Popular Posts

Monday, November 21, 2016

How to Share Files Between Windows, Mac, and Linux PCs on a Network


Home file sharing used to be a nightmare, even between different versions of Windows — never mind Mac and Linux! These operating systems can now talk to each other and share files without any special software.

We’ll be using the SMB protocol for this. Windows uses SMB for file sharing, while both Macs and popular Linux distributions have built-in support for SMB. Microsoft even submitted patches to the open-source Samba project to improve it!

Share a Folder on Windows

You’ll need to enable old-fashioned file sharing on Windows, as other operating systems can’t access homegroups. To do this,  open the Control Panel and navigate to Network and Sharing > Change advanced sharing settings. Enable “network discovery” and “file and print sharing.”

Tweak the other options here if you’d like to share public folders over the network without requiring a password.



Locate the folder you want to share in Windows Explorer or File Explorer, right-click it, and select Properties. Click the Sharing tab and use the options here to share a folder and configure its permissions.



Access a Shared Folder from Windows

Visit the Network pane in Windows Explorer or File Explorer to view other computers sharing files with you. You’ll see properly configured Mac and Linux computers appear in this list along with nearby Windows PCs. Double-click a computer to view its shared files.


You can also connect directly to a computer if you know its name or IP address. Just type //COMPUTERNAME into Windows Explorer or File Explorer’s location bar and press Enter. Replace COMPUTERNAME with the computer’s local IP address if you want to connect directly to an IP address instead.




Share a Folder on Mac OS X

You’ll need to enable network file sharing to share folders on your Mac. Open System Preferences by clicking the Apple logo and selecting System Preferences. Click the Sharing icon and enable File Sharing. Click the Options button here and ensure “Share files and folders using SMB” is enabled.

Use the Shared Folders column to choose additional folders to share. Use the Users column to choose which users and groups can access and write to them.


Access a Shared Folder from Mac OS X

Open the Finder, click Go on the menu at the top of the screen, and select Connect to Server. Enter the following address, replacing COMPUTERNAME with the Windows computer’s name: smb://COMPUTERNAME. You can also enter the other computer’s local IP address instead of its name.




You’ll be prompted to authenticate with the appropriate credentials or log in as a guest. After you’ve connected, the computer will appear under the Shared column in the Finder’s sidebar.

To automatically connect to the shared folder each time you log in, open the System Preferences window and navigate to Users and Groups > Login Items. Drag and drop the network share from under the Shared column in Finder to the list of Login Items.


Share a Folder on Linux

Use your desktop’s file manager to share a folder on Linux. We used the Nautilus file manager on Ubuntu 14.04 here, but the process should be similar with other file managers.

Open the file manager, right-click a folder you want to share, and select Properties. Click the Local Network Share tab and enable sharing for that folder. If this is the first time you’ve enabled sharing, you’ll be prompted to download and install the Samba software — this happens automatically when you provide your password.

Configure your sharing settings after installing the Samba software — be sure to click the Create Share button to start sharing the folder.


Access a Shared Folder from Linux

Your Linux deksotp’s file manager probably includes a network browser you can use to locate and access shared folders on the local network.

Click the Browse Network option in the file manager’s sidebar. You can then double-click the Windows Network option, double-click your workgroup (WORKGROUP by default), and double-click a nearby computer to view its shared files.


To connect directly to a computer, select the Connect to Server option in Nautilus instead and enter the path to the remote computer like so: smb://COMPUTERNAME



However you connect, you may need to authenticate with a user account name and password that has access to the files on the remote machine. This depends on whether you enabled guest access and how you set up your folder sharing permissions.

Saturday, July 30, 2016

Top programming languages defining the future era

Faster, smarter programming, with fewer bugs. Those are the promises coming from the creators of the latest round of languages to capture the attention of programmers. Yes, they're the same buzzwords we've heard before, but lack of novelty is no reason to dismiss them. The future of coding requires stability and good practices so our innovations will work. In fact, our projects are often so much bigger now, we need the innovation more than ever.

If there's a common theme among the languages I describe below, it's that increasing automation can yield code worthy of the terms "faster, smarter, and bug-free." The newer approaches include more structure and more abstraction, allowing the guts of the languages to do what programmers used to have to do themselves. These automated features give the programmer more leverage to concentrate on the big issues. In many cases, they also produce better performance because the automated mechanisms are better able to find opportunities for efficiency and parallel computation, while eliminating some of the simple mistakes that lead to errors.

But beyond this one overarching theme, there's little agreement. One of the languages is built for statistical analysis. Several are meant to modernize classic languages. Some aren't even languages at all—they're merely preprocessors. Still, all of them are changing how we're writing code today and laying the foundation for the future of coding.


Here are languages that are changing how we tell computers what to do.

1. R

At heart, R is a programming language, but it's more of a standard bearer for the world's current obsession with using statistics to unlock patterns in large blocks of data. R was designed by statisticians and scientists to make their work easier. It comes with most standard functions used in data analysis and many of the most useful statistical algorithms are already implemented as freely distributed libraries. It's got most of what data scientists need to do data-driven science.

Many people end up using R inside an IDE as a high-powered scratchpad for playing with data. R Studio and R Commander are two popular front ends that let you load up your data and play with it. They make it less of a compile-and-run language and more of an interactive world in which to do your work.

Highlights: Clever expressions for selecting a subset of the data and analyzing it
Headaches: Aimed at desktops, not the world of big data where technologies like Hadoop rule.

