1. Computer clothing
  2. 4G-Wireless Technology.
  6. Virtual LAN Technology

9 Responses so far »

  1. 1

    sanuphilip said,

    Wearable computer comprises of a computer built within an ordinary clothing. This transformation allows it to be worn constantly, with the goal of becoming a seamless extension of body and mind. Equipped with various sensors which measure heart rate, respiration, footstep rate etc, the apparatus can function as a personal safety device for reducing crime, as well as personal health monitor for improving health care by encouraging individuals to take an active role in diagnosis and body maintenance.

  2. 2

    philip said,

    There are three operational modes in this new interactionbetween human and computer.
    : The computer runs continuously, and is “ always ready tointeract with the user. Unlike hand-held device, laptop computer, or PDA, it does not need to be opened up and turned on prior to use. Thesignal flow from human to computer, and computer to human, runscontinuously to provide a constant user interface.
    : Traditional computing paradigms are based on the notionthat computing is the primary task. Wearable computing, however, isbased on the notion that computing is NOT the primary task. Theassumption of wearable computing is that the user will be doingsomething else at the same time as doing the computing. Thus thecomputer should serve to augment the intellect, or augment the senses.

    • 3

      sanuphilip said,

      Its about computer clothing

  3. 4

    manu said,

    Mobile IP (or IP mobility) is an Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile device users to move from one network to another while maintaining a permanent IP address. Mobile IP for IPv4 is described in IETF RFC 5944, and extensions are defined in IETF RFC 4721. Mobile IPv6, the IP mobility implementation for the next generation of the Internet Protocol, IPv6

  4. 5

    sanuphilip said,

    Rapid advances in bioinformatics are providing new hopes to patients of life threatening diseases. Gene chips will be able to screen heart attack and diabetics years before patients develop symptoms. In near future, patients will go to a doctor’s clinic with lab- on- a- chip devices. The device will inform the doctor in real time if the patient’s ailment will respond to a drug based on his DNA. These will help doctors diagnose life-threatening illness faster, eliminating expensive, time-consuming ordeals like biopsies and sigmoidoscopies. Gene chips reclassify diseases based on their underlying molecular signals, rather than misleading surface symptoms. The chip would also confirm the patient’s identity and even establish paternity.

  5. 6

    sanuphilip said,


    While Internet technologies largely succeed in overcoming the barriers of time and distance, existing Internet technologies have yet to fully accommodate the increasing mobile computer usage. A promising technology used to eliminate this current barrier is Mobile IP. The emerging 3G mobile networks are set to make a huge difference to the international business community. 3G networks will provide sufficient bandwidth to run most of the business computer applications while still providing a reasonable user EXPERIENCE. However, 3G networks are not based on only one standard, but a set of radio technology standards such as cdma2000, EDGE and WCDMA. It is easy to foresee that the mobile user from time to time also would like to connect to fixed broadband networks, wireless LANs and, mixtures of new technologies such as Bluetooth associated to e.g. cable TV and DSL access points.

  6. 7

    sanuphilip said,

    A virtual local area network, virtual LAN or VLAN, is a group of hosts with a common set of requirements that communicate as if they were attached to the same broadcast domain, regardless of their physical location. A VLAN has the same attributes as a physical local area network (LAN), but it allows for end stations to be grouped together even if they are not located on the same network switch. VLAN membership can be configured through software instead of physically relocating devices or connections.

  7. 8

    sanuphilip said,


    Tokyo Japan, February 19, 2002: Nine leading companies today announced that they have jointly established the basic specifications for a next generation large capacity optical disc video recording format called “Blu-ray Disc”. The Blu-ray Disc enables the recording, rewriting and play back of up to 27 gigabytes (GB) of data on a single sided single layer 12cm CD/DVD size disc using a 405nm blue-violet laser.

    By employing a short wavelength blue violet laser, the Blu-ray Disc successfully minimizes its beam spot size by making the numerical aperture (NA) on a field lens that converges the laser 0.85. In addition, by using a disc structure with a 0.1mm optical transmittance protection layer, the Blu-ray Disc diminishes aberration caused by disc tilt. This also allows for disc better readout and an increased recording density. The Blu-ray Disc’s tracking pitch is reduced to 0.32um, almost half of that of a regular DVD, achieving up to 27 GB high-density recording on a single sided disc.

  8. 9

    sanuphilip said,


    “Firewall”… the name itself conjures up vivid images of strength and safety. What executive wouldn’t want to erect a flaming bastion of steel around the corporate network to protect it from unseemly elements lurking on the public Internet? Unfortunately, this imagery no longer matches reality. In recent years, companies across all industry segments have been gradually tearing down the walls that once isolated their private networks from the outside world. Internet-based technologies have allowed significantly tighter links with customers, remote employees, suppliers, and business partners at a fraction of the cost. In many industries, it is no longer possible to remain competitive without extending the virtual corporation far beyond its previous boundaries. With so many users rapidly approaching the enterprise from different points of entry, it is no longer possible for yesterday’s security technology to adequately protect private networks from unauthorized access. The vast majority of firewalls in use today serve only as a passive enforcement point, simply standing guard at the main door. They are incapable of observing suspicious activity and modifying their protection as a result. They are powerless to prevent attacks from those already inside the network and unable to communicate information directly to other components of the corporate security system without manual intervention. Recent statistics clearly indicate the danger of relying on passive security systems in today’s increasingly interconnected world. According to the FBI, corporations reporting security incidents last year lost an average of $570,000 as a direct result, a 36 percent increase from the year before (1998 Computer Crime and Security Survey FBI/Computer Security Institute). And since the vast majority of security breaches are never reported, actual losses may be even higher.

Comment RSS · TrackBack URI

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: