Skip to main content


Featured Post

Most popular Top Technology Websites in the google searches

We are sharing here a list of technology sites that get the higher page rankings and get the top positions while we search the technology regarding knowledge base . We hope these technology sites will be helpful to tech geeks and tech lovers . MIT Technology Review – MIT University conductsthis technology site and contains most popularity among tech reasearchers .Business Insider Tech – Get the latest technology news, development, trends with insightful analysis on hardware, software, mobile computing, tech merger, startups and many more at Business Insider .Futurism – This technology site is an independently owned media company based out of New York City.  They write most of the articles for upcoming technology and future technologies .Mashable Tech – Mashable is a global, multi-platform media and entertainment company.TechCrunch – Dedicated to obsessively profiling startups, reviewing new products & breaking tech newsHacker News – A social news website focusing on computer scienc…
Recent posts

What is Multi Factor Authentication Technique

What is  Multi Factor Authentication -

 Multi Factor Authenticationis is the technique to identify the right person by multiple time verification . Now a dyas Cyber security is a big issue and then multi factor authentication is playing vital role . Even every person can see this technology when login to websites or making the secure transactions .

 Multi Factor Authentication, sometimes referred to as two-factor authentication , is a security updation that allows you to present two proofs of evidence – your credentials – when logging in to an account. Your credentials fall into any of these three categories: something you know (like a password or PIN), something you have (like a smart card), or something you are (like your fingerprint). Your credentials must come from two different categories to enhance security – so entering two different passwords would not be considered multi-factor.

Various Multifactor authentication techniques -

Security tokens : Software-based tokens are becomi…

SHAKTI - India's first Indigenous MicroProcessor

Researchers at Indian Institute of Technology-Madras (IITM) have developed India's first microprocessor, Shakti, which could be used in mobile computing and new devices.

In July 2018, an initial batch of 300 chips, named RISECREEK was produced knocked out Project Shakti, that were fabricated at the Multinational Chip Manufacturer Intels gift at Oregon, USA, that successfully booted the Linux effective system. Now, the fabrication has been finished in India.

The project is funded by Union Ministry of Electronics and Information Technology.

These Shakti microprocessor based systems are going to be widely used in future such as defence, nuclear proficiency installations, doling out agencies and departments.
According to IITM, the Shakti microprocessor can be used in low-expertise wireless systems and networking systems moreover reducing reliance in checking account to imported microprocessors in communication and defence sectors.

The Shakti associates of processors was fabricated at…

How to prevent Online Frauds

Technology is enhancing day by day and more people are connecting with technology . It is better to the " Ease Of Doing " Fundamental but many people become the victim of online fraud due to lack of fraud awareness . Some Black minded people are using the different ways to steal the security credentials . Most of the Online frauds , people make due to lack of awareness rather than the technology bugs .

Today i saw the unwanted and Irritating Emails in Inbox with Money promising and other diverting emails . So I am listing here some of the ways that , fraudesters can use to steal information and can play with your hard earned money .

Know the person , you are dealing with - To complete any type of transacton or providing the details like Debit card , credit card etc , checkout the person or the company brand with whom you are dealing .Look at https:// in the website URL - This is the first step to enter into the safe zone that you see the https:// in the URL of website to pro…

Sets , Cardinality and Power Set in Set Theory

Set - Set is an ordered collection of distinct elements . Set is the part of basically Discrete Mathematics but widely used in most of the fields as Set Thory , Permutations and Combinations , Artificial Intelligence , Machine language etc in the form of Sets .

example -
A = { 1 , 2 , 3 , 4 , 5}
B = { 1 , 2 , 2 ,3 ,4}
a = { 1 , 2 , 3 , 4 , 5}
C = { 1 , 2 , A , B , क , ख  , ग }

Note -

Here A is a Set because it contains all the distinct elements .Here B is not a Set because it contains duplicate element 2 .a is not a Set because it must be represented by capital letter as A .C is a Set if all the letters of Hindi , english , symbols , Integers are allowed Otherwise not a Set .  Cardinality of Set - It shows the number of elements available in that Set .
example -  A = { 1,2,3,4,5} Cardinality of A = | A | = 5 
Representation of Sets - There are several methods to represent a set like - 
1. Tabular / Roaster Method - This method basically applies on the sets of small number of elements tha…

Pipelining in Computer Architecture

Pipelining is a technique to process the data in parallel way . In this technique multiple instructions are overlapped during execution. Pipeline is divided into stages and Each stage completes a part of an instruction in parallel.

Pipelining increases the overall Throughput of executing instructions . Throughput of

Types of Pipelines -

Arithmatic Pipeline -The arithmetic pipeline represents the parts of an arithmetic operation that can be broken down and overlapped as they are performed .Instruction Pipeline - The instruction pipeline represents the stages in which an instruction is moved through the processor, including its being fetched, perhaps buffered , decoding , and then executed. Instruction pipelining is a technique used in the design of modern microprocessors, microcontrollers and CPUs to increase their instruction throughput . Instruction Throughput = The number of instructions that can be executed in a unit of time . Basically CPUs are driven by a clock. The CPU consists …

CPU Scheduling in Operating System

What is CPU or Process Scheduling -
Let say , there are 5 different applications in our  computer system Hard Drive A , B ,C , D , E . When we execute these apps , we say them processes . Some of these processes load into main memory at the booting time and some of execute when we require to execute But the procedure of loading those processes from hard disk to main memory and then execute , may wait also for some time , and to execute all processes in a proper scheduled way to improve overall throughput and efficiency of system is to be said , Process or Cpu scheduling .

What are the different states in which processes reside - 

The execution or life of a process from its origin to end , can be categorized into some different stages , from where that process passes during entite life cycle . We say process states to these stages and the different states are -  Ready StateRunning Queue Wait Queue Running QueueTermination
What is Dispatcher -  Dispatcher is a function in operating systems…