Monday 25 April 2011

Hashing


If you don't get everything you want, think of the things you don't get on time and things that you don't want. Hashing is nothing but a retrieval technique that gives you better and fast results and minimizes your time.   
Working with the large database, it is always a major demand to provide efficient retrieving and storing of data and information. For this purpose, many file organization techniques have already been developed. Hashing is one of the developed techniques.

Hashing is the transformation of a string of characters into a usually shorter fixed-length value or key that represents the original string. Hashing is used to index and retrieve items in a database because it is faster to find the item using the shorter hashed key than to find it using the original value. It is also used in many encryption algorithms.
As a simple example of the using of hashing in databases, a group of people could be arranged in a database like this: Abernathy, Sara Epperdingle, Roscoe Moore, Wilfred Smith, David.   
Each of these names would be the key in the database for that person's data. A database search mechanism would first have to start looking character-by-character across the name for matches until it found the match (or ruled the other entries out). But if each of the names were hashed, it might be possible (depending on the number of names in the database) to generate a unique four-digit key for each name. For example: 7864   Abernathy, Sara    9802   Epperdingle, Roscoe    1990   Moore, Wilfred    8822   Smith, David    (and so forth). A search for any name would first consist of computing the hash value (using the same hash function used to store the item) and then comparing for a match using that value. It would, in general, be much faster to find a match across four digits, each having only 10 possibilities, than across an unpredictable value length where each character had 26 possibilities.

The hashing algorithm is called the hash function (and probably the term is derived from the idea that the resulting hash value can be thought of as a "mixed up" version of the represented value). In addition to faster data retrieval, hashing is also used to encrypt and decrypt digital signatures (used to authenticate message senders and receivers). The digital signature is transformed with the hash function and then both the hashed value (known as a message-digest) and the signature are sent in separate transmissions to the receiver. Using the same hash function as the sender, the receiver derives a message-digest from the signature and compares it with the message-digest it also received. They should be the same.

The hash function is used to index the original value or key and then used later each time the data associated with that particular value or key is to be retrieved. Thus, hashing is always a one-way operation. There's no need to "reverse engineer" the hash function by analyzing the hashed values. In fact, the ideal hash function can't be derived by such analysis. A good hash function also should not produce the same hash value from two different inputs. If it does, this is known as a collision. A hash function that offers an extremely low risk of collision may be considered acceptable. In present information technology world many companies has lot of database servers placed globally and N- number of users access that data simultaneously so use of hashing is the better way to get response in very short time.

Virtual reality (VR)


When we saw a dream we feel everything is real although its game of your mind but now we can feel the same real experiences in unreal environment of technology. Virtual technology is nothing but a dream only difference in real and virtual dream is we can create our own world and we can implement it when we are awake ,in real dreams mind do that work  for you.
Virtual reality is a term that applies to computer-simulated environments that can simulate physical presence in places in the real world, as well as in imaginary worlds. Most current virtual reality environments are primarily visual experiences, displayed either on a computer screen or through special stereoscopic displays, but some simulations include additional sensory information, such as sound through speakers or headphones.
The simulated environment can be similar to the real world—for example, in simulations for pilot or combat training—or it can differ significantly from reality, such as in VR games. In practice, it is currently very difficult create a high-fidelity virtual reality experience, due largely to technical limitations on processing power, image resolution, and communication bandwidth; however, the technology's proponents hope that such limitations will be overcome as processor, imaging, and data communication technologies become more powerful and cost-effective over time.
Virtual reality is often used to describe a wide variety of applications commonly associated with immersive, highly visual, 3D environments.
Here are some VR technologies that work and that may yet point the way to truly successful virtual reality.
Anxiety Therapy
For years now, virtual environments have been used to treat anxiety problems with exposure therapy.
Military psychologists use simulated Iraq war situations to treat soldiers.
VR Training Programs
Virtual reality environments have also been used for training simulators. Flight simulator is a good example for VR training programs.
Multiplayer Online Gaming
One result of virtual-reality research is the existence of entirely separate virtual worlds. Commercial gaming worlds tend to focus on a singular fictional theme and consistently follow formal conventions such as character-focused avatars, progression through an interactive narrative storyline, and a series of competitive events
 Medical Procedures
Modern medicine has also found many uses for virtual reality. Doctors can interact with virtual systems to practice procedures or to do tiny surgical procedures on a larger scale
Project Natal
The latest entry in the virtual reality inspired gaming world is Project Natal, a new piece of technology under development now for the Xbox. Project Natal proposes a new way of interacting with games, and indeed with computer systems in general. In their demo video, they propose a system that requires no keyboard and no controller, where a user's voice and motions serve as their method for interacting with the system.

