Subscribe to Updates
Get the latest creative news from FooBar about art, design and business.
Author: Shulav Shrestha
Near Field Communication (NFC) Near Field Communication is referred to as NFC in short. It is used for short-range data communication between two devices known as initiator (e.g., an NFC reader) and target, as its name implies (i.e., NFC Tag)NFC has many uses, including data transfer between cellphones, identity verification at government offices and other locations, ticket purchasing, etc. It uses low data rates of 106, 212, or 424 kbps and runs at a frequency of 13.56 MHz Both the NFC reader and the NFC tag have active and inactive modes. When two devices are touched or brought within a…
The relational model is one of the most widely used database models. It was created in 1969 by Edgar Codd. A relational database adheres to the relational database model. An assortment of relations or tables makes up a relational database. Each column in a table in a relational database is referred to as an attribute, and the rows of a table are known as tuples. A relation is a collection of tuples with the same properties by definition. Select, Project, and Join are three operations a relational database can carry out on ties. Relationships are combined using the join operation,…
Java: Introduction Java was introduced for network programming and has been the most used programming language for more than 20 years. Furthermore, experts have a firm conviction because Java consistently performs well for application building. Before constructing web apps, Java was created for portable devices and set-top boxes. Java is, therefore, the most popular programming language out of all of them. And Java now dominates several other programming languages. The general-purpose computer language Java uses the object-oriented programming paradigm and the Write Once Anywhere methodology. Enterprise, mobile, online, and desktop apps all require Java. It has excellent debugging features and…
Cognitive technology Algorithms, robotic process automation, machine learning, natural language processing, and natural language creation are all included in the wide category of cognitive technologies, or “thinking” technologies, which extends into the field of artificial intelligence (AI). The philosophical question of whether or not these technologies are actually thinking or intelligent is relevant. For our purposes, these are systems that, regardless of the fundamental structure of the mechanisms that result in those behaviors, appear to think, or behave intelligently, similarly to how humans do. Strong business incentives are provided by cognitive technologies. From routine (robotic process automation) to sophisticated and…
SQL Injection Attack SQL injection, sometimes referred to as SQLI, is a popular attack method that use malicious SQL code to manipulate backend databases and access data that was not meant to be displayed. Any number of things, such as private customer information, user lists, or sensitive corporate data, may be included in this data. A business could experience wide-ranging effects from SQL injection. A successful attack might lead to the illegal access of user lists, the deletion of entire tables, and, in some circumstances, the attacker obtaining administrative rights to a database—all bad things for a company. The loss…
Introduction The internet of things is a concept that describes the connection of everyday objects to the internet. Users can use it to track and monitor their mobile phones, home appliances, vehicles, or even livestock. The Internet of Things (IoT) is a network of physical devices, vehicles, buildings, and other items embedded with electronics, software, sensors, and network connectivity that enable these objects to collect and exchange data. IoT is a network connecting all kinds of electronic devices. This can range from simple sensors for measuring temperature or sound level to complex medical monitoring devices or even autonomous cars. You…
Artificial Intelligence : Introduction Artificial intelligence (AI) is the intelligence that machines display and may be programmed to mimic human behaviour or thought processes. Deep Learning and machine learning methods are combined to create AI. Intelligent choices can be made by AI models that have been trained using enormous amounts of data. Artificial intelligence is founded on the idea that we can describe human intelligence in a way that makes it simple for a computer to duplicate it and carry out activities of any complexity. Artificial intelligence aims to emulate cognitive processes in humans. Regarding concretely defining processes like learning,…
Digital Forensics: Introduction Digital forensics is the science of analysing and extracting digital evidence from computers and storage devices, such as hard drives, cell phones, PDAs, and other electronic storage devices. Digital forensics can also be described as computer forensics or e-discovery. The goal of digital forensics is to examine digital media in a forensically sound manner to identify, preserve, recover, analyse, and present facts and opinions about digital information. Digital forensics can be used for investigations and prosecutions of computer crimes such as internet fraud, theft, data breaches, cyber-bullying, cyberstalking etc… users should gather digital evidence with highly accurate…
Introduction The Metaverse is the virtual reality universe. The idea of a virtual world has been around since the late 1950s when computers became sophisticated enough to simulate real-life situations. Ivan Sutherland and his doctoral student Bob Sproul created the first interactive computer environment. People meant these systems to allow people to interact with three-dimensional images through graphical interfaces. Virtual reality (VR) and augmented reality (AR) has been growing in popularity for years. But what exactly is the metaverse? And how will it affect our daily lives? The metaverse is a theoretical concept that embodies the collective virtual spaces of…
Introduction A man in the middle attack is a type of cyber-attack where the attacker inserts themselves into a communication between two parties in order to eavesdrop or tamper with the data being exchanged. This type of attack can be difficult to detect, as the attacker can masquerade as one of the legitimate parties involved in the communication. Man in the middle attacks can be used to steal sensitive data, such as login credentials or financial information, or to inject malicious code into a transaction in order to conduct other types of attacks. How does this attack take place and…