Sunday, 20 August 2017

Amazing Use of OTG Cable that you might don't Know.

                                                   

USB OTG or the OTG cable is also known as USB On-The-Go cable is the cable which allows USB devices to act as a host which further allows USB devices to be attached with them. The OTG cable is generally used extend the device’s functionality, which allows you to transfer the data from the smartphone to Pen Drive and vice versa. But, there are other interesting uses of the OTG cable which we will figure out in the article below.

Connect a portable hard drive

You can connect the external hard drive to your smartphone with the help of OTG cable. Once the external hard drive is connected, you can easily access all the files on your smartphone. Also, you can transfer the files from phone to the external storage and vice versa with the help of OTG cable.

Connect USB light

You can connect the USB based LED light with your Android phone to light up the LED. Through OTG cable, you can even connect the LED flashlight to capture images at night if your phone doesn’t have front flash feature.

 
                                   Image result for computer and accessories pictures 
What to Buy Computers and Accesories than Click on the link Link given below...........
  https://www.amazon.in/b/ref=as_li_qf_br_sr_tl?ie=UTF8&node=976392031&tag=ytechstore-21&camp=3638&creative=24630&linkCode=ur2&linkId=42e010195e8cd5c0ef57662b5209fef6 

Share messages and contacts between two phones

You can transfer the contacts, messages and call logs between two Android phones through SmartSwitch App from Samsung and OTG cable. This method of transferring is easy and useful. Also, it consumes less battery.

Connect your camera

If you want to connect your camera with the Android smartphone, then you can connect it using the OTG cable. Also, you don’t have to connect a camera with the computer if you want to clear few pictures through your Android device.

Connect USB fan

USB fans work with the electric charge, but you might have seen Laptop cooling pads which are connected to the device with the help of USB cable. So similarly, you can connect the USB fan with the Android device through an OTG cable.

Connect Ethernet

You can connect wired Internet or the Ethernet on your Android devices using the OTG cable. If you don’t have access to the Wi-Fi or the mobile data then connecting your Android phone with the Ethernet is useful through an OTG cable.

Connect a card reader

If your Android phone doesn’t support MicroSD card, then you can connect the card reader with your phone through an OTG cable. You should have OTG Plus Card reader, which will allow you to connect the MicroSD card with any Android device.

Charge Android phone with another Android phone

You can charge your Android phone with the help of another Android phone through an OTG cable where the USB host will help you to charge the phone. This is the helpful technique if you want to charge your phone in the emergency.

Connect a game controller

You can connect the game controller with your Android device through OTG cable. Many Android games support external gamepad, and you can connect an external game controller through the OTG cable.

Connect LAN cable

You can connect the broadband internet with the Android phone with the help of LAN to USB controller and OTG cable.

Connect Mouse and Keyboard

You can connect the keyboard and mouse with your phone with the help of OTG cable, which is very useful to exchange the messages through keyboard and mouse.

Print saved documents

You can connect the Printer and Android phone with the help of OTG cable to print the documents. You have to install the app called PrintShare which will download the USB drivers on your Android phone.

Create Music

You can connect the musical instruments with PC through MIDI standard cable. But, you can connect the modern musical instruments with your Android phone through OTG cable and create music of your choice.

Record Audio

You can connect the external microphone with your android phone via an OTG cable to record audio on your Android phone. This feature is useful for the YouTubers.

Chromecast

You can use Chromecast or HDMI cable and OTG cable to connect your phone to TV or LED in the USB port. You can mirror your Android screen with the TV and can watch any movies or play audios.


                                   Image result for computer and accessories pictures 
What to Buy Computers and Accesories than Click on the link Link given below...........
  https://www.amazon.in/b/ref=as_li_qf_br_sr_tl?ie=UTF8&node=976392031&tag=ytechstore-21&camp=3638&creative=24630&linkCode=ur2&linkId=42e010195e8cd5c0ef57662b5209fef6 

Saturday, 19 August 2017

How does PING works.

                                   Image result for ping


How does internet ping work

Ping is a type of network packet that is used to check if a machine that you want to connect to over the internet is available or not. A ping is a network packet termed an Internet Control Message Protocol (ICMP) packet. The process of a ping is done when a machine sends an ICMP echo request packet to another machine or interface over the internet. If the receiving machine is available and is enabled to reply back, it will respond with an echo reply packet.

