Thursday, November 27, 2014

Web 3.0: The Third Generation Web is Coming

by Lifeboat Foundation Scientific Advisory Board member Nova Spivack.
 
 

Overview

The Web is entering a new phase of evolution. There has been much debate recently about what to call this new phase. Some would prefer to not name it all, while others suggest continuing to call it “Web 2.0”. However, this new phase of evolution has quite a different focus from what Web 2.0 has come to mean. 



Web 3.0

John Markoff of the New York Times recently suggested naming this third-generation of the Web, “Web 3.0”. This suggestion has led to quite a bit of debate within the industry. Those who are attached to the Web 2.0 moniker have reacted by claiming that such a term is not warranted while others have responded positively to the term, noting that there is indeed a characteristic difference between the coming new stage of the Web and what Web 2.0 has come to represent.
 
The term Web 2.0 was never clearly defined and even today if one asks ten people what it means one will likely get ten different definitions. However, most people in the Web industry would agree that Web 2.0 focuses on several major themes, including AJAX, social networking, folksonomies, lightweight collaboration, social bookmarking, and media sharing. While the innovations and practices of Web 2.0 will continue to develop, they are not the final step in the evolution of the Web.
 
In fact, there is a lot more in store for the Web. We are starting to witness the convergence of several growing technology trends that are outside the scope of what Web 2.0 has come to mean. These trends have been gestating for a decade and will soon reach a tipping point. At this juncture the third-generation of the Web will start.


 

                 More Intelligent Web

The threshold to the third-generation Web will be crossed in 2007. At this juncture the focus of innovation will start shift back from front-end improvements towards back-end infrastructure level upgrades to the Web. This cycle will continue for five to ten years, and will result in making the Web more connected, more open, and more intelligent. It will transform the Web from a network of separately siloed applications and content repositories to a more seamless and interoperable whole.
 

Because the focus of the third-generation Web is quite different from that of Web 2.0, this new generation of the Web probably does deserve its own name. In keeping with the naming convention established by labeling the second generation of the Web as Web 2.0, I agree with John Markoff that this third-generation of the Web could be called Web 3.0.


 

Timeline and Definition

Web 1.0. Web 1.0 was the first generation of the Web. During this phase the focus was primarily on building the Web, making it accessible, and commercializing it for the first time. Key areas of interest centered on protocols such as HTTP, open standard markup languages such as HTML and XML, Internet access through ISPs, the first Web browsers, Web development platforms and tools, Web-centric software languages such as Java and Javascript, the creation of Web sites, the commercialization of the Web and Web business models, and the growth of key portals on the Web.
 
Web 2.0. According to the Wikipedia, “Web 2.0, a phrase coined by O’Reilly Media in 2004, refers to a supposed second generation of Internet-based services — such as social networking sites, wikis, communication tools, and folksonomies — that emphasize online collaboration and sharing among users.”
 
I would also add to this definition another trend that has been a major factor in Web 2.0 — the emergence of the mobile Internet and mobile devices (including camera phones) as a major new platform driving the adoption and growth of the Web, particularly outside of the United States.
 
Web 3.0. Using the same pattern as the above Wikipedia definition, Web 3.0 could be defined as: “Web 3.0, a phrase coined by John Markoff of the New York Times in 2006, refers to a supposed third generation of Internet-based services that collectively comprise what might be called ‘the intelligent Web’ — such as those using semantic web, microformats, natural language search, data-mining, machine learning, recommendation agents, and artificial intelligence technologies — which emphasize machine-facilitated understanding of information in order to provide a more productive and intuitive user experience.”
 
