Saturday, September 27, 2014

Importance of Digital Forensics

Digital Forensics branching out from forensic science is scientific advancement for unraveling hidden mysteries from a digital device. Digital era has playing it hard on law enforcements with producing considerable amount of crimes and misuse on digital technologies. Digital technologies are incorporated in all the kinds of domains that are existing. Some of those domains of considerations are


Figure 1 : Digital Forensic categories (Gilchrist, 2014)

Tendencies to break the rules is in nature of living organs and firewalls, honey pots, passwords, multi factor authentication and etc can be compromised within a matter of seconds due to high amount of resources, processing and also the common mistakes due to human error. Avoiding or identifying the source of attack or what gave up the system is considered under digital forensics. This post will focus on how a general process of uncovering the trails and origins of such a compromising in the systems should be laid off.

Quick and Fast Recovery for Business

Robbins (2011) has considered on eight primary elements to consider following a possible digital crime scenario. They are

  1. Protect the subject from further exploitation 
  2. Discover all files which are being compromised 
  3. Recover as much as possible 
  4. Reveal the files which are not there 
  5. Access all the content 
  6. Analyze all possibly relevant data for changes 
  7. Print out an overall analysis 
  8. Provide expert consultation and/or testimony 
These measurements can be taken when the considerations are on the side of the affected party to reestablish their businesses and processes which are depending on compromised technology. This will save the affected party from suffering a lengthy recovery time and avoid financial losses. The person who is involved in this process should also look at verify that there is no longer the threat existing in the system. In order to find the person or the group responsible the forensic personnel should also look into the aspects of forensic evidence collection.

Process of digital forensics

Along with the quick recovery of the system it is important to find the source of origin or the cause of the problem. To do so the forensic personnel mostly follow steps of their own. Here I would like to express on some general steps which are used by Gilchrist (2014) and Edecision4u.com (2014).



Figure 2 : Steps in digital forensics (Gilchrist, 2014)

Preparation and Identification

For a proper execution of collecting evidence the team has to prepare with a proper identification of what needs to be addressed and what is the problem. If it is related to hardware devices taking them into custody so that they can be kept secured avoiding unauthorized access to the devices.

Preservation and collection

There are certain information definitely left in the devices and also dispersed among several places which may provide evidence therefore clear identification of possible sources and getting the data collected and also preserving what are already there is the next step of concern.

As an example in a case of network penetration there may be evidence residing on ISP servers about the potential routes the attacker has gone through and also internal log records will also contain traces.

Processing, Review and Analysis

Following collection comes to the part where all those preparations come into action. Then the data is processed, Hardware are analyzed and the reports are reviewed in order to identify the possible violation of law. This will be performed with the motivation towards producing at a court of law.

Production and Presentation

Preparation of proof of investigation and preparations for taking further custodies on hardware till the court cases is over should be prepared. Also the presentation of evidences should planned and has to be material that can be accepted by the existing frame of law and regulations in the context of the country it is been produced.

Usage of Evidence

According to Robbins (2011) the major parties who are involved with putting these evidence into action are
  • Criminal Prosecutors use computer evidence in a variety of crimes where incriminating documents can be found: homicides, financial fraud, drug and embezzlement record-keeping, and child pornography.
  • Civil litigations can readily make use of personal and business records found on computer systems that bear on: fraud, divorce, discrimination, and harassment cases.
  • Insurance Companies may be able to mitigate costs by using discovered computer evidence of possible fraud in accident, arson, and workman's compensation cases.
  • Corporations often hire computer forensics specialists to ascertain evidence relating to: sexual harassment, embezzlement, theft or misappropriation of trade secrets and other internal/confidential information.
  • Law Enforcement Officials frequently require assistance in pre-search warrant preparations and post-seizure handling of the computer equipment. 
  • Individuals sometimes hire computer forensics specialists in support of possible claims of: wrongful termination, sexual harassment, or age discrimination.

Conclusion

As it is in all other activities even in the digital forensics field we find that there can be certain measures taken in a process. This keeps the digging process more focused and organized therefore the person who is responsible can focus on the whole scenario. Also this will keep the material produce as a result also to be kept in the standards that will enhance them with the ability to produce at any situation

Reference

  • Edecision4u.com, (2014). Network Packet Forensics analysis Training Course. [online] Available at: http://www.edecision4u.com/network-forensics/NPFAT/npfat.html [Accessed 27 Sep. 2014].
  • Gilchrist, M. (2014). Digital Forensics – A Branch of Forensic Science. [Blog] Technical Information - Everything You Need To Know. Available at: http://tech-solution-info.blogspot.com/2014/06/what-is-digital-forensics.html [Accessed 27 Sep. 2014].
  • Robbins, J. (2011). An Explanation of Computer Forensics. [Blog] homelandforensics. Available at: http://homelandforensics.com/forensics.htm [Accessed 27 Sep. 2014].


Wednesday, August 20, 2014

Wearable Personal Health Monitoring

Introduction

According to Bajarin in the world of tech, most successful products address serious needs that people have. This is very much the case behind the current movement to create all types of wearable devices designed to make people healthier [1]. Making health roving along with user, less focused concern and stylishly worn has claimed the industry of wearable health monitoring. ABI Research last year estimated that the market for wearable health-related devices--ranging from heart monitors to biosensors that read body temperature and motion--will reach more than 100 million device sales annually by 2016. The market for wearable sports and fitness-related monitoring devices is growing, too, projected to reach 80 million device sales by 2016 [2]. Primary concern of this article is to provide a brief introduction on some existing wearable health monitoring tools.

 

Smart Watches

Watches can be recognized as the most convenient wearable device that is more closer to people. Current technology has taken ordinary day to day used watch to become smart and ability to perform multiple tasks rather than simply displaying the time. Their capabilities of integrating with smart devices has diluted the problem of storage, connectivity and processing therefore smart watches are now ready to be a health monitor for you.
Fitness monitoring, Heartbeat monitoring, Step counting, Distance calculating, Calorie burn calculations are some of the functionalities that are undertaken by these devices. Samsung gear Fit, Google gem, LG G watch and etc can be found as current technology ready wearable health monitoring solutions which is out and will be reaching the market within 2014. Here is a review given by a user on the usage of Samsung gear fit and LG G watch device on how it is used and its functionalities.
Samsung Gear Fit Review [3]

 LG G Watch Review [4]

 

Wearable Patient Monitoring

When it comes to personal safety it is also primarily focused on getting who are not able under the eye of some person 24*7. In order to do so monitoring them remotely and keeping track of their healthiness is required to be a major concern. In such cases giving them something to wear and ability to get the feedback and their real time health status is crucial. Devices introduced by 9solutions can keep the track of patients and also provide automatic responses to changes of conditions by acknowledging the relevant parties who has a concern on the particular patient such as nurses, loved ones and etc.
Hospital patients often are tethered to various monitors, pumps, and medical gear. The IntelliVue MX40 from Philips Electronics tries to simplify some of that by putting Philips telemetry into a compact wearable patient monitor that can be used to monitor ambulatory patients and patients during transport [2]. This is a lightweight device which can monitor ECG, OXYGEN saturation and other vital signals from the patient with a simple push of a button.
Philips MX40 Product Video [5]

 

Wear them on body

Activity trackers which can be worn as bands and clip on to what you wear are the next piece of heterogeneous technological factor that is concerned. They are mainly focused just on providing personal health monitoring therefore they are concerned dedicated to health. As a part of this they can be worn as arm bands, clip on to your cloth wearing and wear them as a full kit to sync health status with your own self and other related peers who are connected with you.
Fitbit is another popular wearable activity tracker that, compared to Up, is slightly more favorable in the pricing department at $99. The small, lightweight device clips onto your clothing (and is meant to be worn somewhere on the torso) or fits into an elastic armband when sleeping [6]. Personal calorie usage and sleeping detection can be monitored using this device.
 Fitbit Force: Sleek, powerful, flexible fitness tracking [7]

Also along with this there are products introduced from BodyMedia that is also a technology which is capable of providing health related monitoring also the fabrics developed by BodyMedia is very flexible with providing health personal health related feedback.
Figure 1 : Body Media and Avery Deninson body motion monitoring patch.
Also there are some other wearables that can be used as wear them on body categories specially designed for health which is a long list and would like to keep them for the comments and to continue this particular discussion further.

