Monday, January 29, 2018

What Is the Technology Behind a Touch Screen?

Have you ever wondered just how the touch screen on your cell phone, tablet, LED television, or any other device actually works? It is amazing to think that we can now issue commands to our devices with the touch of our hand and while this technology might seem new, it has actually been around since the 1960's.

Roger Samara


In fact, the technology behind the touch screen can actually traced right back to the 1940's but it was only two decades later that it actually became feasible to use on a large scale.

ATMs have been using technology since 1965 which is when E.A. Johnson invented the first finger-driven touch screen that actually used the same capacitive touch mechanism that is still used in cell phones and other devices to this day.

According to Roger Samara, there are other types of touch screen technology such as resistive touch or multi touch technology, capacitive touch technology is the one that is preferred for mass produced consumer products.

How is a Capacitive Touch Screen Made?


Today, a capacitive touch screen works through the use of an ITO touch film that is attached to the screen. This touch film is basically a semiconductor that has been printed out using semiconductor manufacturing methods such as roll to roll processing which uses a roll to roll evaporator system to create an electronic device on a flexible plastic.

A roll to roll evaporator system from industry leading manufacturers are able to mass produce ITO touch film that can be used on various devices such as smart phones, LCD or LED screens, tablets, and PC monitors.

Roger Samara_Touch Screen


Roll to roll technology is the preferred method over other technologies such as roll to plate and plate to plate technologies due to it offering a continuous process and higher throughput than the others. That ITO touch film is then programmed using software that enables us to give our devices instructions through the use of our fingers on the screen.

In fact, semiconductor manufacturing processes such as the roll to roll evaporator system are used for many other products too, such as solar panels, cameras, and printers.

Summary


So now you have a basic idea of where technology came from and the technology that is used to produce the semiconductor film that is used on touch screens today. Without machines that use a roll to roll evaporator system, we would not be able to enjoy the many touch screen devices that are available to us today.

Roger Samara is a computer savvy who is passionate about his work & new technologies. He examines user's technical needs and provides them with best solutions.




Sunday, January 14, 2018

How to Protect your Email from Viruses and MalWare

Once upon a time, email was considered to be a pretty safe communication medium. For those still using PINE or some other text-only mail client, it still is, says Roger Samara. But for the rest of us, who want to take advantage of all the advanced features of modern email client software, opening an email message can be a scary experience.

Virus writers, who used to spread their virtual “diseases” via infected floppies and network shares, have seized the opportunity posed by email programs that support attached files, HTML messages, and embedded scripts to send viruses and other malicious software (called “malware”) to hundreds or thousands of people with just a few keystrokes. In this article, we will look at how email viruses work and what you can do to protect your computer and network from them.

How Email Viruses Work


There are a couple of different ways that viruses can invade your computer through your email box. One of the most publicized is through attachments. If you open an executable file that’s attached to a mail message, the program runs and the virus does its dirty work – in some cases not only doing damage on your own machine but also using your address book to mail copies of itself to everyone with whom you correspond. 

Roger Samara_Email Viruses
Roger Samara_Email Viruses

These infected messages will appear to be from you, even though you weren’t even aware that they were sent. That’s why you should always be wary of mail with attachments, even when it comes from someone you know and trust. Viruses that work this way include the infamous Melissa virus, Klez, and others.

Avoiding attachment viruses would seem to be easy: just don’t open attachments. However, it’s not always that simple. Many of us whose work depends on collaborating with others across the Internet need to exchange attachments. If you do, common sense precautions should prevail. Note the file type before opening an attachment. Executables are most likely to be dangerous, but virus writers use tricks such as appending multiple file extensions to fool you into thinking a file is something it’s not. Because the Windows Explorer and some software programs don’t show common extensions by default, a file named letter.txt.exe will appear to be an innocuous text file when it’s really a program file.


Because the problem of viruses in attachments is so prevalent, Microsoft has written recent versions of Outlook (2002 and above) to automatically block executable file types (.exe, .bat, .com, .lnk, .scr, .vbs and many others). This feature is also added to Outlook 2000 when you apply Service Pack 2 or to Outlook 98 when you apply the Outlook Email Security Update. Unfortunately, this creates a situation where the cure may be worse than the disease if you really need to send and receive those types of files. If so, there are several ways to work around this problem.

The simplest method is to just rename the file with a different extension (for example, rename program.exe to program.txt) and tell the person to whom you’re sending it to rename it to the original name after downloading it.

In Outlook 2002, you can edit the Registry to modify the file types that are blocked. There are several third-party utilities that will let you do the same thing without directly editing the Registry; these include Outlook Permissions Add-in from MRH Technolgoy Group, DetachXP from McDaniel Development and the Xenos Outlook Security Extension. 

