Not working well on your old stock browsers
Try downloading new browsers or try our datum app on google play. click here


Galaxy S5

Samsung: Galaxy S5 out by April, may scan your eyes

Samsung's Galaxy S5, the next generation of its flagship smartphone, will be released by April and may include innovative eye-scanning technology.

An executive for the Korean tech giant confirmed to Bloomberg that the phone will hit stores this year on roughly the same time table as previous iterations of the device, which has emerged as the chief rival to Apple's iPhone.

The Galaxy S4 was announced last March and released in April. Lee Young Hee, executive vice president for Samsung's mobile business, also told the news service that a new version of the company's Galaxy Gear smartwatch will be released at the same time as the new phone.

The new phone is expected to look different from Samsung's popular Galaxy S4, shown here. "We've been announcing our first flagship model in the first half of each year, around March and April, and we are still targeting for release around that time," Lee said.

"When we release our S5 device, you can also expect a Gear successor with more advanced functions, and the bulky design will also be improved."

Speaking at the International Consumer Electronics Show in Las Vegas, Lee wouldn't say whether the eye scanner -- presumably an effort to one-up Apple's iPhone 5S with its fingerprint security feature -- is a sure thing.

"Many people are fanatical about iris recognition technology," she said. "We are studying the possibility but can't really say whether we will have it or not on the S5."

google glass

She did say the S5 will look and feel significantly different than its predecessor, which some felt wasn't different enough from the Galaxy S3.

"When we moved to S4 from S3, it's partly true that consumers couldn't really feel much difference between the two products from the physical perspective, so the market reaction wasn't as big," she said. "For the S5, we will go back to the basics. Mostly, it's about the display and the feel of the cover."

In November, Samsung released the Galaxy Round, with a curved, 5.7-inch screen. That release was only in South Korea, and analysts have speculated the company isn't done with curved-screen technology on its phones. At CES this week, Samsung rolled out a massive, 105-inch television with a curved screen.

Released in September, Galaxy Gear helped push the growing wearable tech trend forward but, like some other smartwatches, met with mixed reviews. Some felt the watch was too bulky and had limited functionality.

Article by, R.JAYANTHI,III B.Sc CT- G1


Li-Fi , or light fidelity, refers to wireless communication systems using light from light-emitting diodes as a medium instead of traditional radio frequencies, as in technology using the trademark Wi-Fi. Li-Fi signals work by switching bulbs on and off incredibly quickly – too quickly to be noticed by the human eye. And although Li-Fi bulbs would have to be kept on to transmit data, the bulbs could be dimmed to the point that they were not visible to humans and yet still functional. Li-Fi is expected to be ten times cheaper than Wi-Fi. Li-Fi has the advantage of being able to be used in electromagnetic sensitive areas such as in aircraft and nuclear power plants without causing interference. The light waves cannot penetrate walls which makes a much shorter range, though more secure from hacking, relative to Wi-Fi. Direct line of sight isn't necessary for Li-Fi to transmit signal. Light reflected off of the walls can carry 70 Mbps.


Both Wi-Fi and Li-Fi transmit data over the electromagnetic spectrum, but whereas Wi-Fi utilises radio waves, Li-Fi uses visible light. While the US Federal Communications Commission has warned of a potential spectrum crisis because Wi-Fi is close to full capacity, Li-Fi has almost no limitations on capacity. The visible light spectrum is 10,000 times larger than the entire radiofrequency spectrum. Researchers have reached data rates of 10 Gbps, which is more than 250 times faster than superfast broadband. Researchers have proven that speeds over 10 Gbps are possible. The Li-Fi market is projected to be worth over $6 billion per year by 2018. Short range, low reliability and high installation costs are the potential drawbacks. Professor Harald Haas is widely recognised as the “father of LiFi.” He is Chair of Mobile Communications at the University of Edinburgh and co-founder of a spin-out company, pure LiFi.

The term Li-Fi was coined by Harald Haas from the University of Edinburgh in the UK. VLC communication is modeled after communication protocols established by the IEEE 802 workgroup. This standard defines the physical layer (PHY) and media access control (MAC) layer. The standard is able to deliver enough data rates to transmit audio, video and multimedia services. It takes count of the optical transmission mobility, its compatibility with artificial lighting present in infrastructures, the defiance which may be caused by interference generated by the ambient lighting. The MAC layer allows to use the link with the other layers like the TCP/IP protocol.
The standard defines three PHY layers with different rates:
• The PHY I was established for outdoor application and works from 11.67 kbit/s to 267.6 kbit/s.
• The PHY II layer allows to reach data rates from 1.25 Mbit/s to 96 Mbit/s.
• The PHY III is used for many emissions sources with a particular modulation method called color shift keying (CSK). PHY III can deliver rates from 12 Mbit/s to 96 Mbit/s.

Article by, Aravind Sakthivel M, BSc CT G1

Neptune Pine Straps a Smart Watch to Wrists

Neptune has developed a working prototype and launched a Kickstarter campaign that has attracted half a million dollars in pledges in just over two weeks.The Neptune pine is great for a wrist watch, but it helps to allow smooth interfaceNeptune has exceeded its goal and plans for shipping then Pino smartwatches Kickstarter. The Neptune pine can make phone calls, surf the web, send emails, all etc. The fact that about 2,000 supporters have thrown dollars on a smartwatch just not there yet suggests a dissatisfied longing for something more. Just something that is basically a smart phone on your wrist. While it can be attached to a smartphone, the focus of Neptune is really about what the" only device you will ever need" a watch.

The phone pine is 66 x 53.5 x 14.2 mm and weighs 60.8 g (2.14 oz), with the strap add another 35.4 g (1.24 oz) for the weight on the wrist. It gets things started with a 2.4 inch QVGA (320 x 240) capacitive touch screen, which is small by phone standards, but quite huge by the standards of the wrist. The watch also features serious hardware training in their shell thickness, starting with a 1.2 GHz dual-core Snapdragon S4, with micro -SIM 2G/3G and Wi-Fi engine. With that, it offers all the basic functions of a smartphone, including phone calls, texts, emails, internet access, etc. And can also serve as a Wi -Fi hotspot for other devices.


Because the pine supports quad -band GSM / GPRS / EDGE and quad-band UMTS / HSPA + / WCDMA, Neptune says it is compatible with 80 percent of mobile carriers worldwide, including AT & T, T -Mobile and Orange.On the software side, the pine is powered by Android Jelly Bean. Neptune is careful to stress that packs the full version of Jelly Bean watch, which means it will work with hundreds of thousands of existing applications. The Android operating system also powers the voice recognition capabilities.It still has the 5 megapixel rear camera for photos and video at 720p, but Neptune has added a front camera for video calls, saying that the watch will be compatible with popular Android services like Skype and Tango offered. Front light LED, Neptune claims as first, offers some strategic lighting for video calls in dark rooms and doubles as a small flashlight.With a GPS, accelerometer, pedometer, gyroscope and digital compass, along with the fact that the wrist straps, undertakes to work more naturally and monitor fitness than a smart phone. It will support existing applications like RunKeeper.


With its integrated Bluetooth 4.0, you can also combine with accessories like heart rate monitors.Other hardware specifications include various buyer's choice of 16 or 32 GB of onboard storage, a micro -USB port and a headphone jack 3.5 mm.With that long list, power hungry hardware, pine needs more than a Swiss engineering operations winding to keep the lights on. It is powered by a lithium polymer battery 810 mAh, which claims Neptune can provide up to eight hours of talk time (2G), seven hours using Wi-Fi, 10 hours of music or 120 hours standby. The clock has changed somewhat in appearance, but still has the same form factor of a watch case that attaches to the belt. Users can remove the body clock for texting with both hands, taking pictures, etc.

Article by, Indhuleka.A, III B.Sc CT- G2


In 1972, Ray Tomlinson sent the first electronic message, now known as e-mail, using the @ symbol to indicate the location or institution of the e-mail recipient. Tomlinson, using a Model 33 Teletype device, understood that he needed to use a symbol that would not appear in anyone's name so that there was no confusion. The logical choice for Tomlinson was the "at sign", both because it was unlikely to appear in anyone's name and also because it represented the word "at", as in a particular user is sitting @ this specific computer.


However, before the symbol became a standard key on typewriter keyboards in the 1880s and a standard on QWERTY keyboards in the 1940s, the @ sign had a long if somewhat sketchy history of use throughout the world. Linguists are divided as to when the symbol first appeared. Some argue that the symbol dates back to the 6th or 7th centuries when Latin scribes adapted the symbol from the Latin word ad, meaning at, to or toward. The scribes, in an attempt to simplify the amount of pen strokes they were using, created the ligature (combination of two or more letters) by exaggerating the upstroke of the letter "d" and curving it to the left over the "a".Other linguists will argue that the @ sign is a more recent development, appearing sometime in the 18th century as a symbol used in commerce to indicate price per unit, as in 2 chickens @ 10 pence. While these theories are largely speculative, in 2000 Giorgio Stabile, a professor of the history of science at La Sapienza University in Italy, discovered some original 14th-century documents clearly marked with the @ sign to indicate a measure of quantity - the amphora, meaning jar. The amphora was a standard-sized terra cotta vessel used to carry wine and grain among merchants, and, according to Stabile, the use of the @ symbol ( the upper-case "A" embellished in the typical Florentine script) in trade led to its contemporary meaning of "at the price of".

Article by Monisindhu.S, III B.Sc CT-G2

Five technologies that will change the future of gaming

Everyone seemingly squirming under the pressure to introduce the next great leap in interactivity, but a handful of engineers and developers have already made serious headway towards reinventing the way we'll play games in the years to come. Here are five of the most promising and revolutionary technologies that may one day find their way into our PCs, consoles, and mobile devices.


The Leap Motion Controller may share a few similarities with Microsoft's Kinect, but its form factor and approach to gesture controls are quite different. Its small, reasonably priced at $69.99 and designed to track minute finger or stylus movements at a threshold of .01 millimeters. Though the Kinect is capable of tracking your entire body, its strict lighting and relative-orientation requirements are a major turnoff for most customers, and in turn, developers. Leap Motion tech eliminates these barriers, and while it may only capture hand/finger movements in its current form, that in itself is an invaluable capability rife with potential. Most Leap Motion demos take place at a desk in front of a PC monitor, but there's no reason the designers couldnt simply extend the cable or implement wireless functionality to adapt it to consoles and coffee tables.


Eye Tribe goal is to integrate hands-free controls into devices such as cell phones, tablets, and feasibly, gaming devices like the 3DS or Vita. While tracking retina movements isnt groundbreaking in itself, it has generally been too expensive for consumers and too large for manufacturers to embed in their products. Eye Tribe was more than happy to upend these notions at CES 2013, demoing its external and embedded retina-tracking solutions running on Windows 8 tablets. In the video above, CNET Bridget Carey takes on Fruit Ninja, deftly slicing citrus and berry alike. Retina tracking may not be suitable for every type of game, but once the tech establishes itself as a must-have bullet point for hardware manufacturers, its only a matter of time before we start to see new game types and mechanics designed around its unusual functionality.

