|
|
 |
By The Numbers |
Among 15,839 students, 11 disabled students secured above 90% in Class 12th, CBSE exams 2009.
|
|
|
 |
Exams alert |
Himachal Pradesh State Combined Management Aptitude Test (HPCMAT-2009)- 6th June, 2009, National Institute of Pharmaceutical Education and Research (NIPER-JEE- 2009) – 14th June, 2009, Board Of Technical Education, Rajasthan (RMAT – 2009) - June, 28, 2009. |
|
|
|
Thus Spake |
Try not to become a man of success. Rather become a man of value. |
|
|
|
|
|
 |
|
|
Interesting Facts |
|
|
|
|
|
The word "listen" contains the same letters as the word "silent".
The whip makes a cracking sound because its tip moves faster than the speed of sound.
The names of the three wise monkeys are: Mizaru (See no evil), Mikazaru (Hear no evil), and Mazaru (Say no evil).
Tablecloths were originally meant to be served as towels with which dinner guests could wipe their hands and faces after eating. |
|
|
|
|
|
|
Did you know |
|
|
|
Great minds think alike : When Johann Vaaler patented his paperclip in 1901, there already were similar designs by William Middlebrook and Cornelius Brosnan. Vaaler is credited with being the first to design a paperclip because of drawings he made as early as 1899.
Widest Bridge in the World: The Sydney Harbor Bridge, in the Australian city of Sydney, is a steel-arch bridge, built in 1932, has a total length of 3,770 feet and a span of 1,670 feet, making it one of the longest steel-arch bridges in the world. And the bridge is 160 feet wide, wider than any other long-span bridge on earth. The Sydney Harbor Bridge is wide enough for eight lanes of traffic, two railroad tracks, and a pathway for pedestrians and bicyclists.
|
|
|
|
|
|
|
|
Radio-frequency identification (RFID) |
|
|
|
Radio frequency identification (RFID) technology uses radio waves to automatically identify physical objects (either living beings or inanimate items). Therefore, the range of objects identifiable using RFID includes virtually everything on this planet (and beyond). Thus, RFID is an example of automatic identification (Auto-ID) technology by which a physical object can be identified automatically. Other examples of Auto-ID include bar code, biometric (for example, using fingerprint and retina scan), voice identification, and optical character recognition (OCR) systems.
There are generally two types of RFID tags: active RFID tags, which contain a battery and can transmit signals autonomously, and passive RFID tags, which have no battery and require an external source to provoke signal transmission. |
|
|
|
|
|
|
|
|
|
Smile Please..! |
Winning Nobel prize |
|
A man is driving down a country road, when he spots a farmer standing in the middle of a huge field of grass. He pulls the car over to the side of the road and notices that the farmer is just standing there, doing nothing, looking at nothing.
The man gets out of the car, walks all the way out to the farmer and asks him, "Ah excuse me mister, but what are you doing"?
The farmer replies, "I'm trying to win a Nobel Prize".
"How?" asks the man, puzzled.
"Well, I heard they give the Nobel Prize . . . to people who are out standing in their field".
|
---------------------------------------------- |
Remember a child
|
|
A young woman was walking through a supermarket to pick up a few things when she noticed an old man following her around. Thinking nothing of it, she ignored him and continued on. Finally she went to the checkout line, but he got in front of her.
"Pardon me," he said, "I'm sorry if my staring at you has made you feel uncomfortable. It's just that you look just like my daughter, who just died recently".
"I'm very sorry," replied the young woman, "is there anything I can do for you"?
"Yes," he said, "As I'm leaving, can you say 'Bye, Daddy!' ? It would make me feel so much better".
"Sure," answered the young woman.
As the old man was leaving, she called out, "Bye, Daddy"!
As she stepped up to the checkout counter, she saw that her total was $127.50.
"How can that be?" she asked, "I only purchased a few things"!
"Your daddy said that you would pay for his," said the clerk.
|
---------------------------------------------- |
Heaven playing sports
|
|
St. Peter and Satan were having an argument one day about baseball. Satan proposed a game to be played on neutral grounds between a select team from the heavenly host and his own hand-picked boys.
"Very well," said the gatekeeper of Heaven. "But you realize, I hope, that we've got all the good players and the best coaches".
"I know, and that's all right," Satan answered unperturbed. "We've got all the umpires".
|
|
|
|
|
|
|
|
|
|
From The Editors Desk |
|
Heartiest Greetings!
In this issue of Youniverse, we have presented an article on "Radio-frequency identification (RFID)", the article provides RFID technology works, Application of RFID & Application required, The benefits of RFID, Advantages of RFID & Conclusion.
Our regular section on Exam Alerts informs you of the important dates of the upcoming entrance examinations. The section on "Complex simplicities" provides an introduction to the concepts of Switched Port Analyzer (SPAN), Cold Fusion & Windows System Assessment Tool (Win SAT).
More >>
|
Complex Simplicities |
|
Switched Port Analyzer (SPAN)
|
|
Switched Port Analyzer sometimes called port mirroring or port monitoring, copies switch network traffic and forwards it out the SPAN port for analysis by a network analyzer. By enabling the SPAN, you can monitor traffic on a switch port by forwarding incoming and outgoing traffic to another port for data collection and analysis. You can use a network analyzer on this monitor port to troubleshoot network problems by examining traffic on other ports or segments without taking the network out of service.
The analyzer decodes the frames and provides you with an analysis of the frame contents, such as the packets and other higher-layer protocol information.
|
|
Cold Fusion |
|
Cold Fusion is an application server and software language used for Internet application development such as for dynamically-generated web sites. In this regard, Cold Fusion is a similar product to Microsoft Active Server Pages, Java Server Pages or PHP. Like other server-side scripting languages, Cold Fusion allows developers to create dynamic WebPages driven by database back-ends. One of the distinguishing features of Cold Fusion is its associated scripting language, Cold Fusion Markup Language (CFML), which compares to the scripting components of ASP, JSP, and PHP in purpose and features, but more closely resembles HTML in syntax. "Cold Fusion" is often used synonymously with "CFML", but there are additional CFML application servers besides Cold Fusion, |
|
Windows System Assessment Tool (Win SAT) |
|
The Windows System Assessment Tool is a module of Microsoft Windows Vista which measures various performance characteristics and capabilities of the hardware. It is running on and reports them as a Windows Experience Index (WEI) score, a number between 1.0 and 5.9 for Windows Vista and Windows Vista SP1 and between 1.0 and 7.9 for Windows 7 (build 7000). The WEI is due to increase its maximum score with future updates. The WEI includes five subscores: processor, memory, 2D graphics, 3D graphics, and disk; the basescore is equal to the lowest of the subscores. The WEI allows users to match their computer hardware performance with the performance requirements of software. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Interesting Facts |
|
|
|
|
|
|
The word "listen" contains the same letters as the word "silent". |
|
|
|
|
|
|
The whip makes a cracking sound because its tip moves faster than the speed of sound. |
|
|
|
|
|
|
The names of the three wise monkeys are: Mizaru (See no evil), Mikazaru (Hear no evil), and Mazaru (Say no evil). |
|
|
|
|
|
|
Tablecloths were originally meant to be served as towels with which dinner guests could wipe their hands and faces after eating. |
|
|
|
|
|
|
The first product to have a bar code was Wrigleys gum. |
|
|
|
The two-foot long bird called a Kea that lives in New Zealand likes to eat the strips of rubber around car windows. |
|
|
|
Hummingbirds can weigh less than a penny. |
|
|
|
The sentence "The quick brown fox jumps over a lazy dog" uses every letter of the alphabet. |
|
|
|
In the year 2000, Pope John Paul II was named an "Honorary Harlem Globetrotter". |
|
|
|
Honolulu is the only place in the United States that has a royal palace. |
|
|
|
Ernest Vincent Wright wrote a novel, "Gadsby", which contains over 50,000 words none of them with the letter E. |
|
|
|
The poison-arrow frog has enough poison to kill about 2,200 people. |
|
|
|
Thomas Edison once saved a boy from the path of an oncoming locomotive who was a station official's child. For his bravery, the boy's father taught Edison how to use the telegraph. |
|
|
|
In honor of the original thirteen states, the U.S. $1 bill has the following on the back: 13 steps on the pyramid; The motto above the pyramid has 13 letters (annuity coatis); E pluribus Unum, written on the ribbon in the eagle's beak, has 13 letters; 13 stars appear over the eagle's head. 13 stripes are on the shield. 13 war arrows are in the eagle's left talon. |
|
|
|
|
|
|
|
|
|
|
|
Did you know |
|
|
|
|
|
|
Great minds think alike: When Johann Vaaler patented his paperclip in 1901, there already were similar designs by William Middlebrook and Cornelius Brosnan. Vaaler is credited with being the first to design a paperclip because of drawings he made as early as 1899. |
|
|
|
|
|
|
|
Widest Bridge in the World: The Sydney Harbor Bridge, in the Australian city of Sydney, is a steel-arch bridge, built in 1932, has a total length of 3,770 feet and a span of 1,670 feet, making it one of the longest steel-arch bridges in the world. And the bridge is 160 feet wide, wider than any other long-span bridge on earth. The Sydney Harbor Bridge is wide enough for eight lanes of traffic, two railroad tracks, and a pathway for pedestrians and bicyclists. |
|
|
|
|
|
|
|
|
 |
World's Widest Waterfalls: Khone Falls, on the Mekong River in Laos, are no more than 70 feet high. So these falls can't compare in height with most of the world's well-known waterfalls. But Khone Falls are wider than any other waterfall on earth, 6.7 miles wide. The amount of water that flows over Khone Falls varies at different times of the year. During the summer when the snows melts in the Tibet region, the river rises and again during the heavy monsoon rains, the Mekong River rises. |
|
|
|
|
|
|
|
Bangkok has the longest place name in the World: The city we call Bangkok, the capital and largest city of Thailand is known as Krung Thep by the people who live there. Its official name is "Krung Thep Maha Nakhon". But this, too, is a shortening of an older name, which consists of those two words and 10 others. Some believe that "Bangkok" derived from either Bang Kok, kok being the Thai name for one or more olive-bearing fruits (olive in Thai is makok); or Bang Koh, koh meaning "island," a reference to the city's surrounding landscape. |
|
|
|
|
|
|
|
|
 |
Black Cats Lucky in Japan: In the United States and many other countries, a person would never wear white clothes to a funeral. Black is the color of mourning. But in Japan, black clothes would be out of place at a funeral, the Japanese color of mourning is white. Many Americans and Europeans think that black cats are unlucky. But black cats are considered lucky in Japan. There's a Japanese saying that black cats "keep the devil away". |
|
|
|
|
|
|
|
The Largest Volcanic Crater on Earth: Mount Aso is a 5,223-foot peak on the island of Kyushu, Japan. The mountain was once a volcano, but it's now a caldera, a crater formed when the cone of a volcanic mountain collapses. The caldera of Mount Aso is the largest volcanic crater on earth, measuring more than 17 miles across. Its total circumference is some 71 miles. This crater is so large that people live inside it. Three towns and 11 villages, home to thousands of people, are located within the huge volcanic crater. |
|
|
|
|
|
|
|
|
Radio-frequency identification (RFID) |
|
Radio frequency identification (RFID) technology uses radio waves to automatically identify physical objects (either living beings or inanimate items). Therefore, the range of objects identifiable using RFID includes virtually everything on this planet (and beyond). Thus, RFID is an example of automatic identification (Auto-ID) technology by which a physical object can be identified automatically. Other examples of Auto-ID include bar code, biometric (for example, using fingerprint and retina scan), voice identification, and optical character recognition (OCR) systems. |
|
There are generally two types of RFID tags: active RFID tags, which contain a battery and can transmit signals autonomously, and passive RFID tags, which have no battery and require an external source to provoke signal transmission. RFID is used in enterprise supply chain management to improve the efficiency of inventory tracking and management.
