Skip to main content

Privacy

This blog does not share personal information with third parties nor do we store any information about your visit to this blog other than to analyze and optimize your content and reading experience through the use of cookies.

You can turn off the use of cookies at anytime by changing your specific browser settings.

We are not responsible for republished content from this blog on other blogs or websites without our permission.

This privacy policy is subject to change without notice and was last updated on May,15 2020. If you have any questions feel free to contact me directly here: bitdeployca@gmail.com.

Comments

Popular posts from this blog

Emotional and Psychological Trauma

What is Emotional and psychological trauma ? Emotional and psychological trauma is any stressful event that occurs in a lifetime that makes you struggle with your emotions, memory,different activities and make you feel helpless and hopeless in this ruthless world. The event may not be objectively scaled it is a subjective sensation about a event and every individual respond differently to the event . For example a death in a family due to accident due to an pothole makes one dad react positively and he goes on to correct every pothole of the city and some other may react it negatively Emotional and psychological trauma can be caused by: In Indian scenarios emotional and psychological trauma can be caused by accident,disasters, sexual assault that may have occurred at any course of life Ongoing family issues, neighbourhood problems , continues rejection from various interviews , household violence , neglect, low performance at school or institution, contin...

What is Public key Infrastructure(PKI)?

Wiki Page Definition      A public key infrastructure ( PKI ) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, internet banking and confidential email. It is required for activities where simple passwords are an inadequate authentication method and more rigorous proof is required to confirm the identity of the parties involved in the communication and to validate the information being transferred. Ref: https://en.wikipedia.org/wiki/Public_key_infrastructure Major Keywords Definitions Certificate Authorities Certificate Authority also acronym as "CA" is trusted third party which authorize the identities of websites, web server, Individual Software and other entities. They Issue Digital Certificate whic...

IMPULSE CAPTURE CAMERA Overview Part-1

  Objective The Android camera platform designed in this project can turn its direction Manually using Button. If a person claps hands, then it will Detect and Impulse and capture the Moment this Device will capture multiple photos if more than one claps detected. It will not only detect clap sound it can detect any kind of noise and starts capturing the photos. The system which we have detected can distinguish between n oise and impulse sound.    Motivation When we travel alone, it can be inconvenient to take pictures with yourself in it. Often, we have to hold the camera with our hands and capture a close photo with barely background. In a better case, we still need to pre - set a short timer, which requires us rushes back from the camera. Therefore, we came up with platform that uses microphones to detect clap direction and ATmega 32 microcontroller with servo motor to control the camera and earpod t o shutter. This design makes selfie much more easier and convenient ...