Note that attachment blocking is optional in Outlook Express, and Outlook Web Access does not include attachment blocking. So another way to get your attachments is to use OWA (if you’re in an Exchange environment) or import your messages into OE from Outlook.

Don’t assume that you’re okay if the only attachments you open are document files. Word documents can contain macros (small programs) that can execute malicious commands. These are called macro viruses. You can protect yourself by setting the Macro Security level in Word (accessed via Tools | Options | Security tab) to medium or high. High disables all unsigned macros, and medium prompts you before running a macro, as shown below.

Roger Samara: Macro Security
Roger Samara: Macro Security

You can’t assume your mail is safe just because you don’t get attachments, either. Viruses can also be embedded in the mail message itself. This isn’t possible in a plain text message, but the most popular mail clients today (Outlook, OE, Eudora) support HTML mail so you can use stationery, embed pictures and sound, and so forth. An HTML message can contain scripts (programs) that execute viruses. This is one reason many mailing lists block HTML mail (another is bandwidth usage).

The latest version of Outlook (2003), now in beta testing, finally allows users to block HTML mail. This is a continuation of a trend that started in Outlook 2002 (XP), when Microsoft started blocking external content (files grabbed from outside servers) in the preview pane. To convert incoming HTML to plain text in Outlook 2000, you can use VBA code. In Outlook 2002, you can use the Rules Wizard’s “run a script” action to call a VBA subroutine to perform this conversion.

Rich text can also be exploited to send unauthorized messages, and even plain text messages can contain URLs that may take you to web sites where scripts run and disseminate viruses.
Like what you're reading? Get the latest updates and tech guides in your inbox.

Protective Measures you can Take


According to Roger Samara, most viruses are operating system specific (that is, viruses that run on Windows often don’t affect Linux or Macintosh computers, and vice versa) and many are also specific to certain email clients. The first step in protecting your computer from email viruses is to apply all service packs and security updates, both those for your OS and those for your email software. Because the mail client may interact with the browser when reading HTML mail, you should also apply the latest updates to Internet Explorer.

Your mail client should be configured so that ActiveX and Java scripts won’t run automatically. In Outlook and OE, this is done through the settings for the Restricted Sites security zone (Tools | Options | Security). Choose Custom Level and scroll through the list of options, and set the option button for each ActiveX or scripting setting to either “disable” or “prompt,” as shown in figure below.

Roger Samara_Disabling ActiveX and scripting
Roger Samara_Disabling ActiveX and scripting

If you use Eudora, in Tools | Options | Viewing Mail, you should disable “allow executables in HTML content.” For Netscape Mail, in Edit | Preferences, Advanced Category, uncheck “enable Javascript for Mail and News.”

The next step is to install a good anti-virus or email security program. Although an AV program will help, it may not be enough to protect a mission-critical network. In that case, a more comprehensive “email firewall” such as GFi MailSecurity for Exchange can check mail content as well as checking for viruses. Remember that new viruses are being created daily, so any virus software will need to have its definition files updated regularly.

Summary


Viruses can destroy data, damage system files that are necessary to run your operating system and applications, and even bring down the entire network through denial of service attacks. If this weren’t enough, these viruses can use your address books to spread themselves further. If you use email, you need to take steps to ensure that you’re protected against viruses, Trojans and other malicious software that can be transmitted via email – without compromising the email features you need to communicate effectively. In this article, we’ve provided an overview of email security issues and pointers to solutions that may be right for your computer and network.

Originally published at: http://techgenix.com

Monday, January 8, 2018

Monitoring Network Traffic More Efficiently

The company intranet is growing constantly at the time. Hence, the network administrators have to handle different type of the traffic that is crisscrossing the networks.

Roger Samara - Network Traffic
Roger Samara - Network Traffic

Monitoring and analysis of the network traffic are necessary in order to resolve the networking issues more effectively says, Roger Samara. Today's the computers did the traffic analysis. This means they conclude the state of the network at the time when the data packet reaches their destinations.

The Network Traffic Monitoring can be done effectively


Actually, the network scrutiny would be done more efficiently if routers inside the structure can report on their own conditions. Furthermore, this also enables the network operators to address the problem quickly.

Hence, the router industrialists start to equip these networking devices with counters which report the number of data packets router process in given time period. But the number counts are lone so convenient.

Also, this is not practical to give routers a singular purpose monitoring circuit for every new dimension the operators want to make. An alternative to this that these network devices transfer the data packet to the outside servers for composite exploration. But this technique does not work well. This is because, the data center having 1, 00,000 servers may need another 40,000 servers in order to keep up with the deluge of the data packet.

