Girish Akolkar

GIRISH AKOLKAR

9870988888

Scientific Way of Finding the Solutions by Decoding the Nature Intelligence

Data Analytics 25
Acquisition
Computational Forensics
Digital Media
E-Discovery Or Ediscovery
Exhibit
Hashing
Image
Imaging
Live Analysis
Slack Space
Steganography
Unallocated Space
Verification
Write Blocker
A Battery
Access Wap Services
Alarm
Calendar And Calculator
Cdma Devices
Clock
Dispatching Emergency Responders
Games
Gprs
Iden
Individual Gsm
International Mobile Equipment Identity (Imei) Number
Keypad
Make Calls
Mms
Push To Talk
R-Uim
Satellite
Send And Receive Data And Faxes
Send Text Messages
Sim Card
Touch Screens
Tow Truck Services
Wcdma
Air-Core Transformer
Audio Transformer
Autotransformer
Balun
Cast Resin Transformer
Combined Instrument Transformer
Constant Voltage Transformer
Current Transformer
Ferrite Core
Ferrite-Core Transformer
Grounding Transformer
Hedgehog
If Transformer
Induction Regulator
Instrument Transformer
Interstage And Coupling Transformers
Isolating Transformer
Laminated Core
Leakage Or Stray Field Transformers
Loudspeaker Transformer
Oil Cooled Transformer
Output Transformer
Phase-Shifting Transformer
Planar Transformer
Polyphase Transformer
Power Transformers
Pulse Transformer
Resolver And Synchro
Resonant Transformer
Rf Transformer
Rotary Transformer
Small Signal Transformer
Toroidal
Transactor
Transmission-Line Transformer
Variable Autotransformer
Variable Differential Transformer
Variable-Frequency Transformer
Variometer And Variocoupler
Voltage Transformer Or Potential Transformer
Components:
Combinational logic
Integrated circuit (IC)
Logic gate
Sequential logic
Theory:
Digital signal (electronics)
Boolean algebra
Logic synthesis
Logic in computer science
Computer architecture
Digital signal (signal processing)
Digital signal processing
Circuit minimization
Design:
Register-transfer level
Formal equivalence checking
Synchronous logic
Asynchronous logic
Finite-state machine
Applications:
Computer hardware
Digital audio
Digital photography
Digital video
Electronic literature
Telecommunication
Design issues:
Metastability
Runt pulse
Input devices:
Keyboard
Image scanner
Microphone
Pointing device
Graphics tablet
Joystick
Light pen
Mouse
Optical
Pointing stick
Touchpad
Touchscreen
Trackball
 Webcam
Softcam
Refreshable braille display
Output devices:
Monitor
Printer
Speakers
Plotter
Removable data storage:
Optical disc drive
CD-RW
DVD+RW
BD-R
Disk pack
Floppy disk
Memory card
USB flash drive
Computer case:
Central processing unit (CPU)
HDD / SSD / SSHD
Motherboard
Network interface controller
Power supply
Random-access memory (RAM)
Sound card
Video card
Data ports:
Ethernet
FireWire (IEEE 1394)
Parallel port
Serial port
USB
Audio jack
AC - Alternating current
DC - Direct current
PM - Permanent magnet
SC - Self-commutated
Fundamental types:
AC motor
DC motor
DC motors:
Homopolar
Electrically-excited field or PM field brushed DC
Unipolar
AC SC mechanical:
Repulsion
Universal
AC SC electronic:
Brushless DC (BLDC)
Switched reluctance (SRM)
AC asynchronous:
Shaded-pole (single-phase)
Dahlander pole changing motor
Squirrel-cage rotor (SCIM)
Wound-rotor (WRIM)
Linear induction
AC synchronous (SM):
Hysteresis
Interior / Surface PM (IPMSM / SPMSM)
Reluctance (SyRM)
Wound-rotor (WRSM)
Special magnetic Machines:
Doubly-fed
Linear
Servomotor
Stepper
Traction
Non-magnetic:
Electrostatic
Piezoelectric
Ultrasonic
Advanced Arresting Gear
Armature (Electrical Engineering)
Armature Controlled Dc Motor
Coil Tap
Double-T Armature
Eddy Current Brake
Electric Motor
Electrical Steel
Electromagnetic Aircraft Launch System
Electromagnetic Propulsion
