Apache Pig is a platform that is used to analyze large data sets. It consists of a high-level language to express data analysis programs, along with the infrastructure to evaluate these programs. One of the most significant features of Pig is that its structure is responsive to significant parallelization. Pig operates on the Hadoop platform,...
In mobile computing, a jammer is a mobile communications device that transmits on the same frequency range as a cellphone to create strong cell tower interference and block cellphone signals and call transmission. Jammers are usually undetectable, and users may experience minimal effects such as poor signal reception. Jamming devices may be used in any location but are typically deployed where cellphone use may be disruptive, such as in libraries and restaurants.
A working cellphone must be in constant communication with its network provider via a cell tower or base station. By sending out radio waves in cellphone frequencies, jammers launch denial-of-service attacks (DoS), causing mobile devices to lose base station communication. Jammers come in a variety of shapes and sizes, including:
All jamming device types have three main parts, as follows:
Handheld jammers are capable of disrupting signals within nine to 30 meters, while more powerful jammers create a huge bubble stretching as far as a mile or 1.6 kilometers. In many countries, jammers are illegal, except in the military, law enforcement and other government agencies, where jammers are largely used to prevent bomb detonation or to isolate suspects in hostage situations.
Read More »
Join 138,000+ IT pros on our weekly newsletter
Home | Advertising Info | Write for Us | About | Contact Us
2010 - 2014
Janalta Interactive Sites: