Sei sulla pagina 1di 33

ART WORK

PRAVEEEN KUMAR B.S.


SELFIE DRONE CONTROL USING
MOBILE
Mohana priya .B

Don't take another boring phone selfie until you've seen this...

Phone selfies are boring. People aren't doing them anymore and
they've become unpopular...First, there was the standard selfie,
then the selfie stick, and now the next evolution of the selfie has
arrived!

Here the Drone 720x:

1
The Drone 720X was designed by two German engineers who
love drones. They found that the drones they had were very
bulky, heavy and difficult to travel with.
So, they designed this ultra-compact, light drone, and all without
sacrificing any of the main benefits of a top HD model.
It is firm, it’s easy to control and it can live stream and record it to
your phone. People are using them to take 'the ultimate selfies' -
the results are incredible...We were surprised by how easy it is to
set up! First, you have to install an app (just scan the QR code in
the manual). It’s all very easy .Once you have done that, just plug
in the battery, connect to your drone and start up the app. In less
than 10 seconds you’re ready to fly your drone!

Tech of the future: technology


predictions for our world in 2050

NITHESH.V
2
 Nanobots will plug our brains straight into the cloud

Tech of the future: nanobots. He believes, that by the 2050,


nanobots will plug our brains straight into the cloud. It will give us
full immersion virtual reality from within the nervous system. Just
like we do know with our Smartphone, we will be able to do it
with our brain. We’ll be able to expand our neocortex in the
cloud. And forget about memory problems, evidence problems,
etc.

 Space tourism: a week in orbit

Space tourism could be feasible in 2050, but likely only for the
very wealthy. Rocket companies like Jeff Bezos’s Blue Origin and
Elon Musk’s SpaceX will push the envelope with space travel
enough that tourism will be feasible in the year 2050. For
example, “someone who could afford to pay 100 million quid
3
could spend a week in orbit… but it would only be for rich people
in 2050.” he said. “It’s not going to be something that’s cheap
anytime soon.”

 EU will face a shortage of 800,000 IT workers by 2020

There is a huge demand for developers in Europe, yet most IT


education is solely available in English. With 24 official languages
spoken in Europe alone, it’s no surprise that non-native English
speakers prefer to learn in their own language. However you can
start seeing many coding academies, schools and universities
focused only on training junior developers for specific companies’
demand, being it a language, a practice, etc. Even though this
problem won’t be solved by 2020, with these new IT
universities and academies, we can fix the situation by 2050.

 Charge your iPhone with the power of a plant

Forests can become the energy stations of the future. Now it is


becoming possible, for example, BIOO is a clean-tech company
capable of generating electricity from plant’s photosynthesis.

4
Computer forensics or Cyber forensics

PASUVARAAJ.S

5
Computer forensics (also known as computer forensic science is a
branch of digital forensic science pertaining to evidence found in
computers and digital storage media. The goal of computer
forensics is to examine digital media in a forensically sound
manner with the aim of identifying, preserving, recovering,
analysing and presenting facts and opinions about the digital
information.

Rules for digital evidence:


Admissible - Must be able to use in the court

Authentic - Evidence must be relevant to the case

Complete- must not lack any information

Reliable - no question about Authenticity

Believable- clear, easy to understand and believable to jury

Techniques

A number of techniques are used during computer forensics


investigations and much has been written on the many techniques
used by law enforcement in particular. Example: "Defending Child
Pornography Cases".

Use as evidence

6
In court, computer forensic evidence is subject to the usual
requirements for digital evidence. This requires that information
be authentic, reliably obtained, and admissible. Different countries
have specific guidelines and practices for evidence recovery. In
the United Kingdom, examiners often follow Association of Chief
Police Officers guidelines that help ensure the authenticity and
integrity of evidence. While voluntary, the guidelines are widely
accepted in British courts.

PATIENCE
Jayashree. G

Patience is the state of being that occurs between experience and


reaction.
By cultivating a practice of patience you are able to let go of
things outside of your control and live with less stress, anxiety and
frustration.

7
A powerful benefit to practicing patience is that you to cultivate
the peace of mind to guide yourself out of many critical situation.

Use awareness to maintain calm and tap into your stillness and
preserve it.

When others let you down or irritate you be patient with them
and gently express love and stillness.
Patience is an expression of this awareness of this so be patience
and act according to the situation.

Not too Far!!

Neuro Hacking
Kathirvel .B

Will there be a day when you say "I can't read your mind, you
know!" and the reply will be "Oh, stop it -- of course you can!"? It
could happen.

8
Neuroscientists are finding ways to read people's minds with
machines, and although this has been in the works for decades,
real progress is being made by researchers at the University of
California, Berkeley, and elsewhere.
Translating electrical activity from the brain by means of decoding
brainwaves is one way to help sufferers of dementia.

For example, who have complications with neurotransmitters


relaying thoughts into comprehensible speech or holding
thoughts long enough to get them out verbally before they are
forgotten .
On the other hand, it is more than a little frightening to know that
science and machines could soon have access to our innermost
thoughts.

Avatars, Surrogates, Robotics


You can be yourself and interact in the world in a fairly low-tech
way while allowing a surrogate, avatar or robot to live your online
and tech life for you.

9
Even the U.S. Defence Advanced Research Projects Agency
(DARPA) has budgeted millions of dollars to create avatars that
will act as surrogates for real, live soldiers.

4Cornerstone Skills Engineers Need for


the Future of Work
Meghana J. Kansagara & Pooja
Sekhar.R

The World Economic Forum found there are 10 critical job


skills that will be in demand for the future job market of Industry
4.0. Four of these skills will be particularly relevant to the high-
tech economy:

1. Complex Problem Solving


2. Critical Thinking
3. Creativity
4. People Management.

10
Complex Problem Solving

Problem solving is the core of engineering: find a problem, break


it down to understand it, and then apply existing knowledge to
create a system, device or process that solves it. This makes
problem solving the most important ability engineers will need for
their future career.

 Fixing Something that is Broken examining and


Addressing Risk and Safety

 Improving Performance and Efficiency

 Complex Problems Will Need Complex Solutions

Critical Thinking

Critical thinking involves analysing a concept or situation with the


aim of reaching valid, sound and objective conclusions. Strong
critical thinking skills take practice, as it’s easy to make decisions

11
“uncritically” based on one’s own interests, biases and emotions,
rather than the facts.

 Ask questions to gather relevant information


 Identify biases and minimize their influence
 Evaluate all available data relevant to the situation or
problem
 Ask for feedback and collaborate with those involved in
the situations, including people with different
backgrounds, perspectives and knowledge specialties
 Generate a variety of possible solutions and determine
the optimal implementation, given the desired
consequences

Creativity

Creativity is the ability to make, invent or produce something new,


rather than imitating something that already exists. Yes, often
times engineers are building off something else, but the creative
label still applies as they look for new methods and processes to
solve problems cheaper, faster and better.

12
People Management and Emotional Intelligence

Teamwork is often the focus of this job skill, since the most
engineering projects and workplaces involve collaboration with
other people. While the has been some movement towards
remote and decentralized employment, as evidenced by the gig
economy and digital meeting spaces, the bulk of engineering
work still involves face-to-face human interaction.

The Human Touch is Still Required

The trend for remote and decentralized work is also expected to


continue, meaning the personal touch will be even more
important as you need to manage teams who could be located
anywhere in the world, with much of the interaction occurring
digitally. At least until we have picture-perfect, true-to-life digital
avatar in a virtual meeting space, a human’s emotional
intelligence will still be needed to parse out body language, tone,
context and subtext of communication through video and written
text.

13
How birds of a feather flock together
K .Nekalya

Scientists have long wondered how and why fish swim in shoals
and birds fly in flocks—what’s in it for the individuals? New
research from New York University helps shed some light on what
benefits they derive from their formations. Unlike, say, a peloton
of cyclists that are travelling on land by pushing their tires against
the ground, fish and birds are moving in a medium that’s all
around them, not just below them—and they’re both doing it,
basically, with similar mechanisms: what NYU Ph.D. candidate Joel
Newbolt, the study’s lead author, refers to as “flapping.”
Previous work has demonstrated that “in these groups like schools
and flocks, you can do things like reduce the amount of energy it
takes to move through the water or through the air,” Newbolt
says. These ways of traveling lead schools of fish and flocks of
birds to move in characteristic shapes. The geometry may differ
from species to species—a flock starlings moves differently than a
V of Canada geese—but both are deriving benefit moves
differently than a V of Canada geese—but both are deriving
14
benefit from their flock In previous models of this behaviour,
scientists assumed that each fish or bird was flapping exactly the
same way, like a group of machines. But the reality is more
complicated: even though every goose in the world is different
from every other goose, still somehow all groups of Canada geese
fly in similar configurations.
Ironically, the researchers behind this latest study actually used
machines to model flapping in a controlled setting. They
positioned two hydrofoils, a lifting surface designed to cut
through liquid efficiently, in a tank of water. They lined the foils up
one behind the other, and “flapped” both of them in a manner
that parallels the general movement of a fish’s swimming tail or a
bird’s flapping wings. What they found was that the lead hydrofoil
created a wake behind it that “affects the position of the
follower,” according to a supplementary video published by the
researchers. That wake “can even keep the follower from colliding
with, or separating from, the leader.”
The experiment “shows that these configurations are very robust,”
says Lehigh University’s Keith Moored, who was not involved with
the current research. His lab also studies flapping. The research
lends more weight to the idea that the shape of moves differently
than a V of Canada geese—but in and water power, the team
hopes. “Depending on the river speed and their spacing, you can
get more efficiency in the following ones,” Newbolt says.