Electromagnetic Suspension
Electropermanent Magnet
Ferrite Core
Helical Railgun
Humbucker
Induction Cooking
Induction Loop
Inductor
Legg's Equation
Linear Induction Motor
Load Control Switch
Magnetic Amplifier
Magnetic Cartridge
Magnetic Core
Magnetic Flow Meter
Magnetic Proximity Fuze
Mean Length Turn
Metglas
Molypermalloy Powder Core
Motor Soft Starter
Non-Radiative Dielectric Waveguide
Railgun
Reed Switch
Relay
Relay Logic
Rotating Magnetic Field
Saturable Reactor
Synchronous Condenser
Telegraph Sounder
Transductor
Voltage-Sensitive Relay
Animated poetry presented in graphical forms
Chatterbots
Collaborative writing projects that allow readers to contribute to the text of a work
Computer art installations
Conversational characters
E-books-hypertext and poetry-on and off the Web
Interactive
Literary performances online that develop new ways of writing
Novels
Poems and stories that are generated by computers
Civil:
Architectural
Construction
Earthquake
Hydraulic
Mining
Structural
Geotechnical
Transportation
Environmental
Mechanical:
Aerospace
Acoustical
Automotive
Marine
Mechatronics
Railway
Electrical:
Computer
Control
Electronics
Electromechanics
Optical
Power
Photonics
Telecommunications
Radio Frequency
Chemical:
Biochemical
Biological
Molecular
Nanotechnology
Process
Reaction
Thermodynamics
Transport phenomena
Petroleum
Interdisciplinarity:
Audio
Engineering mathematics
Biomedical
Fire
Industrial
Materials science
Robotics
Military
Nuclear
Security
Systems
Privacy
Backup Policy
Backup Rotation Scheme
Backup Site
Backup Software
Backup Window
Copy Backup
Cumulative Incremental Backup
Daily Backup
Data Salvaging/Recovery
Differential Backup
Disaster Recovery
Disk Cloning
Disk Image
Flashbackup
Full Backup
Hot Backup
Incremental Backup
Media Spanning
Multiplexing
Multistreaming
Near Store
Normal Backup
Open File Backup
Remote Store
Restore Time
Retention Time
Site-To-Site Backup
Synthetic Backup
Tape Library
True Image Restore
Trusted Paper Key
Virtual Tape Library (Vtl)
11B-X-1371
3-Way – 96-bit block by Joan Daemen
5-UCO
A5/1 & A5/2 – ciphers specified for the GSM cellular telephone standard
Advanced Encryption Standard (Rijndael)
Affine cipher
Anubis – 128-bit block
Atbash cipher
Autokey cipher
Bazeries cylinder
Beale ciphers
BEAR – built from a stream cipher
BID 150
BID 770
Block ciphers
Blowfish – 64-bit block; by Bruce Schneier et al
BMGL
C-36
C-52
Caesar cipher
Camellia
CAST-128 (CAST5)
CAST-256 (CAST6)
CCM
CD-57
ChaCha20
Chameleon
Chaocipher
Cipher disk
Cipher Machines
CipherSaber
CIPHERUNICORN-A
CIPHERUNICORN-E
CMEA
Copiale cipher
Cryptogram of Olivier Levasseur
CS-Cipher
D'Agapeyeff cipher
Data Encryption Standard (DES)
DEAL
DES-X
Dorabella Cipher
DUDEK
Enigma
Enigma – WWII German rotor cypher machine
FASCINATOR
FEAL
Feistel cipher
FISH – by Siemens AG
GDES
Geheimfernschreiber
Grand Cru
GREEN
Grille
HC-9
Hebern
HELIX
Hierocrypt-3
Hierocrypt-L1
Hill cipher
Homophonic substitution cipher
HX-63
Hybrid code/cypher combinations
IDEA NXT
International Data Encryption Algorithm (IDEA)
Iraqi Block Cipher (IBC)
ISAAC – intended as a PRNG
JADE
Jefferson disk
JN-25 – WWII Japanese Navy superencyphered code; many variants
KASUMI – 64-bit block
Keyword cipher
KG-84
KHAZAD – 64-bit block designed by Barretto and Rijmen
Khufu and Khafre – 64-bit block ciphers
KL-43
KL-51
KL-7
Kryha
Kryptos
Kuznyechik
KW-26
KW-37
KY-3
KY-57
KY-58
KY-68
Lacida
Leviathan
LILI-128
LION
List Of Ciphertexts
LOKI89/91
LOKI97
Lorenz SZ 40/42
Lucifer
M-125 Fialka
M-209
M-325
M-94
MAGENTA – AES candidate
Mars
Mechanical:
Mercury
MISTY1
MISTY2
Monoalphabetic substitution
MUGI – CRYPTREC recommendation
MULTI-S01 - CRYPTREC recommendation
