The term "biometrics" is derived from the Greek words "bio" meaning life and "metric" meaning to measure. The technology is mainly used for identification and access control, or for identifying individuals that are under surveillance. The basic premise of biometric authentication is that everyone is unique and an individual can be identified by his or her intrinsic physical or behavioral traits. A biometric system is essentially a pattern recognition system which makes a personal identification by determining the authenticity of a specific physiological or behavioral characteristic possessed by the user. Biometric technologies are thus defined as the "automated methods of identifying or authenticating the identity of a living person based on a physiological or behavioral characteristic". View more
In computing, data recovery is a process of salvaging inaccessible data from corrupted or damaged secondary storage, removable media or files, when the data they store cannot be accessed in a normal way. Recovery techniques.Recovering data from physically damaged hardware can involve multiple techniques. Some damage can be repaired by replacing parts in the hard disk. This alone may make the disk usable, but there may still be logical damage. A specialized disk-imaging procedure is used to recover every readable bit from the surface. Once this image is acquired and saved on a reliable medium, the image can be safely analyzed for logical damage and will possibly allow much of the original file system to be reconstructed. .... View more
Fog computing, also known as "fogging" or “edge computing”, is a distributed computing infrastructure in which some application services are handled at the network edge in a smart device and some application services are handled in a remote data centre - in the cloud. Fog computing implies that rather than hosting and working from a centralized cloud, fog systems operate on network ends. It is a term for placing some processes and resources at the edge of the cloud, instead of establishing channels for cloud storage and utilization.... View more

Follow-the-sun is a type of global workflow in which tasks are passed around daily between work sites that are many time zones apart. The “follow-the-sun” support model was originally developed to provide round-the-clock customer service and has by now been widely adopted by companies around the globe. Such a workflow is set up in order to reduce project duration and increase responsiveness. Thus, the work is "following the sun" and never stops. Yet whether and when to adopt this support model is a question just about every growing business comes to face.... View more


Gesture is defined as a motion of limbs or any other body part which are made to emphasize speech. It can also be defined as an act or a remark made as a sign of attitude. A gesture is scientifically categorized into two distinctive categories: dynamic and static. A waving hand means goodbye is an example of dynamic gesture and the stop sign is an example of static gesture. It is necessary to explain all the static and dynamic gestures over a period of time in order to understand full message. Gesture recognition is interpretation of human motion by computing device. Hand gesture can be detected by controller that contains accelerometers to sense tilting and acceleration of movement. The basic purpose of this system is to provide a means to control electronic devices (capable of infrared communication) using hand gestures. Thus, this system will act like a remote control for operating all the consumer electronic devices present in a house, but this will be achieved through hand gestures instead of pushing buttons. ..... View more
Metadata is data that describes other data. Meta is a prefix that in most information technology usages means "an underlying definition or description." Metadata summarizes basic information about data, which can make finding and working with particular instances of data easier.In simple terms, metadata is "data about data," and if managed properly, it is generated whenever data is created, acquired, added to, deleted from, or updated in any data store and data system in scope of the enterprise data architecture........ View more

Network neutrality is the principle that all Internet traffic should be treated equally. According to Columbia Law School professor Tim Wu, the best way to explain network neutrality is that a public information network will end up being most useful if all content, sites, and platforms are treated equally. A more detailed proposed definition of technical and service network neutrality suggests that service network neutrality is the adherence to the paradigm that operation of a service at a certain layer is not influenced by any data other than the data interpreted at that layer, and in accordance with the protocol specification for that layer. ..... View more


In digital display screens, resolution is the number of pixels (individual points of colour) contained on a display screen, expressed in terms of the number of pixels on the horizontal axis and the number on the vertical axis. The sharpness of the image on a display depends on the resolution and the size of the monitor. The same pixel resolution will be sharper on a smaller monitor and gradually lose sharpness on larger monitors because the same number of pixels are being spread out over a larger number of inches...... View more

Thrift is as software library and a set of code generation tool which was developed at the Facebook Office at Palo Alto, California, to expedite development and implementation of scalable and efficient backend services. The primary goal of thrift is to enable efficient and reliable communication across programming languages by abstracting the portions of each language that tend to require the most customization, into a common library that is implemented in each language....... View more



Inductive power transfer between nearby coils of wire is an old technology, existing since the transformer was developed in the 1800s. Induction heating has been used for 100 years. With the advent of cordless appliances, inductive charging stands were developed for appliances used in wet environments like electric toothbrushes and electric razors to reduce the hazard of electric shock.Inductive charging (also known as wireless charging) uses an electromagnetic field to transfer energy between two objects. This is usually done with a charging station.Energy is sent through an inductive coupling to an electrical device, which can then use that energy to charge batteries or run the device.........View more