Web 3.0 Expanded Definition. I propose expanding the above definition of Web 3.0 to be a bit more inclusive. There are actually several major technology trends that are about to reach a new level of maturity at the same time. The simultaneous maturity of these trends is mutually reinforcing, and collectively they will drive the third-generation Web. From this broader perspective, Web 3.0 might be defined as a third-generation of the Web enabled by the convergence of several key emerging technology trends:

 
Ubiquitous Connectivity
  • Broadband adoption
  • Mobile Internet access
  • Mobile devices
Network Computing
  • Software-as-a-service business models
  • Web services interoperability
  • Distributed computing (P2P, grid computing, hosted “cloud computing” server farms such as Amazon S3)
Open Technologies
  • Open APIs and protocols
  • Open data formats
  • Open-source software platforms
  • Open data (Creative Commons, Open Data License, etc.)
Open Identity
  • Open identity (OpenID)
  • Open reputation
  • Portable identity and personal data (for example, the ability to port your user account and search history from one service to another)
The Intelligent Web
  • Semantic Web technologies (RDFOWLSWRLSPARQL, Semantic application platforms, and statement-based datastores such as triplestorestuplestores and associative databases)
  • Distributed databases — or what I call “The World Wide Database” (wide-area distributed database interoperability enabled by Semantic Web technologies)
  • Intelligent applications (natural language processing, machine learning, machine reasoning, autonomous agents)
 

Conclusion

Web 3.0 will be more connected, open, and intelligent, with semantic Web technologies, distributed databases, natural language processing, machine learning, machine reasoning, and autonomous agents.


Tuesday, November 25, 2014

Talktime Boost with Portable Battery




Friday, November 21, 2014

Tuesday, November 18, 2014


Congrats, you are finally graduated from your University. The only snag is where and how to find a new job corresponding to your studies? Here are some tips for you.


Well-presented and coherent resume and cover letter

First of all, make sure to have a correct and coherent resume and cover letter. State explicitly there why you are the best candidate for a given job offer. In other words, “be clear”. Ask an advice from an expert if needed be to correct some mistakes there in. Information has to be coherent in the resume and the cover letter. Before writing them down, read the job description and carefully target it to your desire to work in the company. Go online or on TV and try to discover what is the job seeker searching for as well as key elements that ca be discussed during a probable interview.

Searching scrupulously

Depending on studies you have followed, you can start researches. Job application may not be directly answered a few days after the deposit. Nevertheless, you will need to be patient and keep on searching. There are hundreds of websites on the Internet that can provide you with job offers that can meet your needs and requirements. Search on newspapers, keep connected with friends and ask them if there is an offer somewhere that may be interesting for you.

Use social networks

Social networks can work for both personal and professional use. Get involved in professional social networks, participate in forums and do not hesitate to show your degree and competences off. Networking is considered to be the number one in networking strategy. Sooner or later, you will receive an answer from a recruiter. You can also use options such as online notification to remind and alert you of a job offer.

Do what it takes to stand out among the crowd

Human resources boards receive and have to read about hundreds of resumes per day. They do not have enough time to read them carefully. Due to this situation then, you have to find ways to make your resume stands out from others. Copy paste from the Internet can be a real danger. Online models are quite the same and using them is giving HR chances not to read yours. Moreover, target your documents (letter of application and cover letter) to the special job you are applying for. Make sure it does not contain error. You can also call the employer and share your excitement and enthusiasm concerning the job offer.

Be confident and don’t give up

Take this last tip in your heart. You may have tried everything but the future still remains unopened. Getting discouraged can happen to everyone and especially to students searching for their first or their new job. Looking for a job is a competitive market. If you give up too early, you are loosing the trade. Even if many people are lacking of motivation and initiate, let it be not you. Perseverance is important in any field of life.

By 2020, 90% of world’s population aged over 6 will have a mobile phone: Report


Eicsson has released its latest Mobility Reporttoday, revealing that the ongoing growth of the smartphone market isn’t likely to slow down any time soon thanks to increasing numbers of users coming online in countries like China and India.
According to the study, which looks at data forecasts up to the turn of the next decade, 90 percent of the world’s population over the age of six will have a mobile phone. A spokesperson told TNW that this figure was calculated “using certain assumptions about phone usage (looking at active users rather than subscriptions) in five-year age brackets and using the UN forecasts of population development, in a medium fertility scenario.”
In total, by 2020, Ericsson predicts there will be at least 6.1 billion smartphone subscriptions globally. Right now, there are 2.7 billion, with an estimated 800 million added in 2014.

To reach the 6.1 billion figure, operators and device vendors will need to attract new customers in virtually every market. India and China are currently leading the way with 18 million and 12 million (respectively) new mobile subscriptions added in the third quarter of 2014 alone. However, of the total number of mobile subscriptions globally, only 37 percent of those are for smartphones, so clearly there’s still a big market opportunity to get ‘dumb’ phone users onto more feature-rich handsets.
The report also looked at other trends that we could expect to see in the coming years, such as a predicted tenfold increase in the use of mobile video calls, which the company said will make up more than half (55 percent) of all mobile data traffic by 2020. Currently streaming music and video services are responsible for a large amount of the data used, rather than video calling.

Looking ahead to the introduction of 5G services, Ericsson said that users are more likely to jump across to the superfast services more quickly than was the case with 4G or 3G rollouts.
➤ Ericsson Mobility Report [Ericsson]

Monday, November 17, 2014

          Top 10 Dangerous Computer Viruses.


1.  Melissa

Creator: David L. Smith
Founded: March 26th, 1999
Spread through: email attachment
Melissa, named after a dancer in Florida, is probably one of the most dangerous viruses to have affected the systems. Spreading through email attachments, the virus replicates itself once activated and dispatches the replicates to 50 of the contacts in the email address book of the user. It lead to a stop in the email system for a while until this virus was stopped. Though the virus didn’t cripple the internet network, it definitely caused a tremor that shook the technological era.

2.   ILOVEYOU/ Love Letter

Creator: Onel De Guzman
Founded: 2000
Spread through: email attachment
Immediately a year after the Melissa debacle, came one more virus named I LOVE YOU virus. It was basically a worm as it had the stand-alone capability to replicate itself and inflict damage. It was similar to the Melissa virus and spread itself through email attachments. The email’s subject says that it is a love letter from a secret admirer and once opened infuses itself into the systems. The virus is known to attack the poor system’s hard drive first, then the registry keys and meanwhile keeps copying itself and entrenches deep into files and folders. By some survey, the virus had said to have caused around $ 10 Billion in damages.

 3.  MyDoom

Creator:Anonymous
Founded: 26th January 2004
Spread through: email
Probably one of the deadliest and threatening viruses ever created in the computing history. Unlike other viruses MyDoom attacks the search engines by sending multiple phony requests to them thereby making them slow and causing them to crash. It also could duplicate emails and send them over the network causing a lot of damage and loss to various companies.

4. CiH virus

Creator: Chen Ing-hau
Founded: 1998
Spread through:Internet circulation
CiH virus, better known as Chernobyl virus had an outbreak in the late 1990’s in Taiwan that wiped out the internal hard drives. This virus is also responsible for infecting the BIOS. This virus has many different variants likeCIH v1.2/CIH.1103, CIH.1049. The virus was responsible for around $ 6 Billion damages in total. The special thing about this virus was that it was actually an attempt by the creator to test the antiviral efficiency of packages out in the market.

 5.     Anna Kournikova Virus

Creator: Jan De Wit
Founded: February 11th 2001
Spread through:email message
Anna Kournikova”? The name ring a bell? You people thinking about the tennis player? If you are, then you are absolutely right. This worm wasn’t made intentionally and the creator had no idea what his creation could do. This spread around like the other viruses like ILOVEYOU , CiH through emails which depicted to contain a picture of the player. Once the mail was opened, the worm automatically forwarded itself to all the contacts in the user’s address book. The virus though not that dangerous had to said to have caused around $ 166,000 in damages.

 6.  SQL slammer:

Creator:Anonymous
Founded: January 2003
Spread through: Internet
It was a worm that basically slowed down the internet traffic and crashed multiple servers. You must be thinking that since it is named as “SQL Slammer”, the base of its creation was SQL. But it surprisingly isn’t. This worm infected the servers over UDP and fit themselves into a single packet, thereby slipping through all the ports inspite of the internet traffic and the routers not functioning. This worm created major problems during that year and resulted in a worst-case scenario in the tech field.

7.   Sasser and Netsky

Creator:Sven Jaschan
Founded:April 30th,2000
Spread through: Network ports
Sasser and Netsky were both created by the 17-yr old German, who cleverly designed them to act in the most unique way as possible. As in both the worms were completely opposite in functioning as compared to each other. The Sasser worm exploited the vulnerability in the network ports and infected the host computers. The specialty of the Sasser virus was that it didn’t spread through email attachments. Instead, it would first scan the ip addresses of potential computers and then infect them. On the contrary, the Netsky worm would penetrate the systems via the conventional email messages and through Windows networks. Both these viruses resulted in a DoS attack (Denial of Service) and also slowed down the internet traffic considerably.

8. Code Red

Creator: Anonymous
Founded: July 13th 2001
Spread through:IIS servers
The Code Red virus bloomed into existence during the summer of 2001, and exploited the vulnerability in the indexing software (buffer flow) with IIS server in the internet.  The virus managed to infect the web servers in the white house. This virus also lead to the discovery of another nemesis to the computing scenario named as Code Red II that had a same injection vector, but different payload.

 9.  Numbing Nimda

Creator: Anonymous
Founded: September 18th 2001
Spread through: email, network shares
This virus debuted itself in 2001 immediately a week after the attack on the World Trade Center. Some media began speculating a link between the virus and the attack on the WTC, which hasn’t been proved yet. The virus basically spreads through the email and browsing of compromised websites. The virus wasn’t very harmful but was said to have been the most dreaded virus if the final payload had worked

 10. Klez virus

Creator: Anonymous
Founded: October 2001
Spread through:email attachment
Now we look at the “The Klez virus”,known to affect the Windows Systems, eclipsing the anti-virus in the systems and posing itself as a virus removal tool. It again spread in the conventional way of attachments and forwarded itself to various contacts of the poor victim. Some variants of the virus created immense damage by rendering one’s computer as inoperable.
So, these were top 10 viruses and the mode in which they enter your PC. If you feel that some info is missing here, feel free to comment and if you found it useful , Like and Share it! :)
For more awesome stuff follow this, like and subscribe   http://fathih40.blogspot.com/

Sunday, November 16, 2014

                                Web 2.0



Web 2.0 is the term given to describe a second generation of theWorld Wide Web that is focused on the ability for people to collaborate and share information online. Web 2.0 basically refers to the transition from static HTML Web pages to a more dynamic Web that is more organized and is based on serving Web applications to users.

Other improved functionality of Web 2.0 includes open communication with an emphasis on Web-based communities of users, and more open sharing of information. Over time Web 2.0 has been used more as a marketing term than a computer-science-based term. Blogs, wikis, and Web servicesare all seen as components of Web 2.0.

Web 2.0 was previously used as a synonym for Semantic Web, but while the two are similar, they do not share precisely the same meaning.






Supercomputer stagnation: New list of the world’s fastest computers casts shadow over exascale by 2020



Top 500 released the updated list of the world’s fastest supercomputers, and it revealed a rather worrying trend: Supercomputer performance gains are slowing down, rather than speeding up. When most of the world’s computing superpowers have announced their intentions to create exascale (1000 petaflops) supercomputers by 2020, this would appear to be a bit of a problem.
The Top 500 list is updated twice a year, in June and November. While the combined performance of all 500 supercomputers is still up from November 2013, the trend is a lot flatter than the long-term trend from the last four years or so. In the graph below, you can see how the latest data point (the blue dot) is almost fully below the trend line. You can also see that, also unusually for the last few years, one supercomputer has stuck to the number-one spot for the last 18 months (the Chinese Tianhe-2). And finally, the yellow dots — which plots the performance of the 500th-fastest supercomputer over the last 20 years — is also starting to dip below the long-term trend.