 

Mobile Apps

Nowadays for almost everything there is a app. It seem like we can’t lose them out of concern. Even when it relates to personal health there are application developed by several developers. They vary from maternity, child care, first aid, exercise and health tips to even towards how to face certain surgeries type of applications which are taking on the market.
RunKeeper is a Android and iOS app is one of the strongest in the category of those that look to turn your smartphone into a personal trainer. RunKeeper is part motivator, part tracker and (long-term) part health graph [6].
 Run Keeper - Tracks you via GPS so you can keep track of your exercise [8].

Lift is a great-looking iPhone app that’s operating behind an ambitious goal: Improving human potential. The Obvious-incubated and now venture-backed startup wants to help you reach your goal, whether that’s getting in shape, living healthier, becoming more productive, or being more kind to animals or your mother in law [6].
Lift iPhone App Review [9]

 

Conclusion

Here in this article I have provided only a glimpse of wearable health monitoring techniques with some of their examples. It is a known fact that adapting to the technology the devices and methods definitely coincides with new and various varieties of technologies. Therefore the discussion thread is open to enhance my ideas and findings with your own set of findings and thoughts.

 

References

[1]. Where Wearable Health and Fitness Gadgets Are Headed - TIME. 2014. Where Wearable Health and Fitness Gadgets Are Headed - TIME. [ONLINE] Available at: http://time.com/2938202/health-fitness-gadgets/.
[2]. 10 Wearable Devices To Keep Patients Healthy - InformationWeek. 2014. 10 Wearable Devices To Keep Patients Healthy - InformationWeek. [ONLINE] Available at: http://www.informationweek.com/mobile/10-wearable-devices-to-keep-patients-healthy/d/d-id/1104359.
[3]. Samsung Gear Fit Review - YouTube. 2014. Samsung Gear Fit Review - YouTube. [ONLINE] Available at: http://www.youtube.com/watch?v=MytOhOYTyKc.
[4]. LG G Watch Review - YouTube. 2014. LG G Watch Review - YouTube. [ONLINE] Available at: http://www.youtube.com/watch?v=MK_RE5bjdcE.
[5]. Philips MX40 Product Video - YouTube. 2014. Philips MX40 Product Video - YouTube. [ONLINE] Available at: http://www.youtube.com/watch?v=6GY7099Tc2o.
[6]. The Ultimate Guide To The 50+ Hottest Health And Fitness Apps, Gadgets And Startups Of The Year | TechCrunch. 2014. The Ultimate Guide To The 50+ Hottest Health And Fitness Apps, Gadgets And Startups Of The Year | TechCrunch. [ONLINE] Available at: http://techcrunch.com/2013/01/02/best-health-apps/.
[7]. Fitbit Force: Sleek, powerful, flexible fitness tracking - YouTube. 2014. Fitbit Force: Sleek, powerful, flexible fitness tracking - YouTube. [ONLINE] Available at: http://www.youtube.com/watch?v=Nxb1UQPrS2Y.
[8]. Run Keeper - Tracks you via GPS so you can keep track of your exercise. - YouTube. 2014. Run Keeper - Tracks you via GPS so you can keep track of your exercise. - YouTube. [ONLINE] Available at: http://www.youtube.com/watch?v=2QE-h1IiI4g.
[9]. Lift iPhone App Review - YouTube. 2014. Lift iPhone App Review - YouTube. [ONLINE] Available at: http://www.youtube.com/watch?v=XjMMArrDcCw. [Accessed 18 August 2014].

Saturday, August 16, 2014

Neurogaming initiatives towards improving mental health

Neurogaming ?
Neurogaming is a method of getting mind and body to get together in order to perform non-invasive BCI to improve gaming experiences of the gamers. Evolution of this process has made a new controller interface for the gamers to interact with the gaming environment. Neurogaming can identify brain waves, heart rate, pupil dilation and emotions as inputs and the feedback mechanism provided by the user to the system. The main advantage of these kind of gaming is that it retains the users attention on the game and develops interactivity straight with user to provide realistic gaming experience. Also interactions with mind are captured using BCI interfaces.
When focusing on mental health kind of applications of neurogaming it can be developed towards improving attention of Attention Deficit Hyperactivity Disorder (ADD/ADHD) diagnosed patients. According to Zach Lynch managing director NeuroInsights  “NeuroGaming is not just about having brain control over games. It’s about having your entire nervous system connected to the gaming experience, bringing together all of your senses as drivers and outputs through a gaming system.” Proves us that this will drive the user for a total wellness of his body and mind control which will eventually result in improved mental health.

