Constant concepts (C++) with Examples

Constant concepts C++:- Constant is a data type qualifier which provide extra quality to our normal variable and that quality is :- After initializing a constant vairable with appropriate value which we can not change that initialized value. In C and C++, rules about constant variable is that we have to initialize that constant variable at the time of declaration of that variable. We can not initialize the variable after declaring it.   const int I; i=10; // Error   In this case, if the variable I is the local variable then at…Read more

Mobile Device Management

At the starting this proposition work called COMMONS that was to discover the regular portable framework for versatility answer for the Bus of ABB. The 37 cross stage advances were explored to check whether they have the capacity to improve a portable system that can run on distinctive unit stages, for example ipad, Android apparatuses and Windows Phone. There are numerous profits furnished by cross-stage instruments (CPT): low incremental expenses and large amounts of code reuse, brief time-to-market, expanded generally application quality. Utilizing Cpts let the designers address numerous stages. The designers in…Read more

The Karbonn S5 Titanium Review

The Karbonn S5 Titanium is the next version of S1 Titanium. It has 5-inch HD display and an 8-megapixel rear camera. The price at the time of launching was around 12000 but now it has come down to 9999 in the online market. Let’s find out why you should buy this karbonn product. Design The karbonn titanium S5 is looks a little different from the titanium S1. It is much more thinly compared to its previous version. The phone is launched in 2 colours that are white and deep blue. It has 5-inch…Read more

Blackberry z10 review

Introduction For a long time, Blackberry was noticeably regarded as a gadget creator that concentrated on the venture section. With rivalry from any resemblance of Apple, Samsung and other handset creators that made Android mechanisms, Blackberry made a move for the developing markets, leveraging its informing stage and making economy apparatuses under its Curve arrangement focused at youths. The organization's Curve arrangement finished exceedingly well and gave Blackberry a portion in the Indian business sector. In 2013, a period when Blackberry is reinventing itself after a monstrous redesign headed by Blackberry 10, the…Read more

Do You Know What is Firewall?

This article states the use of firewall for your security of your operating system from unwanted browsing sites .The firewall plays a vital role in maintaining security of your assets on computer. Have you ever noticed when u type domain www.facebook.com in your college, company or institute it is not available to intended user WHY the reason is administrator has hosted firewall for security.   A firewall protects networked computers from intentional hostile intrusion that could compromise confidentially or result in data corruption or denial service .It may be a hardware device or…Read more

Java Card Security

Java applets are subject to Java security restrictions; however, the security model of Java Card systems differs from standard Java in many ways. The Security Manager class is not supported on Java Card. Language security policies are implemented by the virtual machine. Java applets create objects that store and manipulate data. An object is owned by the applet that creates it. Even though an applet may have the reference to an object, it cannot invoke the object's methods, unless it owns the object or the object is explicitly shared. An applet can share…Read more

Java Card Technology

As we are daily using smart cards. This smart card are developed on basis of java card technology this article briefly states the use and how java language is beneficially used in building smart cards. Java Card technology adapts the Java platform for use on smart cards and other devices whose environments are highly specialized, and whose memory and processing constraints are typically more severe than those of J2ME devices. Java Card technology is evolving. Accompanying both the technical evolution of smart card chips and the needs of application developers, smart cards are…Read more

JAVA Applet

Introduction to JAVA Applet Java applet is a small program transported over internet and delivered to user machine in the form of byte code is platform independent. To open java applet in browser your browser must support java for that browser has to obtain licenced from oracle. Unlike java application java applet has certain limitations like java applet cannot access data on computer this provides security that’s why applets are used in banking and other applications. They cannot be executed directly they have to be opened in java compatible web browser. Applets are…Read more

INTEX AQUA I-5 Review

Intex has recently arrived into the field of smart phones. Before this Intex company was making feature phones. It is currently offering around 12 smart phones in the market and it is planning to launch 20 more smart phones in the near future. The Intex Aqua i-5 is a new Android Smart phone in moderate price, with which the company promises to provide great results at an economy price. Design Aqua i-5 is a big screen Android phone with a very slimmer body as compared to other Smart phones in this range. This…Read more

Cryptography and Information Security

Introduction Cryptography is the concept of information security Cryptography is the practice and study of techniques for secure communication. The sender of an encrypted message shared the decoding technique also called as key needed to recover the encrypted information only with intended recipients, thereby avoiding unwanted persons to read information. Now days due to global acceptance of the internet every computer is connected to other so this has created many problems so cryptography plays very important role in information security. Cryptography is not new technique historical references were available of this technique date…Read more