Saturday, March 15, 2014

QR Code

Quick Response Code Popularly known as QR Code is a two dimensional bar encoding scheme. It can encode a greater amount of Information in it involving various encoding modes (numerics, alphabetics, Kanji, Byte or Binary). It was first designed by Japanese automotive industry. 

A bar code is a machine readable optical label that contains the specific information about the item to which it is attached or associated. A QR code is the 2D extended version of the same that stores much more data and can also be read very fast as compared. It has applications in various domains like: product tracking, time tracking, document management, information transfer in a encoded manner, item identification etc.

The components present in the QR Code scheme is its white background and Square grids on its edges with information stored in the form of patterns.These color schemes were decided originally as black and white only but now it can be customized to any color combinations like blue grids over white background. Data can be extracted from the combination of both horizontal and vertical components of the QR code

Today QR code has become popular with numerous of applications with for instance if a user wants to go to a web site he can just scan the QR Code of that company using his mobile camera (obviously using his QR Code readability application) and he will be redirected to that site with an effort required in typing it. Users can create email, text message, store information, send information using QR Code. QR code today has become a very popular method of getting limited but required amount of information in a quick way.

So here is my QR Code to my linkedin profile like, try it and you will get to practically know its usability.


Tuesday, March 11, 2014

Cyber Security

What?

Cyber security often termed as Information Technology security too, primarily means protecting computer, programs or applications, networks and protecting information breach from unauthorized access, modification in information or destruction.

Importance?


Not only Private Organizations but Government, medical hospitals, research institutes, financial institutions, military intelligence also store a great deal of sensitive information on their computers and networks. With the growing amount of threat in the form of cyber attacks, this ultra sensitive information is needed to be protected for national security.

During a Senate hearing in March 2013, the nation's top intelligence officials warned that cyber attacks and digital spying are the top threat to national security, eclipsing terrorism. Source: http://www.trcsolutions.com/NewsRoom/Articles/Documents/Understanding-Cyber-Security-Federal-Grant-Writing.pdf

Terminology


Access:  
Whenever a user is authenticated, he is provided with the access of the system where he is allowed to change, read or take information based on the rights provided to him.

Blacklist
It's a list of entries may be (IP Address, resources, etc) that are blocked from access.

Bot:
It can be a software program that can automatically perform a sequence of steps. This can be of either protective or destructive nature.

Cloud Computing
It's latest of the models present today to provide the resources to the user based in the request made, thus avoiding wastage of resources.

Cryptography
It is the art making system secure via means of keys and other encryption techniques. A system information can be made secured, confidential and authenticated before access.

Some others are: Enterprise Risk Management, Cyber Space, Data Breach, Digital Forensics, Intrusion Detection, Key, Malware, Passive Attack, Penetration Testing, Phishing, Root, Software Assurance, Virus and Whitelist etc.



Tuesday, March 4, 2014

Open Source Software

Open Source Software is available with their source code available for free. Anyone with the knowledge of development can make changes in its source code and may produce modified version. These open source software in today's era have started taking over most of the present software (Closed source software) , which are available at some price.



Linux is a very famous open source Operating System.

Linux:

Linux is a very powerful and the famous operating system available today. It has many other flavors for satisfying various needs. To name some: Ubuntu, Mint OS, Kubuntu, Zorin OS, Fedora, Backtrack etc.

Artificial Intelligence Open Source Community

I would like to provide some examples over AI (Artificial Intelligence) Open Source Software in various categories.

  • General
    • OpenCog: A project that aims to build an artificial general intelligence (AGI) framework. OpenCog Prime is a specific set of interacting components designed to give rise to human-equivalent artificial general intelligence.
  • Computer Vision
    • AForge.NET is a Computer Vision, Artificial Intelligence and Robotics library for the .NET Framework.
    • OpenCV is a Computer Vision Library in C++.
  • Machine Learning
    • R Programming Language is an open source language for Data mining, statistical computing and graphics.
  • Robotics
    • ROS is an Open Source Software framework used for the Development in Robotics.