Naval Cypher 3 – superencrypted code used by the Royal Navy in the 1930s and into WWII
NEMA
NESTOR
Nimbus
NOEKEON
Noreen
NUSH
OMI
OMNI
One-time pad
Other:
Panama
Permutation cipher
Pike
Pinwheel
Playfair cipher
Polyalphabetic substitution
Polyalphabetic substitution machine ciphers
Polygraphic substitution
Portex
Product cipher
Purple
Q – 128-bit block
Quipu
RC2
RC4 (ARCFOUR)
RC5
RC6
RED
Reihenschieber
Ricky McCormick's encrypted notes
Rockex
ROT13
Rotor machines:
SAFER – variable block length
Salsa20
SC2000 – 128-bit block; CRYPTREC recommendation
Schlusselzusatz
SCIP
Scytale
SEAL
Sectéra Secure Module
Secure voice:
Serpent – 128-bit block
SHACAL-1 – 160-bit block
SHACAL-2 – 256-bit block cypher; NESSIE selection Gemplus (France)
Shark – grandfather of Rijndael/AES  by Daemen and Rijmen
Siemens and Halske T52
SIGABA
SIGCUM
SIGSALY
Singlet
Smithy code embedded within the 2006 judgement on The Da Vinci Code case
SNOW
SOBER
SOBER-t16
SOBER-t32
Square – father of Rijndael/AES  by Daemen and Rijmen
STE
Stream ciphers
STU-II
STU-III
Tamam Shud case
TEA – by David Wheeler & Roger Needham
Teleprinter:
The Babington Plot ciphers
The Bletchley Park Cipher
The Book of the Law
The cryptogram in "The Gold-Bug"
The Magic Words are Squeamish Ossifrage
The Shugborough inscription
The use of the Purple (cipher machine) by Japan before the Pearl Harbor Attack
The Zimmermann Telegram
Triple DES
Twofish – 128-bit block
Typex
TypeX – WWII UK cypher machine
VIC cipher
Vigenère cipher
VINSON
Voynich Manuscript
WAKE
WWII 'Fish' ciphers
XTEA – by David Wheeler & Roger Needham
Zodiac Killer ciphers
Accounting
Aeronautical Engineering
Aerospace Engineering
Agricultural Engineering
Agricultural Science
Agriculture
Agronomy
Algaculture
Anatomy
Animal Husbandry
Applied Chemistry
Applied Engineering
Applied Linguistics
Applied Mathematics
Applied Physics
Aquaculture
Arboriculture
Architectural Engineering
Architecture
Artificial Intelligence
Bioengineering
Biomedical Engineering
Building Science
Business Strategy
Cardiology
Ceramic Engineering
Chemical Engineering
Civil Engineering
Computer Engineering
Computing Technology
Conservation Medicine
Control Engineering
Cuniculture
Dentistry
Dermatology
Education
Electrical Engineering
Electronics
Endocrinology
Energy Storage
Energy Technology
Engineering
Engineering Physics
Engineering Technology
Environmental Engineering Science
Environmental Science
Environmental Technology
Finance
Fisheries Science
Floriculture
Food Science
Forensic Science
Forestry
Fungiculture
Gastroenterology
GIS
Gynecology
Health Science
Heliciculture
Horticulture
Human Anatomy
Hydroculture
Hydroponics
Immunology
Industrial Engineering
Internal Medicine
Language Engineering
Management
Mariculture
Marine Engineering
Marketing
Materials Engineering
Materials Science And Engineering
Mechanical Engineering
Medicine
Microtechnology
Military Education And Training
Military Engineering
Military History
Military Organization
Military Science
Military Strategy And Tactics
Mining Engineering
Nanotechnology
Neurology
Nuclear Engineering
Nuclear Technology
Nursing
Nutrition
Olericulture
Operations
Ophthalmology
Optics
Optometry
Organizational Behavior
Outline Of Management
Pathology
Pathophysiology
Pediatrics
Permaculture
Pharmacology
Pharmacy
Photogrammetry
Physical Therapy
Physiology
Polymer Engineering
Psychiatry
Radiology
Remote Sensing
Security Engineering
Sericulture
Silviculture
Software Engineering
Spatial Science
Systems Engineering
Toxicology
Urology
Veterinary Medicine
40-Bit Key
Authentication Key
Benign Key
Branches Of Cryptography
Content-Encryption Key (Cek)
Crypto Ignition Key