Dubbed Marple - New Approach to Monitor the Network Traffic


Roger Samara - Monitoring Network Traffic
Roger Samara - Monitoring Network Traffic

Some researchers at MIT, barefoot networks, and Cisco networks introduce a new tactic for the network monitoring. The computer savvy Roger Samara says that this approach endows the flexibility in data collection. Furthermore, it also keeps the circuit intricacy of routers and number of exterior analytical servers low.

This new system contains programming language which permits the network operators to stipulate a wide range of network monitoring tasks. In fact, the Marple only needs a single traffic scrutiny server for every 40 to 50 application servers.

The Idea behind the Marple


The main idea behind this new approach is to do possible analysis on the router itself without any network delays. Plus, to send the exterior server summary instead of raw packet data. This will result in saving both the processing time as well as bandwidth.

Roger Samara - Router
Roger Samara - Router

In fact, Marple is built to analyze the transmission of every computer transferring data through the router. This is according to Roger Samara that the problem is that this networking device has the memory to store only 64,000 connections.

This system is able to monitor more transmissions through a variation on caching i.e. a common computer science technique. Here, the Marple kicks off the data for newer data.


Wrapping Up


From hundreds to thousands of processors and Ethernet to ATM, the administrators need some tools for monitoring the network traffic. Actually, the main purpose of network traffic monitoring is to count the IP traffic between individual’s local area network and Internet. The Marple system endows the real-time traffic accounting as well as monitoring.

Tuesday, January 2, 2018

Robotics: A Look at The Future Technology

What do you know about the future of the robotics? Well, we can't say anything for sure as technology is evolving at a rapid pace in all areas, such as artificial intelligence and machine learning. According to Roger Samara, one thing is obvious: Robots will have a great role in the life of a common man as well, not to mention that they will be used in the industries as well.

Roger Samara_Robotics
Roger Samara_Robotics


A research firm made 10 predictions for robotics that we are going to talk about in this article. The list has some really interesting forecasts that may have a great impact on our society and business.

Robots And the future of surgery


Nowadays, surgeons are using robotics in their surgical operations. As a matter of fact, technological development in AI, navigation, computer vision, MEMS sensor and other technologies have been making the robots consistently better.

Moreover, robotics will speed up the process of innovation, hence disrupting and modifying the paradigm of the future business operations. In addition, robotics can sharpen the competitive edge of a company by improving quality, and increasing productivity. Given below are some predictions that will help you get a glimpse of the future of robotics.


Related: Roger Samara | 5 Ways to Enjoy Virtual Reality


1. Growth of Robotics


In 2019, about 30% of the use of robotics in industries will be in the form of a RaaS model of business. This will help businesses cut down on the cost of robot deployment.

2. Robotics Officer

Roger Samara - Robotics Officer
Roger Samara - Robotics Officer


In 2019, about 30% of the major organizations of the world will use a chief robot officer in order to make their businesses better says, Roger Samara.

3. Evolving Competition


In 2020, large organizations will be able to choose from different vendors with the entrance of new players in the multi-billion dollar industry of information and communications in order to increase the deployment of robotics.


4. Talent Race


In 2020, the growth of robots will boost the talent race. As a result, about 35% of the jobs related to robotics will be vacant and the mean salary will go up by at least 60%.


5. Regulations

Roger Samara - Robotics Resolutions
Roger Samara - Robotics Resolutions


In 2019, the governments will introduce new regulations related to robots in order to preserve jobs and resolve privacy, safety and security concerns.

6. Software-defined robots


In 2020, about 60% of these machines will rely on cloud-based apps in order to introduce new skills, apps and cognitive capabilities. As a result, the world will see a robotic marketplace that will be cloud-based.

7. Collaborative robots


In 2018, about 30% of the robots will be smart collaborative machines that will be 300% faster than the robots of today. Plus, they will be safely work around humans.

8. RoboNet


In 2020, about 40% of the commercially available robots will be part of a net of shared intelligence. As a result, the overall operational efficiency of the robots will go up by 200%.

9. Automating of operations


Roger Samara - Automating Operations
Roger Samara - Automating Operations


Two years from now, around 35% of the big organizations, such as health, logistics, and utilities will use the robots for the purpose of automating operations.

10. Ecommerce


In 2018, around 45% of the major international e-commerce companies will use robots in their delivery operations and fulfillment warehousing.

So, hopefully, this will give you a pretty good idea of how the robotics will shape the world in a few years from now.