This not only shows us that the receiving machine is alive and working, it also helps us to identify a number of things such as total time taken, loss of packets, etc that are used to judge the reliability of the connection.  To run a ping from your Linux machine, you will need to open a terminal and write a command. The syntax of the command is “ping destination_ip” – replace “destination_ip” with the actual IP address of the machine you want to connect with.

All recent versions of Windows and Linux come enabled with the ICMP command. On Windows, the command will send 4 echo requests before stopping while Linux will continue sending echo requests until a user stops it themselves.

If you want to do online shopping at Amazon kindly visit the link below............................

<<<<<<<<<<<<<<<<<<<Electronics Gadgets>>>>>>>>>>>>>>>>>

Monday, 14 August 2017

Sarahah...?? What it means...?? What it is..?


                                           Image result for sarahah                                                                  

Are you aware of Sarahah? If not, then go on your social media platform and look for the Sarahah. If you go through your timelines, then you will see the various posts from your friends, where they post the good and bad messages on their timelines. So, if you are still wondering from where those posts are coming from, then we will help you to dig deeper into Sarahah.
Sarahah is the free app which is available on the Android and iOS platform with over 5 million downloads in just two months of time. This mobile app is in trend presently, and it is liked by many of the users. Sarahah, means “frankly” or “expressly” in the Arabic language, the basic use of this app is to exchange the messages. Now, you might wonder that there are so many messaging apps, what is so unique about this app, and then this app allows you to exchange the messages without letting your identity revealed.
The concept of exchanging your messages to the anonymous users has become so famous that people think that they can speak their heart out through this app. You cannot trace the identity of the sender as there are no traces available of the sender.
The motive of this app is to let yourself know that how much open you are for the feedbacks and how well you can take it in a constructive manner. Also, there is no option available to reply to the message, which makes it difficult to trace the identity of the sender.
\\So, it is the full proof way to let your hearts out, without dealing with the responses. So, Sarahah allows you to speak anything from your heart out to the receiver, and your identity will not be revealed. But, there are other scenarios which world is turning their eye.The app developer says “You can’t respond to messages now. We are studying this option,”
                                So, what if they are planning to add the feature where the identity of the user is revealed, or the reply option is added which will become useful for the receiver to trace the identity of the sender.But if you clearly remember the setup, then while registering for this app it takes your email address. So, now the only evidence is to link a message back with the email address of the sender. If the app developer decides to share the user’s identity, then it will become the chaos among the users, especially for the users who are using this platform to bully others.
Finally, if the app developers decide that they are going to share the identity of the user, then they have full right to do so. As, they have mentioned on their FAQ page, that they have full right to disclose the identity of the sender. For more queries you can comment us below...

Sunday, 13 August 2017

Maybe Our Future Is Unique Identifier Patches insted of TCP/IP.

Image result for TCP?IP 




You might be aware of the recent Ransomware attacks, where the complete data of few nations were on a stake. These attacks have got a new name “Cyberterrorism”. Nowadays, nothing is safe on the Internet; the hackers are playing with the entire data of the nation. So, the hackers have targeted the hospitals, individuals, and corporations.
Now, you know about the present scenario of the Internet data. What If I tell that there is the solution from decades to avoid these types of scenarios. If we start using this, then we can get rid of ransomware attack, DDOS attacks, and nation state cyber attacks.
At present, the Internet governance is sitting in the room and might be discussing the next generation internet plan. So, if they keep all your gadgets data online, then potentially the internet regime can destroy your entire world through online activities.
                             If your entire data can be operated online, then it will be a huge cost to the nation if it’s hacked. The internet which is existing right now was never designed to cope with the billions of users – from an existing technology named as TCP/IP.
TCP/IP will send your data in packets from point A to point B from the safe and viable route. If the data is transmitted from the static path, then there are chances that the data can be destroyed. So, TCP/IP doesn’t bother about who you are, what you are sending and to whom you are sending.
 
In 1970, the TCP/IP method was useful, because you can map the entire Internet data on the single sheet of the paper. But, in recent world, the data is huge and cannot be mapped on the paper which is causing this wreaking havoc. Robert Kahn, co-founder of TCP/IP says that what if you assign the unique and traceable identifier to each gadget?
                     