Neurogaming and mental health
When it is referred to mental health BCI related devices involved in neurogaming devices does a vital job in reading mental status of a particular person in the realtime gaming environment.

Attention Deficit Hyperactivity Disorder (ADD/ADHD)
is a psychiatric disorder of the neurodevelopmental type in which there are significant problems of attention, hyperactivity, or acting impulsively that are not appropriate for a person's age (wikipedia 2014). This may result in making a certain person to be neglected from the environment he stays on. ADHD management usually involves some combination of counseling, lifestyle changes, and medications. The neurogaming approaches has paved a way to interact directly with their mind and body in order to keep them focused on a particular activity at one time. Neurogaming applications and BCIs in future will may come up with separate applications which causes them to get their heads of the situation that they are currently. This is because the gaming environment can get feedback on whether the user is focused on the game or his mind is driving away from the situation.
As an additional resource I found an interesting video which talks about how to identify whether you have ADHD.

Figure 1: How to know If You Have ADHD


Bio/Neurofeedback for mental relaxation
Bio/Neurofeedback can be used as a method of identifying the capacity of mental relaxation of a gaming user. While changing the gaming experience the devices can get readings of user to evaluate the mental relaxation of a particular subject. These can be used to provide treatments on sleep problems, teeth grinding, insomnia, autism and chronic pain.

ph_grid7_5161_17425.gif
Figure 2 : Extraction of bio/neurofeedback


This shows that the outputs provided while using neurogaming by  diagnosed user can also be sent on to a therapists directly to provide with required medical attention and to come up with mental status readings. This provides the therapist to understand the real mental status of the subject.

Devices which may turn into mind reading neurogaming devices
The Devices that are below are in the state of emerging as giants in the application use of neurogaming devices which are to come in future. 
Google Glass

Figure 3 : Google Glass Games


Ocolus Rift

Figure 4 : Oculus rift + Omni gaming experience


References

Mini-Games for Glass - YouTube. 2014. Mini-Games for Glass - YouTube. [ONLINE] Available at: https://www.youtube.com/watch?feature=player_detailpage&v=9naxeHGIaRY. [Accessed 01 May 2014]
E-mental health: digital, mobile and tele tech for the brain! | Scoop.it . 2014. E-mental health: digital, mobile and tele tech for the brain! | Scoop.it . [ONLINE] Available at: http://www.scoop.it/t/e-mental-health-digital-mobile-and-tele-tech-for-the-brain. [Accessed 01 May 2014].
Will Neurogaming Speed Our Understanding of the Mind/Body Connection? | DrBonnie360. 2014. Will Neurogaming Speed Our Understanding of the Mind/Body Connection? | DrBonnie360. [ONLINE] Available at: http://drbonnie360.com/post/50661853357/will-neurogaming-speed-our-understanding-of-the. [Accessed 01 May 2014].
Google Glass now has games | Joystiq. 2014. Google Glass now has games | Joystiq. [ONLINE] Available at: http://www.joystiq.com/2014/02/02/google-glass-now-has-games/. [Accessed 01 May 2014].
Omni + Rift = True VR (TF2) - YouTube. 2014. Omni + Rift = True VR (TF2) - YouTube. [ONLINE] Available at: https://www.youtube.com/watch?feature=player_embedded&v=qpHWJMytx5I. [Accessed 01 May 2014].

Sunday, May 11, 2014

Biosignal detection using BCI

Years into the history people might not have never thought of reading a human mind or interacting with the brain of a species.  Initiatives which predates upto 1970s has come up with initiatives towards reading bio signals emitted from a person. This is termed as mind-machine interface (MMI), direct neural interface (DNI), synthetic telepathy interface (STI), brain machine interface (BMI) and Brain Computer Interaction (BCI).
Biosignal is a kind of signal which can be found from in any biological being. Biosignals can be referred to both electrical and non-electrical signals which are generated from specialised tissue, organ or a cell system in a nervous system. The main types of signals which are considered when detecting bio-electrical signals are
  • Electroencephalogram (EEG)
  • Electrocardiogram (ECG)
  • Electromyogram (EMG)
  • Mechanomyogram (MMG)
  • Electrooculography (EOG)
  • Galvanic skin response (GSR)
  • Magnetoencephalogram (MEG)
non-electrical signals that are capable of being detected are

  • mechanical signals ( mechanomyogram)
  • Acoustic signals
  • Chemical signals
  • Optic signals
Related to BCI approaches the main consideration from above signals are towards Electroencephalogram (EEG) and Magnetoencephalography (MEG).

