Tuesday, November 20, 2007

Tata Supercomputer is World's 4th best

November 13, 2007 14:30 IST

After proving its mettle in areas like steel, automotive and IT services on the global arena, corporate behemoth Tata group has now developed the world's fourth fastest supercomputer that can do 117.9 trillion calculations per second.

The supercomputer "EKA", which means number one in Sanskrit, was named Asia's fastest and the world's fourth fastest in the Top 500 Supercomputer list announced at an International Conference for High Performance Computing at Reno (California), USA, on Monday night.

This is the first time that such a system developed in India has been ranked among the world's ten fastest.

Supercomputers are primarily used by universities, military and scientific research labs. They are used in high calculation-intensive jobs like quantum physics, weather and climate research, study of chemical compounds, simulation of aircraft in wind tunnels and detonation of nuclear weapons.

A total of nine supercomputers developed in India have appeared in the Top 500 list, including one more system (179th) developed at Tata Sons' wholly-owned subsidiary Computational Research Laboratories (CRL) in Pune, where EKA was developed.

Others include a system developed at Indian Institute of Science (58th) and six IBM systems (ranked at 152nd, 158th, 336th, 339th, 340th and 371st) developed in the country.

The group chairman Ratan Tata said in a statement: "High performance computing solutions have an ever-increasing role in the scientific and new technological space the world over.

The Tata group has supported this development activity and is extremely proud of the team that has developed and built this supercomputer, which is now ranked the world's fourth fastest.

© Copyright 2007 PTI. All rights reserved. Republication or redistribution of PTI content, including by framing or similar means, is expressly prohibited without the prior written consent.

Monday, November 5, 2007

Secure your mobile wireless device

By Jessica Dolcourt (12/15/2006)

Editor's note: This article was updated on 7/17/2007.

Wi-Fi technology provides the freedom to access the Internet from virtually any location using increasingly sophisticated portable devices. The "cool" factor of e-mailing and instant messaging when you're out and about is so compelling that protecting the device from malevolent invaders is often overlooked. Unfortunately, the same network access that makes online mobility easy for you is also convenient for computer criminals, and even a quick browse can attract damaging codes.

Securing mobile applications requires more effort up front than securing your wireless home network, for two reasons: First, desktops and laptops run on a full-featured operating system that often comes with varying levels of built-in security. Mobile devices, on the other hand, generally leave Internet security up to the user. Second, as each device comes with its own operating system, security software can take time to track down. For instance, BlackBerrys run on a proprietary operating system; Pocket PCs run on Windows Mobile; and Palm devices, like the Treo, run on the Palm operating system. Interoperability is still on our wish list, but here are three steps for protecting your BlackBerry, your Palm device, or your Windows Mobile/Pocket PC from Internet threats.

Step 1: Secure the network

Airscanner Antivirus Pro
Airscanner Mobile AntiVirus can defend against Trojan horses as well as viruses.
It's hard to overemphasize the importance of online security for any network. Since going online is a secondary function for most mobile device users (surfing and sending data come first), securing the connection may not seem as urgent--and that's exactly what exploitation architects are counting on.

The good news is that mobile wireless security is a growing sector, and some solid programs exist to keep the worst network infections at bay. Owners of a Palm device or a Pocket PC can deflect wandering enemies with Trend Micro's reliable PC-cillin Internet Security. Windows Mobile users have other options at their fingertips with F-secure Anti-Virus and Airscanner Mobile AntiVirus Pro.

Symbian smart phones get an extra boost with Commander Mobile Anti-Virus. JiWire SpotLock supports AvantGo handhelds.

Step 2: Block out thieves

The physical world is another source of threats to handheld security. The most recent spate of corporate laptop thefts are a harsh reminder your sensitive data can fall into the wrong hands. Though odds are thankfully low, a thief could conceivably use your information to assume your identity or swipe your e-mail contact list to fuel a spam campaign. At the very least, you'll want to keep out the boldest of snoops.

The most straightforward method is to enable the password lock found in your handheld's native system settings. You'll want to ensure you set and test a strong password that will frustrate any thief who has gotten hold of your device and has leisure time to tinker.