Cryptographic engineering
Cryptovariable
Data Encryption Key (Dek)
Derived Key
Drm Key
Electronic Key
Ephemeral Key
Expired Key
Firefly Key
Key Derivation Function (Kdf)
Key Encryption Key (Kek)
Key Fill
Key Production Key (Kpk)
Master Encryption Key (Mek)
Master Key
Multivariate cryptography
One Time Pad (Otp Or Otpad)
One Time Password (Otp)
Paper Key
Poem Key
Pre-Placed Key
Public/Private Key
Quantum cryptography
Red Key
Revoked Key
Seed Key
Session Key
Signature Key
Steganography
Stream Key
Symmetric Key
Traffic Encryption Key (Tek)/Data Encryption Key (Dek)
Training Key
Transmission Security Key (Tsk)
Type 1 Key
Type 2 Key
Vernam Key
Visual cryptography
Zeroized Key
Specialties:
Cryptographic Security
Emission Security (Emsec)
Transmission Security (Transec)
Physical Security
Related Terms:
Akms = The Army Key Management System
Aek = Algorithmic Encryption Key
Ct3 = Common Tier 3
Cci = Controlled Cryptographic Item - Equipment Which Contains Comsec Embedded Devices
Aces = Automated Communications Engineering Software
Dtd = Data Transfer Device
Icom = Integrated Comsec  E.G. A Radio With Built In Encryption
Tek = Traffic Encryption Key
Ted = Trunk Encryption Device Such As The Walburn/Kg Family
Kek = Key Encryption Key
Kpk = Key Production Key
Owk = Over The Wire Key
Otar = Over The Air Rekeying
Lcms = Local Comsec Management Software
Kyk-13 = Electronic Transfer Device
Koi-18 = Tape Reader General Purpose
Kyx-15 = Electronic Transfer Device
Kg-30 = Family Of Comsec Equipment
Tsec = Telecommunications Security (Sometimes Referred To In Error Transmission Security Or Transec)
Soi = Signal Operating Instructions
Skl = Simple Key Loader
Tpi = Two Person Integrity
Stu-Iii (Obsolete Secure Phone  Replaced By Ste)
Ste - Secure Terminal Equipment (Secure Phone)
Types Of Comsec Equipment:
Crypto Equipment
Crypto-Ancillary Equipment
Crypto-Production Equipment
Authentication Equipment:
Dod Electronic Key Management System
The Electronic Key Management System (Ekms)
The Army's Platform In The Four-Tiered Ekms/ Akms/ Automates Frequency Management
Lcms Provides Automation For The Detailed Accounting Required For Every Comsec Account  And Electronic Key Generation And Distribution Capability
Aces Is The Frequency Management Portion Of Akms
Ct3 With Dtd Software Is In A Fielded/Ruggedized Hand-Held Device That Handles/Views/Stores/And Loads Soi/Key/And Electronic Protection Data
Skl Is A Hand-Held Pda That Handles/Views/Stores/And Loads Soi/Key/And Electronic Protection Data
Key Management Infrastructure (Kmi) Program
Conversion of below analog technologies to digital:
Analog computer to digital computer (1950s)
Telex to fax (1980s)
Phonograph cylinder-gramophone record and compact cassette to compact disc (1980s)
VHS to DVD (2000s)
Analog photography (photographic plate and photographic film) to digital photography (2000s)
Analog cinematography (film stock) to digital cinematography (2010s)
Analog television to digital television (2010s (expected))
Analog radio to digital radio (2020s (expected))
Analog mobile phone (1G) to digital mobile phone (2G) (1990s)
Analog watch and clock to digital watch and clock (not yet predictable)
Analog thermometer to digital thermometer (2010s)
Offset printing to digital printing (2020s (expected))
Decline or disappearance of below analog technologies:
Mail (parcel to continue-others to be discontinued) (2020s (expected))
Telegram (2010s)
Typewriter (2010s)
Fax (2010s (expected))
Landline phone (2020s (expected)) (only offices will continue using landlines)
Payphone (2020s (expected))
Disappearance of other technologies also attributed to digital revolution
CRT (2010s)
