Monday, 21 December 2015

BYOD

BYOD TRENDING IN COMPANIES

WHAT IS BYOD?
In the consumerization of IT, BYOD, or bring your own device, is a phrase that has become widely adopted to refer to employees who bring their own computing devices – such as smartphones, laptops and tablets – to the workplace for use and connectivity on the secure corporate network.


WHY BYOD:
With the rise of smartphone technology, bring your own device, or BYOD, certainly cannot be ignored by businesses. Whether they endorse the policy of using personal devices for workplace tasks or not, employees will use the best tools, or those they are most familiar with, to complete tasks, which frequently means using their own smartphone. Of course, this extends far beyond simply taking work calls. Smartphones in the workplace are now being used to access corporate applications and perhaps more importantly, the data that they contain.

BYOD benefits:
The reason why many businesses are adopting a formal BYOD policy is because the influx of personal devices into the workplace is difficult to prevent. With smartphones already here on mass, and tablets and wearables also popular, it makes more sense for businesses to create a formal BYOD policy than to struggle in vain against the oncoming tide of personal devices. In addition, many organisations are now realising that BYOD, if managed properly, also comes with a huge range of workplace advantages.
·         Productivity –
 One of the major benefits of BYOD is that employees get to use hardware that they are familiar with and comfortable using. Rather than forcing them to use a new device, for which they may need training, or at least time, in order to get up to speed, they can hit the hit ground running with their own smartphone. Furthermore, by giving employees the freedom to use their own devices, companies are displaying trust in their workforce. This can lead to much higher levels of employee satisfaction, which in turn boosts productivity.
·         Cost –
Bring your own device is also gaining popularity with IT firms because it shifts hardware budgets away from the business and onto the employee. Rather than having to shell out on new workplace phones for all employees, which they may not even want to use, employees pay all, or at least some of, the cost for hardware and associated services. Employees are, for the most part, happy to cover these costs, as they would often have been paying for the personal device in any case.
·         Up to date –
 When compared to traditional business technology cycles, BYOD devices are often upgraded more regularly, due to employee interest in having the most cutting-edge hardware available. Of course, this means that companies also benefit from the latest features and the capability of working with modern software packages.


DISADVANTAGES:
·         The security risk

However, the primary concern for all IT decision makers is whether BYOD introduces more vulnerabilities into the business. If employees own the devices that they use to access company applications, This can cause real issues if an employee leaves the company but still has corporate data contained on his or her personal device. This information could easily be accidentally or deliberately leaked, leading to business ramifications. Similarly, if workplace devices are stolen or lost


BLUE BRAIN:

WHAT IS BLUE BRAIN:
“THE MACHINE THAT FUNCTIONS AS A HUMAN BRAIN IS A BLUE BRAIN


Brain is one of the most valuable creations of Allah Intelligence of  a human is lost after death of that human the question is that how can we get the intelligence of a person back after his death ?
So if a blue brain is developed the intelligence of a person will not be lost his feelings, personality and intelligence will be useful for the society

What is a virtual/blue brain?
·        A machine that can function as brain
·        It can take decision.
·        It can think.
·        It can respond.
·        It can keep things in memory
·        It also has feelings and emotions

Functioning of natural brain:
·        Sensory Input :-
Receiving input such as sound ,image, etcthrough sensory cell .
·        Interpretation:-
Interpretation of the received input by the brain by defining states of neurons in the brain.
·         Motor Output:-
Receiving of electric responses from the brain to perform any action.
Blue Brain objectives:
·        The project will search for insights into howhuman beings think and remember.
·        Scientists think that blue brain could also helpto cure the brain disease.
·         If the scientists can crack open the secret of how and why the brain does it, the  knowledge could lead to new breed of supercomputers



Hardware & Software requirements
·        Memory with a very large storing capacity.
·        Processor with a very high processing power.
·        A very wide network.
·        A program to convert the electric impulses from the brain to input signal, which is to be received by the computer and vice versa.
·        very powerful Nanobots to act as the interface between the natural brain and the computer.
·        Finally it is a SUPERCOMPUTER

Uploading human brain-NANOBOTS:
·        The uploading is possible by the use of small robots known as the nanobots
·        These robots are small enough to travel throughout our circulatory system
·        Traveling into the spine and brain, they will be able to monitor the activity and structure of our central nervous system
·        They will be able to provide an interface with computer while we still reside in our biological form
·        Nanobots could also carefully scan the structure of our brain, providing a complete readout of the connection.
·        This information, when entered into a computer, could then continue to function as us.
·        Thus the data stored in the entire brain will be uploaded into the computer

BLUE BRAIN AN ARTIFICIAL BRAIN COMES TO LIFE IN SWITZERLAND!!!!!!!!!!!!!!!! :
·        It works in a fine way when started. nerve cells could be seen on the screen, along with the electrical changes are produced
·        This piece of hardware consists about 10000 pieces of computer chips
·        The simulation was created at the technical university in Lausanne,where 35 researchers participated in the maintaining of artificial brain.
·        It runs on the world’s most powerful super computer
“blue brain” is the most radical attempt so far to investigate the mystery of consciousness