 

EEG based BCI

Researchers and medical practitioners are concerned about providing non-invasive methods of implementing BCI devices and read the mind for enhanced solutions.  EEG has emerged as the mostly studied non-invasive method which also provides with ease of use, portability and low setup cost.
The main drawback of this approach is that it is more prone to disturbed with noise and also in-order to efficient results the users need to go through extensive training first.
The process of extracting, amplifying, classifying and getting feedback from EEG based BCI system is as below.

3112189_pone.0020674.g001.png

Figure 1 : EEG BCI process

EEG functioning devices

XWave headset

xwave_sport-3.jpg

Figure 2 : XWave headset

NeuroSky MindFlex

tb4.jpg
 Figure 3 : NeuroSky MindFlex

MyndPlay Headband

mynd-7.png
Figure 4 : MyndPlay

EEG Examples


Figure 5 : EEG artefacts during a range of different tasks


MEG based BCI

It is a functional neuroimaging technique is also a non-invasive method to map brain activities using magnetic fields produced by the brain electrical currents in brain. Magnetometers are the key players in this technology. Since brain’s magnetic field is considerably lower than in the general atmosphere it requires a magnetic shielding in order to perform magnetoencephalography.
Brain Imaging,  changes in blood flow, creating functional maps of human cortex, pinpointing sources in primary auditory, somatosensory, and motor areas are the main applications of MEG BCI in computing.

Application Use of MEG to identify the aging of human brain
 


 Figure 6 : MEG to identify aging of human brain
 
images
Figure 7 : VectorView

home011-940x360.jpg
Figure 8 : Brain Imagery generated with a MEG system

Referencess

Tuesday, April 22, 2014

Bank 3.0 to attract Customer 3.0

CUSTOMER 3.0
In the era of information has increased the ability to easily seek out competing services. The modern consumers are now more demanding of businesses than ever before. Customer 3.0 is a seeker for personalised services, innovative technologies and greater communications. Rather than being constrained to traditional demographic segmentations like age, gender, consumer type. Customer 3.0 falls to any modern internet user.

BANK 3.0
In his book bank 3.0 Brett King states that in the present context the banking has changed to a state where we can ask Why Banking Is No Longer Somewhere You Go But Something You Do ? This is the base concept of Bank 3.0. Which declares that banking facilities has been shrunken and brought into customers where they can work on the fly.



CUSTOMER 3.0 AND BANK 3.0
According to Marous, customer 3.0 begins their bank and credit union product shopping experience at their desk, in their car or on their couch, relying on friends and family reviews and published reviews across social media channels. Instead of walking into a local branch office and sitting down to open an account during banking hours, these customers purchase their banking services much like they purchase music, books or other products . . . online, 24/7.(Marous J. 2014) This shows that customer 3.0 expects banking to be something they does rather than being somewhere they go. This states the interrelationship among bank 3.0 and Customer 3.0.

