Popular Posts

Wednesday, February 16, 2011

by me gaurav

                                                                     some of the topics lolz
1. 3 - Dimensional Printing 
2. Case Based Reasoning 
3. Storage Virtualization 
4. Wingate Vpn 
5. Thin Client 
6. Location Aware Computing 
7. Ldap ( Lightweight Directory Access Protocol ) 
8. Ubiquitous Computing 
9. Gps 
10. Honeypots & Honeynet 
11. Data Mining 
12. Virtual Linux 
13. Virtual Lan 
14. Rfid 
15. Wireless Security 
16. Virtual Private Lan Service 
17. Web Intelligence 
18. Jiro - The Java Based Technology 
19. Nano Technology 
20. Data Warehousing 
21. Kerberos 
22. Voip Over Wlan 
23. Process Migration 
24. Snake Robot 
25. Wusb ( Wireless Universal Serial Bus ) 
26. Speaker Recognition
27. Deep Blue
28. Intrusion Prevention System 
29. Wireless Mesh Networks 
30. Genetic Programming 
31. Dos ( Denial Of Services ) 
32. Sprite Os 
33. Peer-To-Peer Architecture Using Autonomous Agent 
34. Quantum Computers 
35. Public Key Infrastructure 
36. Mobi Desk 
37. Soft Computing 
38. Mobile Adhoc Network 
39. Embedded Technology 
40. The Network Ram Disk 
41. Human Computer Interaction 
42. Edge 
43. Dns Security 
44. 3 Gp 
45. 4 G ( Forth Generation ) 
46. Optical Computing 
47. Cyborgs 
48. Web Mining 
49. Audio Fingerprinting 
50. Winfs 
51. Wireless Application Protocol 
52. Inference Engine For Semantic Web 
53. Virtual Network Computing 
54. Embedded Internetworking 
55. Amoeba : Distributed Operating System 
56. Blackboard Technology 
57. Introduction To Ajax 
58. Text Mining 
59. Dna Computer 
60. Ss7 ( Singaling System 7 ) 
61. Expansion Bus 
62. Digital Object Identifier 
63. Blu-Ray Disk 
64. Video Fingerprinting And Encryption Principles For Drm 
65. Wireless Lan 
66. Mobile Agents
67. Ibutton 
68. Free Space Optics
69. Ddos 
70. 3d Graphics Apis 
71. Embedded Systems 
72. Rtos 
73. Ospf 
74. Tcp-Ip Puzzling 
75. Smart Dust 
76. Bio-Metrics 
77. J2ee 
78. M-Ram 
79. Rfid 
80. Spam 
81. Java Card 
82. Speech Processing 
83. Cdma-2000 1x Evdo Technology 
84. Distributed Operating Systems 
85. Wireless Application Protocol 
86. Virtual Machine 
87. Software Agents 
88. Java Cryptography 
89. Grid Computing 
90. Vpn 
91. Wimax
92. Virtual Reality Paradigm 
93. Quantum Computing And Its Application In Cryptography 
94. Wireless Atm 
95. J2me 
96. Personal Digital Assistant 
97. Session Identification Protocol
98. Virtual Keyboard 
99. Ai And Neno Technology Solution 
100. Cable Modem 
101. Digital Watermarking 
102. Wireless Network Security 
103. Gigabit Networking 
104. Intrusion Detection System 
105. Data Compression 
106. Data Backup And Recovery 
107. Windows Dna 
108. Virus And Anti-Virus 
109. D-Programming Language 
110. Olap 
111. Secure Communication Protocol 
112. Amoeba System 
113. Protein Memory 
114. Sysmbain Os 
115. Mobile Ipv6 
116. Blue-Eyes 
117. Ipng 
118. Cidr 
119. Gsm 
120. Server Clustering 
121. Windows Longhon 
122. Lottery Scheduling 
123. Corba 
124. Ejb Corba 
125. Virtual Lan 
126. Multi Agent Systems 
127. 64 Bit Computing
128. Virus - Antivirus : Race Not COmpleted
129. Holographic Memory
130. Wireless Fidelity
131. Asynchronous Transfer Mode (ATM)
132. Flash Memory
133. Smart Dust
134. Call Center
135. Smart Networking
136. Global Access File System
137. C# (C Sharp)
138. Direct Access File System
139. Computer Busses
140. Virtual Network Computing 
141. Biometric Identification & Authentication 
142. Gmlts
143. Data Minning 
144. Gigabit Ethernet 
145. Spam
146. Syncml
147. Dsl Modem
148. Dna Computer
149. Win (Wireless Intelligence Network)
150. Steganography
151. General Packet Radio System 
152. Advance Database
153. Cluster Validation For Compact Rule Extraction From Trained Neural N/W
154. Data Warehousing
155. Mpls (Multi Protocol Label Switching)
156. Mobile Ip
157. E-Learning
158. Network Address Translation
159. Project Jxta
160. Imode Wireless
161. Natural Language Processing
162. Kerberos
163. Mobile Computing
164. Erp (Enterprise Resource Planning)
165. Speech Application Language Technology
166. Active Server Pages
167. Jini
168. Fram
169. Java 2 Micro Edition
