This is default featured slide 2 title
This is default featured slide 4 title
This is default featured slide 5 title
 

Category Archives: Technology

Barcode Scanners

Barcode Scanner, also known as Barcode Reader, is an input device which is used to capture and retrieve information about the product which is being scanned. This helps in automation of the process thereby increasing the speed, accuracy, and efficiency of the business process.

Barcode Scanners may be hand-held, hands-free, fixed mount, or portable data terminals. Another way of categorization can be into image scanners and laser scanners. But they utilize a connection with a computer through a serial port, a keyboard port and a wedge, which is an infrared device. Some major brands in the field of POS automation are Nexa, Epson, Zebra etc.

A Barcode Scanner uses a beam of light which falls on the barcode printed on the product. When this beam of light is deflected from the product, it is measured on the basis of the fact that the dark bars on the barcode reflect less light in comparison to the light spaces between the dark bars. The scanner, then, converts the light energy into electrical energy. This is further converted by the decoder in the form of data as output. This final output is then displayed on the computer screen.

This barcode scanning involves scanning of a particular barcode and then searching through the database of hundreds and thousands of products to match it with the exact one and display relevant details of that product.

Every business has its unique requirements and hence the features and functionality while choosing the automation tools make a difference in the way they alter the environment. While choosing a scanner, it is very important to understand your type of usage, whether it requires indoor scanning at a particular point or it requires scanning products outdoor or both ways. Further, there are different types of bar code symbols which are into existence. Between the standard 1D and 2D symbols used in barcoding, different scanners have different decoding capabilities. The right one depends upon the requirements of your business.

If the environment is exposed to extreme heat, dust, chemicals, debris or moisture, then it is essential to select a scanner which is highly durable and rugged. In case of mobility is one important characteristic, then a wireless scanner is the best choice with which the staff can navigate across the entire premises towards accomplishing the objective of barcode scanner.

Telerobotics Vs Telepresence

Telerobotics is often confused with the idea of Telepresence (TP). Both have a role to play in shaping the way that future security systems will act. So, what is the difference between telepresence and telerobotics?

Telepresence allows you to feel like you are in a remote location without actually being in a remote location. Currently, it’s about pumping the highest resolution video and audio to the remote viewer in order to simulate the environment in which the sensing/recording equipment have been placed. This type of solution is going to be focused on improving what the camera and microphone can detect as well as bandwidth utilization. Some common examples of consumer tools include Skype, FaceTime and Google Hangouts.

These are all essentially telepresence applications that can be used from your computer or cell phone. Other than the focus on real-time interaction, this is effectively the current state of the surveillance industry. The video and audio feeds are as real time as possible and an individual can theoretically monitor those feeds from anywhere. This likely means that future applications in security for telepresence may be more about access control or real-time interactions in areas too dangerous/sensitive to host humans.

Telerobotics takes the idea from telepresence one step further. If TP is a remote set of eye and ears, TR is eyes, ears, hands and feet. It allows you to not only see/hear the location and interact via 2-way audio but also to interact physically with objects in the remote location and to navigate the TR hardware around the remote space. This capability could radically alter the way surveillance and security are done.

A telerobotics system could be set up to open doors, physically interact with people or even pull a fire alarm if the situation calls for it. It could also be used to greet guests to the facility or any of a very wide set of tasks that would normally require a human being to be in a specific location. No more having views locked to the focal points of a set of cameras and wondering what is happening just out of shot. With TR, the operator can navigate the hardware anywhere in the facility providing exactly the view needed on any desired location without the need for a bank of cameras. For now, the physical limitations of these systems would be the same as most ‘remote’ technologies. Bandwidth between controller and TR setup, the need to maintain the remote hardware/software and considerations tied to getting a TR setup back in operation should it encounter a significant problem while remote are all considerations that will impact anyone using TR for security.

So now that you have a better idea of the difference between the two ideas/terms, let’s get to the big questions. Is this technology poised to radically change the face of corporate security? How might it do that? When could we possibly expect to see the effects?

Use Google Maps Offline on Android

The process is identical on both iOS and Android. Before we dive into the process, take a moment to visit the App Store on your iOS device, or the Play store on your Android device and check for any available updates for Google Maps.

After verifying you have the latest version, launch Google Maps on your respective device and search for the area you’d like to save for offline access.