IMPORTANCE OF CUSTOMER 3.0

https://www.youtube.com/watch?v=OMsRo9fdWAw

CUSTOMER 3.0 WITH e-BANKING and m-BANKING
Customers 3.0 carries a set of main attributes and they are listed down below with their individual relationship to e-banking and m-banking enablers of Bank 3.0.
  • Highly Informed - Unlike to the previous generations customer 3.0 has a characteristic which they try to leverage information available on internet. They are experiencing the functionalities of apps and comparison tools available on web to identify the trends, patterns and are able to compare services.
Bankers focusing on digital shopping and using analysis about the customers by monitoring their trends and patterns to keep them informed is a precise way of enabling e-banking to satisfy highly informed customer 3.0.
  • Price sensitive -  saving cost over buying or doing transactions is a major concern of customer 3.0. They search for methods on how to save money that’s the main reason.
m-Banking and e-Banking saves customers money and time they have to spend following banking activities and suggestions on investments options make bankers to reach them.
  • Socially Connected - digitally connected customers are also in touch with what other fellow people does. Therefore they look upon data shared between their peers before deciding on what to chose.
e-Banking by providing functions on identifying interests and connections between peers can bring up what they demand on time.
  • Trusting Of The Crowds - Customer 3.0 is not shy. They are very comfortable receiving and sharing reviews on social networks and within apps wherever possible. Recent research reinforces this trend with 14 percent of customers trusting advertisements while 78 percent trust peer recommendations.
Internet banking and mobile banking provides feedbacks on what crowds trend and what they demand and provide a robust path of connecting them together. Monitoring recommendation and review sites also should be a part of this kind of a job.
  • Self-Promotion - depending on the above facility customer 3.0 ultimately promotes themselves and their opinions on certain products and the ways of how they decided on them.
Bankers can groppel these self promotions to ultimately gather a huge collection of information to understand individuals and also extending to identify the society as well.
  • Demanding of Instant Gratification - They want to be able to open accounts, transact business, talk to customer service and view their financial position quickly, easily and in real time.
mainly mobile banking is a powerful enabler to provide them these kinds of services for the customer. camera functionality on a phone for mobile deposits, mobile billpay, mobile account opening and most recently, mobile balance transfer exemplifies the importance of instant gratification are the possible ways of taking over this function.
  • Security Unconscious - Customer 3.0 does not seem to be nearly as concerned about viruses, spam or phishing attacks, uploading and downloading more digital information than any other group.
Banks stiil has to think more and more on this aspect while providing quick and easy methods of e-banking and m-banking facilities.
Also along with these banks should think about the below mentioned ways of retaining the gained Customer 3.0
  • Redefining their business model
  • Engaging whenever, wherever Customer 3.0 desires
  • Changing the way products are created
  • Utilizing technology to gain greater insight into customer behaviors
  • Delivering innovative experiences
  • Rewarding loyalty

CONCLUSION
When we look on to these details it is obvious that we can come to a conclusion that the emergences of e-banking has paved a path towards taking banks towards Bank 3.0 and mobile banking has enhanced the capacity of Bank 3.0 to reach Customer 3.0 effectively and to retain them.


REFERENCES
 Wiley: Bank 3.0: Why Banking Is No Longer Somewhere You Go But Something You Do - Brett King . 2014. Wiley: Bank 3.0: Why Banking Is No Longer Somewhere You Go But Something You Do - Brett King . [ONLINE] Available at: http://as.wiley.com/WileyCDA/WileyTitle/productCd-1118589645.html. [Accessed 02 April 2014].

Marous J., Bank Marketing Strategy: Is Your Bank Ready For Customer 3.0. 2014. Bank Marketing Strategy: Is Your Bank Ready For Customer 3.0. [ONLINE] Available at: http://jimmarous.blogspot.com/2013/11/customer-30-how-banks-must-leverage-digital-mobile-media.html. [Accessed 02 April 2014].

m-banking what ? how ?

INTRODUCTION
According to wikipedia Mobile banking is a system that allows customers of a financial institution to conduct a number of financial transactions through a mobile device such as a mobile phone or personal digital assistant.
It has been evolved from the initiation of sms banking facilities provided to banks for clients. With the emergence of smart phones, WAP, 3G and 4GLTE technologies banks have reached their arms towards using  those technologies to empower and enhance the banking facilities and draw them closer to the client.

SERVICES PROVIDED
M-banking is conquering the banking facilities by providing mobilized, paced-up, easy and convenient banking services at the tips of the banking clients and it enhances the ability of banks to reach into customer and conquer their life styles and provide services at their door steps.
Some services they provide are




PROS AND CONS
Almost everything has its own pros and cons. Even highly sophisticated technologies may have their own pros and cons. Here is a review on Pros and Cons of m-banking which is a technology to perform finance related functions on a mobile device like a Smartphone or tablet. With the use of a mobile device, the user can perform mobile banking via call, text, website, or an app.

PROS
  • Convenience
Ability to use the banking services any time anywhere increases the amount of convenience a bank client can have and also the bank gets benefited from getting the ability to reduce the increasing cues in the branches or ATMs.
  • Mobilizing banking activities
In the traditional banking scenarios banking services was provided as a non-mobile service where the client has to go to client. M-banking has made the bank mobile and omnipresent within the clients.
  • Multitasking
Bank while you work is a major enabler which was generated out of m-banking do multiple functions at once using a mobile enables this aspect.
  • Enhanced Security
Mobile banking is said to be secure than internet or online banking methods that are currently in the picture.
  • Around the clock banking facilities
Either you are a busy person or a person who lives long way from the bank the bank is open 24 * 7 for the banking functionalities without any cues or counters.