InteraXon Muse

We may never gain telekinetic powers in real life, but if InteraXon manages to deliver on its promises, we may be able to interact with software using our thoughts in the near future. The Muse, InteraXon brain-wave-sensing headband, is leading the way for consumer-grade thought-controlled interfaces, which may one day find their way into the realm of gaming peripherals. Nintendo dabbled in biosensors with the Japanese-only Tetris 64, a Nintendo 64 game, but its pulse-sensing accessory failed to leave a mark and was left to wallow in obscurity. InteraXon focus on brain-wave sensors expands the possibilities beyond passive heart-rate monitoring, allowing you to directly control software by focusing your thoughts. Beyond the example shown in the Zenbound demo, thought control will let people, especially those with physical disabilities, interact with software in ways many of us have never imagined.


Head-mounted displays have come and gone over the years, promising a future where virtual reality will actually be relevant outside of events like CES and the Electronic Entertainment Expo. The latest, Palmer Lucky Oculus Rift, stands a better chance than most thanks to his experience researching and developing HMDs for the US military. At 110 degrees, the Rift totes the widest diagonal field of view for an HMD to date. Its accelerometers, gyroscopes, and pair of low-latency, stereoscopic 3D displays convincingly re-create your movements almost as fast as you can make them. With developer kits potentially shipping in late spring, the Rift may finally bring VR to the masses as soon as 2014.

Microsoft IllumiRoom

Microsoft quietly revealed a trailer for a new project during CES that maps the geography of your living room and projects games onto the surface of your walls and furniture surrounding your TV, mixing real and virtual environments in an entirely new way. Whether the IllumiRoom is simulating snow or extending your view of the battlefield, it will open new avenues of expression for developers and artists. The teaser video was created without the use of special effects, illustrating the already impressive capabilities of the WIP technology that may find itself bundled with your new Xbox in the near future.

Article by Thendral .J.P,II B.Sc CT- G1

10 awesome new inventions you have never heard about

1.Robot That Devours Insects and Rodents :

At this point, robotic vacuum sweepers, singing androids and mechanical dogs are old hat. But British inventors Jimmy Loizeau and James Auger have made a quantum leap with the Carnivorous Domestic Entertainment Robot, an automation that would stalk and devour mice and insects, and then eat them and digest their bodies to produce its own power.They've come up with five different concepts, including the mousetrap coffee table robot, which is designed to lure unwary vermin onto its surface, which contains a trap door triggered by motion sensors. Rodent victims trapped by the device would be chemically dismantled and fed to a microbial fuel cell.

A light on the side of the device would inform the owner of how much energy is being produced by the auto-extermination. Other configurations include the Lampshade Robot, which would lure flies and moths to their doom, a Cobweb Robot that would trick spiders into weaving webs and then extract and feed them into its fuel cell, and the Flypaper Robotic Clock.

2.License Plate Flipper

The high-powered weaponry, alas, probably is a bit impractical, not to mention dangerous. But there is a company that offers an electronic license-plate flipper of the sort that Bond used to conceal his identity from prying eyes. The $79.00 Vehicle Plate Flipper doesn't allow you to impersonate a Swiss or French driver, but it does flip down at a 90 degree angle at the press of a button to display a message on an underlying plate for the driver behind you. There's also a special $74.99 version for motorcycles.

We're not sure that this gadget will ever become widely popular, though, in part because some of the device's conceivable uses -- hiding your identity from red light cameras and police, or provoking tailgaters with taunting messages -- could get drivers in a lot of trouble. Indeed, the company that sells the device attaches a disclaimer to its Web site, warning that the gadgets are "STRICTLY intended for off-road use only" and informing potential customers that they take responsibility "for all liabilities associated with the use or misuse of our product" .

3.Portable Cat-toy Park

Comedian Steve Martin used to have a routine in which his pet cat figures out how to imitate his voice and orders $3,000 worth of cat toys from a mail-order company. The bit certainly resonated with cat owners, who know how easily felines can get into mischief when they're trying to alleviate boredom. In 2009, a New York-based inventor was granted a patent for one possible solution: a fold-up "cat toy park" equipped with a scratching post, a tunnel for crawling through, a hanging chew toy, and most ingeniously, a tube equipped with a fan that blows colored balls around a mesh tube, a game that's "devised to occupy one or more cats". While cat fanciers may applaud the ingenuity of the concept, cats are notoriously fussy and capricious, and there's no guarantee they would choose to play with such a toy rather than, say, claw your antique furniture. Also, the value of having a portable cat entertainment centre is questionable, since we've never seen a cat who was a willing traveller.

4. Bat Suit

Have you ever wanted to leave the ground and soar like a bird -- or perhaps a bat? In January 2012, a Connecticut-based inventor was granted a patent for what the application describes as "a completely dynamic human powered flying suit" that is modelled after the bat's style of aviation. The inventor explains in the patent application that bats are fellow mammals and the flying creatures "most closely related to human beings."

The device consists of a pair of strap-on bat-like wings with rigid and non-rigid portions that can be manipulated by the wearer once aloft. Initially getting off the ground is a bit trickier: Unlike bats, which simply do what comes naturally, the wearer of the flying suit would have to be towed, or made to ride on a bicycle, skis or rollerblades down an incline and then assume a leaning-forward flying posture and leap into the air at the appropriate moment.

5.Body Armour With Built-in Stun Gun, Flashlight and Camera phone Charger

The Armstar Bodyguard 9XI-HD01 looks a bit like that scary black body armour that Christian Bale wears in the recent Batman movies. The Bodyguard, which was patented by a California inventor in 2007 under the title of "wearable shield and self-defense device," is designed to be a shield, a non-lethal weapon and a communications device all in one. The flexible arm, which is armoured with Kevlar and hard plastic, contains a rechargeable lithium battery pack that powers an "electronic deterrent" device built into the arm's artificial skin. All the user has to do is pull a pin, and an assailant who grabs his or her arm is going to get zapped with electricity. The Bodyguard is also equipped with a bright LED flashlight, an HD camera capable of transmitting pictures, and a charging slot into which an iPhone apparently fits nicely.We could see this gadget becoming an indispensible tool for law enforcement officers and bodyguards of the future, but given that you have to inquire about it to get a price quote, we're guessing that it'll be too costly to make much of a dent into the everyday suburban adventurer market.

6.Seed Racer

Mercedes-Benz has been an innovator for decades. You can thank the German auto manufacturer for diesel and supercharged engines on passenger cars, antilock brakes, electronic stability systems and more. But nothing could be more innovative than the BIOME concept car, unveiled at the Los Angeles Auto Show in November 2010. Here's how the official press release described the vehicle: "The Mercedes-Benz BIOME grows in a completely organic environment from seeds sown in a nursery. Out on the road the car emits pure oxygen, and at the end of its lifespan it can be simply composted or used as building material."Engineers from the Mercedes-Benz Advanced Design Studios in Carlsbad, Calif., created the car as part of the Los Angeles Design Challenge, which called for a safe and comfortable compact car of the future that could accommodate four passengers, demonstrate good handling and weigh only 1,000 pounds (454 kilograms). The BIOME represents the Mercedes-Benz vision. It is made from an ultralight material called BioFibre so that the finished vehicle, though wider than a typical car, only weighs 876 pounds (397 kilograms). If you think that sounds too good to be true, then get this: The BIOME isn't assembled. It grows from two seeds -- one that forms the interior and one that forms the exterior. The wheels germinate from four additional seeds placed in the nursery.Of course, you won't find the BIOME at your local Mercedes-Benz dealer. That's because the far-out design is a vision of the future -- a concept car that's decades ahead of its time. As such, it couldn't exist today. But it might be as common as a Corolla after 20 or 30 years of innovative thinking and inspired engineering.

7.Insect Assailants

Many people don't know it, but USPTO can apply a secrecy order to a patent if patent office staff and their military advisers think the idea could be used to threaten national security. Once the USPTO decides that a technology is no longer a threat, it can publish the patent and pave the way for commercialization. Some patents may remain cloaked under a secrecy order for one or two years; others languish for decades. More than 5,000 patents -- inventions we may never know or see -- currently have secrecy orders attached to them.

That's not the end of hush-hush inventions. Each year, the Pentagon sets aside billions of dollars to develop top-secret military weapons. This so-called "black budget" has grown tremendously since the Sept. 11 attacks, surpassing even the funds spent at the height of the Cold War. Some of that money has gone toward the development of Nano Air Vehicles (NAVs), remote-controlled micro-drones that could easily infiltrate enemy territory. We all know how the U.S. military has used larger drones to conduct reconnaissance, transport supplies and even target individuals. Unfortunately, the larger attack drones, such as the MQ-1 Predator, can result in unwanted civilian casualties.

Lockheed Martin's Samarai micro-drone could solve that problem. Weighing a mere 5.29 ounces (150 grams) and boasting a 12-inch (30-centimeter) wingspan, the Samarai looks like a maple-seed whirligig, except this one comes with a miniature jet engine to provide thrust and a tiny flap on the trailing edge of the wing to control direction. In the near future, this nature-inspired micro-drone will snap photos using a camera mounted on the gadget's central hub. But the longer-term goals are to turn the Samarai or other similar micro-drones into armed attack vehicles capable of killing a single individual with little or no collateral damage.

8.Perpetual Printing

Printing has come a long way since the computer landed on the desktop. First, there were daisy-wheel printers, then dot-matrix printers, then inkjet and laser printers. The problem with all of these output devices, of course, is that they require paper -- lots of it -- and expensive consumables, like toner. Why can't someone invent an inkless, tonerless printer that allows the operator to reuse paper?

As it turns out, this isn't a new idea. Xerox has been working with so-called electronic paper since the 1970s. Its most promising solution is a type of paper called "Gyricon". A Gyricon sheet is a thin layer of transparent plastic containing millions of small oil-filled cavities. A two-colored bead is free to rotate inside each cavity. When a printer applies a voltage to the surface of the sheet, the beads rotate to present one colored side to the viewer, offering the ability to create text or pictures. The images will remain on the paper until it's fed through the printer once again.

A Japanese company, Sanwa Newtec, is offering its version of inkless, tonerless and rewritable printing technology. Its product is called the PrePeat rewritable printer, which, like the Xerox solution, requires plastic paper. But PrePeat uses a different technique to produce an image. Each sheet of paper comes embedded with leuco dyes, which change color with temperature -- colored when cool and clear when hot. The PrePeat printer, then, heats and cools the paper to first erase an image and then create a new image in its place. According to the company, a single sheet of paper can be reused 1,000 times before it needs to be replaced. What's the catch? A single PrePeat printer costs almost $6,000, while a pack of 1,000 sheets of paper costs more than $3,300. If you're running a printing-intensive business, you might be able to recoup your investment over time. But the average PC user likely won't be willing to shell out that kind of money to replace a standard printer.

9.Pencil Pusher

U.S. businesses use about 21 million tons (19 million metric tons) of paper every year -- 175 pounds of paper for each American, according to the Clean Air Council. This has led to office recycling programs, "please think before you print" e-mail signatures and printers that offer double-sided printing. Now a trio of Chinese inventors hopes to add another device to the cubicle environment: the P&P Office Waste Paper Processor, which turns paper destined for recycling into pencils. The machine, looking a bit like a three-hole punch crossed with an electric pencil sharpener, was a finalist in the 2010 Lite-On Awards, an international competition that seeks to stimulate and nurture innovation.

