Wednesday, 23 May 2018

An Overview about End-to-End Encryption


In todays fast growing world, security of his/her datat is the first priority of every user. So today we are going to give a brief introduction on End-to-End Encryption. End-to-End Encryption is a way of encrypting and decrypting data using the concept of cryptography.      So as the name says End-to-End Encryption refers to encrypting and decrypting of data on both the ends.Suppose a data is going to travel on the internet from a mobile phone, so first it will gen:erate two key , first is Pubic key and second is Private key.    The private key always remains in the phone, but the public key remains at the server.When a data is requested from the server the public key gets activated for that particular mobile phone from which it is generated. The Public key encrypts the data that come from the server in that way that only private key of that particular phone can only decrypts it.
Getting little bit confused ...!!
Lets take an example to clarify...
Suppose there is a messaging app in your mobile phones that uses End-to-End Encryption for protecting your privacy. Now while opening the acoount or Signing Up that app generated two key, first Public Key that will move to the server of that messaging app and the second key that  will remain in that mobile phone only.        So now when someone sends you a message that message will get encrypted by the Public key in that way that only Private key of that account can decrypt it. Now the encrypted file that contains the message is sent through the server to the mobile phone where the private key is already remaining there for decrypting it. So thats it for my self...

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Tuesday, 22 May 2018

An Overview About Google Duplex



Some days before at Google I/O 2018 we have seen a new way of assisting life, which is going to book an appointment instead of you yourself do it, Yes that's True, Google is developing an efficient Artificial Intelligence for communicating with the shop owner or any other person who is going to take an appointment in a way normal person use to take.

What is Google Duplex ?

It's a new tool from Google that aims to use Artificial intelligence (AI) to "accomplish real-world tasks over the phone" according to Google's AI researchers and developers. For now, that means very specific tasks like making appointments, but the tech is being developed with an eye on expansion into other areas. Spending billions to create a cool way to make dinner reservations sounds like something Google would do but isn't a great use of time or money.Duplex is also more than we saw in a demo and if it ever leaves the lab will be a lot more than we see or hear on our end. There are huge banks of data and the computers to process it involved that aren't nearly as cool as the final result. But they are essential because making a computer talk and think, in real time, like a person is hard.

How does Google Duplex Work ?

From the user end, it's as simple as telling Assistant to do something. For now, as mentioned, that something is limited to making appointments so we would say, "Hey Google make me an appointment for an oil change at Joe's Garage for Tuesday morning," and (after it reminded us to say please) it would call up Joe's Garage and set things up, then add it to your calendar.
                     Duplex is using what's called a recurrent neural network. It's built using Google's Tensor-flow Extended technology. Google trained the network on all those anonymized voicemails and Google Voice conversations you agreed to let it listen to if you opted in with a mix of speech recognition software and the ability to consider the history of the conversation and details like the time of day and location of both parties.

Essentially, an entire network of high-powered computers is crunching data in the cloud and talking through Assistant on your phone or other product that has Assistant on board.

Where can I learn more?

Google is surprisingly open about the tech it is using to create Duplex. You'll find relevant information at the following websites:
So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Saturday, 19 May 2018

Had you ever thinked, How does an IP Address is assigned to a device..?


Every device connected to the internet is assigned an IP address when you connect. When you connect with your phone or computer or chosen device, your ISP assigns you an IP Address so you can browse, shop, and navigate the internet.

Who created Internet Protocol (IP) addresses?

Vint Cerf the “father of the internet” was one of the creators of IP addresses. He created it while working for the US Department of Defense's Advanced Research Projects Agency (DARPA).
Code.org and Mr. Cerf explain the creation of IP address.

There are a few organizations involved in IP addresses.

ICAAN - The Internet Corporation for Names & Numbers - They’re the top level and they govern over IP - the internet protocol, and run the policies behind it.
From there it flows down to IANA - Internet Assigned Numbers Authority. IANA is a department of ICAAN that co-ordinates and maintains the number systems that keep the internet running like IP addresses & DNS.
Next step is region specific organizations that hold onto the IP addresses that provide registration and management of them, North America for example is ARIN.
Once at ARIN, ISPs (Internet Service Providers) or organizations can contact them to register an IP address or a block of IP addresses which is where you come in.
How IP Addresses are assigned
You then purchase a connection from an ISP or head to your local Starbucks and connect to the internet - voila!
IPv4 addresses were distributed from ICANN through IANA and then through to your regional internet registry where your ISP or company can coordinate from there and you connect to it!

