List Of Seminar Topics For Computer Science Page - 5
Femtocell Technology
Femto cells or femtocells are small cellular telecommunications base stations that can be installed in residential or business environments either as single stand-alone items or in clusters to provide improved cellular coverage within a building. It is widely known that cellular coverage, especially for data transmission where good signal strengths are needed is not as good within buildings. Femtocells are compatible with CDMA2000,WiMAX or UMTS mobile telephony devices, using the provider's own licensed spectrum to operate. Typically, consumer-oriented femtocells will support no more than four active users, while enterprise-grade femtocells can support up to 16 active users.
Inferno OS
Inferno is an operating system for creating and supporting distributed services. It was originally developed by the Computing Science Research Center of Bell Labs, the R&D arm of Lucent Technologies, and further developed by other groups in Lucent. Inferno was designed specifically as a commercial product, both for licensing in the marketplace and for use within new Lucent offerings. It encapsulates many years of Bell Labs research in operating systems, languages, on-the-fly compilers, graphics, security, networking and portability. Inferno runs directly on native hardware and also as an application providing a Virtual Operating System over other platforms. Applications can be developed and run on all Inferno platforms without modification or recompilation.
i Phones
iPhone is a smartphone made by Apple that combines an iPod, a tablet PC, a digital camera and a cellular phone. The device includes Internet browsing and networking capabilities. The iPhone also includes a 3.5-inch multi-touch screen (4-inch Retina Display on the iPhone 5), rather than a keyboard, that can be manipulated by users with by two finger touches. The iPhone runs on a special version of Apple'sMac OS X operating system. Like iPod, iPhone synchronizes data with a user's personal computer, using iTunes as a client software and Apple's proprietary USB port. Apple says that iPhone carries 8 hours of life on the internal lithium-ion battery for talk or video, and up to 24 hours for music mode.
Project Natal
Project Natal is Microsoft's 3D camera for Xbox 360. It tracks people's motions in three dimensions and has a microphone capable of voice recognition. It is to be used as a controller-free method of playing video games, tracking the player's body movements and voice and transferring that information directly to the gaming console. Microsoft has described the code name as having several sources. "The name "Project Natal" has several sources. Project Natal will allow users to interact with other users using its camera. Project Natal can recognize more than one person at a time.
Next-Generation Secure Computing Base (NGSCB)
The Next Generation Secure Computing Base (NGSCB) is a part of the Microsoft Vista operating system (OS) that employs a trusted platform module (TPM), a specialized chip that can be installed on the motherboard of a personal computer (PC) or server for the purpose of hardware authentication. The TPM stores information specific to the host system, such as encryption keys, digital certificates and passwords. NGSCB employs a unique hardware and software design to enable new kinds of secure computing capabilities to provide enhanced data protection, privacy and system integrity.
Photosynth
Microsoft have released a new application called photosynth. Any smartphone that has a compass and tilt reading capability can use it. Photosynth offers two styles for creating immersive 3D experiences: panoramas and synths. Shoot a panorama when you can capture everything from a single location with a single zoom level. Great for giving a sense of what it feels like to be in one particular place. Can be 360° in both directions, but doesn't have to be.
Deep Web
Current automatic wrappers using DOM tree and visual properties of data records to extract the required information from the deep web generally have limitations such as the inability to check the similarity of tree structures accurately. Data records located in the deep web do not only share similar visual properties and tree structures, but they are also related semantically in their contents.There's a part of the Internet is known as the deep web. Deep web is called the deep web because of its massive size, it's literally 'deep'. According to the guardian, you can only access 0.03% of the Internet via search engines like Google and the rest is what makes up the deep web.
Semantic web
In addition to the classic “Web of documents” W3C is helping to build a technology stack to support a “Web of data,” the sort of data you find in databases. The ultimate goal of the Web of data is to enable computers to do more useful work and to develop systems that can support trusted interactions over the network. The term “Semantic Web” refers to W3C’s vision of the Web of linked data. Semantic Web technologies enable people to create data stores on the Web, build vocabularies, and write rules for handling data. In addition to the classic “Web of documents” W3C is helping to build a technology stack to support a “Web of data,” the sort of data you find in databases. The ultimate goal of the Web of data is to enable computers to do more useful work and to develop systems that can support trusted interactions over the network.
HTML 5
HTML 5 is a revision of the Hypertext Markup Language (HTML), the standard programming language for describing the contents and appearance of Web pages. HTML5 was developed to solve compatibility problems that affect the current standard, HTML4. One of the biggest differences between HTML5 and previous versions of the standard is that older versions of HTML require proprietary plugins and APIs. (This is why a Web page that was built and tested in one browser may not load correctly in another browser.) HTML5 provides one common interface to make loading elements easier.
Ethical Hacking
Ethical hacking is also known as penetration testing, intrusion testing and red teaming. It is also known as detecting, reporting, exploiting, security vulnerabilities. The state of security on the internet is bad and getting worse. One reaction to this state of affairs is termed as Ethical Hacking which attempts to increase security protection by identifying and patching known security vulnerabilities on systems owned by other parties. Ethical hacking is solely done to find system vulnerabilities, to find weak areas in system security which can cause loss of vital information. It is different from peripheral defense and network defense, which enables system owners to adopt stronger security, measures in a way so that an attacker knows if he is committing an attack.
No comments:
Post a Comment