Here's how the pencil-making gadget works: You insert wastepaper into a feed slot. The machine draws the paper in, rolls and compresses it, and then inserts a piece of lead from a storage chamber located in the top of the device. A small amount of glue is added before -- voil -- a pencil slides out from a hole on the side. It's not clear how many pieces of paper form a single pencil, but you figure the average office worker could generate a decent supply of pencils in a month. And that seems to be the biggest drawback to the pencil-producing gadget. How many No. 2 pencils can an office really use, given that most workers take notes on their tablet PCs or laptops? And how much glue and lead core do you need to buy to keep up with the overflowing paper recycle bin? Too much, we would suspect, which is why you may never see this gadget in your office supplies catalog.

10.Military Mind Control

The helmet used by the U.S. military has changed dramatically over the years. In World War I, the M1917/M1917A1 helmets, also known as "Doughboy" or "dishpan" helmets, protected the heads of American infantrymen. They were replaced in 1941 by the M-1 "steel pot," the standard-issue helmet in World War II, the Korean conflict and throughout the Vietnam War. By the 1980s, U.S. military helmets had evolved into a one-piece structure composed of multiple layers of Kevlar 29 ballistic fiber. The helmet of the near future, however, may contain something more than extra protection from flying shrapnel. An Arizona State University researcher, working under a grant from the U.S. Defense Advanced Research Projects Agency (DARPA), is trying to develop a military helmet equipped with technology to regulate soldiers' brains. The technology is transcranial pulsed ultrasound, which delivers high-frequency sound waves to specific regions of the brain. Under the influence of these sound waves, neurons send impulses to their targets, exerting control over them. On the battlefield, this has enormous implications. Using a controller, a soldier could release ultrasound pulses to stimulate different areas of the brain. For example, he or she might want to be more alert after being awake for many hours or relax when it's time to catch some shuteye. The soldier might even be able to relieve stress or become oblivious to pain, eliminating the need for morphine and other narcotics.

Of course, some people think this type of neurotechnology is pure science fiction. Others worry that Uncle Sam is trying to take over the minds of its soldiers. After all, it's one thing to have a drill sergeant yelling in your ear. It's another thing completely to have one inside your head.

Article by: R.Monika, III BSc CT (G2)

2013 Invention: Ballast Bulb

A household lamp powered by a bag of rocks.

More than 780 million people rely on kerosene to light their homes. But the fuel is pricey and is toxic when burned—not to mention a fire hazard. In 2008, London-based product designer Martin Riddiford and his colleague Jim Reeves decided to create a cheap, safe alternative.

Riddiford knew a falling weight could produce enough energy to run a grandfather clock, so why not a light? To find out, he attached the crank of a wind-up flashlight to a bicycle wheel. He hung a weight from the wheel to cause it to spin; the wheel cranked the flashlight, and the device lit up.

Over the next four years, Riddiford, Reeves, and a small team spent their downtime between projects in a basement, refining the GravityLight. To use it, a person hangs the device and fills an attached fabric bag with up to 28 pounds of rocks, dirt, or other material. Lifting and releasing the bag steadily pulls a notched belt through GravityLight's plastic hub; the belt spins a series of gears to drive a small motor, which continuously powers an LED for about 30 minutes. The team used crowdfunding to manufacture 1,000 GravityLights, which it plans to send to developing countries for field testing—plus 6,000 more for backers. "It's exciting to witness so much positive reaction to what we're doing," Riddiford says. Besides remote villages, the lamp could prove handy in campsites, closets, and any dark nook far from a socket, so Riddiford also hopes to license a retail version for less than $10.




  1. As a weighted bag descends, it tugs a belt to turn a series of plastic gears.
  2. The gears work in unison to spin an electric motor.
  3. The motor powers a small yet bright LED, providing continuous illumination for about 30 minutes—the maximum amount of time that the bag can take to descend.
  4. External connectors can power low-voltage devices, and the entire system is designed to work for thousands of lift-and-drop cycles.

INVENTORS Jim Reeves, Martin Riddiford

Article by R.Jayanthi, B.Sc CT-G1

What is Biz Stone's 'Jelly' app?

Yet another Social App!!

Jelly Application

Jelly Application

  1. Jelly, a new social Q&A app, was released on Jan 7,2014.
  2. App emphasizes using friends and photos to answer questions.
  3. Ratings on iTunes are mostly positive, but critics claim app is "pretty but pointless"
  4. App was co-founded by Biz Stone, one of the founders of Twitter.

The crowded world of social media apps got squeezed a bit tighter with the introduction of Jelly on Jan 7,2014.

Riddiford knew a falling weight could produce enough energy to run a grandfather clock, so why not a light? To find out, he attached the crank of a wind-up flashlight to a bicycle wheel. He hung a weight from the wheel to cause it to spin; the wheel cranked the flashlight, and the device lit up.

The social Q&A app from Biz Stone, a co-founder of Twitter, relies on photos and friends to find answers to questions that may not fit neatly into a Google search, such as, "What kind of flower is this?" The team used crowdfunding to manufacture 1,000 GravityLights, which it plans to send to developing countries for field testing—plus 6,000 more for backers. "It's exciting to witness so much positive reaction to what we're doing," Riddiford says. Besides remote villages, the lamp could prove handy in campsites, closets, and any dark nook far from a socket, so Riddiford also hopes to license a retail version for less than $10.

Sure, people can turn to their Facebook or Twitter feeds to ask which backpack to buy, or where to responsibly dispose of or donate old iPhone chargers (both real questions currently appearing on Jelly). The technology isn't new. Neither is turning to friends for help with everything from where to eat in Philadelphia to suggestions for an 8-year-old's birthday party.

But Stone is hoping Jelly makes this experience fun while helping users find answers faster. The dedicated social-search app is free of news feed and timeline clutter, while still allowing you to make use of your social network.

Founder of Jelly App

Founder of Jelly App

We spoke to Stone over the phone on Jan 7,2014 about how Jelly works. His answers informed these instructions:
Using Jelly is simple enough. Open the app, connect your social networks (Facebook platform app must be turned on) and users are immediately prompted to either look through pending questions ("7 people need help") or snap a photo. Users can add links and draw on a photo before sharing a question with others.

Seeing questions and answers from unfamiliar people? Stone says the app works much like LinkedIn, where "2nd degree" connections will appear. In other words, users will be asking questions and receiving answers from friends as well as their friends of friends.

To follow a question, simply tap the "favourite" star in the upper right corner and notifications will appear within the app. But if you dismiss a question, you can't go back to it later when you think of the answer or remember you have a friend on Facebook who probably knows it.

Questions can also be shared outside the app and answered via the Web by people who don't use Jelly. These answers show up as "forwarded by ..."

Stone says in the future they'd like to figure out a way to connect names with outside answers, but it isn't a top priority right now. Users can also rate answers to their own questions, and to other users' questions, as "good," and send virtual "thankyou cards" to helpful respondents.

So far, customer ratings for Jelly in iTunes are mostly positive. For a short time Tuesday Jelly experienced an error which prevented users from connecting and logging in, which appears to be the reason for most posted complaints. Some meaner critics called the app "pretty but pointless."

Some also have criticized Jelly's inability to sort through questions, see questions only from certain users or filter results. In response, Stone said that categorizing questions defeats the purpose of using your entire social network. But he emphasized that he's open to the wishes of the nascent Jelly community, and the idea of sortable questions is not completely out of the question in the future.

Article by, R.Jayanthi, B.Sc CT- G1

Cloud Storage Adoption in Businesses

Cloud Storage

Cloud Storage

Cloud computing is helping businesses combat a growing problem: Too much information and not enough storage capacity, according to an article on

With businesses increasingly facing the prospect of running out of storage capacity, adoption of cloud storage technologies continues to grow, according to a report from cloud-integrated storage solutions specialist TwinStrata.

Many businesses needs cloud storage

Many businesses needs cloud storage

The survey found that 37 percent of respondents have been using cloud computing for three or more years, more than a one-third increase over last year's 27 percent number. When compared with last year's survey, overall adoption of cloud services has steadily increased across all categories, with use of Software as a Service (SaaS) reaching as high as 62 percent and both cloud storage and infrastructure as a service (IaaS) edging closer to 50 percent adoption rates. Platform as a Service (PaaS) experienced the greatest increase in adoption as more organizations become increasingly comfortable with the cloud, the report indicated.

"Overall, we find all cloud initiatives reaching greater levels of maturity. Last year, we found that more organizations intended to use Platform as a Service and cloud storage than had actually deployed them," the report said.

Cloud Technologies Revenue Will Reach $22.6B by 2016

Cloud computing is moving up and to the right.A recent report indicates cloud computing is expected to bring in some impressive financial figures through 2016, according to an article on

Market Monitor, a service of 451 Research, recently released its annual forecast of virtualization, security and automation and management revenue through 2016.

Some key takeaways from the report, "Market Monitor Cloud-Enabling Technologies":
Cloud-Enabling Technologies, defined as virtualization, security and automation and management, global revenues will grow from $10.6B in 2012 to $22.6B in 2016, attaining a 21% Compound Annual Growth Rate (CAGR).

Cloud-as-a-Service revenues will grow from $5.7B in 2012 to $19.5B in 2016, attaining a 36% CAGR. Market Monitor defines Cloud-as-a-Service as externally delivered services, specifically third party, that are hosted and pay-as-you-go with the cloud being relied on as a service delivery and consumption model.

Article by, Mohanapriya.R, B.Sc IT.

Cluster Computing

A computer cluster consists of a set of loosely connected or tightly connected computersthat work together so that in many respects they can be viewed as a single system.

The components of a cluster are usually connected to each other through fast local area networks ("LAN"), with each node (computer used as a server) running its own instance of an operating system. Computer clusters emerged as a result of convergence of a number of computing trends including the availability of low cost microprocessors, high speed networks, and software for high performance distributed computing.

Computer cluster

Computer cluster

Computer clusters have a wide range of applicability and deployment, ranging from small business clusters with a handful of nodes to some of the fastest supercomputers in the world such as IBM's sequoia.


Computer clusters may be configured for different purposes ranging from general purpose business needs such asweb-service support, to computation-intensive scientific calculations. In either case, the cluster may use a high-availability approach. Note that the attributes described below are not exclusive and a "compute cluster" may also use a high-availability approach, etc.


Low Cost:

Customers can eliminate the cost and complexity of procuring, configuring and operating HPC clusters with low, pay-as-you-go pricing. Further, you can optimize costs by leveraging one of several pricing models: On Demand, Reserved or Spot Instances.


You can add and remove computer resources to meet the size and time requirements for your workloads.

Run Jobs Anytime, Anywhere:

You can launch compute jobs using simple APIs or management tools and automate workflows for maximum efficiency and scalability. You can increase your speed of innovation by accessing computer resources in minutes instead of spending time in queues.


One of the issues in nodes may be. For instance, a single designing a cluster is how tightly coupled the individual computer job may require frequent communication among nodes: this implies that the cluster shares a dedicated network, is densely located, and probably has homogenous nodes. The other extreme is where a computer job uses one or few nodes, and needs little or no inter-node communication, approaching grid computing.


However, the use of As the computer clusters were appearing during the 1980s, so were supercomputers. One of the elements that distinguished the three classes at that time was that the early supercomputers relied on shared memory. To date clusters do not typically use physically shared memory, while many supercomputer architectures have also abandoned it. a clustered file system is essential in modern computer clusters. .