Step 3: Protect your data

View full screenshot...
Ilium Software's eWallet uses 256-bit RC4 encryption to protect your data.
Setting the password on your device is an important physical security layer to which software applications provide stronger support. One way to keep your data personal is to use a lockbox program that requires a password each time you access your information. eWallet Professional for Pocket PC helps you create and organize a wealth of information--including credit card, bank account, and car details-- into password-protected categories. CryptMagic performs a similar service for BlackBerry users, and Palm aficionados may appreciate Secret.

Wednesday, October 17, 2007

Microsoft Fingerprint Reader

Product Information

Now there is a convenient way to manage to your passwords without having to remember them. The Microsoft Fingerprint Reader is a standalone device that allows you log on to you PC, access favourite Web sites, and easily switch users with the touch of a finger. Just place your finger on the receiver when a password or username is required. Your unique fingerprint is the only password you will ever need.

The Microsoft Fingerprint reader supports multiple users using the fast user switching feature in Windows XP. Each user on the computer has their own accounts which they can access with the fingerprint reader. This means that each user can easily access their favourite, personalised content and settings, even in mid-session.

system requirements:

Windows XP
Pentium 233 MHz or higher
35MB of available hard-disk space
128MB of RAM

Tuesday, October 16, 2007

Vehicle Traching GPS System

Complete Automatic Vehicle Location system:

  • Do you want to setup your own business on security? With HunterPro GPS you can find any of your vehicles virtually within five seconds (depending on the cellular provider) and you have access to all the streets of your country / city in your PC or laptop!

HunterPro Worldwide

  • For most countries there are several mapping solutions available, both raster and vector maps. We recommend MapInfo maps 100 % as MapInfo has an excellent performance in managing all kinds of vector maps.

  • HunterPro offers a wide-range of possibilities in hardware and software, so you can build your entire security system with our tech-help and support. Don’t hesitate to contact us for your security needs: final solutions in hardware and software are available at an unbeatable price.

    HunterPro Call Center Drawing

Product Description

  • HunterPro GPS Base Station
    -Cellular Transceiver plus Intelligent Engine
    Package Include:
    -One Modem Interface and XP-GPS Software for Windows 9X/XP.
    -Base Station for Automatic Vehicle Location

  • HunterPro GPS Vehicle Unit
    -Cellular Transceiver plus Intelligent Engine
    Package Include:
    -One Cellular Transceiver, one Networking Interface, one GPS Receiver, and one Antenna
    -Vehicle Unit for HunterPro GPS Base Station

  • You may add as much Vehicle Units as you need for each HunterPro GPS Base Station. You can also add additional sensors on the I/O pins, which can be remotely configurable and adapted easily to your needs.

HP-GPS General Features

  • FASTEST positioning (5 seconds) at any distance of the vehicle. International coverage available with roaming.

  • Great performance and sensitivity in urban canyons or dense foliage environments.

  • A complete Car Tracking Solution based on the new Coyote SP 6.0 AVL Software for Windows 95/98.

  • Fastest 12-channel GPS satellite acquisition and reacquisition times.

  • Features Block Engine capability and Remote Panic Detection.

  • Capable of positioning in extreme conditions.

  • Boosts your security on the road with exclusive 2D/3D Real-time Tracking.

  • Optional add-on: provides VOX Mode for Remote Hearing and / or Remote Conversation.

  • High sensitivity small GPS Antenna, small GPS board with SiRF chipset inside delivers powerful reception even in worst conditions.

  • State-of-the-art GPS technology embedded with the most reliable cellular communications standard ever made, all integrated within HP-MLS module.

  • 12-parallel channel GPS receiver capable of tracking under urban canyons or dense foliage environments.

  • Coyote SP 6.0 AVL Automatic Vehicle Location Software for Windows 9X in CD-ROM.

  • Base Station Data Modem Interface.

  • Supports a virtually unlimited number of Vehicle Units.

