Saturday 28 March 2015

Company name are doesn't matter each and every Smart Device are going to communicate in IoT..!!!

'The Internet Of Things'

The “Internet of things” (IoT) is becoming an increasingly growing topic of conversation both in the workplace and outside of it (?!). It’s a concept that not only has the potential to impact how we live but also how we work.  But what exactly is the “Internet of things” and what impact is it going to have on you if any?  There are a lot of complexities around the “Internet of things” but I want to stick to the basics.  Lots of technical and policy related conversations are being had but many people are still just trying to grasp the foundation of what the heck these conversations are about.

Broadband Internet is become more widely available, the cost of connecting is decreasing, more devices are being created with wifi capabilities and censors built into them, technology costs are going down, and smart phone penetration is sky-rocketing.  All of these things are creating a “perfect storm” for the IoT.
Simply put this is the concept of basically connecting any device with an on and off switch to the Internet (and/or to each other). This includes everything from cell phones, coffee makers, washing machines, headphones, lamps, wearable devices and almost anything else you can think of.  This also applies to components of machines, for example a jet engine of an airplane or the drill of an oil rig.  As I mentioned, if it has an on and off switch then chances are it can be a part of the IoT.  The analyst firm Gartner says that by 2020 there will be over 26 billion connected devices…that’s a lot of connections (some even estimate this number to be much higher, over 100 billion).  The IoT is a giant network of connected “things” (which also includes people).  The relationship will be between people-people, people-things, and things-things.


The new rule for the future is going to be, “anything that can be connected, will be connected.”  But why on earth would you want so many connected devices talking to each other?  There are many examples for what this might look like or what the potential value might be.  Say for example you are on your way to a meeting, your car could have access to your calendar and already know the best route to take, if the traffic is heavy your car might send a text to the other party notifying them that you will be late.  What if your alarm clock wakes up you at 6 am and then notifies your coffee maker to start brewing coffee for you? What if your office equipment knew when it was running low on supplies and automatically re-ordered more?  What if the wearable device you used in the workplace could tell you when and where you were most active and productive and shared that information with other devices that you used while working?
On a broader scale the IoT can be applied to things like transportation networks “smart cities” which can help us reduce waste and improve efficiency for things such as energy use; this helping us understand and improve how we work and live.  Take a look at the visual below to see what something like that can look like.
The reality is that the IoT allows for virtually endless opportunities and connections to take place, many of which we can’t even think of or fully understand the impact of today.  It’s not hard to see how and why the IoT is such a hot topic today, it certainly opens the door to a lot of opportunities but also to many challenges.  Security is big issues that is oftentimes brought up.  With billions of devices being connect together what can people to do make sure that their information stays secure?  Will someone be able to hack into your toaster and thereby get access to your entire network?  The IoT also opens up companies all over the world to more security threats.  Then we have the issue of privacy and data sharing.  This is a hot button topic even today so one can only imagine how the conversation and concerns will escalate when we are talking about many billions of devices being connected.  Another issue that many companies specifically are going to be faced with is around the massive amounts data that all of these devices are going to produce.  Companies need to figure out a way to store, track, analyze, and make sense of the vast amounts of data that will be generated.

Conversations about the IoT are (and have been for several years) taking place all over the world as we seek to understand how this will impact our lives.  We are also trying to understand what the many opportunities and challenges are going to be as more and more devices start to join the IoT.  For now the best thing that we can do is educate ourselves about what the IoT is and the potential impacts that can be seen on how we work and live.




If u want more like this or about any other topic post ur e-mail id and ur opinion topic name on command.To get update like and follow our page on Google + and FB Also see bit.do/mnb bit.do/sob bit.do/sbb


To get more feed follow US on Google Pulse and Facebook


திருக்குறள்/ Thirukkural : எழுதியது/ wrote by: திருவள்ளுவர்/Thiruvalluvar
குறள் பால்/Section/Paalஅறத்துப்பால்/Virtue/Araththuppaal 1.
குறள் இயல்/ChapterGroup/Iyalபாயிரவியல்/Prologue/Paayiraviyal 1.
அதிகாரம்/ Chapter/Adhigaramவான்சிறப்பு/The Blessing of Rain/Vaansirappu 2.
குறள் வரிசை/Number2

துப்பார்க்குத் துப்பாய துப்பாக்கித் துப்பார்க்குத்
துப்பாய தூஉம் மழை.

ஒலிபெயர்ப்பு/Transliteration
Thuppaarkkuth Thuppaaya Thuppaakkith Thuppaarkkuth
Thuppaaya Thooum Mazhai 

உரை(விளக்கம்)/ Explanationமு.வரததாசனார்
உண்பவர்க்குத் தக்க உணவுப் பொருள்களை விளைவித்துத் தருவதோடு, பருகுவோர்க்குத் தானும் ஓர் உணவாக இருப்பது மழையாகும்.

Rain produces good food, and is itself food 

thirukkural.com மூலம் குறிப்பிடப்படுகிறது/Referred by:
gokulnath.com/thirukurals மூலம் குறிப்பிடப்படுகிறது/Referred by:

Saturday 14 March 2015

What's Your Password. Here Most Common Passwords Numbers

The Most Common Numbers in 10 Million Passwords


The primary purpose of a password is to serve as an unique verification identifier for a given user. Ideally, the password for a given website or service should be both random and unique; if the letters and/or numbers in the password follow any patterns, then they might be easier to guess by an intruder. For example, someone may put their birth year such as "1987" or "1988" in their password, which makes the passwords easier to remember, but consequently easier to break.