Cluster management


One of the challenges in the use of a computer cluster is the cost of administrating it which can at times be as high as the cost of administrating N independent machines, if the cluster has N nodes. In some cases this provides an advantage to shared memory architectures with lower administration costs. This has also made virtual machines popular, due to the ease of administration.


Although most computer clusters are permanent fixtures, attempts at flash mob computing have been made to build short-lived clusters for specific computations. However, larger scale volunteer computing systems such as BOINC-based systems have had more followers.

Article by, N.SINDHU,II B.Sc CT- G1

Copycat russian android prepares to do the spacewalk

This robot is looking pretty pleased with itself and wouldn't you be, if you were off to the International Space Station? Prototype cosmobot SAR-401, with its human-like torso, is designed to service the outside of the ISS by mimicking the arm and finger movements of a human puppet-master indoors. In this picture, that's the super-focussed guy in the background but in space it would be a cosmonaut operating from the relative safety of the station's interior and so avoiding a risky spacewalk. You can watch the Russian android mirroring a human here.

SAR-1 joins a growing zoo of robots in space. NASA already has its own Robonaut on board the ISS to carry out routine maintenance tasks. It was recently joined by a small, cute Japanese robot, Kirobo, but neither of the station's droids are designed for outside use. Until SAR-401 launches, the station's external Dextre and Canadarm2 rule the orbital roost. They were commemorated on Canadian banknotes this year and they don't even have faces.



It is make or break time for Comet ISON as it nears its closest approach to the sun, set to occur just a few hours from now. The "comet of the century" won't outshine the moon as previously thought, but astronomers suspect it could match the brightness of Venus if it survives its solar encounter.

This animation from NASA's Solar and Heliospheric Observatory, which orbits the sun, gives a taste of what ISON has in store. The images run from late Tuesday evening to earlier this morning and show ISON coming in as the sun (upper left) releases a coronal mass ejection, a burst of charged particles. The comet, which is mostly made from ice and rock, will be heated to 2700 C and buffeted by the sun's immense gravity as it passes by, potentially fracturing its nucleus. If that happens, ISON is unlikely to give astronomers the light show they crave.

But if its nucleus survives, ISON will be brighter than ever. All eyes will be on the comet as it emerges from behind the sun over the rest of the week, when it will be best viewed around dawn. If you are planning to look yourself, be extremely careful and do not look directly at the sun.

Article by Srisandhiya.N,B.Sc IT

Driverless cars

The driverless revolution Currently, the autonomous cars are fitted with cameras, lasers and sensors. A laser range finder is, conspicuously, fitted to the roof of the car: it generates a highly detailed 3D map of the surrounding area, aided by GPS, an inertial measurement unit, and a wheel encoder.

There is a camera near the rear view window that spots traffic lights sufficiently far in advance, and both front and rear bumpers have radars on them to aid the work of the laser. This technology allows the driverless cars to follow speed limits and navigate the best possible route to its destination. The technology costs between $75,000 and $85,000 per vehicle more than the vehicle itself.

A major problem is the technology is ahead of the law. Most federal and state automobile laws in the US assume a human operator. These need to be repealed before the technology can be commercialised.

Getting rid of the driver:

Cars that drive themselves will improve road safety; the vehicles will react to hazards faster than humans and so potentially save lives Technology is at its best when it make people live better. We are using advanced computer science to try and make driving safer and more enjoyable.


How a selfdriving car works


    The most striking feature of the Google Car, the LIDAR (Light Ranging and Detection) is a rotating camera that sends out lasers. It uses the reflected light to build a 3D map of the cars surroundings, up to a distance of 200m.


    Performing much the same function as a mildly interested human motorist, the camera reads road signs, detects traffic lights, and keeps an eye out for pedestrians, cyclists, other motorists and similar obstacles.


    Sensors mounted on the front and rear bumpers keep track of nearby objects, including other cars. This technology is already used in cars equipped with intelligent cruise control.


    Information from the various sensors is fed into the cars central computer. Here the data is analysed, and steering, acceleration and brakes adjusted accordingly. Importantly, the computer needs to understand not only traffic laws, but also the unspoken assumptions of road users.


    An ultrasonic sensor mounted on the rear wheel monitors the cars movements and uses the information to automatically update the vehicles position on the map.


    A self-navigating car demands highly accurate positioning data. Information from GPS satellites is combined with readings from the cars on-board instruments (i.e. tachometers, altimeters and gyroscopes) to make sure the car knows exactly where it is.

Article by Sushmitha Saron.D, B.Sc CT-G1

Impact of computer technology in Indian society

Computers and technologies in India

Computers arrived in India in the 1970s and with the formation of Hindustan Computers Limited (HCL) in 1976; India formally entered the computers club. Interestingly, HCL launched its operations in India a month ago before IBM came to the Indian market. By the 1980s, HCL introduced data operating and processing computers in Indian corporations. However, it was after 1986, when then the Prime Minister Rajeev Gandhi took the initiative to lower duty on hardware and software, the Indian computer Industry began to grow. However, this growth was not smooth. In 1992, when Hindustan Computers Limited (HCL) organized a huge launch of their computers in a function at Calcutta displaying the need of every office in the state to use computers, there were huge demonstrations and protests. The reason people were about to lose their jobs as the work previously done by them would now be done by the computers. This kind of outburst is not rare.

Now, how much computers have touched the people, barring the urbane remains to be asked. In 2002, in Vardhaman district of West Bengal, the ruling CPI (M) government boasted of modernization in villages and availability of computers in every rural school. That was not merely a claim; the schools were actually provided computers. But the irony is that, in the district, which was declared the most literate district, literacy remains at writing ones own name without even knowing the alphabets. So computers remained government toys without any objective of being there.


India is one of the leading offshore destinations in delivering engineering research and development (ER&D) services with a market share of 22 per cent. The market in India is expected to grow to US$ 42 billion by 2020, as per a Zinnov study titled, Engineering R&D: Advantage India The information technology (IT) and Business Process Outsourcing (BPO) sector of India is expected to register a growth of 11 per cent and revenue of US$ 75 billion,US$ 77 billion during 2012,2013 according to National Association of Software and Services Companies (Nasscom).

The public cloud services market in India is projected to grow to US$ 326.2 million, registering 32.4 per cent growth in 2012, highlighted a report by Gartner.In addition, India has become a key contributor in global research and of growth in the Asia-Pacific (APAC) region, playing host to one-third of top 1,000 R&D spenders in the world, according to a Zinnov study titled Global R&D Benchmarking Study.


India is the fifth best country in the world for dynamic growing businesses, according to the Grant Thornton Global Dynamism Index. In addition, Deloitte predicts India will be the second largest manufacturing country in the next five years, followed by Brazil as the third ranked country. Indias growth potential story is therefore a strong one.


Five principle sectors in the IT industry, namely online businesses, IT services, IT-enabled services and software and hardware merchandise received most of the investments. Compelling cost advantage coupled with available skilled force has driven this spectacular growth. Although many low-cost delivery destinations, such as China, Philippines and Vietnam, are emerging, India leadership position cannot be challenged. Its benefit of long term cost competitiveness, supply of highly trained engineers and its expertise in processes and quality will continue to foster its growth.

The technology sector in India received US$6.197 billion through FDI in 2011, an increase of 46% from the previous year. The investment has created 153 projects with an estimated 41,607 jobs in the industry.

Top Trends for 2013

  1. Internet of thing
  2. cybersecurity
  3. Big data visualization
  4. cloud computing in science and engineering
  5. Mobile computing meets the cloud
  6. Internet censorship and control
  7. Interactive public displays
  8. Next-generation mobile computing
  9. 3D imaging techniques and multimedia applications
  10. Safety-critical systems:The Next Generation
  11. Reliability
  12. Haptics in rehabilitation
  13. Multicore memory coherence

Article by S.Kaviya Priya, B.Sc CT-G1

Instagram launches direct messaging feature

Instagram has added a new feature that lets users share photos and videos with up to 15 people rather than everyone who follows them. Called Instagram Direct, the feature is available for Apple and Android phones, CEO Kevin Systrom said at a news event in New York City on 13 ,December 2013. Users can choose up to 15 people who follow them on the popular photo-sharing app to share photos or videos.

Previously, the only way to share content on Instagram was to post it to your feed, which can be either visible to everyone or locked so only people you approve can see it. Systrom said the reason for the 15-recipient limit is to make the feature about "moments you share with friends" and "not about spamming everyone you know."


To use Instagram Direct, download the latest update to the app, and upload or snap a photo the way you normally would. Once you're done applying old-school filters, tagging your friends and adding a caption if you wish, you'll get the option to either share with "followers" or "direct." Tapping the latter will bring up suggested followers to send the photo to, or let you pick from your list of followers. Once you send the photo, a green check mark will appear if the recipient has seen it, replaced by a heart if they "liked" it. It is possible to send photos to people who don't follow you, but it'll appear as a pending request and won't go into their inbox. They can tap "X" and they won't get a direct message from you again - or tap a checkmark and it'll go into their inbox.

The Facebook-owned Instagram has more than 150 million users - up from 80 million at the start of this year - and more than half of them use it every day, Systrom said. The new tool comes as popularity of messaging apps like Snapchat and WhatsApp is growing. Twitter also updated its direct messaging tool to let users send photos and videos to one another for the first time.

Sterne Agee analyst Arvind Bhatia thinks the new feature will help Instagram compete with Snapchat, the disappearing-message app that Facebook reportedly tried and failed to buy for $3 billion recently.

Article by, R.Jayanthi, B.Sc CT-G1

Intelligent headlights make raindrops disappear

A camera finds individual drops, then a projector blacks them out of the driver's view. Anyone who's ever driven through a heavy rain has hoped for something like this: a system that can make rain drops vanish or at least look like they do.

Intel and Carnegie Mellon University have developed technology that makes it happen. Each headlight projects not just a single beam, but a grid of several tiny beams (that is how the different-colored pixels are projected on the screen when there is actually an image being shown). A camera behind the projector watches for raindrops, and a processor predicts their paths. Then the projector blocks out just the part of the grid where the rain is falling, darkening just the pixels in its way. Presto: a rainless view.

Intel says it will be available in a decade, and even though it's not quite perfect some drops still look like they sneak through, at least at the top of the drivers range of vision it seems like a major safety improvement from windshield wipers and a prayer.



Intel has helped cook up some futuristic headlights that make rain seem to disappear. Rain the scourge of the night driver! Too many times have distracting droplets proved an annoyance for those traveling roads after dark.

New technology co-developed by Intel and Carnegie Mellon University could one day change all that. I've spoken to Intel about the new tech, so hit play on the video above to find out how it works. Instead of relying on a bog-standard bulb to beam light out over a darkened road, the futuristic setup would use something more akin to a projector. Meanwhile a camera sits nestled beneath that projector, keeping an eye on drops of rain as they enter the headlight beams. Information from that camera is sent to a processing unit, which identifies raindrops and makes a guess as to where each droplet is headed.

The projector then blots out the bits of its projection where the rain drops are. The result is a light that shines out from the front of a car in the dark, but does not highlight any rain. You will need a powerful projector to make it work though, and obviously cramming a camera, projector and processing unit into the front of your car will be more expensive than a normal bulb. As a result, dont expect to see this technology squeezed into cars any time soon. Intel reckons we will see it inside new vehicles within a decade, though.