|
|
RFID frequency types include the following:
|
|
|
Low frequency (LF) |
|
|
High frequency (HF) |
|
|
Ultra high frequency (UHF) |
|
|
Microwave frequency |
|
|
RFID technology works |
|
A radio device called a tag is attached to the object that needs to be identified. Unique identification data about this tagged object is stored on this tag. When such a tagged object is presented in front of a suitable RFID reader, the tag transmits this data to the reader (via the reader antenna). The reader then reads the data and has the capability to forward it over suitable communication channels, such as a network or a serial connection, to a software application running on a computer. This application can then use this unique data to identify the object presented to the reader. It can then perform a variety of actions such as updating the location information of this object in the database, sending an alert to the floor personnel, or completely ignoring it (if a duplicate read, for example). RFID is also a data-collection technology. However, this technology has some unique characteristics that enable users to apply it in areas beyond the reach of traditional data-collection technologies, such as bar codes. |
|
Replacing barcodes |
|
RFID tags are often a replacement for UPC or EAN barcodes, having a number of important advantages over the older barcode technology. They may not ever completely replace barcodes, due in part to their higher cost and the advantage of multiple data sources on the same object. The new EPC, along with several other schemes, is widely available at reasonable cost. The storage of data associated with tracking items will require many terabytes. Filtering and categorizing RFID data is needed to create useful information. It is likely that goods will be tracked by the pallet using RFID tags and at package level with Universal Product Code (UPC) or EAN from unique barcodes. |
|
The unique identity is a mandatory requirement for RFID tags, despite special choice of the numbering scheme. RFID tag data capacity is large enough that each individual tag will have a unique code, while current bar codes are limited to a single type code for a particular product. The uniqueness of RFID tags means that a product may be tracked as it moves from location to location, finally ending up in the consumer’s hands. This may help to combat theft and other forms of product loss. The tracing of products is an important feature that gets well supported with RFID tags containing a unique identity of the tag and also the serial number of the object. This may help companies to cope with quality deficiencies and resulting recall campaigns, but also contributes to concern about tracking and profiling of consumers after the sale. |
|
It has also been proposed to use RFID for POS store checkout to replace the cashier with an automatic system which needs no barcode scanning. This is not likely without a significant reduction in the cost of tags and changes in the POS process. There is some research taking place, however, this is some years from reaching fruition. |
|
Application of RFID |
|
An RFID application is implemented by an RFID system, which constitutes the entire technology end-to-end. RFID can be used in a variety of applications such as: |
|
|
Access management |
|
|
Tracking of goods and RFID in retail & Tracking of persons and animals |
|
|
Toll collection and contactless payment & Machine readable travel documents |
|
|
Smart dust (for massively distributed sensor networks) |
|
|
Location-based services |
|
|
Tracking Sports memorabilia to verify authenticity |
|
|
Application requirements |
|
RFID is emerging as a complementary technology to help overcome some of the drawbacks associated with bar code technology. Barcodes have one significant downfall they require line-of-sight technology. That means the scanner has to see the barcode to read it, which usually means items have to be manually oriented toward the scanner for it to be read. Conversely, RFID does not require line-of-sight and can be read as long as the item is within range of the reader. |
|
RFID tags are simple, low-cost and disposable and are being used to identify animals, track goods logistically and replace printed bar codes at retailers. RFID tags include a chip that typically stores a static number (an ID) and an antenna that enables the chip to transmit the stored number to a reader via electromagnetic waves. When the tag comes within range of the appropriate RF reader, the tag is powered by the reader's RF field and transmits its ID to the reader. |
|
RFID middleware provides the interface for communication between the interrogator and existing company databases and information management systems. |
|
Security concerns |
|
One of the biggest objections to RFID is the lack of security. There is little to no security on the RFID tag or during communication with the reader. Any reader using the appropriate RF signal can get the RFID tag to communicate its contents. |
|
Typical RFID tags can be easily read from distances of several inches (centimetres) to several yards (meters) to allow easy tracking of goods. RFID tags have common characteristics, including: low cost, high volume manufacturing to minimize investment required in implementation and minimal security, with tags able to be read by any compatible reader. In addition, disposable or one-time use, minimal data storage comparable to bar code, usually a fixed format written once when the tag is manufactured and finally, read range optimized to increase speed and utility. |
|
Spy chips |
|