CONS
  • Vulnerability to scams
m-banking users can be exposed to fake sms messages which may be spams or scams which will mislead them.
    * how to avoid :- M-banking users might be aware that such things like scams are there and be wise to respond only to mostly trusted messages and inquire the bank directly on their hotlines.
  • Loss of mobile devices
Losing a device which is been used by a m-banking service user may put the account in danger like losing pin number, loosing identity on mobile and loosing other sensitive information.
    * how to avoid :- Keeping the sensitive data on mobile backed up and use protection methods on keeping pin numbers and other details encrypted.
  • Excessive Charges
Certain m-banking sevice providers charge the users for the sevices they provide. If the users subscribe for features which they do not use that will be a waste.
    * how to avoid :- Understand and use only the services that is mostly usable for the user.

REFERENCES
Mobile banking - Wikipedia, the free encyclopedia. 2014. Mobile banking - Wikipedia, the free encyclopedia. [ONLINE] Available at: http://en.wikipedia.org/wiki/Mobile_banking. [Accessed 01 April 2014].

Advantages and Disadvantages of Mobile Banking | Mauco Internet Consultants. 2014. Advantages and Disadvantages of Mobile Banking | Mauco Internet Consultants. [ONLINE] Available at: http://mauconline.net/2013/03/07/advantages-and-disadvantages-of-mobile-banking/. [Accessed 01 April 2014].

Tuesday, February 18, 2014

Internship at Network Operating Center UCSC

During my third year second semester I was privileged to work as a Systems Administration intern. It was a time which I was exposed to work with new people with different skills and expertise.

Under the supervision of Dr. Ajantha Atukorale senior lecturer of UCSC and Mr. A. S. C. M. B. Attanayake IS manager UCSC I was directed through various tasks related to Networking and Systems administration.  

Below are the tasks which I was assigned during my internship period.
  • Task 1 -     finding a suitable Operational Solution for HP thin client PC’s which are currently abandoned from use.
  • Task 2 –     fujitsu server mounting and Installation with Mr. devana
  • Task 3 –     2nd Year Software Development Group Project Hosting Server Installation
  • Task 4 –     Install and Configure a Debian server with Gausian
  • Task 5 –     Research on how to deploy Openldap in a linux system.
  • Task 6 –     Install Zeroshell and Check for its browser compatibility.
  • Task 7 -    Library Media reference PC installation
  • Task 8 –     IEEE Extreme programming duty
  • Task 9 –     Ubuntu server 12.04 with Mooshak online examination  system for Computer Science Society Lanka
  • Task 10 –   Install a network monitoring tool in a server
  • Task 11 –   ICTER Conference technical support
  • Task 12 –   Develop and Academic Management System for Dr. Ajantha Atukorale
  • Task 13 –   Server room cable reordering and migrating VM servers into new hard disks
These Tasks evolved through technologies like
  • Monitoring Tools    - Cacti 0.8.8b, NagiOS Core, Observium
  • Operating Systems - CentOs 6.4, Debian 6.0, Esxi 5.5
  • Web Services         - Apache 2.2, MySql, PosgreSql, PHP 5, VSFTPD, Mooshak
  •  Other                    - Gausian, Vsphere, Aruba wifi controller, Hyperterminal
Click to view the final report
Final Presentation

Feasibility Study on Virtual Disk Space via Networked PCs

After some time of silence It is time for me to put up some work I did during my third year at university of Colombo School of Computing as and undergraduate of BICT.

First i would like to publish my feasibility study which I did as a prerequisite to get selected to the forth year.

It was a study on how to extract hard disk spaces from remotely and geographically separated PCs and make them useful for an Organization. This was focused on applying the results extracted in the computer laboratories of UCSC.


Download Virtual Disk Space viaNetworked PCs (NVDS) 

Learning Outcomes
  • Improved researching skills
  • Real world problem identification and solution finding
  • Research methods
  • Feasibility studying principles
  • Working with multiple supervisors