2. Java 8

Java isn't a new language. It's often everyone's first language, thanks to its role as the lingua franca for AP Computer Science. There are billions of JAR files floating around running the world. But Java 8 is a bit different. It comes with new features aimed at offering functional techniques that can unlock the parallelism in your code. You don't have to use them. You could stick with all the old Java because it still works. But if you don't use it, you'll be missing the chance to offer the Java virtual machine (JVM) even more structure for optimizing the execution. You'll miss the chance to think functionally and write cleaner, faster, and less buggy code.

Highlights: Lambda expressions and concurrent code
Headaches: A bolted-on feeling makes us want to jump in with both feet and use Scala (see below).

3. Swift

Apple saw an opportunity when programming newbies complained about the endless mess of writing in Objective C. So they introduced Swift and strongly implied that it would replace Objective C for writing for the Mac or the iPhone. They recognized that creating header files and juggling pointers was antiquated. Swift hides this information, making it much more like writing in a modern language like Java or Python. Finally, the language is doing all the scut work, just like the modern code.

The language specification is broad. It's not just a syntactic cleanup of Objective C. There are plenty of new features, so many that they're hard to list. Some coders might even complain that there's too much to learn, and Swift will make life more complicated for teams who need to read each other's code. But let's not focus too much on that. iPhone coders can now spin out code as quickly as others. They can work with a cleaner syntax and let the language do the busy work.

Highlights: Dramatically cleaner syntax and less low-level juggling of pointers
Headaches: The backwards compatibility requires thinking about bits and bytes occasionally.

4. Go

When Google set out to build a new language to power its server farms, it decided to build something simple by throwing out many of the more clever ideas often found in other languages. They wanted to keep everything, as one creator said, "simple enough to hold in one programmer's head." There are no complex abstractions or clever metaprogramming in Go—just basic features specified in a straightforward syntax.

This can make things easier for everyone on a team because no one has to fret when someone else digs up a neat idea from the nether reaches of the language specification.

Highlights: Just a clean, simple language for manipulating data.
Headaches: Sometimes a clever feature is needed.

5. CoffeeScript

Somewhere along the line, some JavaScript programmers grew tired of typing all those semicolons and curly brackets. So they created CoffeeScript, a preprocessing tool that turns their syntactic shorthand back into regular JavaScript. It's not as much a language as a way to save time hitting all those semicolons and curly bracket keys.

Jokers may claim that CoffeeScript is little more than a way to rest your right hand's pinkie, but they're missing the point. Cleaner code is easier to read, and we all benefit when we can parse the code quickly in our brain. CoffeeScript makes it easier for everyone to understand the code, and that benefits everyone.

Highlights: Cleaner code
Headaches: Sometimes those brackets make it easier to understand deeply nested code.

6. D

For many programmers, there's nothing like the very clean, simple world of C. The syntax is minimal and the structure maps cleanly to the CPU. Some call it portable Assembly. Even for all these advantages, some C programmers feel like they're missing out on the advantages built into newer languages.

That's why D is being built. It's meant to update all the logical purity of C and C++ while adding in modern conveniences such as memory management, type inference, and bounds checking.

Highlights: Some of the most essential new features in languages.
Headaches: You trade some power away for the safety net.

7. Less.js

Just like CoffeeScript, Less.js is really just a preprocessor for your files, one that makes it easier to create elaborate CSS files. Anyone who has tried to build a list of layout rules for even the simplest website knows that creating basic CSS requires plenty of repetition; Less.js handles all this repetition with loops, variables, and other basic programming constructs. You can, for instance, create a variable to hold that shade of green used as both a background and a highlight color. If the boss wants to change it, you only need to update one spot.

There are more elaborate constructs such as mixins and nested rules that effectively create blocks of standard layout commands that can be included in any number of CSS classes. If someone decides that the bold typeface needs to go, you only need to fix it at the root and Less.js will push the new rule into all the other definitions.

Highlights: Simpler code
Headaches: A few good constructs leave you asking for more.

8. MATLAB

Once upon a time, MATLAB was a hardcore language for hardcore mathematicians and scientists who needed to juggle complex systems of equations and find solutions. It's still that, and more of today's projects need those complex skills. So MATLAB is finding its way into more applications as developers start pushing deeper into complex mathematical and statistical analysis. The core has been tested over the decades by mathematicians and now it's able to help mere mortals.

Highlights: Fast, stable, and solid algorithms for complex math
Headaches: The math is still complex.

9. Arduino

The Internet of Things is coming. More and more devices have embedded chips just waiting to be told what to do. Arduino isn't so much a new language as a set of C or C++ functions that you string together. The compiler does the rest of the work.

Many of these functions will be a real novelty for programmers, especially programmers used to creating user interfaces for general computers. You can read voltages, check the status of pins on the board, and of course, control just how those LEDs flash to send inscrutable messages to the people staring at the device.

Highlights: The world of devices is your oyster.
Headaches: It's largely C and C++.

10. CUDA

Most people take the power of their video cards for granted. They don't even think about how many triangles the video card is juggling, as long as their world is a complex, first-person shooter game. But if they would only look under the hood, they would find a great deal of power ready to be unlocked by the right programmer. The CUDA language is a way for Nvidia to open up the power of their graphics processing units (GPUs) to work in ways other than killing zombies or robots.

The key challenge to using CUDA is learning to identify the parallel parts of your algorithm. Once you find them, you can set up the CUDA code to blast through these sections using all the inherent parallel power of the video card. Some jobs, like mining Bitcoins, are pretty simple, but other challenges, like sorting and molecular dynamics, may take a bit more thinking. Scientists love using CUDA code for their large, multidimensional simulations.

Highlights: Very fast performance, at least for parallel code.
Headaches: Identifying the easily parallelizable sections of code isn't always easy.

11. Scala

Everyone who's taken an advanced course in programming languages knows the academic world loves the idea of functional programming, which insists that each function have well-defined inputs and outputs but no way of messing with other variables. There are dozens of good functional languages, and it would be impossible to add all of them here. Scala is one of the best-known, with one of the larger user bases. It was engineered to run on the JVM, so anything you write in Scala can run anywhere that Java runs—which is almost everywhere.

There are good reasons to believe that functional programming precepts, when followed, can build stronger code that's easier to optimize and often free of some of the most maddening bugs. Scala is one way to dip your toe into these waters.

Highlights: Functional, but flexible enough to play well with others using the JVM
Headaches: Thinking functionally can be difficult for some tasks and applications.

12. Haskell

Scala isn't the only functional language with a serious fan base. One of the most popular functional languages, Haskell, is another good place for programmers to begin. It's already being used for major projects at companies like Facebook. It's delivering real performance on real projects, something that often isn't the case for academic code.

Highlights: Already battle tested
Headaches: Thinking functionally can require fixing some bad habits.

13. Jolt

When XML was the big data format, a functional language called XSLT was one of the better tools for fiddling with large datasets coded in XML. Now that JSON has taken over the world, Jolt is one of the options for massaging your JSON data and transforming it. You can write simple filters that extract attributes and JOLT will find them and morph them as you desire. See also Tempo and using XSLT itself.

Highlights: Very simple for many common JSON problems
Headaches: Some JSON transformations are close to impossible.

No generalizations here

It's hard to generalize much about the new languages, at least beyond the promises that they'll produce code that is faster, smarter, and contains fewer bugs. In fact, it's a bit of a stretch to call them new. The history for some of these languages stretches back years, even decades. They just seem new, now that they're being discovered by the larger world.

Thursday, March 17, 2016

Future Networking Technology : LI-FI and GI-FI


WI-FI VS. WI-MAX VS. LI-FI VS. GI-FI


WIRELESS NETWORKING

Wireless networking is an essential productivity tool for today`s mobile workforce. With wireless networking, we and our employees can stay connected to our company`s information resources virtually anytime, anywhere. Wireless networking is used to meet many needs. Perhaps the most common use is to connect laptop users who travel from location to location. Another common use of wireless networking that connects satellite. These applications may involve point-to-point communication, point-to-multipoint communication, broadcasting, cellular networks and other wireless networks, Wi-Fi etc.

Some NETGEAR products confirm to the IEEE 802.11g standard for wireless LAN (WLANs). On an 802.11 wireless link, data is encoded using DSSS technology and it transmitted the radio spectrum at 2.5 GHz. Maximum data rate is 54 mbps, when the radio signal is weak or when interference is detected. With a wireless access point, the wireless LAN can operate in the infrastructure mode. This mode lets you connect wirelessly to wireless network devices within a fixed range or area of coverage. The access point has one or more antennas that allow you to interact with wireless nodes. In infrastructure mode, the wireless access point converts airwave data into wired Ethernet data, acting as a bridge between the wired LAN and wireless clients. Connecting multiple access points via a wired Ethernet backbone can further extend the wireless network coverage. As a mobile computing device moves out of the range of one access points it moves into the range of another. As a result, wireless clients can freely roam from one access point domain to another and still maintain seamless network connection.

In an ad hoc network, computers are brought together as needed; thus, the network has no structure or fixed points—each node can be set up to communicate with any other node. No access point is involved in this configuration. This mode enables you to quickly set up a small wireless workgroup and allows workgroup members to exchange data or share printers as supported by Microsoft networking in the various Windows operating systems. Some vendors also refer to ad-hoc networking as peer-to-peer group networking. In this configuration, network packets are directly sent and received by the intended transmitting and receiving stations. As long as the stations are within range of one another, this is the easiest and least expensive way to set up a wireless network.


Introduction to Wi-Fi

Wi-Fi, also spelled Wi-fi or Wi-Fi, is a local area wireless technology, which allows an electronic device to exchange data or connect to the internet using 2.4 GHz UHF and 5 GHz SHF radio waves. According to the Wi-Fi Alliance Wi-Fi as any "wireless local area network (WLAN) products that are based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 standards". Moreover, since most modern WLANs are based on these standards, the term "Wi-Fi" is used in general English as a synonym for "WLAN". Only Wi-Fi products that complete Wi-Fi Alliance interoperability certification testing successfully may use the "Wi-Fi CERTIFIED" trademark. 


Many devices can use Wi-Fi, like personal computers, video-game consoles, smartphones, some digital cameras, tablet computers and digital audio players. These devices can be connected over a network resource such as the Internet via a wireless network access point. Such as an access point (or hotspot) has a range of about 20 meters (66 feet) indoors and a greater range outdoors. Hotspot may have the coverage area as small as a single room with walls that block radio waves, or as large as many square kilometers achieved by using multiple overlapping access points. Wi-Fi are the less secure than wired connections (such as Ethernet), as an intruder does not need a physical connection. Web pages that use SSL are secure but unencrypted internet access can easily be detected by intruders. Due to this reason, Wi-Fi has adopted various encryption technologies. The early encryption WEP, proved easy to break. Higher quality protocols (WPA, WPA2) were added later. An optional feature added in 2007, called Wi-Fi Protected Setup (WPS), had a serious flaw that allowed an attacker to recover the router's password. The Wi-Fi Alliance has since updated its test plan and certification program to ensure all newly certified devices resist attacks. 