                                                         Top 500 supercomputer performance over the last 20 years

If we look at the bigger picture, all of these trends are caused by one primary factor: Consolidation of power. Rather than everyone and their mother having a supercomputer, there has been a definite shift towards fewer, more powerful computers. Because our demand for faster supercomputers is increasing faster than the combined might of Moore’s law and Dennard scaling, the only way to keep up is to build disproportionately bigger and better machines. The sum performance of the Top 500 has continued to grow around ~15% the last few years, while a PC bought today is probably only ~5% faster than the one you bought last year. It is getting harder and harder to “beat” the trend, let alone stick to it, which is why we are seeing a larger push towards HPC-specific accelerators (Nvidia Teslaand Intel Xeon Phi), and exotic cooling methods.
                                                              Top 500 supercomputers, broken down by CPU maker 
There are some other interesting trends from the June 2014 Top 500 list, too. 62 (up from 53) supercomputers on the list now use accelerators/coprocessors, with no gain for Radeon, Xeon Phi gaining four new systems, and Tesla gaining six. On the CPU front, Intel increased its share of the Top 500 from 82% to 85%, with IBM Power holding at 8% and AMD Opteron losing ground. HP still has the lead in the total number of systems in the Top 500 (182), but IBM and Cray still dominate the top 10 with four and three installations respectively.
To circle back, though, the big story is that it’s getting progressively harder to pump up the petaflops. Due to the consolidation that we discussed earlier, we are still going to see some huge supercomputers from China, Japan, USA, and Europe — but they will take progressively longer to go from the drawing board to installation to peak performance. It’s no longer just a matter of whacking thousands of CPUs into hundreds of cabinets and plugging them into a medium-sized power station. To reach 100 petaflops (the next couple of years) and then 1000 petaflops/exascale (2018-2020), it’s going to require a seriously holistic approach that perfectly marries hardware, software, and interconnect.
Tianhe-2, the world’s fastest supercomputer. 32,000 Ivy Bridge Xeon chips, 48,000 (!) Xeon Phi accelerators, for a grand total of 3,120,000 compute cores. It has a theoretical max performance of 55 petaflops, but actual benchmarked Linpack performance of 33.86 petaflops.

Whether we’ll actually get to exascale by 2020, I think the jury’s still out. While multi-core accelerators like Xeon Phi and Tesla have given the HPC industry a much-needed boost, it was a one-time thing; there’s no evidence that that they’ll push us all the way towards 1 exaflop — they’re still hardware, and thus ultimately beholden to the same scaling and power issues that the entire computing industry faces. Our hardware writer, Joel Hruska, has a great story on the difficulties that lie in wait on the path to exascale if you want to find out more.
Here’s hoping we get there, though. There’s a whole raft of scientific applications that will open up when we get there, apparently, including accurate simulation of the human brain, and processing data from world’s largest telescope.
Source : extremetech

Watch ASCII Star Wars in Windows XP, Vista, 7 and 8/8.1

\

Every one of us has watched Star Wars on television, computer or in a theater. It is the same movie with aliens fighting each other for galaxies and such stuff. There is nothing new in it. But wait, have you watched an ASCII (American Standard Code for Information Interchange) version of Star Wars and that too in Windows usingtelnet? A network protocol known only to computer wizards. Well if you have not, then you must do it now!

There is a complete copy of Star Wars done entirely in ASCII characters that you can watch in the Windowsoperating system (or 
any OS that supports telnet). The only thing required to watch it is an internet connection; speed does not matter.


To watch it on Windows XP, Mac OS X and Linux
1.    Go to Start, Run. (Only for Windows users)
2.    Now type "telnet towel.blinkenlights.nl" without the quotes and press Enter. Users of Mac OS X and Linux can directly execute this code in the terminal window.

On Windows 8, Windows 8.1, Windows 7 and Windows Vista

Telnet is turned off by default in the latest versions of Windows. So, in order to watch star wars, you must first enable telnet by going to Control Panel › Programs › Turn Windows Feature On or Off and ticking both the telnet check boxes. After doing that, follow the steps given below:-
1.    Go to Start, Search in Windows Vista and Windows 7. On Windows 8 and Windows 8.1, open the main Start page.
2.    Type telnet and press Enter.
3.    In the following command prompt window, type "o" without quotes and press Enter.
4.    Now type "towel.blinkenlights.nl" without the quotes and press Enter.
If you do not need telnet anymore, you can turn it off.

command prompt window like the one in the image will open with the movie being played in it. See the movie yourself. Did you enjoy watching this new version of Star Wars? Well, I did and know it for sure that you would have too.