Some organizations govern their own block of IP addresses

Based on that the internet was originally used by the US Military it makes sense on these and with IPv6 there are whole blocks that are taken up by Google, Facebook and the like as the original IP spec and those IPv4 blocks were handed out in the 90s.
So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Saturday, 12 May 2018

How does a WiFi Work..?


Do you ever have that moment where you step back and think about how something you use every day actually works? More specifically have you ever wondered how the heck computers actually communicate wirelessly?
Well, that's exactly the question we're going to be tackling in today's podcast. >

What Is WiFi?

First, let's cover some of the basics. WiFi stands for Wireless Fidelity and is the same thing as saying WLAN which stands for "Wireless Local Area Network."
WiFi works off of the same principal as other wireless devices - it uses radio frequencies to send signals between devices. The radio frequencies are completely different say from walky talkies, car radios, cell phones, and weather radios. For example your car stereo receives frequencies in Kilohertz and Megahertz range (AM and FM stations), and WiFi transmits and receives data in the Gigahertz range.
To break it down even further, Hertz (Hz) is simply a unit of frequency. Let's say you're standing on a pier watching waves come in. As you look down at the waves you can see the crest of each wave roll on by. If you counted how many seconds between each wave crest this would be the frequency of the waves. So if the time between each crest was 1 second that would meant the wave frequency was 1 hertz or one cycle per second.
Comparing sea waves to Mhz and Ghz, these waves are moving at 1 million and 1 billion cycles per second in the air! And to receive the information found in these waves, your radio receiver needs to be set to receive waves of a certain frequency.
For WiFi this frequency happens to be 2.4Ghz and 5Ghz. These waves are very similar to the frequency found in your microwave! Your microwave uses 2.450Ghz to heat up food and your router uses 2.412 GHz to 2.472 GHz to transmit your data over WiFi. This is why some people with old or faulty microwaves experience a problem with their WiFi signal when they try to make popcorn.
Just to clear up a popular misconception: These microwaves are non-ionizing radiation. That means that they do not cause cancer. That’s right kids, microwaves will not make you radioactive and glow in the dark!

How Does WiFi Work?

I mentioned before that WiFi uses both 2.4Ghz and 5Ghz frequencies. Generally older devices only have 2.4Ghz because that was the standard before 5Ghz came out.  
But whether you are in the 2.4Ghz range or the 5Ghz range, there will be a set of channels your router will communicate on. These channels are a slightly different frequency from one another and they allow multiple routers to communicate in the same area without causing a lot of traffic. Just picture yourself driving on the freeway - if there was only one lane, it would cause a traffic jam; but with multiple lanes traffic flows smoothly.
You've probably noticed that you don’t have to worry about setting channels or anything when connecting to WiFi. That's because this is usually set up automatically when you connect your router. Your computer and router will work out the details between them.
Just for your reference, 2.4Ghz has around 12 channels and 5Ghz has around 30 channels. I say around because the number of channels is dictated by the country you are in.
So now we know that radio waves can fly through the air and pass through a lot of things on their way to your router and wireless device. These waves are also high in frequency, which allows them to carry a lot more data than most other radio frequencies. This high speed and high capacity is what allows you to watch Netflix on your smartphone and laptop while being several rooms away from your router.
But the real magic of WiFi has to do with the processing that happens on the end of your WiFi chip. Each device's WiFi chip converts 0’s and 1’s into radio waves to be sent out unto their destination, while at the same time converting a steady stream of 0’s and 1’s into data that your device can interpret as email, web pages, or anything else that you do on the web.
Let’s take a look at a standard wireless router that has a transfer speed of 54mbps (that’s megabits per second). As I’ve mentioned before, a bit consists of a 1 or a 0. At any given point while you’re using a wireless device, your wireless chip is transferring and receiving 54 million 1’s or 0’s in a single second. That would be about 13,000 pieces of paper, if printed out.
Needless to say it’s pretty impressive.
These 1’s and 0’s are the same signals that your wireless device would send if it were directly connected to your network with a wire. At this point your router considers your device to be exactly like any other device on the network. All of the communication is the same, your router just has to decide whether or not to send the signal over a wire or wirelessly using its radio.
So to sum it all up, when you use your laptop, all of your internet traffic is converted into 1’s and 0’s which is then sent to your device’s wireless chip. From there your wireless chip converts the 1’s and 0’s to into a radio frequency. Your router receives the signal and converts it back to 1’s and 0’s and then into the traffic from your device.
So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

