All Posts in : Information Technology Seminars
Showing posts with label Information Technology Seminars. Show all posts

QUANTUM CRYPTOGRAPHY

SEMINAR ON QUANTUM CRYPTOGRAPHY : During the 20 th century and a half, the struggle between makers and code breakers codes have suffered reversals and complications. Unbreakable zero was invented in 1918, unbreakable even if it is not established until 1940. This figure was impractical because it requires the sender and recipient agree in advance the key - a large warehouse of the secret random number some of which were used every time a secret message was delivered. Encryption is the most practical short, re-keys, or not secret key at all, was developed in the 1970s, but today they remain in limbo mathematics, which is not broken and does not show safe. One unexpected recent development is the use of quantum mechanics of doing things reached the mathematics of encryption alone. quantum encryption devices typically employ individual photons of light, and take advantage of the uncertainty principle principle that the measurement of a quantum system in general bother him and give incomplete information about his condition before measurement. Listen in a quantum communication channel thus causes a disturbance unavoidable, alerting the legitimate users. Quantum cryptography exploits this, so that both parties 've never met and who do not share secret information in advance communicate in secrecy under the nose of an opponent.


QUANTUM TELEPORTATION SALMA

SEMINAR ON QUANTUM TELEPORTATION SALMA : Since the wheel was invented more than 5,000 years, people are inventing new ways to travel faster from one place second. Wagons, bikes, cars, planes, rockets have all was invented to reduce the amount of time spent to reach our desired destinations. However, each of these forms of transport from same mistake: they force us to cross a physical distance that can take from several minutes to several hours depending on your point of departure and endpoints. Some scientists are currently working on a method Travel, combining properties of telecommunications and transport To achieve a system called teleportation. The technology of teleportation is 21 century alternative to travel. You can save time and money and improve your home network and external communication. Our System is very easy to use. All you have to do is click link and you can show 3-dimensional setting of a chair or behind a desk across the globe - almost immediately. Our products are designed for the technology is invisible. This means you Always pay attention to the person you are talking about, or technology.


RESILIENT PACKET RING TECHNOLOGY

SEMINAR ON RESILIENT PACKET RING TECHNOLOGY : An important trend in networking is the migration of packet-based technology for Local Area Networks Metropolitan Area Networks. Quickly increasing volume of data traffic in metro networks is challenging the capacity limits existing transport infrastructures based on circuit-oriented technologies, such as SONET and ATM. Inefficiencies related to the achievement of greater amounts of data traffic over voice-optimized circuit-switched networks makes it difficult the provision of new services, and increases the cost of building additional capacity beyond within existing budgets the fastest growing "capital expenditure. parcel technology, a natural fit with the now ubiquitous IP protocol, is considered by many to be the only alternative for the extension of metro networks to meet demand. The solution to emerging applications of data transport meters Packet Ring technology. It has two key features that were previously exclusive SONET: efficient support for ring topology and fast recovery from fiber cuts and the link failures. At the same time, Packet Ring Technology can provide information on the effectiveness of advantages of simplicity and cost, typically Ethernet. Even if there There is currently no performance standard packages Rings Gigabit speeds and more, many vendors are developing and introducing packet ring technology to address this emerging markets.

SAP R/3

SEMINAR ON SAP R/3 : According to the Internet, SAP R / 3 is one of the hottest topics the computer industry, and the company has developed SAP AG, has become a successful software on the market. SAP R / 3 is for most industries: manufacturing, retail, oil and gas, electricity, health, pharmaceutical, banking, insurance, telecommunications, transportation, automotive, chemicals, etc.. All white goods suppliers, without exception, are fully committed to working with
SAP: Currently, AT & T, Bull, Compaq, Data General, Digital, IBM Hewlett-Packard, Pyramid, Sequent, Siemens-Nixdorf and Sun support and certified SAP R / 3 platforms. SAP AG, found in 1972 by four former IBM employees. Since its inception, SAP has made significant development efforts and marketing in the standard application software, is a global player in the market and its R / 2 system mainframe applications and SAP R / 3 to open Mclient / server technologies. The name of the SAP means Systems, Applications Products and data processing. This is a standard software that can be configured in multiple areas and tailored to specific society needs. Support these needs, including SAP many business functions and a room to provide other
improvement or adaptation to changes in business practices.


SESURE INTERNET LIVE CONFERECING PROTOCOL

SEMINAR ON SILC : Cat protocols are very popular on the internet. They been very popular since it first appeared on the record chat network. Internet Relay Chat (IRC) is one of the first chat protocols, and fast received a state is the most popular IM network. Today, the IRC is Several competitors of various other so-called instant messaging (IM) protocols such as ICQ. However, all these different IM protocols something in common: they are all insecure. Safety is important function in applications and protocols in the modern network environment. Senior IM protocols have not been able to meet the growing security Internet requirements. No longer enough to provide services such as instant messaging services. Now the services are safe and secure. The secure Internet Live Conferencing (SILC) is a new protocol generation of instant messaging protocol that offers a fully featured conferencing services, like any other protocol offers contemporary cat. In addition, provides security by encrypting and authenticating messages network. Security is the main objective of the protocol and SILC protocol was designed from day one safety in mind. All packages and Messages travel in the SILC network are always encrypted and approved. The network topology is also different, for example, IRC network. SILC network topology tries to be more powerful and IRC scalable. The basic objective is SILC protocol Ensure conference facilities. SILC protocol developed as open source project. The protocol specifications are freely available and they have been submitted to the IETF. The first
implementations of the protocol is already available.

SIMPUTER

SEMINAR ON SIMPUTER : Even the poorest of the poor pay for the service if the service improves their quality of life someway. Several companies are now deals with the rural market and they are necessary for the information and communications infrastructure in remote rural areas. To achieve this objective, the project plan Simputer the organization of the Global Village, an international seminar on Information technology in developing countries, which was carried out Bangalore IT.com event in October 1998.
If good service is provided on the right path information technology can influence the lives of people around the world world. The Simputer is a low cost alternative to a laptop, for which the benefits of IT can reach the common man. He has a special role in The Third World, as it ensures that knowledge of English is not is no longer an obstacle to the operation of a computer.

THE ANATOMY OF GRID

SEMINAR ON THE ANATOMY OF GRID : The term "Grid" was coined to indicate mid1990s proposed distributed computing infrastructure for advanced science and technology. Significant progress has been made since the construction of these infrastructures, but the term "Grid" has also been merger, at least in popular perception, embracing everything from networks developed in artificial intelligence. One might ask, if the term has real meaning and significance. It 'really distinct "Grid problem", and thus the need for new "Grid Technology"? If yes, what is the nature of these technologies, and what is their domain application? Although many groups have an interest in Grid concepts and share a common vision of Grid architecture significant, do not see a consensus on the answers to these questions. The real and specific problem that underlies the grid concept is coordinated resource sharing and problem solving in dynamic, multi-institutional virtual organizations. The exchange that we are concerned is not primarily file exchange, but the most direct access to computers, software, data and other resources required by a number collaborative problem-solving and resource brokering nascent industry, science and technology. This division is necessarily, highly controlled, with resource and consumer to define clearly and precisely what needs to be shared, which can parties, and the conditions under which sharing occurs. Number of people and / or institutions defined by how sharing rules that we call a virtual organization (VO).