ITwin iTwin Presented by: G.Vyshnavi 14A81A0572 CSE-B.

Slides:



Advertisements
Similar presentations
Data Encryption Data In Transit / Data At Rest. Learning Outcomes How to: – encrypt data on an USB key – encrypt a document – a document safely.
Advertisements

Basic Computer Vocabulary
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Case Study: Pat Lee’s Home PC Network Chapter 1a Panko’s Business Data Networks and Telecommunications, 6th edition Copyright 2007 Prentice-Hall May only.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Novell from Home Net Storage. Novell access via NetStorage 1-Web Interface Connect to your shared drive through your web browser Windows, Mac or Linux.
HiberSnail Portable home directory with environment retrieval.
Secure Private Cloud Storage for Business. The Market Trend File Sharing Any Device Any Where Public clouds are good enough to personal users but security.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
Your storage on the ground; Your files in the cloud.
Information Technology
Chromium OS is an open-source project that aims to build an operating system that provides a fast, simple, and more secure computing experience for people.
Tutorial 11 Installing, Updating, and Configuring Software
User Management Creating and Editing User Accounts Overview of the Client Connector Deploying & Managing Client Computers Troubleshooting Client Deployment.
Chapter 14: Remote Server Administration BAI617. Chapter Topics Configure Windows Server 2008 R2 servers for remote administration Remotely connect to.
By Chris Versaci CLOUD SECURITY. WHAT IS CLOUD COMPUTING? Cloud computing is a concept that involves a large number of computers connected through a real-time.
Monitoring the server and client computers Backup and restore Managing server storage and Storage Spaces Creating server shared folders.
Chapter SIx Maintaining a Computer Part I: Configuring, Updating, and Upgrading the OS.
Computer Concepts – Illustrated 8 th edition Unit A: Computer and Internet Basics.
Portable SSH Brian Minton EKU, Dept. of Technology, CEN/CET)‏
Welcome to MSTC Instructor: Brent Presley. OVERVIEW MSTC Network Login MyMSTC MSTC Computer Needs Software Needs Network Storage Course Website.
Backups. What is a backup. A backup is when someone copies some data (like you may copy and paste your schoolwork!) and sends it to another workstation.
What is CrossLoop? FREE secure screen sharing utility designed for people of all technical skill levels. Connect any two PCs on Earth Available in 21 Languages.
Getting To Know Computers COMPUTER BASICS. WHAT IS A COMPUTER? A computer is an electronic device that manipulates information, or “data.” It has the.
Introduction TO Network Administration
FILE MANAGEMENT Computer Basics 1.3. FILE EXTENSIONS.txt.pdf.jpg.bmp.png.zip.wav.mp3.doc.docx.xls.xlsx.ppt.pptx.accdb.
DiskGo! USB Flash Drive How-to-Use Guide. Capacity The DiskGo! USB Flash Drive will hold 64MB of data. 64MB of information is equivalent to approximately.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
STORAGE LOCAL OR ONLINE. DATA STORAGE: DATA YOU STORE ONLINE FILES SUCH AS IMAGES, SPREADSHEETS, VIDEO OR MUSIC. ONLINE DATA STORAGE: WHEN FILES ARE STORES.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Created by Alexis Ford Research done by Rebecca Tanner Ford 1.
ITWIN SARATH CHANDRA.V 08Q6A05A3. ABOUT THE PRODUCT SECURE AND PRIVATE FILE COLLABORATION PLATFORM INDEPENDENT SIMPLE AND SAFE REMOTE ACCESS YOUR OWN.
Enw / Name. What is a on-line / paper based data capture form Can you give an example where each are used? Automated data capture systems are used around.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Billy Ripple Dr. Oblitey COSC  File-Sharing ◦ What is it? ◦ Uses ◦ History ◦ Types ◦ Dangers  Case Study  Summary  Works Cited.
How to Optimize Operating System of Your PC? Dial For TECHNICAL SUPPORT FOR OPERATING SYSTEM O Operating system is a main platform in a computer.
Lesson 4 Software: Systems and Applicatio n Software CREATED BY MOBIN 2016.
WHAT IS CLOUD COMPUTING? Pierce County Library System.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
Cafanh Seminar Saturday 15, 2015 Speaker: Jean Bernard Choudja.
Getting Connected to NGS while on the Road…
Chapter 40 Internet Security.
iTWIN The Limitless - Pen drive
Computer and Internet Basics
The importance of computer backups
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Information Technology
Operating System.
ITwins By Sushant Burde Vaibhav Deshmukh.
Principles of Information Technology
Presented by, K.K.Radhika.
Fastdroid Produced by : Firas Abdalhaq Mohammad Amour Supervised by : Dr. Raed Alqadi.
Unit 4 IT Security.
Best Webdav Server Windows
Cloud Storage Services
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Cloud vs Local: Better Data Storage Device
Office 365 Integration Enables WebUntis Users to Sign in Using Office 365 Account Information and to Export WebUntis Timetables Directly to Outlook OFFICE.
Back Up and Recovery Sue Kayton October 2015.
Getting Connected to NGS while on the Road…
An Introduction to Cloud Computing
Chapter 3: Protecting Your Data and Privacy
Unit# 5: Internet and Worldwide Web
Local Area Networks School of Business Eastern Illinois University
Software - Operating Systems
Chapter 2: Planning for Server Hardware
Instructor: Mort Anvari
HC VMware Module
What is an operating system An operating system is the most important software that runs on a computer. It manages the computer's memory and processes,
Presentation transcript:

