Posts

BRAIN COMPUTER INTERFACE | Re-imagining your brain |

Image
We all love sci-fi, well who doesn't.   remember the movies “Avatar”, “matrix” well I am sure that you must have watched one of these movies at least once or if you are a big fan as I am, then maybe a lot many times. It really amazed as well as fascinated me that how was jack sully in “avatar” able to control a 10 feet tall alien and experience all that the alien body did, all that from a distant lab, with a weird machine. Similarly, but quite differently there was this movie matrix in which neo dives into a virtual world of machines with his brain connected those sophisticated machines and he too controls his avatar in the virtual world. Like his brain was interacting with the machine in a way which seems quite far away, Or maybe not, in b oth the above examples we saw how brain-computer interface can be at its very best i.e transmitting signals directly to someone's brain that would allow them to  see,  hear or feel specific sensory inputs. Consider th...

Top 10 Tech Myths

Image
TOP 10 TECH MYTHS BUSTED Today's technology is evolving so fast that what we believed was true yesterday may have no relevance today. Still, we often hold on to such outdated false believes which must be exposed. So here is a list of what I believe are the top 10 myths: 1.More signal bars in phone means more signal internet speed Although the number of bars on your phone may show your proximity to the cellular tower it has nothing to do with your internet speed. Different cell phone manufacturers have different standards for the display of bars. You may get more speed with a single bar and your friend may struggle to load a basic HTML page with his phone showing full bars. the pic below shows 2 phones at the same place with different number of bars. 2.Bigger file size does not mean better quality Well, this may be true most of the times but I am sure that you may have downloaded a movie (in GBs)from the net and got frustrated at its quality, wondering why ...

5 Ways To Make Your iPhone More Secure

Image
The iPhone is one of the most secure device out there but what can you do to make it even more secure? Well here are 5 things you can do to make your iPhone even more secure! 1)Use Long Custom Alphanumeric Code As the touch ID & Face ID is very fast and convenient  method to unlock your iPhone hence it makes your interaction with the lock screen far less that it used to be without these unlocking mechanisms,So it's not a bad idea to keep a Alphanumeric Code as your lock-screen code instead of  a simple 4 digit numeric code.Here is a video demonstrating why it's better to use a Alphanumeric code.(Click Here ) You can do change your pass-code type by going in Settings>Touch/FaceID & Passcode>Change Passcode>Passcode Options . You can also select an erase data option if the pass-code is typed incorrectly 10 times in a row by going in  Settings>Touch/FaceID & Passcode>Erase Data, but remember you cannot recover it so it's better n...

Introduction To Web-Designing | Where To Start ?

Image
Web development, also known as website development refers to the development of websites for hosting via intranet or internet. Creating plain text pages to complex websites & web-applications is what we call Web development. Web development process includes web design, web content development, Creating web application & social networks, etc. It mainly deals with the non-design aspect of building websites. Web development is the coding or programming that enables the working of a website.     Web developers imagins or take the design from the client (as per demand) and build them into a fully functioning website. In simple words, consider design as a picture, Developers take that design and break it up into components. Then they use HTML & CSS for creating the front-end or the main part of the website which is going to be visible to the visitors. ➤ Another major part of web-development is Hosting & Domain . A domain name refers ...

Bitcoins: What exactly is cryptocurrency and how it works?

Image
Before we begin let us understand what exactly is cryptocurrency? Well, it is just like cash but in a digital form and can be used to carry on transactions where it is excepted. Again, just as our regular banknotes use some security features to safeguard us from piracy, cryptocurrencies use cryptography (as the name suggests) to secure all the transactions and verify them. UNDERSTANDING HOW CRYPTOCURRENCY WORKS: let us understand the working of bitcoin or any other cryptocurrency by a simple example, Imagine you and I are sitting in a Park, I have a file with me containing some pages with something written on them in a code language, which we both believe is valuable. We made an exchange deal and I exchanged a few pages from my file for your mobile phone. Now as you have some pages say 10, you exchanged 5 of them to buy a house from someone who believes in their value. And the rest of the pages for another set of a commodity. Okay, now consider this same transaction ass...

The Wall By Samsung [CES 2018]

Image
Samsung unveiled it's monstrous 146inches(10ft x 6ft) "Micro" LED TV using a modular display technology at CES 2018 although this wasn't the only  tech in terms of display at CES 2018 as LG also showed it's OLED Canyon but realistically speaking average consumer would not able to afford such a setup,at least not anytime soon. So coming back to "The Wall" by Samsung,it's designed by the cinema screen technology that's designed for the movie theaters but what makes it so special is it's tendency to be modular and what Samsung means by it is  "Users can add or remove modules to make their TV bigger or smaller, in any configuration, removing previous limitations on screen size, with zero impact on performance of the display" Although micro LED is a new technology but it's advantages are clear like The Wall can get brightness like 2000 nits higher that any LED LCD TV.It can also produce DVI-P3 color,but surprisingly Sam...

SSL & TLS | What Are Cryptographic Protocols | Explained

Image
The internet is a very vast topic and internet security is even more. But when it comes to security on the internet it is something that cannot be overlooked. Basically, data transfer is made safe because of cryptographic protocols which provide a secure connection between a Computer Network. In easy words, it is an intermediate path used to transfer data from a computer to a server computer where no third person can steal or peak into the data transfer taking place. There are many Cryptographic Protocols with confusing names like SSL, TLS, ECC, SHA and many more. But the main two which is the one we get asked about the most are SSL & TLS. SSL (Secure Socket Layer) TLS (Transfer Layer Security) SSL and TLS both are a cryptographic protocol. They are used in websites, emails, money transactions, and even on the social media platforms. In your browser, you can tell when you are using a secure protocol, such as TLS, in a couple of different ways. You will n...