyes are made…

Introduction to Java

By Author – Rashmita Soge   Java is a programming language created by James Gosling from Sun Microsystems (Sun) in 1991. The target of Java is to write a program once and then run this program on multiple operating systems. The first publicly available version of Java (Java 1.0) was released in 1995. Sun Microsystems was acquired by the Oracle Corporation in 2010. Oracle has now the steermanship for Java. In 2006 Sun started to make Java available under the…

GPS aircraft tracking

By Author – Samata Shelare   GPS aircraft tracking is used in both commercial and personal aircraft, and it comes along with a variety of benefits both to safety and convenience. What a GPS does on an aircraft in terms of tracking is a lot different than what a GPS may do in your car. GPS tracking can help to ensure your position in the sky and keep you safe while going about a day of flying. In order to…

ARCTIC APPLE

By Author – Ashish Kasture   Now have a bite with more ease and says An apple a day keeps the doctor away. Why did the apple float over the surface of the water? Did you know? Apples have 25% of antioxidant i.e oxygen, when undergoes oxidation apples start getting brown which is called browning. But our biotech giants came up with the apples which are non-browning apples. Arctic Apple is the first genetically engineered apple to be approved for…

GEAR DE-BURRING MACHINE

Gear deburring is a process that has changed substantially over the past 10 years. There have been advancements in the types of tools used for deburring operations and the development of “wet” machines, automatic load and unload, automatic part transfer and turnover, and vision systems for part identification, etc. Three types of tools are used in the gear deburring process, including grinding wheels, brushes, and carbide tools. A discussion of each method is as follows. Grinding Wheels There are many…

Request a Free Estimate
Enter Your Information below and we will get back to you with an estimate within few hours
0