Category Archives: Articles

What is ” Click-Bait ” ?

clickbait (1)
” Click bait “ is defined as a link with a headline that encourages people to click to see more, without telling them much information about what they will see.Example :
cn
Here we can see a link which may open a page which has nothing to do as headline states.when we click on this link it will open an undesired page.Typically click bait links will forward the user to a page that requires payment, registration, or is one in a series of pages to help drive page views for the site.Social media has given rise to a slew of sites catering to this type of content and strategy.But to overcome this problem Facebook recently revamped its news feed algorithm  to help further weed out “click-bait” from users’ pages.

So now question raises that how does Facebook identify click -bait ?

  • Facebook monitors how long a user stays on a certain link after they click it. If the user does not spend an adequate amount of time,and does not comment,like or share that post,Facebook could detect it as a click-bait story.

So now…..!!!

Goodbye clickbait

EdgeRank- A Facebook’s newsfeed algorithm

edgerank
Hello Everybody..!!, This is Ravi once again with an exciting topic “EdgeRank”Facebook had over 1.3 billion active users as of June 2014.We all use Facebook. Have you ever think how facebook’s newsfeed works ? What is the reason behind priority of contents ? Which post should be shown us first, which not ? Why are some posts more successful than others on the news feed? Have you ?
No ??? Let’s know What is behind this…..

Continue reading EdgeRank- A Facebook’s newsfeed algorithm

IBM SyNAPSE computer chip

image001Hello Readers…!! this is Ravi again to discuss about a research introduced by IBM (The International Business Machines )on August 7, 2014, known as SyNAPSE Computer Chip.SyNAPSE stands for Systems of Neuromorphic Adaptive Plastic Scalable Electronics.
A chip that uses a million digital neurons and 256 million synapses shows the beginning of a new era of more intelligent computers.The chip is more powerful, small and light than the existing option takes inspiration from familiar source: The Human Brain.

Continue reading IBM SyNAPSE computer chip

Quantum Cryptography :

qc
Hello folks,Once again this is Ravi with a new topic “Quantum Cryptography”.First, what is cryptography ? Why do we need ?
Ever since mankind has existed, people have had secrets, and other people have wanted to know these secrets.Cryptography (from the Greek Krypto ‘hidden’ and Grafo ‘written’) is the study and implementation of techniques to hide information, or to protect it from being read.It tries to hide, encrypt, the information in such a way that a third party who has access to the hidden, encrypted, data cannot reconstruct, decrypt, the original information. So basically,
Cryptography is the art of devising codes and ciphers, and cryptanalysis is the art of breaking them. Cryptology is the combination of the two. In the literature of cryptology, information to be encrypted is known as plaintext, and the parameters of the encryption function that transforms are collectively called a key.

Continue reading Quantum Cryptography :

Li-Fi Technology :

li-fi-internet-velocidad-de-la-luzHello folks,this is Ravi and I am here with you to throw light on a latest technology named Li-Fi.We are in 21st century,where Internet has become common,Whether we are using wireless internet in a coffee shop,competing for bandwidth at a conference,downloading and all.But what if internet speed is slow ? ? ? We get frustrated. Don’t we ? ?

Li-Fi, which is short for light fidelity, the technology is what is known as Visible Light Communication (VLC) developed by a team of scientists including Dr Gordon Povey, Prof. Harald Haas and Dr Mostafa Afgani at the University of Edinburgh.Li-Fi could lead to the Internet of Things, which is everything electronic being connected to the internet, with the LED lights on the electronics being used as Li-Fi internet access points. LED has become more than a way to throw out light, but to double-up as a super-fast multi-channel highway of data through Visible Light Communication (VLC), and hence the future replacement for WiFi.
Li-fi uses light instead of radio waves to transmit information.And instead of Wi-Fi modems, Li-Fi would use transceiver-fitted LED lamps that can light a room as well as transmit and receive information. Since simple light bulbs are used, there can technically be any number of access points.It is possible to encode data in the light by varying the rate at which the LEDs flicker on and off to give different strings of 1s and 0s. The LED intensity is modulated so rapidly that human eyes cannot notice, so the output appears constant.

How it Works:-

lifiedinburgVisible light is part of the electromagnetic spectrum and 10,000 times broader than the radio spectrum, affording potentially unlimited capacity. Existing LED light bulbs could be converted to transmit LiFi signals with a single microchip and span an entire home or office, making timing-out and signal interference typical of radio wave wireless networking a thing of the past – and vastly increasing the speed of data transmission.Such advancements promise a theoretical speed of 10 Gbps – meaning one can download a full high-definition film in just 30 seconds.
Drawbacks to the technology include the need for a clear line of sight, difficulties with mobility and the requirement that lights stay on for operation.
If you enjoyed this Post, I’d be very grateful if you’d help it spread by emailing it to a friend, or sharing it on social network.Thank you ! keep hitting…

E – Paper Technology :

fujitsu-epaper
After the LCD, Plasma and LED displays, we have reached in the era of flexible and bendable displays. It is in this display technology, you can bend the screen as your wish.
E-paper is a revolutionary material ( sometime called radio paper or just electronic ) that can be used to make electronic displays. It is portable, reusable storage and display medium, electrically writable and erasable and can be re-used 1000s of times.Electronic paper was first developed in the 1970s by Nick Sheridon at Xerox’s Palo Alto Research Center,called Gyricon.

A gyricon sheet is a thin piece of transparent plastic that contains millions of small beads. Each bead–half white half black–is contained in an oil-filled cavity and is free to rotate within its cavity. When voltage is applied to the surface of the sheet, the beads rotate to display either their black sides or white sides. Images of pictures and text are created when a pattern of voltages are sent to the paper. The image will remain until the voltage pattern changes.

flexible_e_paper_display_ivjhj

E Ink uses electronic ink for display: a liquid plastic substance consisting of millions of tiny capsules filled with light and dark dyes that change color – charged dye particles move either up or down within the capsules – when exposed to an electric charge.The E Ink technology has been used for retail signs.Ultimately electronic ink will permit almost any surface to become a display, bringing information out of the confines of traditional devices and into the world around us.

Remove Shortcut Virus from your PC/Laptop/Pendrive.

Is your Computer or USB affected by shortcut virus?  Don’t Worry !!!
Here’s simple solutions to remove this shortcut virus from your PC.

Method 1:-

Using CMD:-
follow the simple and easy steps to remove shortcut virus using CMD.

1)      First go to Start >> then RUN >>  Type CMD

2)      Now Command prompt will be appear on your screen.

3)      Now type this command attrib -h -r -s /s /d e:*.*
 (Replace e with your drive letter where you want to remove virus.)

4)      Now Press Enter

5)      Now, after that all the shortcut virus files and folder will be normal files and folder form simply go and delete the shortcut virus files and folder

GR :-

Untitled

Method 2:-

Using Notepad:-

1) Open notepad file

2) Copy and paste the below code into a notepad file

@echo off

attrib -h -s -r -a /s /d drive_name:.

@echo complete.

(Replace the drive_name with your infected drive name.)

3) Save the file with .bat extension.

4) Close the file and run it

5) After that all of your Shortcut virus files and folder are in normal form, now go and copy all your data to another drive and format your drive.

GR:-

Untitled

Disable Write Protection : Pen drives

Write protection allows a drive to keep its contents from being changed. This effectively prevents you from using the drive in any sort of meaningful way. To start using the drive, you’ll need to remove that write protection.
Here’s how you can fix this:-
First open Run box:-To open Run, press Windows key + R
Now type regedit , to open registry editor.
Untitled
Now navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrrentControlSet\Control\StroageDevicePolicies 

 Untitled1Untitled3Untitled2

Now Open CurrentConrolSet –> scroll down to find StorageDevicePolicies.
If is not there make it by own ->
Right click on CurrentControlSet–>New –> Key. Save a folder named as StorageDevicePolicies.Untitled5

Untitled4

Now Right click on StorageDevicePolicies goto New –> DWORD (32-bit) Value
And name as WriteProtect.

Untitled6

Untitled7
Now Modify its value to 1-for write protection On and 0 – For write protection Off
 Set to 0 and Restart your system.
Your Device’s write Protection is disable now.