An Overview of GDPR Law for Data Protection

The General Data Protection Regulation (GDPR) standardizes data protection law across all 28 EU countries and imposes strict new rules on controlling and processing personally identifiable information (PII). It also extends the protection of personal data and data protection rights by giving control back to EU residents. GDPR replaces the 1995 EU Data Protection Directive, and goes into force on May 25, 2018. It also supersedes the 1998 UK Data Protection Act.
There are many essential items in the regulation, including increased fines, breach notifications, opt-in consent and responsibility for data transfer outside the EU. As a result, the impact to businesses is huge and will permanently change the way customer data is collected, stored, and used.
GDPR applies to all organizations holding and processing EU resident’s personal data, regardless of geographic location. Many organisations outside the EU are unaware that the EU GDPR regulation applies to them as well. If an organization offers goods or services to, or monitors the behavior of EU residents, it must meet GDPR compliance requirements.


Fines for noncompliance are large. They can be as high as €20 million or 4% of a company’s total global revenue, whichever is larger. This is the maximum fine that can be imposed for the most serious violations, e.g. not having sufficient customer consent to process data or violating core Privacy by Design concepts. However, there is a tiered approach to fines, e.g. a company can be fined 2% for not having their records in order, not notifying the supervising authority and data subject about a breach, or not conducting an impact assessment. It is important to note that these rules apply to both controllers and processors.
Egnyte helps customers achieve GDPR compliance by placing industry-leading content collaboration and data governance at the core of their strategy. Our SaaS solution shows exactly where data resides across a network, identifies personal/private and sensitive data, and reports that information quickly and efficiently as required.
So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Wednesday, 9 May 2018

A Programmers Vs Programming.


To normal people, programmers may look mysterious. Kind of like an alien species who is addicted to being hunched over a computer screen. Gathered from books and most importantly, movies, society has gotten some wrongful conventions over what programming is and what a “true programmer” should look like. With the world being as stereotypical as it is, people get a general image of what a group of people should look like. Most, if not all the stereotypes, are incorrect:

1. Programming is difficult

Wrong! Nothing is difficult when you are determined to know it. And as cliché as this may sound, it is the truth. People normally think programming is difficult owing to the rumors they hear. Truth is, once you start from the basics, it gets easier. At first sight, the numerous terms, languages, and whatnots may seem strange and threaten to give you a headache. Don’t hurry through it. Work according to your pace, start from beginner level and progress slowly. Programming languages are so called because they are like languages, say French for example. You don’t begin learning French by having fluent conversations. You may first learn salutations, basic expressions, conjugation, etc. With the more time you spend learning and speaking it, you gain fluency. Same goes for programming languages. Each one has its rules of operation. If you understand them, it gets better. It’s easier to try to master one programming language or concept before moving over to the next.  With enough learning, you could begin “speaking” the language.

2. Programming is for smart people

Being smart is necessary for computer programming, as it is in every other aspect of life. But people get the concept of smartness wrong. No, you don’t need to have an IQ of 140+ to write a program. The previous point already established that programming is NOT difficult. Keep it in mind that one does not need to be a genius like Einstein to succeed as a programmer.

3. All programmers are nerds

Hollywood has led people to believe that programmers necessarily have to wear big thick-framed glasses, lack a fashion sense and spend all their time learning/writing code. Well, the last point is true, in most cases. Still, a lot of stereotypes should be abandoned. No, not all programmers wear glasses. Yes, some programmers know their fabrics and can pull off a red-carpet-worthy look when a need arises. Just because your program doesn’t mean you shouldn’t look attractive from time to time.Admittedly, there are perks of being an introverted programmer. But not everyone fits this profile. Not all programmers spend their day locked up in a room with nothing but their laptops and a cup of coffee as companions. Not all of them are shy, quiet creatures. They can be talkative. They can be outgoing. They can be extroverts who party like no other. The level of social interaction varies depending on the person.