Article by, R.JAYANTHI,III B.Sc CT- G1

Interesting Facts


  • Amazon, originally a printed book seller company, now sells more e-books than printed books.
  • The first domain name ever registered was
  • Tim Berners-Lee coined the phrase "World Wide Web" in 1990.
  • U.S. President Bill Clinton's inauguration in January 1997 was the first to be webcast.
  • Google uses an estimated 15 billion kWh of electricity per year, more than most countries. However, google generates a lot of their own power with their solar panels.
  • Bill Gates, the founder of Microsoft was a college drop out.
  • Bill Gates house was designed Using a Macintosh computer.
  • About 1.8 billion people connect to the Internet, only 450 million of them speak English.
  • In 2012, approximately 17 billion devices (which includes computers, tablets and mobile) connected to the Internet.
  • Sweden has the highest percentage of internet users, they are 75%.
  • Did you know that Email was already around before the World Wide Web came?
  • Up until the 14th of September, 1995, domain registration was free.
  • One of the world's leading computer and computer peripheral manufacturer Hewlett Packard was first started in a garage at Palo Alto in the year 1939.
  • Google estimates that the Internet today contains about 5 million terabytes of data (1TB = 1,000GB), and claims it has only indexed a paltry 0.04% of it all! You could fit the whole Internet on just 200 million Blu-Ray disks.
  • The prime reason the Google home page is so bare, is due to the fact that the founders didn't know HTML and just wanted a quick interface. In fact, the submit button was a later addition, initially, hitting the RETURN key was the only way to burst Google into life.
  • Doug Engelbart had made the first computer mouse in 1964, and it was made out of wood.
  • Every minute, 10 hours of videos are uploaded on Youtube.
  • The world's first computer which was named Z1, was invented by Konrad Zuse in 1936. His next invention, the Z2 was finished in 1939 and was the first fully functioning electro-mechanical computer.
  • There are approximately 1,319,872,109 people using the Internet.
  • Amongst the most interesting computer facts is, when the first Apple computer which was built by Steve Jobs and Steve Wozniak, it was made by using parts they got for free from their employers. They were made to scrounge spare parts from work.
  • While it took the radio 38 years, and the television a short 13 years, it took the World Wide Web only 4 years to reach 50 million users.
  • 70% of virus writers work under contract for organized crime syndicates.
  • A program named "Rother J" was the first computer virus to come into sight "in the wild" that is, outside the single computer or lab where it was created.
  • 'Stewardesses' is the longest word which can be typed with only the left hand.
  • Mosaic was the first popular web browser which was released in 1993.
  • Of the 247 BILLION email messages sent every day, 81% are pure spam.

Article by Geetha Parameshwari.P, III B.Sc CT-G2


Cloud Computing

  1. Analysts predict that by 2014 the latest technology inventions related to cloud computing will significantly influence how we use our computers. Cloud computing is where tasks and file storage on your computer are performed and stored elsewhere.By using an internet connection you can connect to a service that has the architecture, infrastructure and software to manage any task or storage requirement at less cost.The advantages of cloud computing is that it eliminates the difficulty and expense of maintaining, upgrading and scaling your own computer hardware and software while increasing efficiency, speed and resources.
  2. Your computer processing speed, memory capacity, software applications and maintenance requirements are minimized. You could store and access any size or type of file, play games, use or develop applications, render videos, word process, make scientific calculations, or anything you want, by simply using a smart phone. As a comparison, let's say you had to generate your own electricity. You would need to maintain, upgrade and scale these resources as required to meet your demands. This would be expensive and time consuming.
  3. Cloud computing could be compared to how a utility provides electricity. It has the architecture, infrastructure, applications, expertise and resources to generate this service for you. You just connect to their grid. Microsoft, IBM and Google are some of the companies that are investing heavily into the research and development of cloud technology.

Car GPS tracking

  1. Car Gps Tracking is fairly common in new vehicles, providing drivers with tracking and navigation. However, latest technology inventions have made car gps tracking systems more sophisticated, allowing for a wide range of additional uses. Smartbox technology is one example of how car gps tracking systems are being used to lower car insurance.A comprehensive recording of a driver habits allows insurance companies to provide "pay-as-you-drive" car insurance.
  2. City officials in New York City are considering how car gps tracking could be used as "Drive Smart" technology.Most large cities have a limited capability to change the infrastructure of their roadways.A car gps tracking system that integrates with traffic information would give drivers the ability to select routes in real time that were more fuel efficient, less congested, faster or shorter.
  3. A driver recorded routing selection could then be used to penalize or reward drivers by lowering or increasing their related licensing fees or by calculating mileage based "road-use" fees. Eventually, such a system would replace gasoline tax since these revenues will decline as more vehicles become less dependent on fossil fuels.

Air into Water

  1. Johathan Ritchey has invented the Watermill, which is an atmospheric water generator. It converts air into fresh water.This latest technology invention produces fresh water at a cost of about 3 cents a liter (1 quart). Originally designed for areas that do not have clean drinking water, the Watermill is for households that prefer an eco-friendly, cost effective alternative to bottled water.Atmospheric water generators convert air into water when the temperature of the air becomes saturated with enough water vapor that it begins to condense (dew point).
  2. "What is unique about the Watermill is that it has intelligence," says Ritche. This makes the appliance more efficient. It samples the air every 3 minutes to determine the most efficient time to convert the air into water.It will also tell you when to change the carbon filter and will shut itself off if it cannot make pure clean water.

Vein Identification

Another technology innovation is the biometric identification and security device known as Palm Secure. It works by identifying the vein pattern in the palms of our hands.Similar to our fingerprints, vein patterns are unique to each individual. The purported advantages of this technology is that it is less expensive, easier to manage, and is more reliable than traditional methods of identification.

World's Fastest Motor

  1. A new motor developed by researchers at ETH Zurich's Department of Power Electronics and marketed by the Swiss company, Celeroton, can spin in excess of 1 million revolutions per minute.As a comparison, collapsed stars spin at 60,000 rpms, a blender at about 30,000 and high performance engines at around 10,000 rpms.The matchbook-sized motor has a titatnium shell, ultra-thin wiring and a trade secret iron formulated cylinder. The need for smaller electronic devices requires smaller holes, which means smaller, faster, more efficient drills.
  2. A new prototype house walked around the campus of the Wysing Arts Centre in Cambridgeshire, England.The eco-friendly house is powered by solar cells and minature windmills, and comes with a kitchen, a composting toilet, a system for collecting rain water, one bed, a wood stove for CO2 neutral heating, a rear opening that forms a stairway entrance, and six legs.
  3. A collaborative effort between MIT and the Danish design collective N55, the house walks about five kilometers an hour similar to the walking speed of a human. The legs reguire a software algorithm to calculate the movement and position of the legs to provide stability over varying terrain.The house can turn, move forward or backwards, or change height as required and can be programmed with GPS waypoints for traveling to destinations.

Article by R.Monika,B.Sc CT-G2

LED carpet turns the floor into a screen

  • BIG-SCREEN TV not involving enough? How about a giant LED-studded carpet that transforms the floor into a vivid display? The design could let animated characters step out of your TV and whizz across the floor or guide passengers at an airport.
  • Announced last week, the carpet is the result of a collaboration between Dutch carpet-maker Desso of Waalwijk and display and lighting firm Philips of Eindhoven. The trick was to engineer a carpet backing that could transmit light, says Desso's Ludwig Cammaert. Instead of the usual opaque, rubbery resin, Cammaert built a translucent plastic backing that can stand up to heavy wear and tear. This is laid on top of a 10-millimetre-thick steel screen peppered with LEDs.
  • The carpet could provide animated signage on the floors of shops, theatres, and hotels, says Ed Huibers of Philips. And at airports, arrows could point passengers toward their departure gate, for example. "Architects are looking into other interesting applications now, too such as placing QR codes on the floor," he says.
  • It is a clever idea to turn the floor into a display, says Simon Parnall of News Digital Systems, a firm developing ways to build large tiled screens cheap enough to cover walls. "This technology could have an enormous range of uses, signage just being the first," he says. "I am sure interactive gaming applications will soon follow. It very much fits in with the vision of ubiquitous screen technology we share."


  • It's been a while since the moon has had house guests. China is due to send a lander and a rover as early as next week to the lunar surface � the first attempt to land there in 37 years. But researchers say the mission could be a mixed blessing for spacecraft already in orbit.
  • China aims to use robots to return lunar material to Earth for study around 2017. To prepare for this, two previous Chinese probes took images of the moon from orbit. The latest mission, Chang'e-3, will be China's first lunar touchdown. It includes a six-wheeled rover that has been named Yutu, or Jade Rabbit, after the mythological pet of lunar goddess Change.
  • "This is going to be quite a feat � something that's not been done for a number of years and something that China has never done," says Clive Neal of the University of Notre Dame in Indiana.
  • Details about the mission are thin on the ground, possibly because China does not want to release too much information about it in case it fails, suggests Neal. But according to Chinese media reports, the mission is due to blast off from the Xichang Satellite Launch Center in southwest China in early December.



  • The craft will aim to land on a flat plain inside a 235-kilometre-wide crater known as the Bay of Rainbows. The solar-powered rover may be able to travel at least 3 kilometres from the landing site. It will carry a ground-penetrating radar system that will probe the structure of the lunar crust down to perhaps 200 metres or so, along with a scoop for collecting soil samples that will help China test technology needed for its future sample-return mission. The rover will also carry a number of cameras, including two on a raised mast that may provide 3D images.
  • But China's historic moon mission is due to arrive while a NASA probe called LADEE is also trying to take data on the moon's almost non-existent atmosphere. Last week LADEE entered into the relatively low orbit needed for it to make its main observations and create a baseline for the composition of the lunar atmosphere.
  • If LADEE does not have its core data before the Chinese mission arrives in mid-to-late December, any gases that Chang'e-3 emits as it descends to the surface and any dust it kicks up on landing might be hard to disentangle from the normal conditions on the moon, says Neal. But if LADEE is able to complete its task first, it could have an unexpected opportunity to study how long any gas and dust added to the atmosphere stays aloft. "This can be a nice controlled experiment for the LADEE mission," says Neal.
  • Project scientist Rick Elphic at NASA's Ames Research Center in Moffett Field, California, is hopeful that Chang'e-3 will be more help than harm. He notes that the LADEE mission began some science observations on 21 October at a higher altitude and has already taken data under a range of different conditions, such as when the moon was bathed in particles streaming from the sun.
  • "It's very early days yet," he says. "But these observations, and others over coming weeks, will provide us with a good baseline."

Article by, A.Puvitha, B.Sc IT

More facts about LINUX

Developer of Linux

Developer of Linux

Linux is one of the world’s most powerful and popular operating systems. Linux operating system was developed by Linus Benedict Torvalds at the age of 21. At present there are more than 300 flavors of Linux available and one can choose between any of them depending on the kind of applications they want.

Linux is a freeware and generally speaking its free from Virus and other malware infections.

  1. Only 2% of the current Linux kernel written by Linus Torvalds.
  2. The Linux kernel version is written in the programming language C.
  3. GNU/Linux


  4. The first commercial distribution GNU / Linux,Yggdrasil, was launched Lice-CD format in 1992. Red Hat was one of the first distributions to settle within companies and data centers in 1999.
  5. A guy named William Della Croce Jr. registered the name Linux and demanded royalties for use of the mark. Later, he agreed to assign the trademark to the true owner, who is Torvalds.
  6. Countries such as Russia, Brazil and Venezuela have put their focus on Linux as a basis for interoperable management, cost efficient and technologically independent.
  7. U.S. Department of Defense, U.S. Navy Submarine Fleet, and Federal Aviation Administration use Linux in government offices. Indian state of Tamil Nadu uses Linux for education purpose.
  8. 90% of the world’s most powerful supercomputers using an operating system GNU / Linux, in fact, the top ten of supercomputers use Linux. In fact, the penetration of Linux in data centers is very high, 33.8% of the world runs on Linux servers compared to 7.3% does so in a Microsoft operating system.
  9. Linux Penguin logo

    Linux Penguin logo

  10. The name of the penguin, Tux, is not entirely clear. On the one hand, it is said that the origin of the name comes from the fact that penguins appear to be wearing a tuxedo, which in English is said max tuxedo tux and is abbreviated. In contrast, another source comes from the letters of the logo of Tux are Unix Torvalds.
  11. Torvalds wanted to call the kernel Freax (a combination of “free”, “freak”, and the letter X to indicate that it is a Unix-like), but his friend Ari Lemmke, who administered the FTP server where the kernel was hosted for download, the download directory called kernel of Linux Torvalds.
  12. Linux Debian logo

    Linux Debian logo

  13. Debian was one of the first GNU / Linux that was constituted and organized as a community of developers.
  14. Linux is present in highly critical applications such as Japan’s bullet trains, traffic control, San Francisco, the New York Stock Exchange, CERN, many air traffic control systems or control of nuclear reactors of submarines and ships many nuclear war.
  15. Linux programmers are often associated with living “isolated” in the world, however, over 75% of the code developed for the Linux kernel came from private sector developers. In fact, large technology companies like Intel, Google, IBM, AMD, Sun Microsystems, Dell, Asus, HP, Analog Devices, Oracle, Novell or Red Hat help developing applications, contributing to the core or pre-installing any GNU / Linux their machines. In fact, during the 2003 Super Bowl (which paralyzes the United States and remains glued to the TV for many Americans), IBM delivered a beautiful ad talking about Linux and open source options.
  16. The GNU project in 1991 had no drivers and kernel, that’s what led to Linus Torvalds to address the Linux kernel development. If GNU had had, perhaps, Torvalds had not been put to work on that.
  17. The Linux kernel is now the most widely ported operating system, running on a great variety of operating systems.
  18. World known companies such as Google, Cisco, Facebook, Twitter, LinkedInetc. use Linux as their main operating system.

Article by, R.Jayanthi, III B.Sc CT- G1.

New malware communicates via sound waves



Scientists have developed a new malware that transmits information between computers using high-frequency sound waves inaudible to the human ear.

This allows the malware to transmit keystrokes and other sensitive data even when infected machines have no network connection. The new malware uses high-frequency audio signals to bridge the 'air gap' , a type of security where network is secured by keeping it separate from other local networks and the Internet.

Using just the built-in microphones and speakers of standard computers, the researchers from Germany's Fraunhofer Institute for Communication, Information Processing, and Ergonomics were able to transmit passwords and other small amounts of data from distances of almost 65 feet. The software can transfer data at much greater distances by employing an acoustical mesh network made up of attacker-controlled devices that repeat the audio signals.

The complete concept of air gaps can be considered obsolete as commonly available laptops can communicate over their internal speakers and microphones and even form a covert acoustical mesh network. "Over this covert network, information can travel over multiple hops of infected nodes, connecting completely isolated computing systems and networks (example internet) to each other.

After testing several ways to use inaudible sounds to transmit data between two laptops using only their built-in microphones and speakers, researchers found the most effective technique. It relied on software originally developed to acoustically transmit data under water.

Sound waves as a loophole

Sound waves as a loophole

Created by the Research Department for Underwater Acoustics and Geo-physics in Germany, the so-called Adaptive Communication System (ACS) modem was able to transmit data between laptops as much as 19.7 meters apart. By chaining additional devices that pick up the signal and repeat it to other nearby devices, the mesh network can overcome much greater distances.

However, transmitting data via sound waves has one drawback - a transmission rate of about 20 bits per second. The sluggish bandwidth forecloses the ability of transmitting video or any other kinds of data with large file sizes.

Article by, T.Poornima, B.Sc CT- G2

Amazon Prime Air

I am really excited to share this recent exciting innovation from Amazon’s - next generation R&D labs. Amazon is the world’s biggest online retailer and one of their key targets is to deliver shipment to customers in a quick smart way. This new innovation, as they cherish as “Prime Air” – are unmanned aerial vehicles (UAVs) or drones that can deliver packages weighing up to 2.3kg to customers within 30 minutes of ordering. As drones are for known from couple of decades back, mainly used in military spying and special operation purposes. Using drones commercially like this ‘Prime Air’ could have to face lot of hampers for bringing them into commercial service. Here I want to put forth some of my views on the pros and cons of this type of technological innovations.

A picture of ‘Prime Air’ drones released by Amazon, the world's largest online retailer for delivering goods on customer doors.


Prime Air on my view:

The Prime Air is an octocopter with eight propellers for precise navigation control, even though as they are low flying objects, requirement of having a highly intelligence system for interpreting obstacles in a densely populated areas should be consider.

  • Safe landing of this prime air in to the customer’s home in a growing number of apartments in a multistoried building is a difficult task, as many of those apartments are highly secured to enter into it.
  • It is difficult to guard them on their way, as they can be captured and stolen.
  • As online shopping are mainly meant for their cheap prices, technological innovations like this should be contemporarily highly expensive is difficult for the customer to offer and decrease their choice of use.
  • To introduce this type of drone technology in to commercial use should be licensed by each country and sometimes by each city and zone.


  • Innovations like these in technological advancement era is welcomed and is most required, though there are certain bottlenecks that need consideration and are to be addressed in order to make these innovations practically successful.
  • The Federal aviation agency (FAA) was "actively working on rules for unmanned aerial vehicles", the company said, adding that it hoped the green light would be given as early as 2015.
  • Multinational companies like Amazon can start working on eliminating the bottlenecks in order to strengthen their innovation with drone.

Article by Sabarisree dhanabalan, B.Sc CT -G2


A quantum computer (also known as a quantum supercomputer) is a computation device that makes direct use of quantum-mechanical phenomena, such as superposition and entanglement, to perform operations on data. Quantum computers are different from digital computers based on transistors. Whereas digital computers require data to be encoded into binary digits (bits), quantum computation uses quantum properties to represent data and perform operations on these data.Quantum computing: A dynamic new fascinating field that is being pioneered as you read these words. Forget bits, binary and logic gates. Welcome to the world of Qubits, Quantum Gates and Quantum circuits & algorithms.


The power of computers today depends upon the number of transistorson chip. More transistors, generally the more powerful the computers.

Moor's Law states: 'The number of transistors on a microprocessor continues to double every 18 months.'This means that by the year 2015 we will find that transistors on a chip will become so small that they will be measured on an atomic scale. Quantum computers will be able to perform millions of calculations at the same time, whereas today's conventional computers only perform one.


The classical computer (non-quantum), like the PC or laptop that sits in front of you, uses the language of computers called binary. Binary is a base 2 mathematical language because it only consists of two digits. These are 1s and 0s. This is the fundamental unit of information or building block called the bit. A bit, in classical computers, is either a 1 or 0. In quantum computing the fundamental unit of information is a qubit (quantum bit). Qubits form the basis of quantum computing.


Qubits are made up of quantum particles which are: photons, atoms, electrons and ions. These particles need to be controlled in order to create a qubit which cages these particles. Control devices trap these particles and then switch their state. There are four control devices that can be used to create qubits: *Ion traps *Quantum dots *Semiconductor impurities *Superconducting circuits

Ion traps:

Ion traps use magnetic fields to trap ions. At this moment in time, researchers have managed to entangle as many as six ions in a single ion trap. As ion trap technology becomes more established, the number of ions trapped will grow.

Quantum dots:

Quantum dots are bits of semiconductor material that contain one or a few electrons. Quantum dots are loaded with electrons, and they can be integrated into electronic devices. The most advanced prototypes today work only at extremely low temperatures.

Semiconductor impurities:

It is difficult to make a pure computer chip. Some atoms embedded in these chips are commonly found as impurities (or flaws).Qubits include 'unwanted' electrons of atoms intentionally into the semiconductor materials. The state of these electrons can then be controlled using lasers or electric fields.

Superconducting circuits:

Superconducting circuits are simply electrical circuits which are made of superconducting material. Superconducting circuits can form qubits by the flow of current. The current can be made to flow in both directions at once (simultaneously) in the quantum state of superposition.The advantage is that they use millions of electrons instead of controlling individual particles. Superconducting circuits have to work at extremely low temperatures.



We have seen the enormous superiority that qubits have over bits. This means nothing though, if we don't have a way of manipulating the information in qubits. To manipulate information in a qubit, quantum gates are used.

Quantum computer

Quantum computer

How quantum gates work:

A quantum gate works similar to a classical logic gate. Classical logic gates take bits as input; evaluate and process the input and produce new bits as output. In the example below (refer to diagram CLG), the logic gate takes in 0101 as input, which goes through the gate and an output of 10 is produced.

Quantum processing

Quantum processing


Another property of quantum gates it that they are reversible unlike many classical logic gates. This means that the outputs can be converted back into the original input. Why is it necessary? The answer is, to preserve the quantum state. In order for the gates to be reversible, the number of outputs must be the same as the number of inputs.

Article by, Navaneethakrishnan.K and Anguraj.N,II B.Sc CT-G1

Strangers can mail you with Gmail's new update, Concerns Raised

A new feature in Google Inc.'s Gmail will result in some users receiving messages from people with whom they have not shared their email addresses, raising concerns among some privacy advocates.

The change, which Google announced on Jan 9,2014, broadens the list of contacts available to Gmail users so it includes both the email addresses of their existing contacts, as well as the names of people on the Google+ social network. As a result, a person can send an email directly to friends, and strangers, who use Google+.

Gmail threats

Gmail threats

Google is increasingly trying to integrate its Google+, a two-and-a-half-year old social network that has 540 million active users, with its other services. When consumers sign up for Gmail, the company's Web-based email service, they are now automatically given a Google+ account.

Google said the new feature will make it easier for people who use both services to communicate with their friends.

"Have you ever started typing an email to someone only to realize halfway through the draft that you haven't actually exchanged email addresses?" the company said in a blog post announcing the feature. "You're in luck, because now it's easier for people using Gmail and Google+ to connect over email."

Google said that users who did not wish to receive email messages from other people on Google+ could switch the settings so that they receive messages only from people they have added to their networks of friends or from no one at all.

Google said the new feature would not expose the email addresses of any Google+ users to strangers. Emails from strangers on Google+ will be routed to a special section within the recipient’s mailbox that is separate from messages from friends and other contacts. If the recipient does not reply to the message, Gmail will block any future messages from that person.