WEP or Wired Equivalent Privacy is the most common standard for wireless encryption and it is proven that it can be easily broken even when it is properly configured. Usually Wi-Fi access points are configured using an open/ encryption- free mode. This zero-configuration device which is out-of-the-box ready to use is beneficial for novice users but since it is the default mode, it offers zero wireless security. In order to turn on the security, users are required to configure this device with the help of GUI (Graphical User Interface) software. A major security concern in unencrypted Wi-Fi networks is that it enables users to monitor and record personal information of all users who are using this network. Such networks are required to be secured with the help of other protection methods, such as Hypertext Transfer Protocol over HTTPS (Transport Layer Security) and VPN. This security concern is overcome with the help of WPA2 if a strong passphrase is used to secure the network.


US Federal Communications Commission released the 802.11g wireless fidelity for the ISM band for unlicensed use. In 1991, NCR Corporation with AT&T Corporation invented the precursor to 802.11 intended for use in cashier systems. The first wireless products were under the name WaveLAN. 
Some have dubbed Dutch engineer Vic Hayes the "father of Wi-Fi" due to his involvement in negotiating the initial standards within the IEEE while chairing the workgroup. The Australian radio-astronomer John O'Sullivan developed a key patent, which was used in Wi-Fi as a by-product in a CSIRO research project, "a failed experiment to detect exploding mini black holes the size of an atomic particle". In 1992 and 1996, Australian organization CSIRO (the Australian Commonwealth Scientific and Industrial Research Organization) obtained patents for a method later used in Wi-Fi to "unsmear" the signal. In 1999, the Wi-Fi Alliance formed as a trade association to hold the Wi-Fi trademark under which most products are sold. 


UPDATES OF WI-FI: WI-MAX 

After the past three decades after invention of Wireless system, we were unable to send data without any wire at high speed. In 1999, the invention of Wi-Fi revaluated the telecom industry. The latest version of Wi-Fi 2004.802.16d, started to update the Wi-Fi system. Wi-MAX (Worldwide Interoperability for Microwave Access) is a wireless communications standard designed to provide 30 to 40 megabit-per-second data rates, with the 2011 update providing up to 1 Gbit/s for fixed stations. The name "Wi-MAX" was created by the WiMAX Forum, which was formed in June 2001 to promote conformity and interoperability of the standard. The forum describes Wi-MAX as "a standards-based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL".
Wi-MAX refers to interoperable implementations of the IEEE 802.16 family of wireless-networks standards ratified by the Wi-MAX Forum. (Similarly, Wi-Fi refers to interoperable implementations of the IEEE 802.11 Wireless LAN standards certified by the Wi-Fi Alliance.) Wi-MAX Forum certification allows vendors to sell fixed or mobile products as Wi-MAX certified, thus ensuring a level of interoperability with other certified products, as long as they fit the same profile. The original IEEE 802.16 standard (now called "Fixed Wi-MAX") was published in 2001. Wi-MAX adopted some of its technology from Wi-Bro, a service marketed in Korea. 

Worldwide Interoperability for Microwave Access (Wi- MAX), is a wireless communications technology aiming to provide wireless data over long distances in a variety of ways as an alternative to cable and DSL, from point-to-point links to full mobile cellular type access. It is based on the IEEE 802.16 standard. The name Wi-MAX was created by the Wi-MAX Forum, which was formed in June 2001 as an industry-led, not- for-profit organization to promote conformance and interoperability of the standard. The goal of this deliverable is to provide an overview of the functionality and a description of the Wi-MAX network architecture. The coexistence and interoperability solutions between Wi-MAX and other wireless access networks, such as WLAN (IEEE 802.11) in Beyond 3G (B3G) networks. 


NEW INTERNET TECHNOLOGY: LI-FI

Weather we are using the wireless connection in a coffee shop or stealing it from the guy next door, or competing bandwidth at a conference or training centers, we get frustrated for the slow speed of internet. Thirty years after the introduction of the first commercially available mobile communication systems, wireless connectivity has become the essential commodity like gas and electricity. But in the contradiction, the limited available RF spectrum in subject to think about the problems which are faced mentioned before. Motivated by the looming radio frequency (RF) spectrum crisis, the scientists demonstrated that owe has now reached a state where it can demonstrate that, it is a variable and matured solution to this fundamental problem in particular, in case of the indoor communications, where most mobile data & traffic is consumed.
Li-fi is the only solution which is operated via VLC. Therefore, there have been many independent warnings of a looming. 'RF Spectrum Crisis ' as a mobile data demands continue to increase while the network spectral efficiency saturates despite newly - introduced standards and great technologies advancements in the field. It is new estimated that by 2017, more than 11 bytes of data traffic will have to be transferred through mobile networks every month.


SIGNAL MODULATION IN OWC:

Seamless all own would require the ubiquitous coverage provided by the optical front- end elements. This the usage of a large amount of Li-fi, enable lightning units. The most likely candidates for front end devices in VLC are incoherent solid-state lighting LED‘S due to their low cost. Due to the physical properties of these compounds, information can only be encoded in the intensity of emitted light.


MULTIPLE ACCESSES:

A networking solution cannot be realized without any suitable multiple access scheme that allows multiple users to share the communication resources without any mutual cross talk. Multiple access schemes used in RF communication can be adopted for OWC as long as the necessary modification related to the 1M/DD nature of modulating signals, are performed of DM come with of DMA . Single carrier modulation schemes such as M- PAM, OOK, PWM, and CDMA. 