There is a still a suspicious view of RFID held by many in the industry, the thinking that RFID technology is a 'spy chip' technology. The term 'spy chip' is self- explanatory and the issue of lack of privacy rears its head. However, there are security measures being put in place to tackle the issue of privacy. Both EPC global and AIM Global, the trade association representing RFID manufacturers, have issued policy statements on RFID and privacy. AIM's policy states: "AIM Global believes that policies and procedures should be put into place to ensure consumer rights, for example, the right to know whether products contain RFID tags, the right to have RFID tags removed or deactivated when they purchase products, the right to opt out of RFID- enabled services, the right to access an RFID's tag's stored data and finally the right to know when, where and why the tags are being read". |
|
The benefits of RFID |
|
There are many areas that benefit from the use of RFID. The technology can be used in Document Tracking Applications as a way to improve the management of important document files in industries like insurance and legal where the loss of such files can cause severe problems. RFID improves the tracking of documents so that files can be more quickly located and legal document workflow more easily tracked. |
|
For sports events, concerts, and other leisure activities, RFID systems streamline ticket issue and validation. They also serve to minimize losses from ticket fraud. Tickets can be created on demand with RFID-enabled bar code printers; RFID card transponders can be issued to individual customers and enabled for specific time periods; and tickets can be read remotely to increase throughput at entrances and gates. |
|
A hands-free access system for ski lifts based on RFID is used at many ski resorts in Europe. This allows for improved customer service, more efficient operations, increased sales and higher throughput of customers. Remote-operated gates detect a valid ski pass, embedded with a Tag-it read/write transponder, and open automatically. The credit-card sized ski pass fits into a jacket pocket and never has to be removed, giving skiers the freedom to enjoy hassle free skiing. |
|
RFID in e-commerce |
|
RFID is now being considered as an integral link in e-commerce environments. The technology enhances and complements Electronic Data Interchanges (EDIs) to facilitate quick response and the generation of exception reports. This should allow real time information to be transmitted to partners within the supply chain supporting the decision-making process. Ultimately RFID could provide immediacy of data right down to individual item level identification. This can help bridge the gap between the customer, the order and order fulfillment process to the satisfaction of the customer. This means essentially that it can enable the enhanced responsiveness expected within an E-Business environment. |
|
RF communications |
|
The area of using RF for communication, including IRDA, Bluetooth and WiFi is expanding very rapidly too. The first breakthrough in wireless communication for personal area networks was the use of Infrared communications and the establishment of a universal standard, IrDA. IrDA is used for simple short-range (up to 1 meter) point-to-point transmissions; use is still especially strong in Japan but Bluetooth has really taken over in 2007 in Europe and the US, especially as many handheld computers no longer have IR ports installed. |
|
Bluetooth solutions are still relatively more expensive than IrDA, but there is an industry promise of a low cost of ownership, ease of use and a fully interoperable system. Wireless Personal Area Networks, connecting hand-held computers with a range of peripheral equipment with either IrDA or Bluetooth will dominate in mobile computing applications. Connectivity to Wireless LANs and WANS will mainly be handled by radios in the computer system. The ability to seamlessly switch from a WLAN running 802.11b to peer-to-peer WPAN using Bluetooth will be a defining requirement for the future. |
|
Advantages of RFID |
|
|
Greater control over inventory |
|
|
Increased security & Greater visibility of your facility |
|
|
Better time management of mobile personnel and resources |
|
|
Reduction in time spent on maintenance and record-keeping |
|
|
Better organization of assets and resources |
|
|
Reduction in paperwork & Delivers accurate and precise information |
|
|
Conclusion |
|
The use of RFID is also superior to Barcode in some important way. Bar code can be affected by rain, dirt and dust, while RFID tags are not subject to these problems. Library staff does not have to reprint and reaffix RFID tags as they would in the case of bar codes. In addition, the RFID streamlines workflow in area of self check, book drop, anti theft, inventory and others. The issues around privacy are now front and centre with most library associations and the major. Library associations have caused library RFID system providers to consider security as a central part of library implementations. Libraries looking at RFID can plan for success by ensuring that the system chosen is scaleable and has interoperability so that the system can go grow with the technology. The only major drawback is the ease with which the security aspect of the technology can be nullified. However, current electromagnetic systems also provide little in the way of prevention from determined thieves. The benefits of RFID technology cannot be ignored in todays tight staffing and funding climate. |
|
|
|
|
|
Switched Port Analyzer (SPAN) |
|
Switched Port Analyzer sometimes called port mirroring or port monitoring, copies switch network traffic and forwards it out the SPAN port for analysis by a network analyzer. By enabling the SPAN, you can monitor traffic on a switch port by forwarding incoming and outgoing traffic to another port for data collection and analysis. You can use a network analyzer on this monitor port to troubleshoot network problems by examining traffic on other ports or segments without taking the network out of service.
|
|
The analyzer decodes the frames and provides you with an analysis of the frame contents, such as the packets and other higher-layer protocol information.