INTERNET OF THINGS

INTERNET OF THINGS


WHAT IS INTERNET OF THINGS
A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.
EXAMPLES:









17 THINHS ONE MUST KNOW ABOUT INTERNET OF THINGS:
·         The majority of people (87%) have not heard of the term ‘Internet of Things’.
·         ATMs are considered some of the first IoT objects, and went online as far back as 1974.
·         Back in 2008, there were already more objects connected to the Internet than people.
·         This year, we will have 4.9 billion connected things.
·         And some predict that by 2020, the number of Internet-connected things will reach or even exceed 50 billion.
·         In 2015, over 1.4 billion smart phones will be shipped and by 2020 we will have a staggering 6.1 billion smartphone users.
·         The IoT will connect many of the devices we have in our homes, from smart thermostats to smart fridges. Companies like Google GOOGL -1.72% and Samsung understand this. Google bought smart thermostat maker, Nest Labs, for $3.2 billion, and Samsung purchased connected home company SmartThings for $200 million.
·         By 2020, a quarter of a billion vehicles will be connected to the Internet, giving us completely new possibilities for in-vehicle services and automated driving.
·         In fact, we already have cars that can drive on their own – Google’s self-driving cars currently average about 10,000 autonomous miles per week.
·         The global market for wearable devices has grown to 23% in 2015, with Fitbit shipping 4.4 million devices and Apple AAPL -2.86% selling 3.6 million Apple Watches.
·         And yes, Internet-connected clothing is coming. Estimates predict that 10.2 million units of smart clothing will ship by 2020, compared to a meagre 140K units in 2013.
·         Today, the market for Radio Frequency Identification (RFID) tags, used for transmitting data to identify and track objects, is worth $11.1 billion. This is predicted to rise to $21.9 billion in 2020.
·         Machine-to-machine (M2M) connections will grow from 5 billion at the beginning of this year to 27 billion by 2024, with China taking a 21% share and the U.S. 20%.
·         GE believes that the “Industrial Internet” (their term for IoT) will add $10 to $15 trillion to global GDP in the next 20 years.
·         According to estimations by the McKinsey Global Institute, the IoT will have a total economic impact of up to $11 trillion by 2025.
·         Having a connected kitchen could save the food and beverage industry as much as 15% annually.

·         CISCO believes the IoT could generate $4.6 trillion over the next ten years for the public sector, and $14.4 trillion for the private sector.

BARCODE

BARCODE TECHNOLOGY

 What is barcode?
·         It is an automatic identification technology
·          Bar code is a predefined format of dark bars and white spaces
·         Structured to contain a specific piece of information
·          It allows real-time data to be collected accurately and rapidly
·          Combination of barcode technology with computer and application software improves performance, productivity and profitability
Why use barcodes?
·         As far back as the 1960s, barcodes were used in industrial work environments. Some of the early implementations of barcodes included the ability identify rail,road,cars,etc
·         In the early 1970s, common barcodes started appearing on grocery shelves. To automate the process of identifying grocery items,
·         UPC barcodes were placed on products.
·          Today, barcodes are just about everywhere and are used for identification in almost all types of business.
·         When barcodes are used in the business process, procedures are automated to increase productivity and reduce human error.
·          Whenever there is a need to accurately identify or track something, bar-coding should be used.
·         For example,
o   in a data entry work environment workers may be required to enter an enormous amount of data into a customer database system. instead of manually typing a customer identification number into a database, if the information is contained in a barcode, a data entry operator may scan it in. This would increase automation and reduce human error.

 Barcode Types:
  The type of barcode to use for a particular situation depends upon
o   The use.
o   The data encoded in the barcode.
o   How the barcode will be printed.
There are two types of barcodes:
v  Linear barcodes
v  2D barcodes.


Reading the barcodes:
v  One of the most common tools for reading barcodes is the hand held barcode scanner.
v   All of the barcode scanners recommended and sold by ID Automation have built-in decoders that can read several different bar code types.
v  Most of the scanners sold by ID Automation receive their power from the PC keyboard or USB port so no external power supply is required.
v   When a barcode is scanned, the data is sent to the PC as if it was typed using a keyboard.


