background preloader

GNU Radio - WikiStart - gnuradio.org

GNU Radio - WikiStart - gnuradio.org
Introduction¶ GNU Radio is a free & open-source software development toolkit that provides signal processing blocks to implement software radios. It can be used with readily-available low-cost external RF hardware to create software-defined radios, or without hardware in a simulation-like environment. It is widely used in hobbyist, academic and commercial environments to support both wireless communications research and real-world radio systems. GNU Radio is licensed under the GNU General Public License (GPL) version 3 or later. Content¶ 0. Registration for GRCon16 is now open! I. If you've never touched GNU Radio before, these pages will get you started with a running installation of GNU Radio and will show you how to take your first steps with this software radio tool. II. GNU Radio has two manuals: one for the C++ API and another for the Python API. The Sphinx documentation fills in some holes in the C++ docs where there is Python-only code: Sphinx-based Documentation III. IV. V. VI. Related:  Projetos

New Roles and Skills for Cloud Computing - AdVoice: Microsoft - Cloud Power This article is commissioned by Microsoft Corp. The views expressed are the author’s own. Clearly, cloud computing requires new skills inside of organizations that are moving to the cloud. We all get that. However, many companies have difficulty understanding exactly what those skills are, the scope required, and the timing. There are several ways this can play out. My take on all of this is that before we ignore the problem, or toss money at it, perhaps this a good time to put some lines in the sand around what skills are required as the cloud creeps into our IT universe. When considering what skills are needed to thrive in the cloud, I like to use a role-based approach, with the new roles being: Cloud Architect Cloud Security Specialist Cloud Developer Cloud Infrastructure Manager Provider Specialist Cloud architect is the No. 1 job posting that I see from any company or consulting organization looking to move into cloud computing.

Técnicos dizem que futuro da transmissão por satélite está ameaçado Luiz Xavier Diretora da Secom da Câmara, Sueli Navarro disse que a nova faixa de frequência vai interferir no sinal da TV Câmara. Durante seminário realizado nesta terça-feira para debater o futuro da recepção do sinal de TV por satélite no Brasil, técnicos das emissoras de televisão se manifestaram contra o edital do leilão da faixa de frequência de 3,5 GHz, aprovado pela Agência Nacional de Telecomunicações (Anatel). Eles afirmam que essa nova faixa de frequência vai interferir no sinal de televisão captado por antenas parabólicas instaladas no País. Na avaliação do engenheiro de comunicações da Rede Record André Felipe Trindade, o futuro da transmissão por satélite corre risco depois que a Anatel decidiu colocar em leilão a faixa de 3,5 GHz para ofertar serviços de WiMAX, tecnologia de banda larga sem fio. Ele citou como situação em que haverá interferências a recepção de eventos internacionais como a Copa do Mundo de Futebol e os Jogos Olímpicos.

teleco.com.br Densidade de Banda Larga do Brasil está abaixo da média mundial O Brasil terminou 2008 com 10 milhões de acessos Banda Larga (fixa) e está entre os 10 países com mais acessos Banda Larga no mundo. Já em termos de densidade de Banda Larga (acessos/ 100 hab.) o Brasil está abaixo da média mundial (UIT), ao contrário do que ocorre com a densidade de telefones fixos e celulares. Nota: não inclui banda larga móvel O Brasil é o 67º país em densidade de Banda Larga no Mundo atrás do México (7,1 acessos/100 hab.) e da Argentina (8,0 acessos/100 hab.). O mapa abaixo, que detalha a densidade de cada estado no 1T09, ajuda aentender melhor as causas desta baixa densidade. Pode-se dividir o Brasil em duas regiões: As sete unidades da federação com densidade de 8,9 acessos/100 hab., superior à média mundial, que concentram 72,1% dos acessos Banda Larga do país e representam 45,5% da população. Esta divisão é agravada pela baixa cobertura geográfica com que é oferecida a Banda larga no Brasil.

Austrian breakthrough in quantum cryptography: Record in the transmission of entangled photon pairs (Update) Austrian physicists say a breakthrough in next-generation quantum cryptography could allow encrypted messages to be bounced off satellites, the British journal Nature reported Sunday. A team from Austria's Institute for Quantum Optics and Quantum Information (IQOQI) managed to send entangled photons 144 kilometres (90 miles) between the Spanish islands of Las Palmas and the Balearics. Because of the success of the test, the IQOQI team said it was now feasible to send this kind of unbreakable encrypted communication through space using satellites. Quantum cryptography works by sending streams of light particles, or photons, making it entirely secure, as any eavesdropping would leave traces and immediately be detected. In quantum cryptography, photons are used as the key for the encrypted communication -- just as mathematical formula are used in conventional cryptography. (c) 2009 AFP Update: Please find IQOQI's press release below: Provided by IQOQI

Armees.Com : Actualités et forums militaires One Military Brigade And Its Equipment This time we’ll visit a military brigade located in the Moscow Region. It was founded in 1918 and released 5 Heroes of the Soviet Union. 51 military men from this brigade servied in Afghanistan, Tajikistan and the Chechen Republic and 47 received state decorations. We shall start the tour with demonstration of military equipment. Signal vehicle ‘Gazel’. About 40% of military equipment is new in the brigade. They can organize a video conference at any minute. Small satellite communication station R-438-M. They could call their moms for free… see all images on one page

Pentagon Can Now Play Offense in Cyberspace | Executive Gov DHS image The head of the National Security Agency said last month that playing offense in cyberspace is challenging because the current strategy focuses primarily on defense. “They find a vulnerability, they penetrate the network, we find out about it several months later,” said Army Gen. Keith Alexander “We diagnose the malware, we set up the signature, we clean up our systems, we get everything set again and wait for the next exploitation.” Congress has now given the Pentagon a clause on offensive cyber operations in the National Defense Authorization Act for fiscal year 2012. “Congress affirms that the Department of Defense has the capability, and upon direction by the president may conduct offensive operations in cyberspace to defend our nation, allies and interests,” the act says. The law also directs the Pentagon to oversee collaborative cyber activities with the Department of Homeland Security, according to Federal Times. share

Military tests iPads, smartphones as tools of warfare | Local news, sports, weather, blogs, opinion, crime, obituaries, business, directory, marketplace, education, high school, family, shopping, arts, entertainment, movies, books, cooking, auto, real est LOS ANGELES — As a Cobra attack helicopter pilot, Marine Capt. Jim “Hottie” Carlson was running support missions above Afghanistan last summer when it occurred to him that it was taking far too long to find where U.S. troops were under attack. “Do you have any idea how long it takes to find the right map, unfold it, and find where you’re going? Stay with the story. For as little as 27 cents a day, you can have complete access to all the local news, photos and video content from North Central Washington's primary news source.

Related: