Technology

Fidget Spinner : What They Are, How They Work and Why the Controversy

fidget spinner A fidget spinner is a toy that is marketed as relieving stress. … The toy has been advertised as helping people who have trouble with focusing or fidgeting (such as those with ADHD, autism, or anxiety) by acting as a release mechanism for nervous energy or psychological stress. This season’s hottest toy is…

light-based wireless technology (li-fi) | How it works?
Technology

light-based wireless technology (li-fi) | How it works?

light-based wireless technology (li-fi) will be the future of our world. In this post, I will tell you in detail about Light-Based Wireless Technology (Li-Fi) light-based wireless technology (li-fi) Li-Fi is a bidirectional, high-speed and fully networked wireless communication technology similar to Wi-Fi. The term was coined by Harald Haas[1] and is a form of visible…

Airtel Rolls Out Aggressive Plans To Take On Jio Prime
Technology

Airtel Rolls Out Aggressive Plans To Take On Jio Prime

Airtel Rolls Out Aggressive Plans To Take On Jio Prime So guys as you all know Jio is now becoming biggest communication company in India. Airtel Rolls Out Aggressive Plans To Take On Jio read below article to know more in detail about it. Airtel offers free voice calling across India to compete with Reliance Jio…

DIGITAL Reliance Jio: The Good, Bad and Ugly of Mukesh Ambani’s Proposed Digital Empire
Technology

DIGITAL Reliance Jio: The Good, Bad and Ugly of Mukesh Ambani’s Proposed Digital Empire

DIGITAL Reliance Jio: The Good, Bad and Ugly of Mukesh Ambani’s Proposed Digital Empire “As Mukesh Ambani company Reliance Jio Steve Jobs and looks to shake-up Internet connectivity, the bloodbath that will follow needs to be monitored to ensure that the industry is competitiveness and viability remains intact.” ABSTRACT In July 2016, Reliance Jio Infocomm…

Ethical Hacking Introduction
Technology

Ethical Hacking Introduction

Ethical Hacking Introduction Ethical Hacking Introduction : “It is an Art and science of determining the vulnerabilities of your information infrastructure to better defend them”.It is performed by high skilled ethical security professionals.is that:“It is an Art and science of determining the vulnerabilities of your information infrastructure to better defend them”.It is performed by high…