HOW LI- FI WORKS:

We can imagine ourselves walking into a complex where GPS Signals are unavailable but the complex is equipped with ceiling bulbs that create their own ' constellation ' of navigation becomes. As the concern of our cell phone automatically receives these signals, it switches our navigation software to use this information to guide us to the ATM machine we are looking for we conclude our ATM transaction and notice the Giga spot sign for instant digital movie download within a few seconds, or AD movie into Gign link flash desire plugged into the USB port of our smartphone. As we walk away, out phone notifies us that the leather jacket featured in the character of movie is ON sale nearby. We walk over there towards the slow window and own image comes up on the screen, wearing the jackets. We can turn and pause while the image matches our orientation and body gestures for a digital filtering. When we walk into the store, the clerk handover us the actual jacket into exactly size tilting. 


Security Concerns:

It is a proven fact that Li-Fi is more secure as compared to traditional Wi-Fi. This is because Wi-Fi routers are generally used by attackers to enter a network and strong firewalls are also unable to safeguard your network from these attackers. One of the common reasons behind this is that the range of Wi-Fi routers is an important factor which enables these security breaches into your Wi-Fi network. On the other hand, Li-Fi uses light which limits the range of the internet connection and it cannot be increased at any cost. Thus, not letting the bulb be lightened or dimmed manually. This peculiar feature of Li-Fi will protect your network from interference from your neighbours.

FUTURE OF LI-FI: INTRODUCTION TO GI-FI 

Gi-Fi or gigabit wireless refers to wireless communication at a data rate of more than one billion bits (gigabit) per second. By 2004 some trade press used the term "Gi-Fi" to refer to faster versions of the IEEE 802.11 standards marketed under the trademark Wi-Fi. In 2008 researchers at the University of Melbourne demonstrated a transceiver integrated on a single integrated circuit (chip) that operated at 60 GHz on the CMOS process. It will allow wireless transfer of audio and video data at up to 5 gigabits per second, ten times the current maximum wireless transfer rate, at one-tenth the cost. Researchers chose the 57–64 GHz unlicensed frequency band since the millimeter-wave range of the spectrum allowed high component on-chip integration as well as the integration of very small high gain arrays. The available 7 GHz of spectrum results in very high data rates, up to 5 gigabits per second to users within an indoor environment, usually within a range of 10 meters. Some press reports called this "Gi- Fi". It was developed by Melbourne University- based laboratories of NICTA (National ICT Australia Limited), Australia‘s Information and Communications Technology Research Centre of Excellence.

In 2009, the Wireless Gigabit Alliance was formed. It used the term "Wi-Gig" which avoided trademark confusion. It utilize at 5mm square chip and a 1mm wide antenna burning its less than 2milli watts of power to transmit data wirelessly over short distance. It provides many features like ease of development small from factors ,enabling the future of information management, high speed of data transfer low power consumption etc. 


Features:

The Gi-fi technology allows wireless uncompressed high definition content and operates a range of 10metres, without of interference.it is chip architecture. It is highly portable and can be constructed in everywhere. Entire transmission system can be built on a cost effective single silicon chip that operates in the unlicensed 57-64 GHz spectrum band. Gi-Fi technology also enables the future of information management is easy in development with small form factor.


1. Capacity of high speed of data transfer:

The data transfer rate of Gi-fi is in gigabits/sec speed of Gi-fi is 5gbps, 10 times faster than all existing technologies providing higher data transfer rate is the main feature of gi-fi, an entire HD movie can be transmitted to a home computer or screen at the same speed.


2. Interference in Data Transfer:

It uses the 60 GHz millimeter were spectrum to transmit the data which gives the advantage are WI-FI. Wi-Fi‘s part of spectrum is increasingly crowded, phones which leads to interference and slower speeds. But the millimeter were spectrum(30 to 300 GHz) is all must an occupied And the new chip is potentially hundreds of times faster than the average home Wi-Fi technology.


3. Power consumption:

Gi-Fi technology is based on IEEE 802.15.3C and this Standard provides more security since it provides optional security in the link level and service level. Point-to-point wireless systems operating at 60 GHz have been used for many years by the intelligence community for high security communications and by the military for satellite-to-satellite communications.


COMPARISON:


WI-FI VS.WI-MAX

Wi-MAX is exactly not a technology; it is rather than a certification mark, or 'stamp of approval', it is given to equipment that meets certain conformity and interoperability tests for the IEEE 802.16 families of standards. A similar confusion surrounds the term Wi- Fi, which like Wi-MAX, is a certification mark for equipment based on a different set of IEEE standards from the 802.11 working group for wireless local area networks (WLAN). Neither Wi-MAX, nor Wi-Fi is a technology but their names have been adopted in popular usage to denote the technologies behind them.



This is likely due to the difficulty of using terms like 'IEEE 802.16' in common speech and writing.
Wi-MAX and Wi-Fi are both wireless broadband technologies, but they have difference in the technical execution. Wi-Fi was developed to be used for mobile computing devices, such as laptops, in LANs, but is now increasingly used for more services, including Internet and VoIP phone access, gaming, and basic connectivity of consumer electronics such as televisions and DVD players, or digital cameras. On the other hand Wi-MAX was developed as standardsbased technology enabling the delivery of last mile wireless broadband accesses as an alternative to cable and DSL. 

Here now we will differ these two technologies with the following valuable parameters:


WI-FI VS. LI-FI 

Li-Fi is a term, one used to describe visible light communication technology applied to high speed wireless communication. It acquired this name due to the similarity to WI-FI, only using light instead of radio. Wi-Fi is great for general wireless coverage within buildings and li-fi is ideal for high density wireless data coverage in confined area and for relieving radio interference issues, so the two technologies can be considered complimentary. Late last year the IEEE802.15.7 draft standard for VLC was produced. This standard covers both the physical layer (PHY) air interface and the medium-access control (MAC). 