Plasma display (2010s)
CCFL backlit LCDs (2010s)
Improvements in digital technologies:
Desktop computer to laptop to tablet computer
DVD to Blu-ray Disc to 4K Blu-ray Disc
2G to 3G to 4G
Digital watch to smartwatch
Analog weighing scale to digital weighing scale
A2DP via Bluetooth
AC'97 (Audio Codec 1997) interface between integrated circuits on PC motherboards
ADAT interface
AES3 interface with XLR connectors
AES47 - professional AES3-style digital audio over Asynchronous Transfer Mode networks
Audio-specific interfaces include:
Automation
Axle
Bearings
Belts
Block And Tackle
Blu-ray Disc (BD)
Brake
Burmester Theory
Cam
Cam Follower
Chain Drive
Clevis Pin/ Cotter Pin/ Spring Pin/ Taper Pin
Clifford Algebra
Clutch
Compact Disc (CD)
Continuously Variable Transmission
Cutting
Deformation
Digital Audio Broadcasting (DAB)
Digital audio broadcasting:
Digital audio interfaces:
Digital audio player
Digital Audio Tape (DAT)
Digital Compact Cassette (DCC)
Digital Detoxx
Digital Radio Mondiale (DRM)
Drilling
Drive Shaft
Dual Quaternion
DVD-Audio
Early Flying Machines
Edge Jointing
Electric Media R&D
EMWLSDP8
Enigma Machine
Epicyclic Gearing
Essence Of Machines:
Euler's Rotation Theorem
Fabrication
Factory
Fastener
Fasteners
Flap
Four-Bar Linkage
Frame
Gear
Gear Ratio
Gear Train
General Machine-Related Concepts:
Geneva Drive
Hard disk recorder
HD Radio
History Of Computing Hardware
History Of Machines:
History Of Mechanical Engineering
History Of Perpetual Motion Machines
History Of The Bicycle
History Of The Sewing Machine
I²S (Inter-IC sound) interface between integrated circuits in consumer electronics
Ideal Machine
In-band on-channel (IBOC)
Industrial Revolution
Instantaneous Center Of Rotation
Intel High Definition Audio - modern replacement for AC'97
Key
Keys
Kinematic Coupling
Knurling
Link Chains
Linkage (Mechanical)
Lubricants
Machine Operations:
Machine Shop
Machine Theory:
Machining Machinist
MADI (Multichannel Audio Digital Interface)
Manufacturing
Mechanical Advantage
Mechanical Components:
Mechanical Engineering
Mechanics
Mechanism (Engineering)
Mechanism Elements:
MIDI - low-bandwidth interconnect for carrying instrument data
MiniDisc
Molding
Paper Machine
Power (Physics)
Production Line
Propeller
Rack And Pinion
Roller Chains
Rope
Rotation Matrix
Rudder
S/PDIF - either over coaxial cable or TOSLINK
Sail
Sanding
Screw Axis
Screw Theory
Seals
Simple Machine
Six-Bar Linkage
Splines
Spring
Springs
Sprocket
Storage technologies:
Structural Elements:
Super Audio CD
Tabulating Machine
TDIF/TASCAM proprietary format with D-sub cable
Threshing Machine
Tools
Transmission (Mechanics)
Universal Joint
Various audio file formats
Vending Machine
Virtual Work
Washing Machine
Waterproofing without Breaking
Wheel
Wing
Work (Physics)
Advertising
Barker channel
Business presentations
Commerce
Communications
Community bulletin board
Computer simulations
Corporate communications
Digital art
Digital Detoxx
Digital photography
Digital signage
Education
Electric Media R&D
Engineering
Entertainment
Experimental music
Fine art
Government
Graphic design
Industry
Infrastructure
Journalism
Marketing
Military
Movies
Music
News
Nonprofit services
Primary uses:
Professional training
Public services
Science
Software interfaces
Telecommuting
Television
Transportation
Video
Video games
Virtual reality
Alice and Bob
Cipher
Ciphertext
Code
Cryptographer
Cryptographic key
Encryption/decryption
Plaintext
Tabula recta
Agriculture:
Agricultural Robot
Closed Ecological Systems
Cultured Meat
Genetically Modified Food
Precision Agriculture
Vertical Farming
Architecture:
Arcology
Building Printing
Contour Crafting
D-Shape