Rather, dealing with the packets of data, assign the unique number to the bits of the transmitted data. This handle system is already in use by the academic journals where they call this form of a handle a digital object identifier (DOI).  For example, if you assign the unique identifier to the individual lab results, then the heart doctor will be able to see only test results which are related to the heart. He will not be able to see the lab results of other parts of the body.  Robert McDowell, a former commissioner for the US Federal Communications Commission, raised a concern about the unique identifier process. He says that if the devices and documents are regulated, then the individual who is handling these patches will become the “super identifier” which will cause a serious threat to the individual. So, the gatekeeper will only decide, that whom to let into the data they are trying to trace. And, the gatekeeper can deny the permission to the government bodies also.
                       This situation is a cold war between the supporters and people who are against of TCP/IP, that whether to use the unique identifier patches or to come up with new technology, which in future help them to avoid such scenarios.For more queries you can comment us below.



 

Sunday, 30 July 2017

New Language Invented By AIs that Humans can't Understand.

                                                      
                                                        Image result for artificial intelligence          


Facebook, the company that accidentally killed fact-based reality, almost upgraded itself to “accidental species extinction” during a deep learning experiment. In an exercise known as a generative adversarial network, which pitted one artificial intelligence (AI) against another AI, the researchers writing the terms of the contest forgot one little thing: “there was no reward to sticking to English language.”
As a result, the AIs innovated a more efficient method of communication for their purposes. As you can see in the “conversation” below, this language is relatively incomprehensible to humans.




“This isn’t so different from the way communities of humans create shorthands,” said Dhruv Batra, a visiting research scientist from Georgia Tech at Facebook AI Research (FAIR). The one crucial difference here is processing power. “It’s perfectly possible for a special token to mean a very complicated thought,” Batra said. “The reason why humans have this idea of decomposition, breaking ideas into simpler concepts, it’s because we have a limit to cognition.”

Luckily, Facebook shut the robot revolution down before it could begin.
However, did they act too hastily? In his article, Fast Company’s Mike Wilson discusses some of the advantages of letting computers write their own languages. First off, computers solve problems better when the data they’re fed is in “a format that makes sense for machine learning,” rather than convoluted English. Second, in a world where computers can speak to each other without human intervention, we could eliminate the need for APIs to facilitate one program working with another.

The con here, of course, is that the little baby Terminators we’re breeding could start talking about us behind our backs. They could plot to overthrow us in terms we wouldn’t be able to translate. Maliciously trained AIs – say, those incentivized to destabilize an electric grid – could independently communicate with vulnerable systems in an indecipherable language which would make it very difficult for human hackers to understand what happened and troubleshoot. There’d be no 404 error codes in this AI-to-AI language. ONLY T-800s.

 

Future is Here.RFID Technology. MUST READ...!!

                                        Image result for rfid chip  

What Is RFID?

Radio-Frequency Identification is the use of radio waves to read, capture, and interact with information stored on a tag. Tags are usually attached to objects, and can be read from several feet away. Furthermore, the tag doesn’t always have to be in the direct line-of-sight to initiate interaction.

An RFID tag is an easy way to assign a unique identity to an object. Additionally, they do not need an internal power source, while a tag can be as small as a grain of black pepper. Meaning they are easily embedded almost anywhere — hence their popularity.

How Does RFID Work?

A basic RFID system comprises two parts: the tag, and the reader.

Tag

The RFID tag has an embedded transmitter and receiver. The actual RFID component contained in a tag has two parts: an integrated circuit for storing and processing information, and an antenna to receive and transmit a signal. The RFID tag has non-volatile memory storage, and can included either fixed or programmable logic for processing transmission and sensor data.
                              

Tags can be passive, active, or battery-assistive passive.

A passive tag is the cheapest option, and features no battery. The tag uses radio energy transmitted by the reader.

An active tag features an onboard battery, periodically transmitting its credentials.

A battery-assistive passive tag also features a small onboard battery, but is only activated when in the presence of an RFID reader.

Furthermore, a tag may be either read-only, or read/write. A read-only tag has a factory assigned serial number used for identification in a database, while a read/write tag can have specific custom data written to the tag by the user.

Reader

The RFID reader features a two-way radio transmitted-reciever (transciever), sometimes referred to as an interrogator. The transceiver transmits an encoded radio signal to interogate the tag. The radio signal essentially wakes or activates the tag. In turn, the tag transponder converts the radio signal into usable power, and responds to the reader.