There are many more examples in real world about the virtual world which will change our life
by innovative powerful technologies in the real world for virtual world.

Windows Azure


“Microsoft”, everybody knows about it. There are always additions to their technology and services by Microsoft in an IT field.  When I searched for new things on internet one thing captured my attention that is Windows Azure.

Windows Azure is a cloud services operating system that serves as the development, service hosting and service management environment for the Windows Azure platform. Windows Azure provides developers with on-demand compute and storage to host, scale, and manages web applications on the internet through Microsoft datacenters.
Windows Azure is a flexible platform that supports multiple languages and integrates with your existing on-premises environment. To build applications and services on Windows Azure, developers can use their existing Microsoft Visual Studio expertise. In addition, Windows Azure supports popular standards, protocols and languages including SOAP, REST, XML, Java, PHP and Ruby.
Application Scenarios
Windows Azure is a service that allows developers to run applications and store data on servers owned and operated by Microsoft. These cloud applications can be targeted at businesses, consumers or both. Some examples are:
·         Enterprises that use Windows Azure to run their own line-of-business, batch processing or large-volume computations.
·         An independent software vendor (ISV) that creates a SaaS (Software as a service) application targeted towards business users.
·         Perform large-volume storage, batch processing, intense or large-volume computations
·         An ISV that creates a SaaS application targeted towards consumers.
Benefits:
·         Agility: Take advantage of development tools, automated service management and global datacenter presence to respond faster to customer needs, focus on your competitive differentiators, and reach new markets.
·         Efficiency: Windows Azure improves productivity and increases operational efficiency by lowering up-front capital costs. Customers and partners can realize a reduction in Total Cost of Operations of some workloads by up to 30 – 40% over a 3 year period.
·         Focus: Focus on delivering services and value to your customers – and not on managing technology infrastructure. Windows Azure enables you to spend less time on operational hurdles and more time focusing on your competitive differentiators.
·         Simplicity: Utilize your existing skills in familiar languages such as .NET, Java and PHP to create and manage web applications and services.
Trustworthy: Enterprise class service backed by a reliable service level agreements and a rich online services experience

Monday 18 April 2011

Squeeze

After two years of development Debian Linux version 6.0 (code name “Squeeze”) has been released along with a technology preview of Debian  GNU/kFreeBSD, a new variant of Debian, this time not based on Linux, but based on FreeBSD. Debian GNU/kFreeBSD is a port that consists of GNU user land using the GNU C library on top of FreeBSD’s kernel, coupled with the regular Debian package set.
Debian GNU/Linux is distributed freely over Internet. You can download all of it from any of the mirrors. There is also an Installation Manual with detailed installation instructions.
Debian 6.0 includes the KDE Plasma Desktop and Applications, the GNOME, Xfce, and LXDE desktop environments as well as all kinds of server applications. It also features compatibility with the FHS v2.3 and software developed for version 3.2 of the LSB.
This release includes numerous updated software packages, such as:
·         KDE Plasma Workspaces and KDE Applications 4.4.5
·         An updated version of the GNOME desktop environment 2.30
·         The Xfce 4.6 desktop environment
·         X.Org 7.5
·         OpenOffice.org 3.2.1
·         Iceweasel 3.5.16 (an unbranded version of Mozilla Firefox)
·         Icedove 3.0.11 (an unbranded version of Mozilla Thunderbird)
·         PostgreSQL 8.4.6
·         MySQL 5.1.49
·         Linux 2.6.32
·         Xen Hypervisor 4.0.1 (dom0 as well as domU support)
·         OpenJDK 6b18
Debian 6.0 includes over 10,000 new packages including the open source version of Google’s Chrome browser called Chromium. Support has also been added for the ext4 and Btrfs file systems and — on the kFreeBSD architecture — the Zettabyte file system (ZFS). The installation system for Debian GNU/Linux is now available in 70 languages.