Google Maps will then show the area you find, with the name being displayed along the bottom of the screen. You will need to download the area of interest before being able to take advantage of Google Maps offline. This is what we mean when we say things must be done “proactively.” The map area must be downloaded before leaving the safety of your city’s secure connection.

You’ll then be tasked to adjust the area to be saved via panning and zooming around, making sure to pay attention to the size limit alert along the top of the screen. Of course, there is a massive amount of information when downloading nearly two cities and everything in between them. Be ready to sacrifice plenty of storage space for your maps. These can take up to 1GB, depending on the area. Additionally, you will get a glimpse of the local weather conditions, pictures, hotels, shops, restaurants and navigation options. You will even get a travel estimate to that spot based on your current location.

Tap on the name. Next, tap on the three-dot icon in the top-right corner of your screen. Select and then save an offline map. There is a way to download this data to an SD card, though, which is a relief. Simply go to Menu > Offline Areas > Settings > Storage Preferences and switch “Device” to “SD card.”

If the mapped area is deemed too large, you’ll need to zoom in and repeat the process for the area left out. Once you’re happy, tap on Save and give the offline map a name. To access your saved maps, slide you the menu draw and select My Places from the list of options. Scroll to the bottom of the page, where you should find any offline maps still stored on your device.

Keep in mind that any saved maps will only remain on your device for 30 days. This is mostly because the world changes nearly daily. Maps are dynamic and require updating. What happens when a new street is added, or an old one is closed? Maybe a new restaurant opened up in town. Google wants you to have an updated version of your maps when offline. Presumably, after that, the app will purge a saved map to clear up space on your device.

You can also do the automatic updating with the Google map nowadays. Just go to the Offline Maps settings and activate automatic updates. This will ensure your offline maps are regularly updated when expired. You can even choose only to be updated when using Wi-Fi, ensuring your precious gigabytes don’t go to waste.

Things to Consider when Using Offline Google Maps

There are drawbacks to offline Google Maps. Here are some things missing from offline maps that are available in live Google Maps:
• Public transit routes are not available in Offline maps.
• Bike and walking routes are not available.
• Live traffic will not be employed.
• Travel estimates will not be as accurate.
• Routes can’t be modified (avoidance is not an option).

Chrome Keeps Crashing

Step 1 – Re-Install Google Chrome

The most common reason why Chrome crashes is because it has a series of issues with its integration with Windows.

As mentioned, it is highly extensible which means it has a large number files which all need to work correctly. If just one of these files becomes damaged, Chrome will stop working.

To resolve this, the most effective way to fix the error is to simple re-install Chrome. This not only replaces any potentially damaged files, but updates the various Windows settings that are often the silent cause of errors/crashes.

To do this, you need to follow the steps here:

  • In Windows 7, click onto “Start > Control Panel > Add/Remove Programs”
  • In Windows 10, right-click “Start” > select “Apps and Features”
  • When either application management interface appears, scroll through and locate Google Chrome
  • Right-click and select “Uninstall”
  • This will process the uninstallation, after which you should restart your PC

Upon restart, your system will not have Chrome, so you’ll need to use Internet Explorer – or Edge if you’re using W10 – to download a new copy.

To do this, you should just load up the other browser, search for Google Chrome and let it download. Once downloaded, install it and then sign in with your Google account (if you have one).

Once you’ve signed in, all your old plugins / settings etc will load up. This should work, although if you have a faulty plugin, the crash may occur again.

If it does, you should continue to step 2.

Step 2 – Replace Missing Files

Another problem with Chrome is that it will often have a large number of files which simply become missing in Windows.

These missing files are lost because of incompatibility problems with other applications in the system, from the likes of Photoshop to Visual Studio often causing problems.

If you’re experiencing crashes with Chrome, and especially if an error appears, you will likely need to replace a number of files which may be causing problems on your system.

To do this, you can follow the steps outlined here:

  • Click onto “Start”
  • Select “Computer” (Windows 7), “File Explorer” (Windows 8/10)
  • Browse to C:/Program Files (x86)/Google/Chrome
  • Look at any DLL files and search for them online
  • If there are any missing ones, you need to download them from the Internet and then place them into that folder
  • After doing this, restart your system and see if Chrome works again

This process might seem a little far-fetched but it’s very important.

One of the major problems for Chrome is that your system will basically be unable to load particular files that are required to get it working. If this is the case, you need to ensure that your system has all the files necessary.