Drawbacks:


LI-FI

Now that we are accustomed to what is Li-Fi, let us take a look at some drawbacks of Li-Fi. One difference between Li-Fi and Wi-Fi is that it Li-Fi is more secure than Wi-Fi. You can only use the internet using Li-Fi when the light is coming out of the bulb. Hence, you have to be present there! Moving away from the bulb will result in losing your internet connection. One of the most common drawbacks of Li-Fi is that all electronic devices are to be configured with the bulb for them to get connected to the internet.


WI-FI

The speed of data transmission is highly affected in a Wi-Fi network because the call-quality is always influenced by the surrounding. It is peculiarly sensitive to electromagnetic radiations emitted from household devices. Devices manufactured by different companies may often not be compatible with Wi-Fi which affects its communication speed. It has limited action radius and is mostly only suitable for home-networking. At high- density operating points of Wi-Fi, different channels can interfere with each other; hence affecting the quality of service.


WI-MAX & LI-FI

Wi-MAX is one of the hottest broadband wireless technologies around today. Wi-MAX systems are expected to deliver broadband access services to residential and enterprise customers in an economical way. Loosely, Wi-Max is a standardized wireless version of Ethernet intended primarily as an alternative to wire technologies (such as Cable Modems, DSL and T1/E1 links) to provide broadband access to customer premises Li-Fi, an alternative to Wi-Fi that transmits data using the spectrum of visible light, has achieved a new breakthrough, with UK scientists reporting transmission speeds of 10Gbit/s – more than 250 times faster than super-fast broadband. The fastest speed previously reported was 3Gbit/s, achieved earlier this year by the Fraunhofer Heinrich Hertz Institute in Germany. Chinese researchers also claimed this month to have produced a 150Mbp/s connection, but some experts were doubtful without seeing further proof.


THE BEST TECHNOLOGY

After review all the technology, we found the best technology is Wi-max. There are some reasons are mainlined below:
  • Wi-Fi has very low speed. Wi-Max has 100 times faster than Wi-Fi. Li-Fi is 10 times faster than Wi- Max.
  • Li-Fi is very costly than Wi-Max 
  • Li-Fi operating range is only 10 meters.
  • Gi-Fi is more critical connection than Wi-Max. Reliability, Flexibility, is much better of Wi-Max. 
The Wi-MAX forum has made exciting claims about distance and speed, which have yet to be realized in commercial operations. In October 2006, Nortel demonstrated IPTV over Wi-MAX. In Nortel's demonstration, an IP television service over a live high- speed Wi-MAX connection was used to view and download broadcast TV (via four mbps) with an integrated electronic program guide. While this was happening, users were also able to use Wi-MAX to access the Internet, and to make VoIP calls using an IP Multimedia Subsystem (IMS). So, after study, I think that, Wi-Max is going to be the best technology in future.

Tuesday, March 15, 2016

HOW TO PICK THE RIGHT SOCIAL PLATFORM TO GROW YOUR BUSINESS

What Platform is the Best for Digital Marketing? 





As you have probably heard by now, social media marketing has taken the reigns of digital marketing. It is a tool that can be used to drive traffic through websites, blog links, Twitter mentions, Facebook fans, LinkedIn and Google+ among many others. Social media is a whole new way of approaching traditional online marketing;social media marketing not only increases traffic, but it also creates a sense of trust and community that surrounds your company. The goal of social media marketing is to create a community for your customers, to focus on building and nurturing relationships, and to use word of mouth and storytelling as opposed to pushing a product or service. So, what are the best platforms for digital marketing? Let's find out.




Courtesy of Salesforce.

  • Facebook: 1,550,000,000 monthly visitors (source: Statista)
Although Facebook’s user base has declined a bit in the last few years, it still stands as the most popular social media site with over 1,550,000,000 monthly visitors. It has the largest number of users and over 1 million small to medium sized businesses advertise on it. Facebook is a simple and inexpensive way to increase your website’s traffic, interact with customers, and promote word-of-mouth. Facebook is also a great way to show your company’s human side – don’t be afraid to add a little personality into your statuses or share photos that you think your followers will appreciate! These kinds of posts make people want to respond and share it with their friends, which means more exposure for you.

Since Facebook is an inexpensive way to market your business it’s a great way to test marketing concepts before applying them to larger campaigns. Facebook even has its own analytics so you can track information your customers are most likely to click on and share. This information will be extremely valuable when you move on to bigger marketing campaigns because you will already know what content your followers are most likely to engage with.

  • Twitter: 320,000,000 monthly visitors (source: Statista)
Twitter is the second most popular social networking site and is another great way to increase traffic to your website while interacting with customers. Tweets are used to share stories, link to photos, and promote content, among other things. Although Twitter only allows you to use 140 characters in a tweet, it’s a great way to redistribute information from your blog or website and make it shareable.

Twitter can also be used to pitch stories to journalists. If your dealership holds an annual giveaway or hosts a popular fundraiser get the media involved! Twitter is a quick and easy way to let journalists (and your followers) know about what is happening in the community. You can also keep in contact with your followers by using popular hashtags, sharing relevant images and participating in Twitter chats within your community.


  • LinkedIn: 100,000,000 monthly visitors (source: Statista)

LinkedIn helps build professional networks with other users and is currently the largest professional network. So, unlike most other social networks LinkedIn focuses on career development, professional connections and industry discussions. LinkedIn is less about blatantly promoting your company and more about subtly staying in contact with customers. You can do this by posting daily statuses, inviting people to your email list and sharing your blog posts regularly. Although these are great, free ways to promote your company, you can also use LinkedIn Sponsored Updates. Paying for sponsored updates will ensure that your posts are seen on an individual’s LinkedIn feed. This is also a great way to reach a niche audience and promote content that your customers are interested in which will eventually lead to more traffic and more sales.


