by WhistleBlower | Oct 25, 2016 | Technology
Android provides third-party applications with an extensive permission API that includes access to phone hardware, settings, and user data. Access to privacy- and security-relevant parts of the API is controlled with an install-time application permission system. In...
by WhistleBlower | Aug 26, 2016 | Technology
Today requirement for having the secure and safe computations in computing architecture is the growing demand and need of the era of concerned cyber security conscious business world. Side channel attacks mitigation is a growing concern among the cyber security...
by WhistleBlower | Aug 24, 2016 | Technology
Ever think of a car whose body is made of sheet of cameras , that wrap around car to give the autonomous driving flawlessly. In Columbia university Nayar is working on the sheet of lenses that can be bended and is totally flexible thus having bendable digital camera...
by WhistleBlower | Jul 29, 2016 | GIS, Technology
There are two important data models used in GIS , one is Spatial and other is Attribute Data model. We have discussed in detail about the Spatial Data Model in our “Executive Introduction to Geographic Information System (GIS)”. Attribute Data Models in...
by WhistleBlower | Jul 28, 2016 | GIS, Technology
The quality of data sources for GIS processing is always of great concern among GIS application specialists and End users. We have seen in the “Executive Introduction to Geographic Information System (GIS)” that there are variety of data input sources...