Friday, 30 March 2012

PROTECTING YOUR PERSONAL DIGITAL WORLD

By: Azmeena Nazimuddin Khowaja

While accepting that security has become a major issue in IT, it is still not easy to figure out how to actually protect your information. I am presenting a gist of some security related articles that I had gone through, to give a clearer understanding of how to stay protected.

Laptop: Make it password protected. For further protection, use biometric devices so that only the owner can access it. Try to avoid printer, files and folders sharing. For sensitive data, encrypt your files and folders.


Mobile phones: Set a password to lock and unlock the phone. Try not to store sensitive business information on smartphones, unless necessary. Use unsecured wireless networks cautiously, otherwise cyber criminals can take advantage.

Wireless connection: SSID (Service Set Identifier), which is a default system ID, is easily traced by hackers. Change it, as well as your password, to a complex and strange one.

Use WPA (Wi-Fi protected Access) and WEP (Wired Equivalent Privacy) to encrypt your confidential data. This will protect from casual wireless hacking.

Change the default administrator passwords that come with hardware and software; configure router (by studying the given manual) to allow or stop access to the desired people; subscribe and update anti-virus software.

USB Drive: While it is not in your hands to keep your flash drive away from being misplaced or stolen, what you can control is the security of its data. For this, assign an authentication password to the USB, so that only the user can access it. Secondly, by using file encryption software, encrypt the confidential data and then transfer it to the USB.

Online Protection (Internet): If you have multiple accounts on various websites, assign a separate password to each of them, note them down somewhere in a notebook to remember, and make a complex alphanumeric password which is hard to be deciphered.

Never give your email address, password, or any personal original details to a website, unless it is a genuine one. Many software online track your personal information, preferences and browsing activities while you are browsing on the internet, that becomes the reason why you receive spam, advertising or adult emails from the websites you have never visited before.

While using social networking websites, such as Facebook, Twitter, etc, alter the security settings and make them strict. For e.g., never fill in your complete birth details on such websites.

Block the cookies when visiting any anonymous websites, as hackers may take advantage of these files.

Email: Nowadays, many email service providers, such as Gmail, are giving options for encryption. To confirm the email‘s security and that the information you send is encrypted, see that “https” is written at the start of the webpage address. A padlock symbol beside the address bar indicates that the security certificate of the website is active, and that the information will be sent to the right server.

An extract of articles from: www.articlesbase.com

Tuesday, 27 March 2012

How I.T Transforms Marketing and Advertising

Robotics

By: Uzma Sahar

Robotics is the branch of IT that deals with the designation, making, operations construction and application of robots and computer systems for their control, sensory feedback, and information processing

The concept and creation of machines that could operate autonomously dates back to classical times, but research into the functionality and potential uses of robots did not grow substantially until the 20th century. Today, robotics is a rapidly growing field, as we continue to research, design, and build new robots that serve various practical purposes, whether domestically, commercially, or militarily

Advantages
  • They are more accurate than humans Example no shaking when in a very important surgery, puts every screw in fabricating a car etc.
  • Can do jobs 24/7.
  • Can guard without being tired just keep doing the same thing 24/7
  • They don’t need food.
  • You can programed them to make them do exactly what you want them to do
  • They cannot harm you unless they are programmed to
  • Can work without doubts for example when you think "what do i do now”? Mean they don’t have emotions
  • They can lift very heavy things easily

Disadvantages
  • You need to get people trained to fix them if anything wrong happens
  • Need a very intelligent crew
  • They can ruin people’s lives for example Take their job away from them, unemployment
  • They are very expensive to make
  • You need the right materials to make them that could be very rare and expansive too.
  • If you make a very amazing robot with amazing quality and it brakes, it might be very hard to fix.
  • They can be very hard to program.
  • You need highly trained people to make them
  • They cannot recharge themselves.

Few applications of robotics

Robotics and Military vehicles
Every military are having personnel ranging from thousands to millions. Instead we can use robots which don't feel pain and makes army strong. These robots may be autonomous or remote controlled according to the use. Theses robots may be programmed to carry heavy payloads of bombs and gets self-blasted .

Drones vehicles
Daily we hear the news of drones attacking Pakistani Taliban’s bombing heavily and firing missiles with high accuracy, they are robots.

Robots in Mining
It is difficult for people to work in coal mines where temperature and pressure is more. But robots can be designed to withstand extreme conditions.

