Friday, November 26, 2010

Top 10 Technology Terms to Know for 2009 (1)

4G

·         4G, which is short for fourth generation, is an ITU specification that is currently being developed for broadband mobile capabilities.
·         4G technologies would enable IP-based voice, data and streaming multimedia at higher speeds, compared to 3G.
·         This IP-based and packet-switched evolution of 3G technologies (such as WCDMA, HSDPA, CDMA2000 and EVDO) that uses voice communications.
·         A number of technologies considered to be 4G standards include Long Term Evolution (LTE), Ultra Mobile Broadband (UMB) and the IEEE 802.16 (WiMAX) standard.
·         Three major operators in the Indian subcontinent have already begun WiMAX 16e rollouts – Tata Communications and Bharat Sanchar Nigam Ltd. (BSNL), the incumbent, in India, and Wateen Telecom in Pakistan.

Android

·         Android (also called the Android Platform), was officially unveiled in November of 2007, but it really hit the news in the latter half of 2008 as the first "Android Phone" debuted in September 2008.
·         Android is an Open Handset Alliance Project based on the Linux kernel, but the platform itself was originally developed by Google (dubbed Google's Android by the media).
·         This open and free software stack includes an operating system, middleware and also key applications for use on mobile devices, including smart phones.

Clickjacking

·         The Internet just wouldn't be the Internet without malicious vulnerabilities. While Trojans and malware are rampant, a new type of malicious code made its entry this year — and unfortunately it is only going to be more common and infect more Internet users in 2009.
·         Clickjacking (also called Clickjacking or Clickjack attack), is a vulnerability that is used by an attacker to "collect" an infected user's clicks.
·         The attacker can force the user to do all sort of things from adjusting the user's computer settings to unwittingly sending the user to Web sites that might have malicious code.

No comments:

Post a Comment