Advantages
v  REPRESENT UNIQUE IDENTITY OF A PRODUCT
v   ACCURACY OF DATA INPUT (ERROR FREE)
v  LABOUR SAVINGS BY AVOIDING MANUAL SYSTEM
v   MORE ACCURATE DESPATCH  COST EFFICIENT
v  REAL TIME DATA COLLECTION
v  MEASUREMENT OF WORK IN PROGRESS THROUGHOUT THE FACTORY
 Disadvantages:
v  System Failure may cost more delays.
v   Scratched or crumpled barcodes may cause problems

v   Data must be coded in the barcode 
BIOMETRIC SYSTEM
Biometric refers to the automatic identification of a person based on her / his physical, psychological or behavioral characteristics
Physical biometrics
·       Finger print
·       Facial recognition
·       Iris scan
·       Hand geometry
·       Retina scan
Finger print recognition:
A live acquisition of person’sfinger prints
Dots(very small ridges)

Face recognition:
Capture image
Find face in image
Extract features
Compare features
Declare matches

Hand geometry:
Hand or finger geometry is an automated measurement of many dimensions of hand and fingers



Iris scanning:
Measure the iris pattern in coloured part of eye

Retina recognition:
Images of the back part of eye and there blood vesels matching with the sample

Speaker/voice recognition:
Voice recognition uses vocal characteristics to compare voice of a person with the sample saved
Signature recognition:
An automatic method of measuring an individual’s signatures
The technology determines speed ,direction, pressure of writing and the type the stylus is in the person’s hand
Keystroke dynamics:
Keystroke dynamics or typing dynamics refers to the automated method of identifying or confirming the identity of an individual based on the manner and the rhythm of typing on a keyboard. Keystroke dynamics is a behavioral biometric, this means that the biometric factor is 'something you do'
The technology examines such dynamics as speed and pressure total time taken to type a particular word and time elapsed between hitting certain keys



smart cards

SMART CARDS
WHAT ARE SMART CARDS?
A Smart card is a plastic card about the size of a credit card, with an embedded microchip that can be loaded with data, used for telephone calling, cash payments , and other applications, and then periodically refreshed for additional use



CARDS BEFORE SMART CARD:
·        Plastic Cards:
 Visual identity application :
 Plain plastic card is enough
·        Magnetic strip (e.g. credit cards):
 Visual data also available in machine readable form
 No security of data
·        Electronic memory cards:
Machine readable data
Some security (vendor specific)
Dimensions of smart card:
85.6mm x 53.98mm x 0.76mm (defined by ISO 7816)
Why use smart cards?
·        Can store currently up to 7000 times more data than a magnetic stripe card.
·         Information that is stored on the card can be updated.
·         Magnetic stripe cards are vulnerable to many types of fraud.
 Lost/Stolen Cards
 Skimming
·        Greatly enhances security by communicating with card readers.
·         A single card can be used for multiple applications (cash, identification, building access, etc.)
·         Smart cards provide a 3-fold approach to authentic identification:
• Pin
 • Smartcard
• Biometrics
·        Security:
Data and codes on the card are encrypted by the chip maker
ADVANTAGES:
More Secure

This simple technology has revolutionized the payment card industry and increased the level of card security. These cards use encryption and authentication technology which is more secure than previous methods associated with payment cards. The microprocessor chip embedded at the heart of the smart card requires contact to the card reader and certain areas of the chip can be programmed for specific industries
Safe to Transport
Another advantage to having a smart card is their use in the banking industry (and many other sectors). These cards give the holder freedom to carry large sums of money around without feeling anxious about having the money stolen. In this regard, they are also safe because the cards can be easily replaced, and the person would have to know the pin number to access its stored value. This takes care of the problem with cash; once it is stolen it is nearly impossible to trace and recover it.
Double as an ID Card
A third advantage of using a smart card is that they can provide complete identification in certain industries. There are numerous benefits of using smart cards for identification. A driver's license that has been created using smart card technology can give the police the ability to quickly identify someone whose been stopped for speeding or reckless driving. These cards can be used by health professionals to identify someone who is brought in by an ambulance but unconscious or unable to speak.
Prevents Fraud
Other benefits of using smart cards for identification can be used by governments to prevent benefits and social welfare fraud to ensure the right person is receiving the welfare benefit. Some countries are using the smart cards to identify temporary workers who have been given work permits. This has the potential to reduce immigration fraud.
Smart cards are just as easy to use as a credit or debit card, but considerable more secure. They are lightweight and easy to carry. This makes it easy to have one card to pay for parking, access to the office, and for buying lunch at the office cafeteria.
DISADVNTAGES:
·          
·         Possible Disadvantages
Easily Lost
Like a credit card, smart cards are small, lightweight and can be easily lost if the person is irresponsible. Unlike credit cards, smart cards can have multiple uses and so the loss may be much more inconvenient. If you lose a card that doubles as a debit card, bus pass and key to the office, you could be severely inconvenienced for a number of days.
Security

A second disadvantage of the using smart cards is their level of security. They are more secure than swipe cards. However, they are not as secure as some in the general public would believe. This creates a false sense of security and someone might not be as diligent as protecting their card and the details it holds.
Slow Adoption
If used as a payment card, not every store or restaurant will have the hardware necessary to use these cards. One of the reasons for this is since the technology is more secure, it is also more expensive to produce and use. Therefore, some stores may charge a basic minimum fee for using smart cards for payment, rather than cash.
Possible Risk of Identify Theft

When used correctly for identification purposes, they make the jobs of law enforcement and healthcare professionals easier. However, for criminals seeking a new identity, they are like gold, based on the amount of information it can contain on an individual.