  • Pinterest: 100,000,000 monthly visitors (source: Statista)

Unlike many social media networks, Pinterest allows you to create a separate account for your business. Despite the stereotype that women aren’t interested in cars, women influence 84% of all vehicle purchase decisions. Currently 71% of Pinterest users are women, so it is a great way to really reach out to them and their needs. Many Pinterest users loveto repin tips, ways to save money, ways to make their lives easier, funny pictures, beautiful photos and more. A great pin is a pin that is easily shareable. Think about pinning infographics that showcase something interesting about different vehicles or a timeline of your business.


  • Instagram: 400,000,000 monthly visitors (source: Statista)

Having an Instagram account is essentially free advertising once you build your audience. Keep your feed current and make sure to post images that are both fun and informative. With Instagram’s new app, Boomerang, you can post Gifs that will entice your followers and get them interested in what you have to say. If you’re looking for a way to increase followers, follow some of your followers back and engage with other companies through likes and comments.

Currently there are over 200,000 advertisers on Instagram. Companies can pay to promote their posts on millions of Instagram feeds around the world. Another way to promote your company is through influencers on Instagram. Try reaching out to a well-known Instagram personality to see if they would be willing to promote your company.


  • Google+:

Google+ launched in 2011 and there are currently over 2.2 billion profiles online. Although 2.2 billion people are signed up for Google+, not many people actively use the site for anything but Gmail and commenting on YouTube videos. Although Google+ may not be the best way to reach your target audience there are some hidden benefits. Posting frequently on Google+ can help your business page rank higher on Google search pages. Another way to help your search engine optimization rankings is by creating a Google+ Local Page and a Google+ Business page. This will help your customers find directions, hours and reviews as well as help Google recognize your page as a reputable site.

Social media marketing is different. It’s a way to repurpose traditional media with a new outlook. Traditional media such as advertising, contests and public relations can all still be used in social media marketing, just with a different focus and attitude. The goal is to promote and nurture relationships, and to build lasting connections with consumers. Using these platforms to build connections will greatly increase a sense of community, traffic, and in the end, sales. Just remember, whether you use these social media sites or expand to others—continuously try to build positive, lasting relationships with your customers.

Monday, March 14, 2016

Few amazing WhatsApp Tips and Tricks. Definitely you will like it.

WhatsApp is going to be best mobile messaging app ever made for Android, iphone, Blackberry, Nokia & Java Mobiles. If you've active Internet connection with your mobile phone, then with the help of this app you can send unlimited communications, videos, audios, pictures to anyone. As you know that the WhatsApp’s popularity is continuing to grow so popular many whatsapp tricks and tips coming in the internet. It is predicted that WhatsApp has a lot more than 400 million active users all over the world. Due to it’s rapidly message delivery service and many other cool features namy citizens were attracted towards this. Here in this tutorial i am sharing the 12 Best And Untold Whatsapp Tips And Tricks  for any user who are applying Whatsapp app on their mobile phones or PC.

  • Use WhatsApp without your Mobile Phone Number

You can work with whatsapp without number which means not with your own individual number. So this trick may help you to do that easily and you'll activate whatsapp that has a number which is not your own my spouse and i. e fake. Just follow the below steps and revel in.
  • If you already are using WhatsApp, uninstall it from the device completely. Download and do the installation again.
  • Lock your messaging service through changing the airline flight mode.
  • Now open WhatsApp in addition to add your number to it. So it are not able to deliver the message towards server it will request you to choose an alternative strategy to verify.
  • Choose the authenticate through message option and fill up your email address and Click on ‘Send’ selection and without waiting simply click ‘Cancel’. This ends the authorization practice.
  • Now, you are required to forge messages. Install the message Spoof text for Andriod in addition to Fake- a- Information for iPhone.
  • Spoofing approach: Go to ones Outbox -> Copy the message information to spoofer app -> Send this to spoofed proof.
  • Use the pursuing details.
  • To: +447900347295
  • Coming from: +[Country code][mobile number]
  • Information: Your email target
  • A message is going to be sent through that will spoofed number. You should use this number for connecting with your close friends


  • Hide “Last Seen” Timestamp


Automatically, WhatsApp shows the “last seen” timestamp, telling other users the last time you were on WhatsApp. It’s a great feature, but the function becomes really annoying given it reveals whether that you are online or definitely not. You can not hide from the friends and they’ll keep actually talking to you. So if you want to hide this ” last seen in the” time stamps follow the under mentioned steps.
  • Earlier there are several third party Applications for sale in Google Playstore to cover ‘last seen’ feature. By the the latest update, you are able to use this feature without installing another apps.
  • Download the latest version of WhatsApp on the official website have fun with this feature.
  • To hide last seen feature, Open WhatsApp, Head to Settings > Accounts > Privacy > Previous Seen.
  • There you can select three possibilities, Everyone, My contact lenses, Nobody. Select any one of them.

  • Spy and Investigate Conversation of Ones Friend


Is it feasible to Spy straight into Whatsapp conversation in the your close close friends and read their conversation? Yes, it will be possible and i’ll explain you relating to this awesome trick through which you'll spy your close friends conversation. Just comply with the below stated steps.
  • Firstly, you want to do is, go to the MicroSD card and then go through the Whatsapp and down the road on the Repository option.
  • Immediately after that you are done with step one you’ll get two files including, msgstore-yyyy.. dd.. db. crypt
  • msgstore. db. crypt
  • After finding these files, you must do is take these files from the friends mobile and then you can be easily able you just read their conversations they have done with their friends. You can open them employing a simple text publisher.