Domed City
Biomedical:
Artificial Uterus
Ampakine
Brain Transplant
Cryonics
Cryoprotectant
Cryopreservation
Vitrification
Suspended Animation
De-Extinction
Genetic Engineering
Gene Therapy
Head Transplant
Isolated Brain
Life Extension
Strategies For Engineered Negligible Senescence
Nanomedicine
Nanosensors
Personalized Medicine
Regenerative Medicine
Stem-Cell Therapy
Tissue Engineering
Robot-Assisted Surgery
Synthetic Biology
Synthetic Genomics
Virotherapy
Oncolytic Virus
Tricorder
Whole Genome Sequencing
Displays-Next Generation:
Fed
Flcd
Imod
Laser
Lpd
Oled
Olet
Qd-Led
Sed
Tpd
Tdel
Tmos
Screenless:
Bionic Contact Lens
Head-Mounted Display
Head-Up Display
Optical Head-Mounted Display
Virtual Retinal Display
Other:
Autostereoscopy
Flexible Display
Holographic Display
Computer-Generated Holography
Multi-Primary Color Display
Ultra Hd
Volumetric Display
Electronics:
Electronic Nose
E-Textiles
Flexible Electronics
Molecular Electronics
Nanoelectromechanical Systems
Memristor
Spintronics
Thermal Copper Pillar Bump
Energy
Airborne Wind Turbine
Artificial Photosynthesis
Biofuels
Carbon-Neutral Fuel
Concentrated Solar Power
Fusion Power
Home Fuel Cell
Hydrogen Economy
Methanol Economy
Molten Salt Reactor
Nantenna
Photovoltaic Pavement
Space-Based Solar Power
Vortex Engine
Storage:
Beltway Battery
Compressed Air Energy Storage
Flywheel Energy Storage
Grid Energy Storage
Lithium–Air Battery
Molten Salt Battery
Nanowire Battery
Research In Lithium-Ion Batteries
Silicon–Air Battery
Thermal Energy Storage
Ultracapacitor
Smart Grid
Wireless Power
It And Communications:
Ambient Intelligence
Internet Of Things
Artificial Intelligence
Applications Of Artificial Intelligence
Progress In Artificial Intelligence
Machine Translation
Machine Vision
Semantic Web
Speech Recognition
Atomtronics
Carbon Nanotube Field-Effect Transistor
Cybermethodology
Fourth-Generation Optical Discs
3d Optical Data Storage
Holographic Data Storage
Gpgpu
Memory
Cbram
Fram
Millipede
Mram
Nram
Pram
Racetrack Memory
Rram
Sonos
Optical Computing
Quantum Computing
Quantum Cryptography
Rfid
Chipless Rfid
Software-Defined Radio
Three-Dimensional Integrated Circuit
Encryption standards:
Data Encryption Standard (DES-now obsolete)
Triple-DES
Advanced Encryption Standard (AES)
RSA the original public key algorithm
OpenPGP
Hash standards:
MD5 128-bit (obsolescent)
SHA-1 160-bit
SHA-2
HMAC keyed hash
PBKDF2 Key derivation function (RFC 2898)
Digital signature standards:
Digital Signature Standard (DSS)-based on the Digital Signature Algorithm (DSA)
RSA
Elliptic Curve DSA
Public-key infrastructure (PKI) standards: X.509 Public Key Certificates
Wireless Standards:
Wired Equivalent Privacy (WEP)-severely flawed and superseded by WPA
Wi-Fi Protected Access (WPA) better than WEP-a 'pre-standard' partial version of 802.11i
802.11i a.k.a. WPA2-uses AES and other improvements on WEP
A5/1 and A5/2 cell phone encryption for GSM
Classified Standards:
EKMS NSA's Electronic Key Management System
FNBDT NSA's secure narrow band voice standard
Fortezza encryption based on portable crypto token in PC Card format
STE secure telephone
STU-III older secure telephone
TEMPEST prevents compromising emanations
Other:
IPsec Virtual Private Network (VPN) and more
IEEE P1363 covers most aspects of public-key cryptography
Transport Layer Security (formerly SSL)
SSH secure Telnet and more
Content Scrambling System (CSS-the DVD encryption standard-broken by DeCSS)
Kerberos authentication standard
RADIUS authentication standard
ANSI X9.59 electronic payment standard
Common Criteria Trusted operating system standard
CRYPTREC Japanese Government's cryptography recommendations

