Posts

Concept behind 3D Holographic Projection

Image
Three-dimensional holographic projection technology  is based on an illusionary technique called Peppers Ghost. It was first used in Victorian theatres across London in the 1860s.  3D holographic projection technology clearly has a big future ahead. Holographic projection is the new wave of technology that will change how we see things in the modern era. Three-dimensional holographic projection technology will have tremendous effects on all fields of life including business, education, science, art, and healthcare. To understand how a  3D holographic projector works we need to know what a hologram is. Holography is the method we use to record patterns of light. A  3D holoprojector  uses holographic technology to project large-scale, high-resolution images onto a variety of different surfaces, at different focal distances, from a relatively small-scale projection device.   The  working of holography  is divided into two phases:...

Everything you must know about RFID Technology.

Image
RFID is abbreviation of Radio Frequency Identification. RFID signifies to tiny electronic gadgets that comprise of a small chip and an antenna. This small chip is competent of accumulating approx 2000 bytes of data or information. RFID devices is used as a substitute of bar code or a magnetic strip which is noticed at the back of an ATM card or credit card, it gives a unique identification code to each item. And similar to the magnetic strip or bar code, RFID devices too have to be scanned to get the details (identifying information). A fundamental advantage of RFID gadgets above the other stated devices is that the RFID device is not required to be placed exactly near to the scanner or RFID code reader. As all of us are well aware of the difficulty which store billers face while scanning the bar codes and but obviously the credit cards & ATM cards need to be swiped all though a special card reader. In comparison to it, RFID device can function from few feet away (approx 20 fee...

Facebook confirms that it spies messenger data.

Image
Facebook revealed this week that it’s scanning users’ Messenger conversations – including text chats, pictures, and links – in an effort to ensure that people play by its rules. CEO Mark Zuckerberg first spilled the beans in  an interview with Vox’s Ezra Klein , in which he brought up an incident surrounding ethnic cleansing in Myanmar, and explained that the company’s systems “detect what’s going on” when people try to send sensational messages via Messenger, and Facebook “stops those message from going through.” The company  told Bloomberg  that it analyzes Messenger conversations the same way it does with public content on the social network, with a view to prevent abuse. Messages that are flagged for violating Facebook’s community standards are read by moderators, who can then block or take them down if needed. A spokeswoman said: For example, on Messenger, when you send a photo, our automated systems scan it using photo matching technology to detect kn...

How to make your personal USB Mobile Charger.

Image
Now the charging of your mobiles has been made easy with the help of USB outlets present in the Laptop and PC. For the charging of your mobile phone, this circuit provides you a regulated voltage of 4.7 volts. 5  volts of DC voltage and 100mA of current is being provided by the USB outlet which is well enough for the mobile phone charging slowly. We can use this circuit to charge the mobile while we are in journey also. So, we may treat it as  Mobile Phone Travel  The USB port of the mobile is used for the charging, as the USB port is the very helpful voltage source that can charge the mobile. Nowadays, there are two to four USB ports on the laptops that are available in the market. USB actually refers to Universal Serial Bus. It is one of the newest incarnations of method which is used to get information in as well as out from your computer. We are concerned at the fact that ±5 volts of power is being provided by the USB port to the external devices and can avail at t...

How to clone a SIM card.

Image
Before I start this guide, I would like to make one thing clear SIM CLONING is illegal. This tutorial should be used for educational purposes only. First off a little introduction about SIM CARD: Our SIM cards contain two secret codes or keys called (imsi value and ki value) which enables the operator to know the mobile number and authenticate the customer, these codes are related to our mobile numbers which the operators store in their vast database, it is based on these secret keys that enables the billing to be made to that customer. SIM cloning extracting these two secret codes from the SIM and programme it into a new blank smart card (often known as wafer) since the operator authentication on SIM is based on these values, it enables us to fool the operators in thinking that it’s the original SIM, this authentication is a flaw with the GSM technology Now which SIM cards can be cloned? SIM cards are manufactured based on three algorithms COMP128v1, COMP128v2 and COMP12...

What is Port Forwarding.? How does it works.?

Image
Since an IP address can easily be traced by anyone, most people prefer using services, like VPN or proxies to hide or change their IP address. These services employ the Port forwarding feature to change the IP address of any device. Port forwarding, also referred to as Port tunneling, is a behind-the-scenes process of intercepting data traffic heading for a computer’s IP combination and redirecting it to a different IP. Usually, a VPN or proxy program is used to cause the redirection, but it can also be done via hardware components such as a router, proxy server, or firewall. This allows you to send requests to servers across the internet without other people knowing the original location or IP address of these requests, guaranteeing your privacy on the internet. How does port forwarding work? To send any request over the internet, packets of data are created and sent over the internet. These packets contain the details of your request, which also includes the dest...

Machine Learning VS Artificial Intelligence

Image
Now a days Artificial Intelligence and Machine Learning has become comman in day to day life. People usually get confused between Artificial Intelligence and Machine Learning  now today i am going to tell your briefly about Artificial Intelligence and Machine Learning. AI and machine learning are often used interchangeably, especially in the realm of big data. But these aren’t the same thing, and it is important to understand how these can be applied differently.   Artificial intelligence is a broader concept than machine learning, which addresses the use of computers to mimic the cognitive functions of humans. When machines carry out tasks based on algorithms in an “intelligent” manner,  that  is AI. Machine learning is a subset of AI and focuses on the ability of machines to receive a set of data and learn for themselves, changing algorithms as they learn more about the information they are processing.  Training computers to think like hum...