  • Backup And Regain WhatsApp Chats


WhatsApp makes automatic backups of the chats, but it's also possible to make a handbook backup. Follow these simple steps to restore ones whatsapp chats.
  • In iOS, Go to be able to Settings > Speak Settings > Speak Backup, then just click Backup Now.
  • In Android, just go straight into Settings > Speak settings and faucet Backup conversations to generate a backup.
  • It will not likely backup your media, so you will have to use a record manager to burn the media files in /sdcard/WhatsApp/Media with your mobile.
  • There’s ugh to restore talks directly from WhatsApp, so if you want to restore a burn just uninstall in addition to reinstall WhatsApp.
Whilst you begin WhatsApp right after the reinstalling ones app, you ought to be prompted to restore your newest backup.

  • Send files of other Extension cords like Zip, Rar, PDF

We all are aware that WhatsApp doesn’t help to send different files than sound and video platforms. There is no actual option to reveal documents, compressed files, and other files using WhatsApp. But having an additional app just like Cloud Send you can send PDFs, APKs, Word documents plus much more using WhatsApp.
Also you can use third get together app like Whats Crammed 2 ads to be able to send any files of any dimensions via WhatsApp. But ensure that both the sender and receiver have to have Whats Packed 3 ads application installed on their smartphone.

  • Disable WhatsApp Car Image Download

Automatically WhatsApp download all images, videos and voice notes for a
memory which will create large amount of mess in ones gallery. Sometimes this may well kill your portable data and battery life once you have a very small data balance with your mobile. So this trick is going to be helpful to cease auto download associated with images or movie.
Settings > Speak Settings > Mass media Auto Download. Select a solution from all three which befits you. If you desire to completely disable automobile download, make all options to No Media.

  • Hide ones WhatsApp Profile Picture(DP)

On account of privacy concerns, or everything else, if you desire to hide your profile picture this trick will certainly help you. Hiding Profile Picture option is available for the latest version of WhatsApp. Should you be not using newest version then obtain it and after installing visit Settings > Accounts privacy. Then simply click Profile Photo, select from any of the three options based on your needs – Everyone, My contacts, Not anyone.

  • Change Your Friend’s Profile Picture

You can change your friend’s profile pic into your WhatsApp by using this new and an incredible trick to prank your pals. Follow the below mentioned easy ways to do this.
  • Choose a profile picture for your friend. Use Google Image look for cute looking monkeys in addition to donkeys or creepy looking people.
  • Resize the picture to 561×561 pixels employing Paint or Photoshop in addition to name it with all your friend’s mobile telephone number.
  • Save the image towards SD >> greeting card WhatsApp >> Page Pictures. Overwrite the current file (if necessary).
  • Disable Wi-fi and data network. If you don’t WhatsApp will automatically update the picture.
  • Now, people show your buddy the pic ones profile WhatsApp instant panic invite the woman's face.
Note: This may not be a hack, but simply a trick to change your friend’s profile picture only with your device. This means for fun goal only.

  • Create A Fake / Speak Conversation

This trick goes viral these days and lots of people are generating funny fake interactions and posting the screenshots over social media marketing like Facebook in addition to Google Plus. By using the app like WhatSaid-Whatsapp Prank you can actually create fake interactions and play pranks with your friends.
  • You can create fake interactions with anyone by having your photos, name it and create your own personal posts ( with both sides). Don’t work with it to spoil someone’s existence please.
  • Hide Two Images In one
  • Do you desire to send an image for a WhatsApp friend that will first look such as a beautiful one yet when he/she simply click it, the image will change to another one? Then just comply with below steps…
  • Down load & Install Magiapp with regard to android and in addition to FhumbApp on iphone.
  • Now after adding this wonderful app just fire this up and then you will observe interface something lie inside the image on the correct.
  • Now just go through the True Image selection and choose ones original image and then go through the Fake Image selection and choose ones pranky image.
Currently after selecting ones images just press Do Magic! selection and voila! its done now just share your picture with everyone.

  • Secure /Lock Your WhatsApp

Everybody, at some position or another, has probably had to manage friends or family going for a sneak peek with their WhatsApp announcements. Thankfully, if you’re employing WhatsApp on Android os or BlackBerry, there are apps that will help secure your WhatsApp coming from prying eyes.
In the event you’re using Android os, there’s WhatsApp Secure, while BlackBerry users may wish to check out Secure for WhatsApp.
Basically, both of these types of apps work in the same way: when you have tried them, WhatsApp will be protected by way of PIN (in the truth of WhatsLock) or a password (in the truth of Lock pertaining to WhatsApp). Either technique, once you have things build, the people about you shouldn’t be capable of take a sneak peek for your WhatsApp any extended.

  • Create Shortcuts With regard to Important Contacts

Would like to speed up your current WhatsApp communication? Why not consider creating a shortcut for your favorite Whatsapp get in touch with or group straight from a homescreen?
On Android os, this is as simple if pressing on the group or contact you would like to create a shortcut pertaining to. When the menu appears, just tap on Add conversation shortcut. This will make a shortcut to the contact or group you have chosen right on your current homescreen.
This behaviour isn’t available on WhatsApp for iOS, but you may use a third-party app such as 1TapWA to have got similar functionality on the iPhone. Since it’s an app, 1TapWA also offers some extra features such as an image manager and an steps scheduler.

  • Conclusion

In this way, this was about  12 Best And Untold WhatsApp Tips And Tricks 2015 , In the event that you have any kind of inquiries with respect to this excercise then  let us know, I will attempt our best to determine them. Furthermore besides, in the event that you like this excercise and discover this excercise valuable and useful then remember to share this to your companions and social circles as well.