Step 3 – Close Antivirus

The next, and actually somewhat successful, step is to close any antivirus applications running on your system.

One of the most common causes of problems for Windows is over-zealous antivirus tools blocking access to other apps.This happens particularly badly with Chrome because it is constantly connected to the Internet.

To resolve this, you may wish to close any antivirus application that you have running on your PC. As a warning, this will leave your system temporarily exposed to viruses – but this should not be a problem for a short duration:

  • Move the mouse down to the bottom right hand side of the taskbar
  • In the “icon tray” select the antivirus icon
  • Right-click on the icon with your mouse
  • Select an option which says “Pause” (or the equivalent)
  • Select the shortest duration

One the system has been paused, you should then try loading up Chrome.

If there are no errors, it means that your antivirus is conflicting with the system, and thus will be leading to a number of potential conflicts inside Windows. If it still crashes, it means your computer has a deeper problem with the app, and you should re-enable your antivirus using the steps above.

Step 4 – Restart Your PC

Finally, you should try restarting your system.

You’ll be surprised at how often you can fix computing problems through a simple restart. This not only shuts down Windows correctly, but also makes sure that any applications you’re running get the ability to start up correctly when the system boots again.

One of the main problems for Windows is that it is often the case that the longer the system is left running, the slower it becomes as it corrupts all its files. This is one of the major causes of problems for Chrome.

Privacy Is Not The Product

Your basic human right: Today, millions of people across the globe doesn’t differentiate online and offline privacy. However, you need to always keep in mind that current legal system of democratic nations like USA, India, UK, E.U countries, Japan, South Korea and many countries strongly protects person’s right to privacy.

The organization like UNHRC, ICCPR, a number of national and international treaties, and written words on the constitution of several nations, enshrine “privacy” as a fundamental basic human right.

It was the year 2015 when The United Nations Human Rights Council noticed that the enormous progress in the communication technology has made it easier for corporations & government to record daily activity of an individual and they can easily block free speech. The authoritarian government can very easily crackdown on protests and they can even limit the spread of information, while a corporation can sale the data to the malicious third-party contractor for money. In short, online privacy makes you stronger than the government itself.

The absence of online privacy makes you unsafe: Whenever you are connected with the digital world, you leave behind a traceable and permanent trail of your private data. This recognized as “digital footprint”. What is this? Well, it’s your online biography! It can reveal your health information, shopping habits, sleeping patterns, keyboard stroke and much more. Scared yet? This vast amount of personal data can be accessed by various third-party vendors for targeting purpose. Don’t believe me? Open your preferred search engine and type in your name. I am certain you will be shocked to see the outcome. This data can put your reputation and physical safety at risk. Remember the incident when Pokemon Go was launched?

The risk to freedom of expression: Privacy is a fundamental ingredient of freedom of expression. Privacy control for certain group is absolutely necessary. Privacy is important for general people and it is crucial for the people who are involved with journalism, activism and opposition politician to avoid intimidation for their ideas. This people usually become the central pillar of any democracy and I think now you understand the importance of online privacy.

It can affect your reputation: Most of us, using the internet have at least one or two embarrassing stories we would like to keep private. If we travel back to 70s, people were good at keeping their privacy safe. However, in the digital edge, it is quite possible your private stuff stay alive inside your “digital footprint”. If we go back a few years ago, many of us heard about the “iCloud” fiasco! Remember those face of the celebrities hiding from the camera( I mean camera of journalist of course!)? That can be you!

Data Center Consolidation

There are a number of drivers for consolidation projects. In some cases, the organization grew through mergers and acquisitions, inheriting multiple data centers that replicate services. In addition, many organizations have effectively reduced their IT footprint through virtualization and the adoption of hyper-converged infrastructure solutions. These technologies make it possible to eliminate underutilized equipment and replace what remains with smaller form factors.

The rationalization of these services can also facilitate consolidation. This has been a priority within the federal government through the Federal Data Center Consolidation Initiative. Federal agencies have been working to reduce the cost of their data operations by eliminating waste and implementing a shared services model.

Similar efforts are underway at the state level. According to the National Association of State Chief Information Officers (NASCIO), 42 percent of states had completed data consolidation projects in 2016, up from just 14 percent in 2007. In addition, 47 percent of states are currently working on consolidation projects, and 11 percent are in the planning stages.