But even the animals remain mysterious at this point. “There’s


really so much to be understood about these movements in
groups,” says Newbolt.

WEIRD FACTS ABOUT TECHNOLOGY


 MALATHI.N

15
Email existed before the worldwide web

16
 You probably don't even think before composing a one-
line email message and sending it.
 But it wasn't always so easy.
 There's an interesting clip on YouTube: "How to send an
Email – Database – 1984".
 This was from a tech TV show called Database and the
presenters demonstrated what it took to actually send an
email back in those days.
 You had to use a computer and a rotary telephone to
connect to a service called Micro net.
 This was pre-WWW, so there were no URLs, just
numbered webpages. For emails, the webpage number
was 7776.

TOP TECHNOLOGY TRENDS IN 2019

- MANJU SRINIVASAN

17
Digital Twins

A digital twin refers to the digital representation of a real-world


entity or system.

By 2020, Gartner estimates there will be more than 20 billion


connected sensors and endpoints and digital twins will exist for
potentially billions of things. Organisations will implement digital
twins simply at first.

They will evolve them over time, improving their ability to collect
and visualise the right data, apply the right analytics and rules,
and respond effectively to business objectives.

“One aspect of the digital twin evolution that moves beyond IoT
will be enterprises implementing digital twins of their
organisations (DTOs).

“A DTO is a dynamic software model that relies on operational or


other data to understand how an organisation operationalises its
business model, connects with its current state, deploys resources
18
and responds to changes to deliver expected customer value,”
said Cearley.

Empowered Edge

The edge refers to endpoint devices used by people or


embedded in the world around us. Edge computing describes a
computing topology in which information processing, and content
collection and delivery, are placed closer to these endpoints.

It tries to keep the traffic and processing local, with the goal being
to reduce traffic and latency.

In the near term, edge is being driven by IoT and the need keep
the processing close to the end rather than on a centralised cloud
server.

However, rather than create a new architecture, cloud computing


and edge computing will evolve as complementary models with
cloud services being managed as a centralised service executing,
not only on centralised servers, but in distributed servers on-
premises and on the edge devices themselves.

Over the next five years, specialised AI chips, along with greater
processing power, storage and other advanced capabilities, will be
added to a wider array of edge devices.

Longer term, as 5G matures the expanding edge computing


environment will have more robust communication back to
centralized services. 5G provides lower latency, higher bandwidth,
and (very importantly for edge) a dramatic increase in the number
of nodes (edge endpoints) per square km.

Immersive Experience

19
Conversational platforms are changing the way in which people
interact with the digital world. Virtual reality (VR), augmented
reality (AR) and mixed reality (MR) are changing the way in which
people perceive the digital world.

This combined shift in perception and interaction models leads to


the future immersive user experience.

“Over time, we will shift from thinking about individual devices


and fragmented user interface technologies to a multichannel and
multimodal experience.

“The multimodal experience will connect people with the digital


world across hundreds of edge devices that surround them,
including traditional computing devices, wearables, automobiles,
environmental sensors and consumer appliances,” said Cearley.

Kanitha .S

சிலகாலம் உன் னுடன் பல ...

கஷ்டங் கள் வந் துதுணையாகும் .

கை்ைில் வலிகள் கணைந்த ாடும்

20
அணவகள் மணையபாண கள் முன் த ான் றும்

இது ான் வாழ் க்ணகஎன் றுபுைிந் நாமும்

த ால் விக்காக கலங் காமல் வவை் றிக்காக


மயங் காமல்

நாம் வகாை்ட இப் பிைப் ணப வரும் சங் கதிகளுக்கு


வியப் பாக்கி மணைதவாதம ..

CRYPTOCURRENCY

Pavithra.R

21
A cryptocurrency (or crypto currency) is a digital asset designed to
work as a medium of exchange that uses strong cryptography to
secure financial transactions, control the creation of additional
units, and verify the transfer of assets. Crypto currencies use
decentralized control as opposed to centralized digital currency
and central banking systems. Bitcoin is the best example for
cryptocurrency.