iTwin iTwin Presented by: G.Vyshnavi 14A81A0572 CSE-B

PRESENT DRAWBACKS Drawback of USB flash drive is its small size cause of which it can be easily misplaced In cloud storage data can be stolen or misused if the username and password of an account to access the storage is hacked by someone There are many more drawbacks like limited storage , no security , back up , temp files , no remote disable etc.,

FOUNDER AND DESIGNER LUX ANANTHARAMAN Electrical and electronics engineering from IIT in Chennai and a Masters Degree from IISC in Bangalore

WHAT IS iTWIN??? iTwin is a limitless secure USB device that enables users to access ,edit &share all their files & media between any two online computers anywhere in the world The only limit is the size of your computer’s hard drive iTwin uses thoroughly analyzed crypto protocols and algorithms

Need of iTwins Transferring data from one PC to another can be difficult especially if it is a large amount of data. For example if you want to send data to somebody in other country ,you’re going to have to go through the hassle of sending it through email or upload it to some file hosting service. Chances are, if your file is too large, you’ll probably need to buy large storage.

ABOUT iTWIN DEVICE USB CONNECTOR USB connector is to plug the device into the USB port of a computer iTWIN CONNECTOR The iTwin connector is used to connect the two halves of the iTwin device to form a physical pair ACTIVITY INDICATOR NO LIGHT : Device is not functional or iTwin is not installed on your computer RED LIGHT : error CONSTANT BLUE LIGHT : Device is active and functioning

HOW TO USE!!!

Twin Trust Authentication Before allowing any data transfer every iTwin is authenticated by iTwin’s Twin Trust servers All communication between iTwin and Twin Trust is secured using industry strength https protocol After successful authentication by Twin Trust ,Twin trust assist iTwin to discover its another half

Two-Factor Authentication After authentication with twin trust two halves of iTwin mutually authenticate each other using their pre-shared key If password is set then password verification is performed on both iTwins before data transfer is initiated between two iTwins

Data Security iTwin does not store any data on itself. It just enables a secure connection between two computers. Your remote data can only be accessed if you have the physical iTwin with you. Additionally you can set up your iTwin to require a password. It also allow you to remotely disable iTwin with its remote disable feature. So you can rest assured that your data is safe, even if you lose your iTwin device.

Requirements Windows and Mac OS X compatible you can use iTwin on any of both Windows and Mac OSX Minimum 512MB ram needed 15MB space on hard disk USB 2.0 port Broadband connection uploading speed should be 1Mbps

FEATURES multi-language support No temp files

DRAWBACKS A bit expensive Ends are not protected by caps Not compatible with Linux

CONCLUSION The iTwin-A fantastic solution for the home user who wishes to access and change their files remotely and securely. The iTwin bypasses the virtual world of cloud services to turn your physical storage into its own networking solution. The iTwin is simple to use and inexpensively solves the dropbox limitations. For those who want to keep files up-to-date between two computers the iTwin is for you.

ANY QUESTIONS???