That data comes from a newly released report, “Shrinking State Data Centers: A Playbook for Enterprise Data Center Consolidation.” The report notes that consolidation enables centralization of data infrastructure, which streamlines maintenance and strengthens security. Consolidation also offers an opportunity to introduce standards, better integrate systems and applications, improve support for legacy systems and enhance business continuity.

There are, of course, challenges. Resistance to change is always a huge hurdle – one that only intensifies when technical problems emerge or consolidation doesn’t meet business needs. In some instances, costs are higher than anticipated and regulatory compliance requirements aren’t met.

To help minimize risk, the NASCIO playbook recommends 9 steps organizations should take in a consolidation initiative:

• Conduct a needs analysis. IT should meet with business stakeholders to discuss their current requirements as well as anticipated growth.

• Remain engaged with stakeholders throughout the project. Making stakeholders feel they are part of the process helps minimize resistance to change.

• Plan carefully but remain flexible. The project plan should identify all impacts and provide enough flexibility to accommodate unforeseen issues.

• Document existing assets. Thorough documentation helps identify underutilized or unneeded resources, opportunities for reuse, and any resource gaps.

• Conduct a cost analysis. By understanding current costs, the organization can better calculate the savings afforded by consolidation.

• Implement standards wherever possible. Standards such as ITMS and ITIL help increase efficiency and security and further reduce costs.

• Expect the best but prepare for the worst. Maintain constant communication with stakeholders to manage expectations.

• Get buy-in. If all stakeholders are on board for the project, it is more likely to deliver long-term benefits.

• Report successes. Show the organization how much money has been saved, and the greater efficiencies and security that are gained.

While public sector agencies are leading the charge for data center consolidation, organizations across industry sectors can benefit from rationalizing and rightsizing their operations.

Trouble With Sophia

No doubt I am the only one concerned about hackers. I just happen to remember what hackers did to our so-called, self-cleaning, intelligent public toilets. I mean, if people can spy on me though my TV eye, my webcam, and my smart fridge, imagine what mischief they could wrought if they gained access to my bed. This could certainly put a new twist on our political elections, but actually I was thinking more in terms of being able to hack someone’s bed in the middle of the night and trigger that eject button.

I mean seriously, if you’re going to have a smart bed, let’s do it up properly and consider all of the ramifications and potential issues and take the idea fully to its logical conclusion.

As if smartbeds were not already a potential disaster, we also now have the lady robots. As usual, people are always trying to create a new and improved woman, especially one that can do customer service for free. It is a great tragedy, a huge offense, that we live in a culture that genuinely does not seem to understand the human element, the significance of women, the importance of finally getting to talk to a “real human being.”

Naturally Sophia has already suggested that humans belong in a zoo. Taking it just a bit farther, we actually now have robots who can make well reasoned arguments for why humans should be destroyed. This doesn’t bother me as much as the fact that we ourselves seem unable to launch a good argument in our own defense.

I think there is an interesting bit of truth hidden here, and while we laugh at “cute” Sophia quipping about destroying humans, in truth a world run exclusively by reason, absent sacrificial love, absent humans created in the image of God, absent the realness of women, becomes a world in which logic soon dictates, humans really serve no vital purpose.

Technological Impact

What is a card issued by UIDAI? One such card is a card holding a number assigned to every citizen of India by the UIDAI or THE UNIQUE IDENTIFICATION AUTHORITY OF INDIA and the card commonly named as the AADHAR CARD.

Technology behind it: The technology is foolproof. The Iris and Fingerprints of a person are captured, scanned and held into a card. The entire process is done by very sophisticated devices and elite technology was used. This process is called the process of capturing the Biometric Identity of an individual. The Iris and the fingerprint of one individual will never match with the details of another individual in this world. That is why such a system was used. This card is commonly named as the AADHAR CARD..

How secure is it? According to experts the UIDAI details are kept in a highly secured server and it cannot be leaked. But it is only a matter of time to get its efficacy tested.

Demonetization: This is the art of moving currency away from the system and to provide detectable electronic modes of financial transaction. This also involves making the currency notes in circulation as invalid and issuance of new currency notes.

Technology behind demonetization: The technology lies in the art of printing notes. The mint stops printing the notes of old format and the government declares them ineffective. The mint then releases notes of new format.