  • Complete Vehicle Unit with 12-Channel High-Sensitivity GPS Board, Microprocessor Engine and Cellular Transceiver integrated providing a compact solution suitable for installation in any place.

  • High-sensitivity GPS Antenna.

Click here to expand this image


  • The system can be adapted to the customer needs, and is a turnkey solution. No service fee to pay, no extra components need to be added to operate normally.

  • Accessories: VOX MODE for hearing or full duplex VOX MODE conversation command. There is also a special mode in which the user can call the vehicle without using the base station and open a hands free audio link between the driver and the user.

  • Battery backup is supported. When connected the mobile unit will detect when the main power source is lost and will report that immediately to the call center.

  • Reports are configurable automatically from the base station, 100 % compatible with standard ASCII Interface Protocol.

  • Can be programmed remotely to store the events and triggers of alarm zones. Once the energy is restored it will reproduce the exact situation of the system before loosing power source.

  • Capable of storing the state of the engine, so in case of incidental battery disconnection, when connecting it again the engine will remain blocked. thus preventing the robbery.

  • Capable of storing the state of arming and partial zone arming (XYZ).

  • Can calculate distance traveled from the base station.

  • Can calculate acceleration from the base station.

  • Storage of information 'HP-Logging': date, time, height, latitude, longitude, state of the outputs, state of the inputs, commands from base station, GPS precision, number of satellite tracked, GPS status (2D/3D, No-Fix), events, triggers, speed, heading and distance traveled.

  • Storage of points including all mentioned above with a remotely programmable period of time (16 sec, or 1-15 minutes).

  • Capacity of memory compression thus saving 'HP-Logging' memory. If the mobile unit is idle and no events are detected the system will not store redundant information.

  • Base station is capable of making a detail log of its operation, and a special networking log is available for supervisors.

  • 'HP-Logging' is 100 % compatible with Microsoft Excel and Microsoft Access by using the CSV format (comma delimited format).

  • Mobile unit are protect with a unique 24-bit code.

  • Send the least bytes per message as possible thus saving costs per operation (short message).

  • Is able to interact with the vehicle unit even if the GPS board is damaged, is removed or has no satellite data at all.

  • Capable of defaulting the output and the arming to a configurable value. Is able to call the base station in each power up if programmed to do so.

  • Information is protected and ciphered so the information is not exposed.

  • All settings can be configured remotely from the base station.

  • We recommend to use MapInfo TAB maps or 100 % compatible with our AVL Software.

  • We're looking for resellers / distributors for this product worldwide. Please contact us if you're interested.

  • For More Information Visit http://www.hunterpro.com/GPS/GPS-vehicle-tracking.html

Sunday, October 14, 2007


WiMAX, the Worldwide Interoperability for Microwave Access, is a telecommunications technology aimed at providing wireless data over long distances in a variety of ways, from point-to-point links to full mobile cellular type access. It is based on the IEEE 802.16 standard, which is also called WirelessMAN. WiMAX allows a user, for example, to browse the Internet on a laptop computer without physically connecting the laptop to a router, hub or switch via an Ethernet cable. The name WiMAX was created by the WiMAX Forum, which was formed in June 2001 to promote conformance and interoperability of the standard. The forum describes WiMAX as "a standards-based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL."

Fixed WiMAX

This is a phrase frequently used to refer to systems built using 802.16-2004 ('802.16d') as the air interface technology.

Mobile WiMAX

A phrase frequently used to refer to systems built using 802.16e-2005 as the air interface technology. "Mobile WiMAX" implementations are therefore frequently used to deliver pure fixed services.


The bandwidth and reach of WiMAX make it suitable for the following potential applications:

  • Connecting Wi-Fi hotspots with each other and to other parts of the Internet.
  • Providing a wireless alternative to cable and DSL for last mile (last km) broadband access.
  • Providing high-speed data and telecommunications services.
  • Providing a diverse source of Internet connectivity as part of a business continuity plan. That is, if a business has a fixed and a wireless Internet connection, especially from unrelated providers, they are unlikely to be affected by the same service outage.
  • Providing nomadic connectivity.