rdit lecture#01
TRANSCRIPT
Lecture#01
Recent Developments in IT
Ever Changing Field of IT More Paced Changes in Recent Times Many Topics can be covered including:1. 3D Internet2. 3D Password3. Blue Gene4. Brain Gate5. Camera Pill6. Cyborgs7. DNA Computing8. Ethical Hacking9. Gi Fi
Course Contents
10.Green Cloud11.Intelligent RAM12.Palm Vein Technology13.Quantum Cryptography14.Visible Communication15.Virtual Private Networks16.Smart Quill17.Spam Assassin18.Google Glass19.Mind Reading Computer20.Gesture Recognition Technology
Course Contents
Complete Virtual Environment in 3D Countless Possibilities Demo Sites Available3D Internet
1. Recall2. Recognition3. Biometric3D Password
The Blue Gene/Q system, shown below is the third-generation computer architecture in the Blue Gene family of supercomputersBlue Gene
Brain Gate
Capsule Endoscopy involves swallowing a small (the size of the large vitamin pill) capsule, which contains a color camera, battery, light source and transmitter. The camera takes two pictures every second for eight hours, transmitting images to a data recorder about the size of a portable CD player that patients wear around the waist.
Camera Pill
Minds, Technologies, and the Future of Human IntelligenceCyborgs
The main idea behind DNA computing is to adopt a biological (wet) techniques an efficient computing vehicle, where data are represented using strands of DNADNA molecules can act as elementary logic gates analogous to the silicon-based gates of ordinary computers. Short strands of DNA serve as the gates’ inputs and outputs. Ultimately, such gates could serve as dissolved “doctors”—sensing molecules such as markers on cells and jointly choosing how to respond.
DNA Computing
Can hacking be ethical?Ethical hackers are usually security professionals or network penetration testers who use their hacking skills and toolsets for defensive and protective purposesEthical hackers who are security professionals test their network and systems security for vulnerabilities using the same tools that a hacker might use to compromise the networkAny computer professional can learn the skills of ethical hacking
Ethical Hacking
Multi-gigabit wireless technology that removes the need for cables between consumer electronic devicesMore than 100 times faster than current short-range wireless technologiesAllows wireless streaming of uncompressed high-definition contentOperates over a range of 10 meters without interferenceEntire transmission system can be built on a cost effective single silicon chipOperates in the unlicensed, 57-64 GHz spectrum band.
Gi Fi
Green Clo
ud
Intelligent RAM
Palm Vein Technology
Quantum Cryptography
Visible Communication
10.Virtual Private Networks11.Smart Quill12.Spam AssassinVPN
Smart Quill
Spam Assassin
10.Google Glass11.Mind Reading Computer12.Gesture Recognition TechnologyGoogle Glass
Mind Reading Computer
Gesture Recognition System