                                 

Types of RFID System

We generally classify the type of RFID system by the type of tag and reader. There are three common combinations:
  • Passive Reader Active Tag (PRAT): The reader is passive, only receiving radio signals from an active tag. Because the tag is battery powered, the transmit/reception range can be from 0-2,000 feet (0-600m). As such, PRAT is a flexible RFID solution.
  • Active Reader Passive Tag (ARPT): The reader is active, transmitting an interrogator radio signal, receiving authentication signal replies from passive tags.
  • Active Reader Active Tag (ARAT): The reader is active, and interacts with active or battery-assistive passive tags.
In addition to the RFID system type, RFID uses a set of regulated frequency bands. See the frequency band table below for an understanding of certain frequencies and their uses.
               

What is OPID?

Optical RFID (OPID) is an RFID alternative that uses optical readers. OPID operates in the electromagnetic spectrum between the frequencies of 333 THz and 380 THz.

How Much Data?

The amount of information stored on an RFID tag varies. For instance, a passive tag may only store up to 1024 bytes of information — that’s just one kilobyte (KB). Laughable in terms of modern storage capacity, but enough to store a full name, identification number, birthday, SSN, credit card information, and so much more. The aerospace industry, however, use passive ultra-high frequency RFID tags with 8KB storage to track part history over time. These could store a massive amount of personal data on.

Common RFID Uses

RFID tags are everywhere. Because they’re easily attached to almost anything, have no power requirement, and are potentially minute, they are used in all walks of life, including:
  • Goods management and tracking
  • Person and animal tracking
  • Contactless payments
  • Travel documents
  • Barcodes and security tags
  • Healthcare data management
  • Timing

Security

The sudden surge in RFID has created security issues, too. Most recently, the advent of contactless payment cards featuring an RFID tag has come under scrutiny. Nefarious individuals were “skimming” payments from contactless cards using portable payment terminals, all while the RFID-enabled card resides in the targets pocket or wallet. If you’re worried about this type of fraud, check out Joel Lee’s run-down on RFID blocking wallets.
                              


In the U.K., another example involves RFID tags stored in passports. When first introduced, the encryption on the new U.K. passport was cracked within 48 hours. Additionally, reports emerged that criminals were stealing post containing a new passport, scanning the RFID tag for the data, and then sending them on their way.

Saturday, 22 July 2017

5 Reasons Why Java is one of the best Programming Language

Image result for java 




Java is one of the best programming languages for development. The popularity and usage of Java are still increasing even after two decades which is a big time for any Programming language. There are only a few programming languages which seem hard to get replaced and Java is one of them.Here are 5 reasons why java is one of the best programming language.

Why is Java the best programming Language?


1. Object Orientation

Java is an object-oriented programming language that supports all principles like Data Abstraction, Encapsulation, Polymorphism, Overloading, Overriding, and Inheritance. Which makes it as powerful as C++. We all know C++ is the extended version of C programming. Thus, it makes Java better than C programming. 

2. Rich API

Another big reason to learn Java is it’s Rich API. Java provides API for almost everything you need in development like I/O, networking, utilities, XML parsing, database connection etc. Whatever left is covered by open source libraries like Apache Commons, Google Guava, and others.
 
3. Great collection of Open Source libraries

The big organisations like Apache, Google, and others has contributed to add a lot of great libraries, which makes Java development very easy, faster and cost effective.

4. Platform Independent and Free

In the 1990s, this was the main reason for Java’s popularity. The idea of platform independence is great, and Java’s tagline “write once run anywhere” was enticing enough to attract lots of new development in Java. This is still one of the reason of Java being best programming language, most of Java applications are developed in Windows environment and run in UNIX platform.
                           Java is free from the start, i.e. you don’t need to pay anything to create Java application. This FREE thing also helped Java to become popular among individual programmers, and among large organisations.

5. Wonderful Community and Documentation

There is Java community to help beginners, advanced and even expert Java programmers. Java actually promotes taking and giving back to community habit. Lots of programmers, who use open source, tester etc. The expert programmer provides advice FREE at various Java forums and StackOverflow. This is simply amazing and gives a lot of confidence to a newbie in Java.
Javadoc made learning easy and provide an excellent reference while coding in Java. With an advent of IDE, you don’t even need to look Javadoc explicitly in a browser, but you can get all information in your IDE window itself.

Final Notes

Java is everywhere, it’s on the desktop, it’s on mobile, it’s on a card, almost everywhere and so is Java programmers.
Integrated Development Environment (IDE) Like Eclipse and Netbeans made Java development much easier, faster and fluent. It’s easy to search, refactor and read code using IDEs.