|
|
The SPAN port mirrors traffic from one or more source interfaces on any VLAN, or from one or more VLANs to a destination port for analysis. The network analyzer attaches to the SPAN port and examines the traffic as it passes through the switch. The network analyzer enables you to dig into the details of your network traffic. For SPAN configuration, the source interfaces and the destination interface must be on the same switch. |
|
SPAN does not affect the switching of network traffic on source interfaces; copies of the frames received or transmitted by the source interfaces are sent to the destination interface. |
|
|
|
|
|
|
Cold Fusion |
|
Cold Fusion is an application server and software language used for Internet application development such as for dynamically-generated web sites. In this regard, Cold Fusion is a similar product to Microsoft Active Server Pages, Java Server Pages or PHP. Like other server-side scripting languages, Cold Fusion allows developers to create dynamic WebPages driven by database back-ends. One of the distinguishing features of Cold Fusion is its associated scripting language, Cold Fusion Markup Language (CFML), which compares to the scripting components of ASP, JSP, and PHP in purpose and features, but more closely resembles HTML in syntax. "Cold Fusion" is often used synonymously with "CFML", but there are additional CFML application servers besides Cold Fusion, and Cold Fusion supports programming languages other than CFML, such as server-side Action script and embedded scripts that can be written in a JavaScript-like language known as CFScript. Cold Fusion is most often used for data-driven web sites or intranets, but can also be used to generate remote services such as SOAP web services or Flash remoting. It is especially well-suited as the server-side technology to the client-side Flex. Cold Fusion can also handle asynchronous events such as SMS and instant messaging via its gateway interface, available in Cold Fusion MX 7 Enterprise Edition. |
|
Cold Fusion provides a number of additional features out of the box. Among them: |
|
|
Client and server cache management |
|
|
Client-side code generation, especially for form widgets and validation |
|
|
Conversion from HTML to PDF and Flash Paper |
|
|
File indexing and searching service based on Verity K2 |
|
|
GUI administration, Server, application, client, session, and request scopes |
|
|
XML parsing, querying (XPath), validation and transformation (XSLT) |
|
|
Server clustering, Task scheduling & Graphing and reporting |
|
|
|
|
|
|
|
|
Windows System Assessment Tool (Win SAT) |
|
The Windows System Assessment Tool is a module of Microsoft Windows Vista which measures various performance characteristics and capabilities of the hardware. It is running on and reports them as a Windows Experience Index (WEI) score, a number between 1.0 and 5.9 for Windows Vista and Windows Vista SP1 and between 1.0 and 7.9 for Windows 7 (build 7000). The WEI is due to increase its maximum score with future updates. The WEI includes five subscores: processor, memory, 2D graphics, 3D graphics, and disk; the basescore is equal to the lowest of the subscores. The WEI allows users to match their computer hardware performance with the performance requirements of software. For example, the aero graphical user interface recommends a WEI score of 3 or higher for satisfactory use of the "Aero Glass" feature. The WEI can also be used to show which part of a system will provide the greatest increase in performance when upgraded. For example a computer with the lowest subscore being its memory, would benefit more from a RAM increase than adding a faster hard drive (or any other component). |
|
Microsoft intends that software publishers list WEI scores to specify hardware requirements instead of specific technical parameters (such as "256MB of RAM or more"). Microsoft also intends that hardware manufacturers publish the WEI scores of their computers. However, very few software or hardware vendors have done so to date. The WEI is also available to applications through an API, so they can configure themselves as a function of hardware performance, taking advantage of its capabilities without becoming unacceptably slow. |
|
The current version of Windows Vista (Build 6001) version of WinSAT performs the following tests: |
|
|
Aero Assessment |
|
|
Direct3D Alpha Blending Assessment & Direct3D Texture Load Assessment |
|
|
Direct3D ALU Assessment |
|
|
Windows Media Playback |
|
|
CPU Performance, Memory Performance & Disk Performance |
|
|
While running, the tests show only a progress bar and a "working" background animation. Aero Glass is deactivated while the tests are running so that it will not confound the measurements. |
|
|
|
|
|
|
|
|
From The Editors Desk |
|
|
Kayalvizhi |
Email - kayal@mindlogicx.com |
|
Heartiest Greetings! |
|
|
In this issue of Youniverse, we have presented an article on "Radio-frequency identification (RFID)", the article provides RFID technology works, Application of RFID & Application required, The benefits of RFID, Advantages of RFID & Conclusion.
Our regular section on Exam Alerts informs you of the important dates of the upcoming entrance examinations. The section on "Complex simplicities" provides an introduction to the concepts of Switched Port Analyzer (SPAN), Cold Fusion & Windows System Assessment Tool (Win SAT).
We hope that you find the information presented in this issue of Youniverse interesting and useful. |
We welcome your thoughts, views, comments and suggestions to share information as knowledge. |
|
Editor |
|
|
|
|
Feedback |
|
|
 |
Please provide us with your feedback on how you feel about the Youniverse newsletter.You can also send us your queries on the VEDAS services. |
top |
|
|
Email to info@vedaslive.com |
|
|
|
|
|
|
|