Recent posts

It is a computer board with the size of a credit card, measuring approximately 9cm x5.5cm. Raspberry Pi operates on Fedora, Raspbian, and Debian. By default, it supports Python programming language. We can use Raspberry Pi for designing, experiments and innovations, there are two types of models Model A and Model B. The difference between them is a USB port, in a Model A the board does not have an ethernet port connection but a Model B contains ethernet port connection. Raspberry Pi is an open source technology like communication and web technologies. In Raspberry Pi 3 we have, 4 USB ports, GPIO pins, Micro USB power, SD card slot, Ethernet port, DSI display connector, Audio and video port, HDMI port. We can connect to CPU for power supply, keyboard, and mouse. The board designed with 256MB of RAM in it. GPU(Graphics Processing units) used for speeding up the calculations. There 40 GPIO pins which consist of VCC and GRND. XBee used for a wireless communication system in Raspberry Pi. Raspberry Pi can only handle digital signals. Components of Raspberry Pi: ARM CPU/GPU: It is a Broadcom chip on the system that made up of ARM central processing unit and […]

Read more

Social media allows people to connect each other by sharing a piece of information like file sharing, video, audio, and ideas. Therefore, social media like Facebook, Twitter, YouTube and others play a major role in our daily life. Basically, social media connect people at low cost. Most of the social media networking provides the facility of sending text messages, chatting, e-mails, file sharing, video-chat. Using social media is posing a high privacy risk. Strange people try to get into our account so that account may hack using different hacking sites. Nowadays, hackers are attacking user’s personal information and directing them to visit harmful sites because of that user’s mobile or computer infected with the virus.Hacking user’s passwords and transferring money to their account. For protecting our personal information from being hacked, we must install antivirus on our mobile phones and computer. Developing systems which help users to maintain their accounts secure, while signing up for account user’s age verification must be acceptable if their age is below it does not allow to sign up so, it can minimize the fraud. By using Two-factor authentication service, all information we provided will be secure by not sharing with others. It is experiencing […]

Read more

Cyber-crime, as its name suggests is a crime that implicates computers and internet (networks). Cyber-crime is defined as a crime which is done to harm an individual or a group of individuals with the help of modern technology and software. In this present era, there are numerous reports of cyber-crime on a large scale. These are the offenses against people with an objective to intentionally harm them with the help of computerized modern technology. The concept of cyber-crime has become an area to be looked upon; the offenders can harm the victim physically or mentally, directly or indirectly. The offenders threaten the victim’s security and financial health. Cyber-crime has emerged drastically with the fast growth of upgraded and new technologies. The people who master technology and have evil and wrong intentions leads to become cyber-criminals and become a threat to the nation and its people. Some of the common cyber-crimes include hacking, cyber bullying, illegal pornography, extortion, illegal copyright, infringement, online blackmailing to name a few. Cyber-crime also exceeds to harm women physically and psychologically by blackmailing them or by pornography, using various means of modern telecommunication networks, internet, and mobile phones. Cyber-crime is a curse to every economy. It […]

Read more

Snapchat is a social media application which accords its users to click photos, add texts, add drawings, record videos and send them to a preferred list of audiences. Snapchat was bought into being in the year 2011, by its founder, Evan Spiegel, Reggie Brown and Bobby Murphy, who were students at Stanford University. Snapchat offers a stage for its users to conserve an ideal self-identity. The contents that users share on snapchat is deleted from company’s server after a limited period. Snapchat is considered as the world’s hottest application, and it fabricated a new social pipeline. Snapchat was the first social media application that moved towards the opposite direction, that is, in the world where all the media content is saved and preserved, snapchat took a different road, it made moments temporary. The success of snapchat is all supervised by its antithetic approach. The way in which snapchat functions, is very close to the way we communicate face to face, compared to any other social network. Snapchat imitates the behavior of the daily life of the users, that is, when we talk face to face, the moment’s vanishes, likewise, snapchat memories are also temporary. History of snapchat The snap chat […]

Read more

Common Object Request Broker Architecture (CORBA) is a design and detail for making, dispersing, and overseeing disseminated program questions in a system. It permits programs in changing areas and created by various sellers to impart in a setup through an “interface representative.” CORBA is by a consortium of merchants through the Object Management Group (OMG), which presently incorporates more than 500 part organizations. Both International Organization for Standardization (ISO) and X/Open have authorized CORBA as the standard engineering for circulated objects (which are otherwise called parts). CORBA 3 is the most recent level. What is the Technology behind it? The basic idea in CORBA is the Object Request Broker (ORB). Sphere bolster in a system of customers and servers on various PCs implies that a customer program (which may itself be a protest) can ask for administrations from a server program or question without understanding where the server is in a circulated arrange or what the interface to the server program resembles. The programs utilize the General Inter-ORB Protocol (GIOP) and, for the Internet, its Internet Inter-ORB Protocol (IIOP). IIOP maps GIOP asks for and answers to the Internet’s Transmission Control Protocol (TCP) layer in every PC. A prominent hold-out […]