A Google spokeswoman said the company planned to send an email to all Google+ users during the next two days alerting them to the change and explaining how to change their settings.

One exception to the new feature is celebrities on Google+, who are followed by a large number of fans. According to the spokeswoman, the Gmail accounts of such public figures will not automatically receive emails from other Google+ users.

Some privacy advocates said Google should have made the new feature "opt-in", meaning that users should explicitly agree to receive messages from other Google+ users, rather than being required to manually change the setting.

Marc Rotenberg, the executive director of non-profit Electronic Privacy Information Center, called the new feature "troubling."

"There is a strong echo of the Google Buzz snafu," he said, referring to a social networking service that Google launched in 2010. Buzz initially used its Gmail users' contact lists to create social networks that the rest of the world could see, leading to uproar and ultimately a settlement with the US Federal Trade Commission.

Article by, R.JAYANTHI,III B.Sc CT- G1

Technology facts

Probing with technology

Probing with technology

Want X-Ray vision like the man of steel? A technology that lets you see behind walls could soon be built in to your cell phone.

MIT professor Dina Katabi and graduate student FadelAdib have announced Wi-Vi, a demonstration of a technology that uses Wi-Fi to allow a viewer to "see" a person moving behind a wall. (Wi-Vi stands for "Wi-Fi" and "vision.")

Previous work demonstrated that the subtle reflections of wireless inter signals bouncing off a human could be used to track that person's movements, but those previous experiments either required that awireless router was already in the room of the person being tracked, or "a whole truck just to carry the radio," said Katabi.

The new device uses the same wireless antenna as is found in a cell phone or laptop and could in theory one day be embedded in a phone.

The trick is canceling out all interfering signals.Wi-Fi doesn't just bounce off humans, but also walls, floors, and furniture. And those signals are 10,000 to 100,000 times more powerful than the reflections off a human body.

Katabi'sWi-Vi sends out two wireless signals, one of which is the inverse of the other. In what Katabi calls "interference nulling" the two signals cancel each other out unless they hit a moving target such as a human.

"To silence the noise, we change the structure of the Wi-Fi signal so all the undesired reflections cancel," she said.

The device is meant to be portable so, for example, a person worried that someone was hiding in the bushes could do a quick scan for her personal safety.

Wi-Vi could also serve as a high tech baby monitor or help Superman or just cops catch baddies.

6 Ways to Get a Stronger Wi-Fi Signal at Home
Wifi signal

Wifi signal

One or two bars on your laptop's Wi-Fi signal strength indicator is just one of the signs that you've got a weak signal. Movies take forever to load. Webpage loading stalls. Or maybe you've seen the dreaded message: You are no longer connected to the Internet.

You may be able to improve your Wi-Fi signal at home by making a few simple changes.

Reposition the router:

Is your wireless router in the basement or tucked unobtrusively into a corner? You may be losing as much as half the signal. Most routers are Omni-directional, sending signals is a circular pattern like the ripples from a rock dropped in the center of a pond.

For best performance, position your wireless router in a central location away from exterior walls and off the floor. If you live in a multistory house, place the router on the main or middle floor.

Metal objects and water also will block the signal. Position routers at least two feet from things like metal filing cabinets, appliances and fish tanks.

Change the channel:

Interference from other household electronics and your neighbor's Wi-Fi network can reduce your router's signal. Wi-Fi routers transmit signals on one of three channels: 1, 6 and 11 in the U.S. The default for most routers is set to 6 by the factory, but you can change it to a less-trafficked channel.

Find your router's configuration page address on the manufacturer's website. Open settings and choose a new channel. Wait a few minutes to determine if your signal has improved.

Trial and error is the only way to find out which channel is least congested. The best channel will vary from house to house, depending on which channels other wireless devices in your area are using.

Replace the antenna:

Moving the router to a central position may not be feasible because the router must be connected to your cable box or other Internet modem.

If this is the case, you may be able to upgrade the router's antenna to a so-called high gain antenna, which could double your router's signal.

Check to see if your router's antenna is removable. Alternately, your router may have a jack available for an additional antenna. Verify that the new antenna will fit your router.

With a 12-inch square of aluminum foil, some glue and a piece of cardboard, you can make your own device to rival a new high gain antenna. The flexible parabolic shape can be adjusted to direct most of the router's signal out into the room rather than losing it to the outside.

The Ez-12 Parabolic Reflector template is available as a free download from Watch the video first. The project can be done in less than 30 minutes and has been shown to more than double signal strength.

Upgrade your computer's network adapter:

If you're using an older computer that does not have built-in wireless capability and you are using a card-style network adapter, it may be time for an upgrade. Your router may be sending a strong signal, but if your computer's adapter is weak, you'll have a weak signal.

Older adapters send and receive signals based on older Wi-Fi standards denoted as 802.11 a/b/g. Today's faster standard is called "n" and offers data signal speeds up to 600 megabits per second compared with 54 Mbps for 802.11a/b and 11 Mbps for 802.11b.

Look for an 802.11n USB network adapter with an external antenna. It will be backwards compatible with computers built on earlier standards. Expect to pay between $10 and $20. It may be wise to buy an adapter made by the manufacturer of your router to eliminate possible compatibility problems.

Add a wireless repeater:

Signals weaken the farther they travel from the router. If your house is large, a wireless repeater or booster can be used at the halfway point between the router and the points where family members are using their devices.

Wi-Fi repeater cans double the coverage area of your existing Wi-Fi network. It is a stand-alone unit that is not physically connected to the network.

Once again, it's probably best to buy a repeater made by the same manufacturer as your router.

Article by, A.G.REVATHY,II B.Sc IT

Tongue-Controlled Wheelchair System

Researchers have refined a system that allows people with tetraplegia (paralysis of all four limbs) to control their wheelchair with their tongue.

The system, called Tongue Drive System (TDS), consists of a headset that holds sensors just outside the cheeks and a barbell-shaped, magnetic tongue piercing.

The headset’s sensors detected the changes in the magnetic field caused by the tongue changing position in the mouth, then relayed the information to an iPod that sent the commands to the paired, powered wheelchair.

The system debuted last year, but now has been streamlined with the elimination of the then-required dental retainer.

U-CAT Turtle-bot Explores Shipwrecks

The U-CAT robot was developed to explore shipwrecks, where its small, turtle-inspired body can squeeze into places too tight or dangerous for humans to venture.

Instead of the typical propellers, the U-CAT is equipped a camera that collects footage of the wreck for later study and four flippers that allow it to move forward and backward as well as turn in place and hover. The choice of flippers was an important key in the development of the robot, because they enable it to move through the environment without disturbing the water and stirring up silt from the seabed, which would decrease visibility.

OrbSys Shower Recycles Water While You Wash

The water-recycling OrbSys Shower purifies water while you wash, cutting water use by up to 90 percent.

The shower, which is similar to those used on space shuttles, features a closed-loop system that filters the soapy, used water, purifies it and then sends it directly back into the flow.

The water retains most of its heat during the process as well, and the filtration process leaves the water even cleaner than typical tap water.

Creating a Power Plant in the Sky

By placing a network of unmanned drones at high altitudes, a UK firm hopes to harvest energy from a variety of sources for transmission to ground-based receiving stations.

The company, New Wave Energy, is developing technology that will see a network of drones hovering in the sky and harnessing wind and solar power. Each four-rotor drone would be equipped with wind turbines and a panel for harvesting solar energy, allowing it to gather enough energy to power itself and still transmit an additional 50 kW wirelessly to the ground as electromagnetic waves.

The drones would operate at high altitudes where they would not be disturbed by weather or aircraft, and their aerial nature would make it easier to send power to remote locations or provide assistance during a natural disaster.

Jellyfish Inspire More Stable Flying Drones

The jellyfish’s ‘flight’ through water has inspired a small flying drone able to maintain a more stable flight without the need for a complex control system.

Many robotic drones have been based around the flight mechanisms of insects such as fruit flies, but that form requires a series of complicated adjustments in order to remain stable. In contrast, the new, jellyfish design features a set of four wings arranged like flower petals. The motion of the wings resembles the pulsing motions of a jellyfish, enabling the drone to hover, ascend and fly in designated directions while also remaining stable.

Eliminating some of the complicated stabilizers reduces weight and frees up extra space, paving the way for smaller and more energy efficient drones.

Diagnosing Cancer with a Squeeze

Researchers have found a way to diagnose cancer easily and more accurately by monitoring how individual cells respond to being squeezed.

The technique uses a deformability cytometer that is able to screen cells for cancer by measuring their level of rigidity. This screening is more efficient than previous methods because it can take place while the cells are still in the pleural effusion (the liquid that builds up in the spaced surrounding the lungs in the presence of cancer).

Instead of the cells needing to be extracted and then subjected to complicated procedures, the cells are squeezed as they move through micro scale conduits, and then their amount of deformity is measured. Cancer cells are softer than healthy cells, and so will deform in different ways.

SmartWig Sends Email Alerts

Sony has patented a design for a SmartWig that would connect wirelessly to smartphones and provide haptic feedback to signal email messages and such.

The SmartWig would be able to wirelessly communicate with a “second computing device,” such a smartphone, tablet or sunglasses. In addition to providing email alerts, the wig could also be paired with a GPS device, which would trigger different areas of the wig to vibrate to indicate directions. Other ideas in the patent include touchpad-integrated sideburns, a built-in camera and a laser pointer.

Besides helping the user feel a bit like James Bond, the wig could also have medical applications—such as monitoring brain waves, blood pressure and temperature

Charging Electric Vehicles on the Go

The ‘range anxiety’ felt by drivers of electric vehicles may be relieved if researchers realize their vision of installing wireless chargers in roads.

Currently, stationary inductive charges for EVs rely on sensors to make sure the receiver coils on the vehicle are properly aligned with the charging coils. To allow for the charging of a moving vehicle, a team from North Carolina State University developed a receiver that will trigger a shot of power when a vehicle passes over a transmitter. The roadway-embedded transmitter coils would be constantly giving off a weak field, which would be increased when a vehicle with a receiver passes by. The team has already created a low-power prototype, and hopes to increase its rate to 50 kilowatts.

According to Srdgan Lukic, assistant professor at NCSU, models indicate that installing the charging coils in just 10 percent of a roadway would extent a car’s driving range from about 60 miles to as much as 300.

E-Fox Velomobile Combines the Best of Bikes and Cars

Designed for urban commuters, the E-Fox was created to bridge the gap between the bicycle and the car.

Technically classified as an electric bike, the E-Fox Velomobile is equipped with a small electric motor able to propel the car up to 20 mph with a 30 mile charge radius. The user can also pedal the vehicle in order to increase the speed or extend battery life. The protective shell of the E-Fox will protect the occupant against the weather, and the small, seven-pound battery can be removed from the car, taken inside, and fully charged in five hours with a charger just a bit larger than a laptop charger.

Tiny Sensor Detects Strokes During Heart Surgery

The discovery of a protein that serves as a biomarker for brain injuries has led to the creation of the world’s most sensitive organic thin film sensor—and a new way to detect brain injury during heart surgery.

Although brain injury can occur during heart surgery in patients of all ages, the biosensor was developed specifically with young patients in mind. Many children with congenital heart defects require a series of operations throughout their lives, and pediatric cardiologist Dr. Allen D. Everett noticed the neurodevelopment problems that would occur as a result of the repeated surgeries.

