Posts

Showing posts from May, 2018

An Overview about End-to-End Encryption

Image
In todays fast growing world, security of his/her datat is the first priority of every user. So today we are going to give a brief introduction on End-to-End Encryption. End-to-End Encryption is a way of encrypting and decrypting data using the concept of cryptography.       So as the name says End-to-End Encryption refers to encrypting and decrypting of data on both the ends. Suppose a data is going to travel on the internet from a mobile phone, so first it will gen:erate two key , first is Pubic key and second is Private key.     The private key always remains in the phone, but the public key remains at the server.When a data is requested from the server the public key gets activated for that particular mobile phone from which it is generated.  The Public key encrypts the data that come from the server in that way that only private key of that particular phone can only decrypts it. Getting little bit confused ...!! Lets take an example to clari...

An Overview About Google Duplex

Image
Some days before at Google I/O 2018 we have seen a new way of assisting life, which is going to book an appointment instead of you yourself do it, Yes that's True, Google is developing an efficient Artificial Intelligence for communicating with the shop owner or any other person who is going to take an appointment in a way normal person use to take. What is Google Duplex ? It's a new tool from Google that aims to use Artificial intelligence (AI) to "accomplish real-world tasks over the phone" according to Google's AI researchers and developers. For now, that means very specific tasks like making appointments, but the tech is being developed with an eye on expansion into other areas. Spending billions to create a cool way to make dinner reservations sounds like something Google would do but isn't a great use of time or money.Duplex is also more than we saw in a demo and if it ever leaves the lab will be a lot more than we see or hear on our end. The...

Had you ever thinked, How does an IP Address is assigned to a device..?

Image
Every device connected to the internet is assigned an IP address when you connect. When you connect with your phone or computer or chosen device, your ISP assigns you an IP Address so you can browse, shop, and navigate the internet. Who created Internet Protocol (IP) addresses? Vint Cerf the “father of the internet” was one of the creators of IP addresses. He created it while working for the US Department of Defense's Advanced Research Projects Agency (DARPA). Code.org and Mr. Cerf explain the  creation of IP address . There are a few organizations involved in IP addresses. ICAAN  - The Internet Corporation for Names & Numbers - They’re the top level and they govern over IP - the internet protocol, and run the policies behind it. From there it flows down to IANA - Internet Assigned Numbers Authority.  IANA  is a department of ICAAN that co-ordinates and maintains the number systems that keep the internet running like IP addresses & DNS. Nex...

How does a WiFi Work..?

Image
Do you ever have that moment where you step back and think about how something you use every day actually works? More specifically have you ever wondered how the heck computers actually communicate wirelessly? Well, that's exactly the question we're going to be tackling in today's podcast. > What Is WiFi? First, let's cover some of the basics. WiFi stands for Wireless Fidelity and is the same thing as saying WLAN which stands for "Wireless Local Area Network." WiFi works off of the same principal as other wireless devices - it uses radio frequencies to send signals between devices. The radio frequencies are completely different say from walky talkies, car radios, cell phones, and weather radios. For example your car stereo receives frequencies in Kilohertz and Megahertz range (AM and FM stations), and WiFi transmits and receives data in the Gigahertz range. To break it down even further, Hertz (Hz) is simply a unit of frequency. Let's sa...

An Overview of GDPR Law for Data Protection

Image
The General Data Protection Regulation (GDPR) standardizes data protection law across all 28 EU countries and imposes strict new rules on controlling and processing personally identifiable information (PII). It also extends the protection of personal data and data protection rights by giving control back to EU residents. GDPR replaces the 1995 EU Data Protection Directive, and goes into force on May 25, 2018. It also supersedes the 1998 UK Data Protection Act. There are many essential items in the regulation, including increased fines, breach notifications, opt-in consent and responsibility for data transfer outside the EU. As a result, the impact to businesses is huge and will permanently change the way customer data is collected, stored, and used. GDPR applies to all organizations holding and processing EU resident’s personal data, regardless of geographic location. Many organisations outside the EU are unaware that the EU GDPR regulation applies to them as well. If an orga...

A Programmers Vs Programming.

Image
To normal people, programmers may look mysterious. Kind of like an alien species who is addicted to being hunched over a computer screen. Gathered from books and most importantly, movies, society has gotten some wrongful conventions over what programming is and what a “true programmer” should look like. With the world being as stereotypical as it is, people get a general image of what a group of people should look like. Most, if not all the stereotypes, are incorrect: 1. Programming is difficult Wrong! Nothing is difficult when you are determined to know it. And as cliché as this may sound, it is the truth. People normally think programming is difficult owing to the rumors they hear. Truth is, once you start from the basics, it gets easier. At first sight, the numerous terms, languages, and whatnots may seem strange and threaten to give you a headache. Don’t hurry through it. Work according to your pace, start from beginner level and progress slowly. Programming languages are...

What is ICANN i.e Internet Corporation Assigned Name and Numbers.

Image
To reach another person on the Internet you have to type an address into your computer - a name or a number. That address has to be unique so computers know where to find each other.  ICANN  coordinates these unique identifiers across the world. Without that coordination we wouldn't have one global Internet. ICANN  was formed in 1998. It is a not-for-profit partnership of people from all over the world dedicated to keeping the Internet secure, stable and interoperable. It promotes competition and develops policy on the Internet’s unique identifiers. ICANN  doesn’t control content on the Internet. It cannot stop spam and it doesn’t deal with access to the Internet. But through its coordination role of the Internet’s naming system, it does have an important impact on the expansion and evolution of the Internet. What is the domain name system? The domain name system, or  DNS , is a system designed to make the Internet accessible to human beings. The mai...