Robotics in Bomb disposals
Robots are very useful in disposing bombs which is a risk factor for humans. Dogs and robots can work together, the job of dog is to sniff and after the bomb is detected, the robot does its work. They are used by police and military.

Robots as Heavy lifting devices
Humans cannot carry more than 20 kgs wait for large distances. Robots can be used here for transport. They can be guided by tracks or lines. They can be controlled manually also.

Robots in Space Missions
Rovers are robots which can perform multiple tasks for space missions. Recently NASA has sent a land rover on mars which would move continuously avoiding obstacles.

Robots in Surgeries
Robots are used in surgeries where accuracy is needed. They are guided by doctors. They can pierce body very accurately so that other parts cannot be spoiled.

KBE – Knowledge Based Engineering

By: Azad M Yakoob
General Manager (Network Operations & Projects), Augere, Pakistan.

The knowledge based engineering is a new technology that develops bridge between knowledge & engineering. It helps to automate systems based on real time information obtained through its other components.

KBE merges object-oriented programming, artificial intelligence, and computer aided design. KBE systems aim to capture product and process information to allow businesses to model engineering processes, and then use the model to automate all or part of the process.

KBE provides more power and flexibility in the development of design automation systems. KBE systems are designed to allow complex rules, heuristics, artificial intelligence, and agents to be embedded in the system. While, some KBE systems provide more direct control over geometry and topology as well as more advanced geometry introspection capabilities. These systems leverage reuse of corporate design knowledge to the maximum extent possible, eliminating mundane tasks within the complex process of transforming a product concept into production-ready details.
Main Outcomes of KBE

Shared intelligence
It helps to share intelligence among peers, colleagues & stake holders.

Improved performance
It improves overall performance of system through its diversified tools.

Competitive advantage
This system brings competitive advantage due its efficiency & effectiveness.

High level of innovation
It brings innovation at every stage and for every individual. 

Why KBE

No Knowledge Loss
No Knowledge misuse
Reduced cost
Increased efficiency

To remain competitive, it's imperative for manufacturing firms to embrace knowledge-based engineering (KBE)—the use of software tools and techniques for capturing and reusing intellectual property and product know-how in ways that bring product design into closer harmony with manufacturing, support, finance, procurement, sales, marketing, and other domains.

Monday, 5 March 2012

ODBMS VS RDBMS

By Umair Rabbani

ODBMS add database functionality to object programming languages. Object DBMSs broaden the semantics of the object programming languages to offer full-featured database programming facility, while retaining native language compatibility.

RDBMS decompose all data into relational tables. The rules for this decomposition are collectively referred to as the 1st, 2nd, and 3rd normal forms. These rules provide a simple and powerful way to organize data into rows contained within tables. For some scenario this method of data organization provides quick and convenient access to information but there are cases when it becomes Complex.

Let us consider an example in which a person wants to store a car in the garage at the end of the day. In a relational system, all data needs to be normalized; i.e., it must be flattened to primitives and sorted by type. It means that the car must be disassembled, down to its primitive elements, which must each be stored in separate tables. So, the screws go in one table, and the nuts in another, and the wheels, and side panels, and pistons, etc. In the morning, when he wishes to drive to work, he must first reassemble the automobile, and then he can drive off.
This may sound exaggerated but it is not very different from many applications that are working. Whenever the application has complex (non-tabular, varying sized, interrelated) data structures, the application programmer must write code to translate from those data structures down to flat tables. This translation code has three problems.
  1. Programming Time and Cost i.e. a programmer must hire to perform all such development.
  2. Integrity Loss i.e. it may possible that one programmer will do this mapping differently from other another programmer, resulting in a mismatch in their work and integrity violations.
  3. Performance i.e. nested structures or varying-sized structures require multiple RDBMS tables, and joins between them. The join, although it's quite flexible, but it requires a search-and-compare operation, which takes time, and gets slower as the database tables get larger. 
In contrast, ODBMS have no performance overhead to store or retrieve a hierarchy of interrelated objects.  Let’s take the same example of car. In an ODBMS, this is modeled with an object for the car, another for the garage, one method or function “store”.  Due to unification of the application and database development into a seamless data model and language environment, applications require less code, use more natural data modeling, and code bases are easier to maintain. Moreover, the one-to-one mapping of object provides higher performance management of objects, and it enables better management of the complex interrelationships between objects.