Read more

Introduction Palm vein innovation is one of the up and coming modernizations. • It is the world’s first contactless individual differentiates the original framework which utilizes the design of veins in human palms to confirm a man’s personality. • It is very secure and exact. • The contact lens component gives it a sterile favorable position over other biometric validation advancements. • It utilizes the vascular examples of a person’s palm as individual ID data. What is Vein Technology? From security frameworks for the natural family home to insurance of individual data, hostile to burglary gadgets for autos and different vehicles, and overall against fear-based oppressor frameworks, moderately sheltered, generally safe security frameworks are looked for in a vast assortment of fields. Biometrics (recognizable proof), which can distinguish a person to a high level of exactness which used the uniqueness of the human body and it is popular nowadays as the most dependable methods for individual ID. Inside this field, “vein validation”, which utilizes picture acknowledgment and optical innovation to examine the regularly imperceptible vein of the palm, hand backside, fingers, and so on has the properties of being profoundly exact and exceedingly impervious to forging pantomime and other exploitative […]

Read more

Building a PC on a low budget can be tough. You cannot lose the quality and the effectiveness of your PC. You just need to pick the best out of the lot and also compromise on some parts. But what if you could assemble the bests that suit your budget! There are some variables to build a PC on a low budget. Let’s take a look at how to build a cheap and effective PC. Processor: First, you need to pick a fast and cheap processor. Intel Core i3-7100 is a very good option to start with. There is also a substitution for that. Intel Pentium G4560 is another processor which will definitely fit your low range budget and both of them work just fine for the price. The newest entry of AMD Ryzen 3 1300X is loved across the globe. People who don’t want to spend much but are expecting a good performance from their processor, Ryzen can be their first choice. Graphics Card: If you want to build a PC where you can experience some good games, then Graphics Card must be the thing of concern. A good Graphics Card costs a lot. But there are some cards […]

Read more

Nintendo LABO is a series of kits to combine the awesomeness of Nintendo Switch and the fun of DIY creations. One can make, play and explore with this new gadget which is going to launch on April 20. The most exceptional feature is Toy-Con Garage that can be accessed in Discover mode. Along with it, the Toy-Con projects in the kit also brings you loads of fun. To be brief, the all-new Nintendo LABO is gonna offer a unique opportunity for interactive gaming in retro style. It allows you to create things like motorcycle handles, fishing rod or even a piano out of the cardboard. What is Nintendo Labo? It simply is a dream comes true that makes the owner a real-life crafter and helps to turn the Switch into different kind of objects. It offers cardboard kits which are called the Toy-Con and then your imagination is the only limit. Nintendo also encourages you to free your imagination and you can draw anything on the cardboard using color pencil to bring the kits into life. This gaming style is even better than the Augmented Reality and Virtual Reality. There are lots of possibilities and the creation surely does inspire […]

Read more

In this age of technology, we have come so far that everyone needs to learn new technologies; even toddlers/kids like to learn from technical gadgets. So, this results in the development of high tech gadgets as kids toys. Kids love to play with laptops, Smartphone, and many other gadgets. Please think, is it safe to give your laptop to your kid for the learning experience? What he/she will do with it? You don’t even when they are going to spell disaster on it. This can cost you a lot. So how can you offer them the advanced and modern learning experience? Well here comes the need of toy laptops which are the very low cost in comparison to your expensive laptop. They are very good and created such that they have enough for kids. Your kid can learn and get the education through it in a funny way. There are many kids laptops available in the market, but which are best ones. So here we present the list of best laptops for kids/toddlers- My Own Laptop- It is a great laptop which is very friendly to your kid. This laptop will allow your kid to learn while exploring alphabets, music […]

Read more

A Smartphone is a kind of device which if you use with your sense and brain then it can be the best thing from which you can learn anything. The best thing about the Smartphone is you always keep it with you wherever you go which means you can learn anytime, and anywhere. There are millions of sources of learning anything; sources include many applications and websites. In this article, we will mainly discuss on applications as our title suggests. All applications have their own specific goal of helping their user. There may be a possibility that some applications are better than other with a common fact is that they all have the same target of helping users and provide the users with the best knowledge they can have. If you want to be a smart learner then you must go through the best applications. Here is the list some best and advanced learning applications: Photo Math We see that Mathematics is the weak point of many students, so this app can be the solution for those students as its name suggests “Photo Math”. This app is based on OCR technology. It can read the equation that you want to […]

Read more