HISTORY OF BITCOIN

Bitcoin is a cryptocurrency, a digital asset designed to work as a


medium of exchange that uses cryptography to control its
creation and management, rather than relying on central
authorities. Prior to the release of bitcoin there were a number of
digital cash technologies based on e-cash protocols of David
Chaum and Stefan Brands. Adam Back developed hash cash, a
proof-of-work scheme for spam control. The first proposals for
distributed digital scarcity based cryptocurrencies were Wei Dai's
b-money and Nick Szabo's bit gold.

In the bit gold proposal which proposed a collectible market


based mechanism for inflation control, Nick Szabo also
investigated some additional aspects including a Byzantine fault-
tolerant agreement protocol based on quorum addresses to store
and transfer the chained proof-of-work solutions, which was
vulnerable to Sybil attacks, though.

22
Paying With Your Face

- MODHANA PRIYA R

Face-detecting systems in China now authorize payments, provide


access to facilities, and track down criminals.

Credit cards, online wallets and crypto currencies are just some of
the numerous ways of payment in the modern world. Yet, there
has been a recent addition to this list. Meet a completely new
technology: paying with your face. Yes, seriously.

No fingerprints or retinal scans. Just smile into the camera and


have the payment done

The Face++ start-up has a partnership with several commercial


banks: Ant Financial and a subsidiary of Alibaba - Alipay. Many
people already use Alipay to make their online payments.

It is actually done using an application!!!! Nowadays, over 120


million people in China use the Face++ app to confirm their
payments. The developers of the new app called Face++ are
located in Beijing, China.

23
The first version of the app was launched nearly five years ago.
Since then, a number of improvements have been added to it.
One of the most important of them is moving to a completely
new platform with computer vision algorithms at its core.

How does it work!!!

When the users upload their photos to the system, it integrates


facial biometric data and tracks up to 83 different key points on
the face from various angles at the same time. Identity verification
happens immediately with an extremely high accuracy. This
technology is used in Alipay’s “smile-to-pay” application.

Face++ payment confirmations can improve the financial security


of any person. Together with an overall image of an individual’s
face, this app also captures some specific facial features. The
software can identify faces with 99 percent accuracy.

What else this application can do!!!

In addition to ID verification, Face++ can do other things:  analysis


of age, race, face comparison, gender detection and identification
of emotional expressions. All of that based on just one photo. It
can provide automatic access to private property, such as
company’s offices, for example. In fact, this is one of the most
popular and widespread usages of Face++ right now. The app
can also monitor people’s movements inside a room. That makes
this technology quite helpful for banks or big stores.

The Future of Shopping Is Virtual and Augmented

E.LAKSHMI PRIYA

24
There are many things consumers have long disliked about
shopping, from poorly lit dressing rooms to lack of information to
pushy salespeople. Digital and mobile technologies have started
to chip away at those irritants, but it turns out those are just the
beginning. With digital signage now the norm and the mobile
revolution well underway, augmented reality (AR) and virtual
reality (VR) are set to completely transform the shopping
experience, replacing the pain points with captivating, interactive
experiences that both inform and entertain.

Alongside retail technology trends, retailers are also investing in


artificial intelligence (AI) and the Internet of Things (IOT). In fact,
many of the use cases making the most impact on the customer
experience combine some or all of these technologies to create a
more engaging encounter with the brand. These retailers are
betting on a data-fuelled, differentiated experience to boost
conversions and revenue by making shopping fun again.

Testing or Trying on Merchandise:

AR and VR can both be useful in helping consumers see products


in context, such as a furniture buyer previewing how a couch
would look in their living room. To overcome the stumbling block
of consumers avoiding the possibility of overheated, poorly lit
fitting rooms, Timberland unveiled a virtual fitting room using
Kinect and digital signage technology that enables passers-by to
25
virtually try on every piece of clothing available in the store using
hand gestures. Web and Facebook apps use a PC’s built-in
cameras and AR to create a similar experience for home users.

Designing Custom Goods:

Creating a custom order used to take a lot of time and rely on the
customer’s imagination. AR and VR in retail help overcome those
hurdles by producing virtual versions of the desired
product. Object tracking and projection technology (using AI and
IOT) as well as digital signage or video walls to enable a
customized design to appear on sneakers. An hour later the
customer can pick up the finished product.

Thinking Out of the Box


(Creative Thinking)

- Jeevadharshini.V

In a small Italian town, hundreds of years ago, a small business


owner owed a large sum of money to a loan-shark. The loan-
shark was a very old, unattractive looking guy that just so
happened to fancy the business owner’s daughter.