Birth, Time of Birth, Date of Birth, Month of Birth, Season of Birth, Year of Birth.

Death, Time of Death, Date of Death, Month of Death, Season of Death, Year of Death.

Shraaddha, Time of Shraaddha, Date of Shraaddha, Month of Shraaddha, Season of Shraaddha, Year of Shraaddha.

Education, Job, Marriage, Retirement, Death.

Job, Time of Joining of Job, Date of Joining of Job, Month of Joining of Job, Season of Joining of Job, Year of Joining of Job

Marriage, Time of Marriage, Date of Marriage, Month of Marriage, Season of Marriage, Year of Job

Divorce, Time of Divorce, Date of Divorce, Month of Divorce, Season of Divorce, Year of Divorce

Business, Time of Commenecemnt of Business, Date of Commenecemnt of Business, Month of Commenecemnt of Business, Season of Commenecemnt of Business, Year of Commenecemnt of Business

NPA - Non Performing Assets, Time of NPA - Non Performing Assets, Date of NPA - Non Performing Assets, Month of NPA - Non Performing Assets, Season of NPA - Non Performing Assets, Year of NPA - Non Performing Assets

Vaastu, East, West, North, South, North East, North West, South East, South West

Success, Achievement, Secured Life, Health, Wealth, Joy, Pleasure, Contented, Satisfaction, Happiness, Growth, fulfilment of Wishes, Career, Sports, Games, Hobbies, Internet, Wifi, Mobile, Social Media, Whatsapp, Facebook, Twitter, Linkedin, Youtube, Instagram, Google Plus, DoWhistle, Insurance, Mediclaim, Salary, Bonus, Gratuity, ESIC, PF, Pension, Investment, Stock Holding, Income Tax, GST, Import Export Code, Balance Sheet, Energy, Peace of Mind, Meditation, Yoga, Brahmamurta, Enabler, Alchemist, Prayer, Excercise, Diet, Vegetarian, Lifestyle, Addiction, Video Games, Newspaper, TV Channels, Internet Browisng, Research & Development, Innovation, Forensic Engineering Audit, Startup, Technology, Merger & Acquisitions, Advertising, Branding, Consultant, Advisor, Solution Providers, Digital Transformation, Human Resources, Placement Assistance, Self Enterpreneur, Trading, Broking, Marketing, Reselling, Stockist, Dealer, Distributors, value Addition, Business Exchange, Personal Relation(PR), Restructuring, Redesign, Subham karoti, Ram Raksha, Mantra, Tantra, Gayatri Mantra, Aarti, Maha Mrityunjaya Mantra, Atharvashirsha, Satya Narayn Pooja, Ganpati, Navratri, Govinda, Janmashtami, Diwali, Dasara, Holi, Akshatruteya, Rang Panchami, Gym, Aasan, Sanskrut, Routine Life.