Custom Search

Tuesday, September 29, 2009

Cloud computing

A style of computing where massively scalable IT- enabled capabilities are delivered ‘as a service’ to external customers using Internet technologies


Another Step in the Evolution of Technology From in-house to outsourced
Step 1: Outsourcing Outsourcing is great for processes that are standardized and repetitious.
Step 2: Outsourced Hosting Only the technology and infrastructure –but companies still have to buy a fixed amount of computer capacity and run dedicated computers and software. It’s a lot like in-house computing except for the location of the equipment.
Step 3: Software as a Service (SaaS) Share hosted computing resources with other companies, with each company’s data secured separately.
Step 4: Cloud Computing How is cloud computing different from SaaS? The difference is in the back room where the computers reside. Cloud computing distributes the computer capacity across multiple computers that may be in multiple locations.


http://en.wikipedia.org/wiki/Cloud_computing

















Sunday, September 20, 2009

Near Field Communication


Near Field Communication (NFC) is a new, short-range wireless connectivity technology that evolved from a combination of existing contactless identification and interconnection technologies. Products with built-in NFC will dramatically simplify the way consumer devices interact with one another, helping people speed connections, receive and share information and even make fast and secure payments.Operating at 13.56 MHz and transferring data at up to 424 Kbits/second, NFC provides intuitive, simple, and safe communication between electronic devices. NFC is both a “read” and “write” technology. Communication between two NFC-compatible devices occurs when they are brought within four centimeters of one another: a simple wave or touch can establish an NFC connection, which is then compatible with other known wireless technologies such as Bluetooth or Wi-Fi. The underlying layers of NFC technology follow universally implemented ISO, ECMA, and ETSI standards. Because the transmission range is so short, NFC-enabled transactions are inherently secure. Also, physical proximity of the device to the reader gives users the reassurance of being in control of the process.NFC can be used with a variety of devices, from mobile phones that enable payment or transfer information to digital cameras that send their photos to a TV set with just a touch. The possibilities are endless, and NFC is sure to take the complexities out of today’s increasingly sophisticated consumer devices and make them simpler to use.

Near Field Communication or NFC, is a short-range high frequency wireless communication technology which enables the exchange of data between devices over about a 10 centimetre (around 4 inches) distance.
The technology is a simple extension of the ISO/IEC 14443 proximity-card standard (contactless card, RFID) that combines the interface of a smartcard and a reader into a single device. An NFC device can communicate with both existing ISO/IEC 14443 smartcards and readers, as well as with other NFC devices, and is thereby compatible with existing contactlessinfrastructure already in use for public transportation and payment. NFC is primarily aimed at usage in mobile phones.


http://en.wikipedia.org/wiki/Near_Field_Communication

Radio-frequency identification

Radio-frequency identification

Radio-frequency identification (RFID) is the use of an object (typically referred to as an RFID tag) applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader.

Most RFID tags contain at least two parts. One is an integrated circuit for storing and processing information, modulating and demodulating a radio-frequency (RF) signal, and other specialized functions. The second is an antenna for receiving and transmitting the signal.

There are generally three types of RFID tags: active RFID tags, which contain a battery and can transmit signals autonomously, passive RFID tags, which have no battery and require an external source to provoke signal transmission and battery assisted passive (BAP) which require an external source to wake up but have significant higher forward link capability providing great read range.

Today, RFID is used in enterprise supply chain management to improve the efficiency of inventory tracking and management.

Source : Wikipedia



You Tube videos




RFID chip hand implantation



How to block RFID chips


RFID chips are very similar to barcodes in the sense that a certain amount of data is contained within them, and then transmitted to a reading device which then processes and utilizes the information. The
major difference is that barcodes have to be physically visible to the reading device, which is usually only able to scan them at a distance of a 12 inches or less. RFID tags, on the other hand, do not have to be visible to the reading device. They can be scanned through clothes, wallets, and even cars. The distance from which they can be read is also much greater than that of a barcode. At DEFCON an RFID tag was scanned at a distance of 69 feet, and that was back in 2005, the possible reading distance now is probably much greater than that.

There are a few different categories of RFID tags, but the most common ones, and the ones we will be dealing with in this instructable, are the "passive" type. Passive RFID chips contain no internal power supply. They contain an antenna which is able to have a current induced in it when within range of the RFID reader. The tag then uses that electricity to power the internal chip, which bounces its data back out through the antenna, where it will be picked up by the reader.