A few weeks ago, security researcher Mark Burnett released a list of 10 million passwords compiled from various sources over the years. Reddit user jalgroy posted a histogram of the years used in these passwords, which I've verified using my own scripts:

There is a clear maximum at 1987 which implies a current age of about 28. This makes sense, as internet users in their 20's are generally considered to be very attuned to internet usage. The spike at 2000 is likely not because it's a birth year, but because 2000 is a kewl number.


There are actually many similar patterns for numbers in passwords, which involve surprising yet intuitive logic.

Digit Behavior

The distribution of the number of digits in passwords varies significantly.


42% of passwords have zero numerical digits, which implies that 58% of passwords have atleast one digit. However, the local maxima in number of digits in a password all occur at even numbers of digits, which may imply that humans have an easier time of remembering even amounts of numbers.

If you look at a typical keyboard, you'll note that the default sequence of numbers is 1234567890. If the user wants a number in their password that is easy to type, drawing from this sequence of numbers might be a good idea.

Note that the length of the sequence is uncorrelated with the number of occurrences of the sequence. Many more people use 123 in a password than just 12, even though it's longer. 123, as a triplet of numbers, may be easier to remember by the average person than a pair of numbers. However, that contradicts the logic above that even numbers may be easier to remember, which suggest that another factor may be involved.

Sequences of numbers are popular, but are some sequences of numbers more popular than others? Let's look at the order and composition of 1-digit, 2-digit, and 3-digit numbers in these 10 million passwords.

More on Digit Patterns

Note: all number patterns are distinct number patterns, e.g. 2-digit numbers analyzed are not subsets of 3-digit or larger numbers.

Take a look at the most used single-digit numbers:


1 is by far the most-used single-digit number, which may be due to the fact that it is the left-most number on the keyboard and therefore an easy press for services that force the inclusion of a digit in the password. Relatedly, 9 and 0 are the least-used single-digit numbers. That's intuitive enough. But does that hold for more complex patterns?

Let's look at the most-used 2-digit patterns, including numbers with 0 as a leading digit:


12 and 11, a sequential pattern and a repeating pattern respectively, are by far the most-used 2-digit numbers. Many repeating patterns such as 22 and 99 are prominent. But why is 69 in third place? (besides the obvious non-family-friendly reason)

It may be helpful to look at a heat map of all possible 2-digit numbers to see if there are any observable patterns.


There are a couple distinct patterns: numbers beginning with a 1 or 2 are used the most frequently, and both repeating and sequential digits are used the most frequently.

Almost all 2-digit numbers outside of those patterns are unused (the exception is 69, of course) The intersection of both of these patterns is at 11/12, which is the reason both have high usage.

Do 3-digit numbers follow similar patterns? Here's a list of the most-used 3-digit numbers in passwords:


Yes and no. Here, there appear to be more instances of special numbers, such as 321 and 007 which deviate from the patterns above. Of note, 3-digit numbers ending in 00 appears as a new pattern.

This can be confirmed by looking at a faceted heat map for each possible combination.


By far the most popular pattern for a 3-digit number is a repetition pattern, followed by a sequential pattern (the sequential pattern is always located one tile up and two tiles right from the repetition pattern). There are very few outliers which deviate from this schema aside from the ones mentioned previously. (420 is not as significant of an outlier for 3-digit numbers as 69 is for 2-digit numbers)

The patterns of numbers in passwords can offer some insight to human psychology. However, if possible, I recommend you avoid using such patterns in your passwords since it introduces a vulnerability. It's a good idea to use a password manager instead, such as 1Password or KeePass, which offer advantages including the generation of both truly random and unique passwords.


To get more feed follow US on Google Pulse and Facebook


திருக்குறள்/ Thirukkural : எழுதியது/ wrote by: திருவள்ளுவர்/Thiruvalluvar
குறள் பால்/Section/Paal: அறத்துப்பால்/Virtue/Araththuppaal 1.
குறள் இயல்/ChapterGroup/Iyal: பாயிரவியல்/Prologue/Paayiraviyal 1.
அதிகாரம்/ Chapter/Adhigaram: கடவுள் வாழ்த்து/The Praise of God/Katavul Vaazhththu 1.
குறள் வரிசை/Number: 8

கோளில் பொறியின் குணமிலவே எண்குணத்தான்
தாளை வணங்காத் தலை.


ஒலிபெயர்ப்பு/Transliteration
Kolil Poriyin Kunamilave Enkunaththaan
Thaalai Vanangaath Thalai

உரை(விளக்கம்)/ Explanation:சாலமன் பாப்பையா

எண்ணும் நல்ல குணங்களுக்கு எல்லாம் இருப்பிடமான கடவுளின் திருவடிகளை வணங்காத தலைகள், புலன்கள் இல்லாத பொறிகள்போல, இருந்தும் பயன் இல்லாதவையே.

Before His foot, 'the Eight-fold Excellence,' with unbent head,
Who stands, like palsied sense, is to all living functions dead

thirukkural.com மூலம் குறிப்பிடப்படுகிறது/Referred by

gokulnath.com/thirukurals மூலம் குறிப்பிடப்படுகிறது/Referred by

If u want more like this or about any other topic post ur e-mail id and ur opinion topic name on command.To get update like and follow our page on Google + and FB Also see bit.do/mnb bit.do/sob bit.do/sbb

Referred by click here: