Seminar Topics


NB: For Full Reports in Word Document Contact: Arunlal Mathew 



Intel® Core™ i7 Processor

With faster, intelligent multi-core technology that applies processing power dynamically when needed most, the new Intel® Core™ i7 processors deliver an incredible breakthrough in PC performance. They’re the best desktop processors on the planet.
Multitask applications faster and unleash incredible digital media creation. Experience maximum performance for everything you do, thanks to the combination of Intel® Turbo Boost Technology and Intel® Hyper-Threading Technology , which maximizes performance to match your workload.
Whether you’re casually checking e-mail and surfing the Web or multitasking compute-intensive applications such as HD
Video encoding, you want a processor that enables maximum PC performance. With the Intel Core i7 processor, you’ll get just that. An unprecedented four-core, eight-thread design with Intel Hyper-Threading Technology ensures incredible performance, no matter what your computing needs. And with more than double the memory bandwidth for faster memory access, you’ll achieve more while waiting less
It’s time for digital content creation that’s limited only by your imagination. Experience total creative freedom with the power to encode video up to 40% faster. And enjoy incredible performance on other multimedia tasks like image rendering, photo retouching, and editing.
The Intel® Core™ i7 processor provides new levels of brilliant performance for highly threaded immersive games. By distributing All , physics, and rendering across eight software threads, the Intel Core i7 processor lets you concentrate on taking down the bad guys while your PC handles all the visual details such as texturing and shading that keep you feeling totally immersed. It’s a gaming experience so perfect, you just might lose yourself in the action.
...  Read Full Report

 


CLOUD ANTIVIRUS

Most popular anti-virus programs are not very effective against new viruses, even those that use non-signature-based methods that should detect new viruses. The reason for this is that the virus designers test their new viruses on the major anti-virus applications to make sure that they are not detected before releasing them into the wildSome new viruses, particularly ransomware, use polymorphic code to avoid detection by virus scanners 

Current malware is invisible, silent and most importantly, financially motivated. Security has moved beyond protecting your computer to protecting your identity. Today it is not only about computer security, it is about identity protection. Cyber-crime is migrating from amateurs to professionals working for organized crime rings. These criminal enterprises are so efficient and confident that they operate like legitimate businesses. The number of malware variants is growing exponentially while the number of computers infected by each sample is decreasing. The gap between created and detected malware keeps increasing.

As a result, security solutions solely based on continuously updated signature files cannot keep up with malware growth. They are no longer sufficient to guarantee users’ security... Read Full Report


Time Machine
Time Machine is a backup utility developed by Apple. It is included with Mac OS X and was introduced with the 10.5 "Leopard" release of Mac OS X. The software is designed to work with the Time Capsule as well as a number of external FireWire (IEEE 1394a/b) and USB hard drives.
Time Machine, like many backup utilities, creates incremental backups of files that can be restored at a later date. It allows the user to restore the whole system, multiple files, or a single file. It works within iWork, iLife, and several other compatible programs, making it possible to restore individual objects (e.g.: photos, contacts, calendar events) without leaving the application. According to Apple support personnel
"Time Machine is a backup utility, not an archival utility, it is not intended as offline storage. Time Machine captures the most recent state of your data on your disk. As snapshots age, they are prioritized progressively lower compared to your more recent ones."
For backups to a network drive, Time Machine allows the user to back up Apple Macintosh computers through Apple's AirPort networking, and supports backing up to normal network attached storage devices or servers without the use of hand-tuned configuration options, accessed through the Terminal. Apple's Time Capsule acts as a network storage device specifically for Time Machine backups, allowing both wired and wireless backups to the Time Capsule's internal 500GB, 1TB or 2TB hard disk...

Read Full Report

 

 


INTEL ANTI-THEFT TECHNOLOGYS
Keeping data secure in a mobile environment is not only a daunting challenge, but a critical requirement. HITECH, HIPAA, data-breach notification rules, and other increasingly stringent regulations in data security and privacy have added complexity for companies with mobile users. Loss and theft of systems and data is not only costly to your company, but can result in financial or legal exposure, and cause significant disruptions to business
Laptops with a new 2010 Intel® Core™ processor with Intel® Anti-Theft Technology (Intel® AT) provide IT administrators with intelligent protection of lost or stolen assets. Intel AT gives you the ability to disable your PC with a local or remote poison pill if the system is lost or stolen. This poison pill can delete essential cryptographic material from system hardware in order to disable
Intel AT includes several hardware-based detection mechanisms to detect potential loss/theft situations. When a suspicious situation is identified, Intel AT can activate “theft mode” and respond according to your company’s information technology (IT) policies. Because Intel AT has a flexible policy engine, you can specify the detection mechanism that asserts theft mode, the thresholds for timer intervals, and the theft-response action(s) to take...

Read Full Report

 

 


Future mobile technologies
Most of us take it for granted that we can check e-mail with our mobile phones. But not long ago, this was a truly disruptive technology that changed how we did business and stayed in touch when we were away from home and the office.
Which begs the question: What new mobile technologies will emerge in the next few years that will change our lives?
That question was posed to a group of industry analysts, futurists and executives for key vendors, a group grounded in reality, not fantasy. Yet, they still suggested 13 technologies that will provide dramatically better mobile access, better devices and better applications. Some of these life-changing technologies are just around the corner while others years away.
These aren't isolated technologies. Rather, for the most part, they build on each other so that one won't be possible until another is widely available. But they all, in their own way, will significantly improve how individuals and business users are mobile. Let's see what the future holds.
Better access
Advanced applications and devices require fast, easily affordable access, but today's 3G cellular data service remains expensive and, with typical speeds between 400Kbit/sec. and 700Kbit/sec., slow. That's about to change, however, and the pace of change will remain rapid into the foreseeable future...

Read Full Report


 

USB 3.0

Universal Serial Bus (USB) is a serial bus standard to connect devices to a host computer. The USB 3.0 is the upcoming version of the USB. The USB 3.0 is also called super speed USB. Because the USB 3.0 support a raw throughput of 500MByte/s. As its previous versions it also support the plug and play capability, hot swapping etc. USB was designed to allow many peripherals to be connected using a single standardized interface socket. . Other convenient features include providing power to low-consumption devices, eliminating the need for an external power supply; and allowing many devices to be used without requiring manufacturer-specific device drivers to be installed.

There are many new features included in the new Universal Serial Bus Specification. The most important one is the supers speed data transfer itself. Then the USB 3.0 can support more devices than the currently using specification which is USB 2.0. The bus power spec has been increased so that a unit load is 150mA (+50% over minimum using USB 2.0). An unconfigured device can still draw only 1 unit load, but a configured device can draw up to 6 unit loads (900mA, an 80% increase over USB 2.0 at a registered maxim­ um of 500mA). Minimum device operating voltage is dropped from 4.4V to 4V. When operating in Super­ Speed mode, full-duplex signaling occurs over 2 differential pairs separate from the non-SuperSpeed differential pair. This result in USB 3.0 cables containing 2 wires for power and ground, 2 wires for non-Super­ Speed data, and 4 wires for SuperSpeed data, and a shield (not required in previous specifications)...

Read Full Report