4. All programmers are male

Gender inequality aside, this is false. Female programmers are like the white-horned rhino of the animal kingdom. Yes, they are rare. But they are alive. In the male-dominated field of computer programming, women are “endangered species”. They may be, but they’re not dying out. In fact, their population increases by the day. Look around! Female programmers will do their job well, and look sexy while doing it. You’ll be surprised to know that the first ever programmer to write a code was Ada Lovelace, a female. You can read more about her in our list of Five Women Who Changed Modern Technology and Science.

5. All programmers are single

Just no. Come on, they are humans too. Strange humans, but still humans. As such, they have feelings. And although they generally find it harder to display these feelings to someone and translate it into a relationship, they do try. And those that succeed enjoy beautiful relationships.
Male programmers tend to look for female programmers to share their lives. Admit it, it sounds cute to have that perfect person to spend time and write code together with (#RelationshipGoals).  But there will always be exceptions. There are no rules in the complex dating world. In some cases, opposites will attract.Programmers value their time, which is spent on coding tasks. If they can sacrifice coding to spend time with you, it means you are important. There’s no time to play around with your feelings. They can be romantic too, especially when it comes to digital communications. When the relationship gets too stressful to handle, they could write a program or bot to handle the texting, calling and sending daily romantic emails to them. Their partner will never even know the difference.

6. Programming is all about coding

Haha! Two minutes of silence for anyone out there who believes this. You think writing a thousand lines of code makes your job complete? Wrong! There’s always more to be done. Always room for improvement. And writing code is the easy part. Debugging is trickier. Your compiler will give you an error and warning messages. You’ll try to fix that and get more errors and warnings. You will probably cry a few times and maybe give up on programming. Don’t.
Just when you have successfully compiled your program, free of any bugs, you will think you are done. But then, you have a documentation to write!
So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Monday, 7 May 2018

What is ICANN i.e Internet Corporation Assigned Name and Numbers.

To reach another person on the Internet you have to type an address into your computer - a name or a number. That address has to be unique so computers know where to find each other. ICANN coordinates these unique identifiers across the world. Without that coordination we wouldn't have one global Internet.
ICANN was formed in 1998. It is a not-for-profit partnership of people from all over the world dedicated to keeping the Internet secure, stable and interoperable. It promotes competition and develops policy on the Internet’s unique identifiers.
ICANN doesn’t control content on the Internet. It cannot stop spam and it doesn’t deal with access to the Internet. But through its coordination role of the Internet’s naming system, it does have an important impact on the expansion and evolution of the Internet.
What is the domain name system?
The domain name system, or DNS, is a system designed to make the Internet accessible to human beings. The main way computers that make up the Internet find one another is through a series of numbers, with each number (called an “IP address”) correlating to a different device. However it is difficult for the human mind to remember long lists of numbers so the DNS uses letters rather than numbers, and then links a precise series of letters with a precise series of numbers.
The end result is that ICANN’s website can be found at “icann.org” rather than “192.0.32.7” – which is how computers on the network know it. One advantage to this system – apart from making the network much easier to use for people – is that a particular domain name does not have to be tied to one particular computer because the link between a particular domain and a particular IPaddress can be changed quickly and easily. This change will then be recognised by the entire Internet within 48 hours thanks to the constantly updating DNS infrastructure. The result is an extremely flexible system.
A domain name itself comprises two elements: before and after “the dot”. The part to the right of the dot, such as “com”, “net”, “org” and so on, is known as a “top-level domain” or TLD. One company in each case (called a registry), is in charge of all domains ending with that particular TLD and has access to a full list of domains directly under that name, as well as the IP addresses with which those names are associated. The part before the dot is the domain name that you register and which is then used to provide online systems such as websites, email and so on. These domains are sold by a large number of “registrars”, free to charge whatever they wish, although in each case they pay a set per-domain fee to the particular registry under whose name the domain is being registered.
ICANN draws up contracts with each registry*. It also runs an accreditation system for registrars. It is these contracts that provide a consistent and stable environment for the domain name system, and hence the Internet.
In summary then, the DNS provides an addressing system for the Internet so people can find particular websites. It is also the basis for email and many other online uses.
What does ICANN have to do with IPaddresses?
ICANN plays a similar administrative role with the IP addresses used by computers as it does with the domain names used by humans. In the same way that you cannot have two domain names the same (otherwise you never know where you would end up), for the same reason it is also not possible for there to be two IP addresses the same.
Again, ICANN does not run the system, but it does help co-ordinate how IP addresses are supplied to avoid repetition or clashes. ICANNis also the central repository for IP addresses, from which ranges are supplied to regional registries who in turn distribute them to network providers.
What about root servers?
Root servers are a different case again. There are 13 root servers – or, more accurately, there are 13 IP addresses on the Internet where root servers can be found (the servers that have one of the 13 IP addresses can be in dozens of different physical locations). These servers all store a copy of the same file which acts as the main index to the Internet’s address books. It lists an address for each top-level domain (.com, .de, etc) where that registry’s own address book can be found.
In reality, the root servers are consulted fairly infrequently (considering the size of the Internet) because once computers on the network know the address of a particular top-level domain they retain it, checking back only occasionally to make sure the address hasn’t changed. Nonetheless, the root servers remain vital for the Internet’s smooth functioning.
The operators of the root servers remain largely autonomous, but at the same time work with one another and with ICANN to make sure the system stays up-to-date with the Internet’s advances and changes.
What is ICANN’s role?
As mentioned earlier, ICANN’s role is to oversee the huge and complex interconnected network of unique identifiers that allow computers on the Internet to find one another.
This is commonly termed “universal resolvability” and means that wherever you are on the network – and hence the world – that you receive the same predictable results when you access the network. Without this, you could end up with an Internet that worked entirely differently depending on your location on the globe.
How is ICANN structured?
ICANN is made up of a number of different groups, each of which represent a different interest on the Internet and all of which contribute to any final decisions that ICANN’s makes.
There are three “supporting organisations” that represent:
  • The organisations that deal with IPaddresses
  • The organisations that deal with domain names
  • The managers of country code top-level domains (a special exception as explained at the bottom).
Then there are four “advisory committees” that provide ICANN with advice and recommendations. These represent:
  • Governments and international treaty organisations
  • Root server operators
  • Those concerned with the Internet’s security
  • The “at large” community, meaning average Internet users.
And finally, there is a Technical Liaison Group, which works with the organisations that devise the basic protocols for Internet technologies.
ICANN’s final decisions are made by a Board of Directors. The Board is made up of 21 members: 15 of which have voting rights and six are non-voting liaisons. The majority of the voting members (eight of them) are chosen by an independent Nominating Committee and the remainder are nominated members from supporting organisations.
ICANN then has a President and CEO who is also a Board member and who directs the work of ICANN staff, who are based across the globe and help co-ordinate, manage and finally implement all the different discussions and decisions made by the supporting organisations and advisory committees. An ICANN Ombudsman acts as an independent reviewer of the work of the ICANN staff and Board.
How does ICANN make decisions?
When it comes to making technical changes to the Internet, here is a simplified rundown of the process:
Any issue of concern or suggested changes to the existing network is typically raised within one of the supporting organisations (often following a report by one of the advisory committees), where it is discussed and a report produced which is then put out for public review. If the suggested changes impact on any other group within ICANN’s system, that group also reviews the suggested changes and makes its views known. The result is then put out for public review a second time.
At the end of that process, the ICANN Board is provided with a report outlining all the previous discussions and with a list of recommendations. The Board then discusses the matter and either approves the changes, approves some and rejects others, rejects all of them, or sends the issue back down to one of the supporting organisations to review, often with an explanation as to what the problems are that need to be resolved before it can be approved.
The process is then rerun until all the different parts of ICANN can agree a compromise or the Board of Directors make a decision on a report it is presented with.
How is ICANN held accountable?
ICANN has external as well as internal accountabilities.
Externally, ICANN is an organisation incorporated under the law of the State of California in the United States. That means ICANN must abide by the laws of the United States and can be called to account by the judicial system i.e. ICANN can be taken to court.
ICANN is also a non-profit public benefit corporation and its directors are legally responsible for upholding their duties under corporation law.
Internally, ICANN is accountable to the community through:
  • Its bylaws
  • The representative composition of the ICANN Board from across the globe
  • An independent Nominating Committee that selects a majority of the voting Board members
  • Senior staff who must be elected annually by the Board
  • Three different dispute resolution procedures (Board reconsideration committee; Independent Review Panel; Ombudsman)
So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/