To address the issue, he used an organic thin film transistor as the platform for a sensor able to detect glial fibrillary acidic protein (GFAP), a biomarker for brain injury. The detector is extremely sensitive to the protein, and can alert the medical team to the occurrence of a stroke, allowing them to take immediate measures. The sensor could also eventually be used at sporting events to detect concussions in athletes.

La Fonction No. 1 is an Office in a Briefcase

The La Fonction No.1 is a sleek, mobile office that folds out from a briefcase creating a private, handy workspace for travelers or shared-office users.

Inspired by the ways early photographers sheltered them from the light, the sides and top of La Fonction No. 1 can be opened and folded to create an organized working zone. Other office necessities, such as pens and papers, can be stored in the internal compartments, which are located within handy reach when the case is in workstation mode. Made of quality leather, lined in Italian canvas, and able to carry a 15 inch laptop, the case is also stylish enough for urbanites.

Detecting Disease with Bees

A new device that uses bees to detect cancer and other diseases could give dogs some new competition.

Created by Susan Soares, the bee-powered sensor is made up of pair of chambers: a smaller one, called the diagnosis space, and a larger chamber that holds the trained bees. The patient breathes into the smaller chamber, and the bees, which have been taught to connect certain smells with a food reward, will move toward the person’s breath if they detect their trigger smell. According to Soares, bees can be trained to respond to certain smells in only ten minutes. Once the bee has been captured, trained and performed its duty, it is released to return to the hive.

Sign Language Ring Translates for the Hearing

The Sign Language Ring concept tracks the signing motions made by the user and translates them into audio and written text.

The system would consist of a bracelet and six rings, which are stored on the bracelet when not in use. The ring would detect the hand motions and send the data to the bracelet, where the signs would then be translated into spoken word as well as displayed as text on the bracelet’s screen.

The Sign Language Ring is a 2013 Red Dot award winning design.

Ultrasound Insulin Delivery

A new device that lets diabetic sufferers 'inject' their insulin with ultrasound could provide a pleasant alternative to the daily, multiple injections.

The technique involves using ultrasound pulses to inject insulin-filled nanoparticles just under the patient’s skin. The nanoparticles would have either a positively charged or negatively charged coating, which would allow them to attach to each other instead of spreading throughout the body. As the insulin slowly seeped through the porous nanoparticles, the electrostatic force will also keep it from spreading.

A hand-held ultrasound device is used to release the insulin into the bloodstream when the person is ready for a dose. The device is used externally, and is held just above the site of the nano-network to deliver focused waves of ultrasound to the particles. The team believes the waves excite tiny gas bubbles in the tissue, temporarily disrupting the force holding the particles together and thus allowing the insulin to be released into the bloodstream.

Taste Simulator Adds Flavor to Virtual Worlds

An electrode able to simulate different tastes when held to the tongue could have implications in both gaming and healthcare.

The device is equipped with a silver electrode that is held to the tip of the tongue by the user. Slight changes in the alternating current and temperature controlled by semiconductor elements generate the primary tastes of salty, sweet, bitter and sour. Currently the electrode has to be physically held to the tongue to operate, but the developers hope to create a wireless version that can be used with the mouth closed.

Along with allowing the user to ‘taste’ foods in games and cooking shows, the team also envisions the device being used in healthcare to help chemotherapy patients regenerate their diminished sense of taste or allow diabetics to enjoy the taste of sugar without actually ingesting any.

Tiny Take Yourself Camera Designed for Self-Portraits

The tiny Take Yourself camera pairs with a smartphone to provide an easier and more creative way to take self-portraits.

The Take Yourself camera can be held easily in one hand, which makes it a bit more fluid to operate than some smartphone cameras. It uses the smartphone’s screen to display the image being captured, and then sends the image to the phone via Bluetooth and the companion app.

The camera can also be placed on a surface or clipped to an object and the smartphone used as a remote shutter control to capture images beyond self-portraits.

Bloom Floating Farm Designed to Reduce CO2 Levels

The Bloom floating farm was designed to grow plankton (which help to remove carbon dioxide from the air) while it monitors sea levels, creates fresh water and sends tsunami alerts when appropriate.

One of the five finalists in the "Architecture+Weather" category of Architizer A+ Awards, the Bloom was conceived by Sitbon Architectes of Paris. The large, floating structure would be equipped with aquariums of photoplankton, tiny sea-creatures that play a key role in removing CO2 from the air. The semi-submersible Bloom would be tethered to the ocean floor with a series of cables, and could be moved to ‘dead areas’ of the ocean to help increase the water’s oxygen levels.

The Bloom would also filter sea water to create drinking water, and its sensitivity to sea vibrations would make it an excellent source of early tsunami warnings.

Article by, V.GIRINATH,II B.Sc IT


Ubiquitous computing (ubicomp) is an advanced computing concept where computing is made to appear everywhere and anywhere.

Ubiquitous technologyis a technology which enables tiny microchips to be implanted in physical objects.

Ubiquitous computing

Ubiquitous computing

Ubiquitous communicators:

The small hand held terminals used to read information contained in tiny microchips that makes up the ubiquitous computing environment.

Ubiquitous offers a model in which computing is an integral part of the real world. "The location of the computer" is one of the key "conditions".

Ubiquitous communicators specialize in communications not only between people "but also between people and things".

New possibilities:

Implanting microchips into physical objects and then loading that information using computer built into household electronics and other devices makes it possible to configure a sensor network "capable of understanding surrounding conditions with greater accuracy".

A real time possibility is that ubiquitous communicators make it possible to have air conditioning and lighting instantly adjusted to the personal taste and requirements..

Checking on security:

Ubiquitous computing is too vast to simply sit backand deal with problems when they arise.There is also an issue that microchips emit radio waves, effect that radio waves can have on human body must also be considered.It is an important new technology it must be developed carefully and wrong turns must be avoided.

The ubiquitous computing will bring RFID chips (RADIO FREQUENCY IDENTIFICATION) into our daily lives. There is a limit to what software protection can do when even the "owner cannot be trusted".



"E TRON" is a special encryption hardware system that prevents electronic data from "being copied or counterfeted". E TRON offers a distributed system frame work for secure distribution of framework..

Ubiquitous computing is thus a new developing technology.The development of affordable and safe microchips will require the great leaps in production technology for which much research development yet has to be done.

Article by, P.Anitha and S.Sariga,II B.Sc CT- G1


Websites, computers, appliances, machines, mobile communication devices, and software applications are with the focus on the user's experience and interaction. These make the user's design of interaction as simple and efficient as possible.

Good user interface design facilitates finishing the task at hand without drawing unnecessary attention to it. Graphic design may be utilized to support its usability.

User interface design requires a good understanding of user needs. There are several phases and processes in the user interface design, some of which are more demanded upon than others, depending on the project.

Windows 8 interface

Windows 8 interface

Functionality requirements gathering assembling a list of the functionality required by the system to accomplish the goals of the project and the potential needs of the users.

User analysis is analysis of the potential users of the system. Typical questions involve:

*What would the user want the system to do?

*How would the system fit in with the user's normal workflow or daily activities?

*How technically savvy is the user and what similar systems does the user already use?

*What interface look & feel styles appeal to the user?

Information architecture- development of the process and/or information flow of the system.

Prototyping- is development of wireframes, either in the form of paper prototypes or simple interactive screens.

Usability inspection- is letting an evaluator inspect a user interface.

Usability testing- is testing of the prototypes on an actual user—often using a technique called think aloud protocol where you ask the user totalk about their thoughts during the experience.

Graphic interface design- is actual look and feel design of the final graphical user interface (GUI). It may be based on the findings developed during the usability testing if usability is unpredictable, or based on communication objectives and styles that would appeal to the user. In rare cases, the graphics may drive the prototyping, depending on the importance of visual form versus function.

User interface controls

User interface controls


Dynamic characteristics of a system are described in terms of the dialogue requirements contained in seven principles of part 10 of the ergonomics standard, the ISO 9241. Seven dialogue principles are:

Suitability for the task:

The dialogue is suitable for a task when it supports the user in the effective and efficient completion of the task.


The dialogue is self-descriptive when each dialogue step is immediately comprehensible through feedback from the system.


The dialogues controllable when the user is able to initiate and control the direction And pace of the interaction until the point at which the goal has been met.

Conformity with user expectations:

The dialogue conforms with user expectations when it is consistent and corresponds to the user characteristics, such as task knowledge, education, experience.

Error tolerance:

The dialogue is error tolerant if despite evident errors in input, the intended result may be achieved.

Suitability for individualization:

The dialogue is capable of individualization when the interface software can be modified to suit the task needs, individual preferences, and skills of the user.

Suitability for learning:

The dialogue is suitable for learning when it supports and guides the user.

Concept of usability is defined of the ISO 9241 standard by effectiveness, efficiency, and satisfaction of the user.

Article by, K.Seethalakshmi,II B.Sc CT- G1

Internet thieves are targeting Indians

Today world has come to our hands. Through smart phone, one can talk with or see a person in any corner of the world. To travel anywhere in the world, one can plan the journey from his /her place, buy flight tickets online, book the hotel room of desired choice. Internet gives number of services like the above mentioned ones. In addition to this, money transactions are possible with the smart phone in our hands.

But thieves misuse this technology to grab money from pockets. The hacking is mainly done by thieves from African countries like Uganda, Nigeria and have been targeting Indians for years.

Last year, a popular Psychologist from Chennai Dr.M.Thirunavukarasu had gone to America for a meeting. During that time, a mail had come from his e-mail ID mentioning that he has lost his baggages, mobile phone, money, ATM and VISA. Further it has been added that to help him, Rs.10000 must be sent to the mentioned bank account number. Some hackers have hacked his e-mail and made a theft of 6 lakh rupees.

Now this scam has even taken its form through mobile phone. The secret information of internet users those who do their transactions online is identified with their mobile phones. In addition to stealing all the money, the hackers also get various things in debt from the companies from which the client usually buys.

The money which is being theft in this manner is transferred to many foreign accounts and finally goes to respective hackers in African countries like Nigeria, Uganda. Those who actually involved in these thefts will close their accounts once their thefts are completely over. Most of these hackers open their accounts using duplicate address proofs. Hence they could not be traced. Only few cases have been reported through media. Some other thefts of people involved in black money have been intentionally hidden.

The hackers have also created another way to steal money. A missed call might come to you from a foreign number seeming like an important call. If you contact that number again, with your sim card, Rs.1000 to Rs.2000 will be debited as call charges. Most of these missed calls are from numbers like +375602605281, +37127913091. According to international code, the number starting from 375 is from Belarus in Afghanistan and the number starting from 371 is from a country called Ladvia in Europe.

Thieves who swindle money with a single missed call cannot be caught to get back the money easily. So it is necessary to be careful with the unknown missed calls. People who use the internet in their smart phones must change the password at least once in a month. The password must be made difficult by using a mixture of letters, numbers and special characters. If possible don't allow other people to use you mobile phone. The missed calls from numbers like +375602605281, +37127913091 should be deleted immediately.

If one knows how to use technology safely, problems like these can be tackled easily.

Article by Shridha.S, III B.Sc CT-G2

Table of Contents