170. Network Ram
171. Morphine
172. Network Intrusion Detection System
173. Quantum Cryptography
174. Wml (Wireless Markup Language)
175. Virus On Mobile
176. Advance Peer To Peer Network
177. Ospf (Open Shortest Path First Protocol)
178. Ipv6
179. Human Computer Interfacing (Hci)
180. Com And Com+
181. Home - Plug
182. Pda
183. Grid Computing
184. Digital Water Marking
185. Linux Device Driver
186. Hyper Threading
187. Iscsi
188. Road Signal Reorganization By Color Imaginary
189. Meteor Burst Communication
190. Augmented Reality
191. Geographical Information System (Gis)
192. Voip (Voice Over Ip)
193. Distributed Database Management System
194. I Button
195. ICEBERG
196. J2ME
197. RMI
198. Firewalls
199. Smart Card
200. DDOS (Distributed Dental Of Syatem)
201. Database Normolization & Denormolization 
202. Computerised Clothing
203. Data Compression Techniques
204. ISDN
205. Image Processing - Corena
206. Genral Packet Radio Service
207. 3G Technology
208. Apache Sever
209. AMD Athlon XP Processer
210. Hamster
211. DNA Computing
212. The Genesis Kernel
213. ISCSI
214. Concurrent Versions Systems
215. Virtual Private Networks (VPN) 
216. Internet Protocol System
217. Global Position System
218. JSTL
219. Manet - Mobile Area Network
220. LDAP (Lighitweight Directory Access Protocol)
221. Skip : Simple Key Management Protocol
222. Simputer 
223. Interplanetary Internet
224. Bioinformatics
225. Quantum Computing
226. PHP: Hypertext Protocol
227. Wiondows DNA
228. Jini Technology
229. Medical Iamge Processing (Artificial Intelligence in Medicine)
230. Session Imitation Protocol (SIP) 
231. Thin Client/Sever Computing Model 
232. Ninja
233. The QNX Real Time Operating System
234. Lossless Data Compression Technique 
235. Wireless Personal Area Network (WPAN) 
236. Voice Over Protocol
237. Data Mining
238. Wi - Fi (802.11B) Technology
239. Deep Blue: The First M/C That Defected Garry Kasparove
240. Secure Socate Layer
241. Recent Advances in Photonic Devices for Optical Compouting
242. Smart Dust
243. Image Guided Therapy
244. Socks - Protocol (Proxy Sever)
245. Advanced Lunix Sound Architecture
246. Optical Ethernet
247. Neural Network
248. MPLS
249. Viruses On Mobile
250. SAMBA
251. Protein Memory
252. Efficient Data Storage Techniques
253. Hyper Transport Technology
254. Ultra Wide BAnd
255. Hacking
256. Java Management Extensions (JMX)
257. Internet - 2 & ITS Application
258. SMS, EMS & MMS
259. Advanced Rise Machines (ARM)
260. Tele Immersion - The Future of Internet Telecommunication
261. Designing an Enterprised Strorage Network (ESN)
262. Simple Object Access Protocol (SOAP)
263. Neural; Network
264. Java Server Pages (JSP) 
265. C# (C Sharp) 
266. Geographical Information System (GIS) 
267. Palm Operating System
268. Sever Clustering
269. Global Position System (GPS) 
270. Firewalls
271. Voice Over IP 
272. Digital Subsciber Line (DSB) 
273. Artifical Intelligence
274. Active Server Pages
275. Image Processing
276. NetWOrk Atteched Storage
277. Direct X
278. Corba
279. CGI Scripting With Perl
280. Introducation to PHP
281. Optical Processer
282. EJB 
283. Mobile Computing - 3G System
284. Universal Model Language (UML) 
285. .NET Framework & Platform
286. Object Oriented Database
287. Oracle 9i
288. Voice XML
289. Storage Area Network(SAN) 
290. The Surat Dot: Application of WAN
291. Molecular Computing
292. Virtual Private Networks (VPN) 
293. Windos XP, An Operating System
294. Mobile Commerce(M-Commerce) 
295. VRML
296. Virus - Antivirus 
297. Univarsal Serial BUS
298. Wireless Application Protocol
299. COM, COM+, Hidden Technologies From Ms.
300. Network Security
301. Universal Description, Discovered & Interface
302. QNX Operating System
303. Future of Java
304. JXTA 
305. Wireless Markup Language(WML) 
306. Genral Packet Radio Service
307. Jacking
308. Session Initiation Protocol (SIP)
309. Bluetooth Technology
310. Remote Method Invocation(RMI)
311. Radius Protocol
312. .Net
313. WIN32 API 
314. Wireless Local Loop
315. Wireless Web
316. Holographic Data Storage
317. Microsoft Transaction Sever
318. Scalability of Bounded Networks
319. Open GL