He decided to offer the


businessman a deal that would
completely wipe out the debt
he owed him. However, the
catch was that we would only
wipe out the debt if he could
marry the businessman’s
daughter. Needless to say, this
proposal was met with a look of disgust.

26
The loan-shark said that he would place two pebbles into a bag,
one white and one black.
The daughter would then have to reach into the bag and pick out
a pebble. If it was black, the debt would be wiped, but the loan-
shark would then marry her. If it was white, the debt would also
be wiped, but the daughter wouldn’t have to marry the loan-
shark.

Standing on a pebble-strewn path in the businessman’s garden,


the loan-shark bent over and picked up two pebbles.

Whilst he was picking them up, the daughter noticed that


he’d picked up two black pebbles and placed them both into the
bag.
He then asked the daughter to reach into the bag and pick one.
The daughter naturally had three choices as to what she could
have done:

1. Refuse to pick a pebble from the bag.


2. Take both pebbles out of the bag and expose the loan-shark
for cheating.
3. Pick a pebble from the bag fully well knowing it was black
and sacrifice herself for her father’s freedom.

She drew out a pebble from the bag, and before looking at it
‘accidentally’ dropped it into the midst of the other pebbles.
She said to the loan-shark;

“Oh! how clumsy of me. Never mind, if you look into


the bag for the one that is left, you will be able to tell
which pebble I picked.”

The pebble left in the bag is obviously black, and seeing as the
loan-shark didn’t want to be exposed, he had to play along as if
the pebble the daughter dropped was white, and clear her
father’s debt.

27
Moral of the story:

It’s always possible to overcome a tough situation throughout of


the box thinking, and not give in to the only options you think you
have to pick from.

List of Information Technology (IT) JOBS

- PRAKASH.C

Job Titles

People with jobs in the career field of information technology (IT)


use computers, software, networks, servers, and other technology
to manage and store data. Information technology job titles can
vary greatly from one company to another. For instance, one
company may recruit for a "developer" where another recruits for
a "programmer" — but the work may be precisely the same at the
two companies, despite the difference in job titles. Also, many of
the skills in this field are transferable, which means candidates may
be qualified for many different roles.

If you are searching for positions in IT, it's helpful to take a look at
a broad list of job titles so that your search can include all of the
relevant roles.

28
Cloud Computing Engineers

 Cloud Architect
 Cloud Consultant
 Cloud Product and Project Manager
 Cloud Services Developer
 Cloud Software and Network Engineer
 Cloud System Administrator
 Cloud System Engineer

Computer Network Specialists

 Computer and Information Research Scientist


 Computer and Information Systems Manager
 Computer Network Architect
 Computer Systems Analyst
 Computer Systems Manager
 IT Analyst
 IT Coordinator
 Network Administrator
 Network Architect
 Network and Computer Systems Administrator
 Network Engineer
 Network Systems Administrator
 Senior Network Architect
 Senior Network Engineer
 Senior Network System Administrator

Computer Support Specialist

 Customer Support Administrator


 Customer Support Specialist
 Desktop Support Manager
 Desktop Support Specialist
 Help Desk Specialist
 Help Desk Technician

29
 IT Support Manager
 IT Support Specialist
 IT Systems Administrator
 Senior Support Specialist
 Senior System Administrator
 Support Specialist
 Systems Administrator
 Technical Specialist
 Technical Support Engineer

Database Administrator

 Data Centre Support Specialist


 Data Quality Manager
 Database Administrator
 Senior Database Administrator

Information Technology Analysts

 Application Support Analyst


 Senior System Analyst
 Systems Analyst
 Systems Designer

Information Technology Leadership

 Chief Information Officer (CIO)


 Chief Technology Officer (CTO)
 Director of Technology
 IT Director
 IT Manager
 Management Information Systems Director
 Technical Operations Officer

Information Security Specialist

30
 Information Security
 Security Specialist

Software/Application Developer

 Application Developer
 Applications Engineer
 Associate Developer
 Computer Programmer
 Developer
 Java Developer
 Junior Software Engineer
 .NET Developer
 Programmer
 Programmer Analyst
 Senior Applications Engineer
 Senior Programmer
 Senior Programmer Analyst
 Senior Software Engineer
 Senior System Architect
 Senior System Designer
 Senior Systems Software Engineer
 Software Architect
 Software Developer
 Software Engineer
 Software Quality Assurance Analyst
 System Architect
 Systems Software Engineer

Web Developer

 Front End Developer


 Senior Web Administrator
 Senior Web Developer
 Web Administrator
 Web Developer

31
 Webmaster

Choose a job you love…………

32

Potrebbero piacerti anche