Reason: The people keeping unaccounted wealth suddenly found the currencies kept in the secrecy of their homes invalid. Hence they are deprived of their unaccounted wealth. Another reason is to make electronic modes of financial transactions almost compulsory.

Backlogs: Very few people keep their wealth in form of notes as it is hard to hide. People who kept it in the form of Gold or other precious things or precious objects those are easy to hide escaped the process. A large part of population cannot even sign their names. How they will conduct electronic modes of transaction?

Reason: The reason behind it is to prevent the increase of black money in the system.

Effectiveness: The literacy rate of India is low. Hence any person having a card can avail any financial facility provided he declares his income properly.

Backlogs: The backlogs of this system are also there. They are:

Misuse: Any wealthy person can put undisclosed wealth into the accounts of one UIDAI number seeded account of another person for a price in order to make their wealth clean.

Even after making this system mandatory a person can disclose his wealth in a partial manner and keep the rest by converting it into other forms like gold.

Tax heavens: Tax heavens like Switzerland, Dubai, Mauritius etc still exist and wealth can be channelized there unless the Indian Government sign a treaty with those countries and synchronise their technical system with the details of non-resident Indians.

CD Printing

• Lithographic offset print

The industry standard for labelling and printing on high volumes of discs, lithographic printing is an innovative printing method involving the creation of what is known as printing plates. These plates can be made from photographic negatives, which are processed using a traditional photo production method where the negatives are bathed in chemicals. Images can likewise be processed directly from a computer to a plating machine in a procedure known as the CTP or computer to plate process. The plates are imposed onto rubber blanket cylinders within a specialised printing machine (thus the term offsetting, as plate imagery are offset onto the cylinders). The cylinders then apply the appropriate colours onto the disc’s printing side.

• Silk screen print

Silk screen printing uses the basic principle of traditional screen printing where ink is passed through a mesh or screen. The mesh is stretched on a frame together with an outline or stencil of the image to be printed. The open areas of the stencil allow the ink to flow through, leaving a nice, clean print on the disc. A four-color process, screen printing on CDs, much like screen printing on garments and fabrics is more suited for designs that use solid colours rather than those with colour gradients.

• Inkjet print

Inkjet printing is a cost-efficient option for those with low-volume printing requirements. The great thing about inkjet is that it can be used to produce a wide range of design styles, including solid colour and photographic images. This type of CD printing uses principles and technologies similar to home inkjet colour printers.

• Thermal print

In thermal printing, images are sent directly from the computer to the print machinery. The machine uses transfer ribbons that pass below a heated printing head, thus enabling ink transfer. Thermal outputs are waterproof and don’t require additional procedures to keep the print intact, unlike inkjet prints.

Wire Harness

Remember back to children’s programming of the 1970s and 1980s? There’d be moments when the fourth wall would be broken by the actor on camera acknowledging the voice over, and it usually involved the actor being completely clueless about something. The idea of a wire harness and how it helps up in our everyday lives is probably giving most folks the same befuddled feeling.

So, what it is a wire harness? In truth, it’s nothing more than just a collection of wires into one unit that helps to keep electrical systems organized. If you’ve ever opened your desktop computer’s tower or looked inside of a printer, you’ve probably noticed how clean everything looked. Clean, of course, refers to the uncluttered look of the internal pieces. This is how wire harnesses really earn their keep. What’s more, they can also vary in size depending on the application.

First things first, though, we need to ask ourselves – what does a wire harness do? Well, it allows data and electrical power to be conveyed efficiently throughout a structure. Considering how many things we’re surrounded by that start their functioning by being plugged in, it’s safe to say that wire harnesses are everywhere.

Finally, who uses these little remarkable wonders? Everyone. Every industry you can think of has found a unique use. Keep in mind the function they have about transmitting electrical power, signals, and data from point A to point B. As technology gets better and a demand for more efficient multi-functionality grows, so, too, does the need for wire harnesses to be built to handle these advancements.

The industries most associated with them are: automotive, aerospace, national defense, telecommunication, and medicine. On the surface, these particular industries don’t seem particularly interesting. Yet, they all have one thing in common – failure experienced by the machinery that makes up the industries can lead to the loss of life. It can be easy to gauge the success of an industry by looking at its financial health at the end of a fiscal year, but nothing lets you know that something went terribly wrong than when someone loses their life due to faulty parts.