0

Secret US Air Force Plane Conduct Classified Mission in Outer Space for Two Years

X-37B US Air Force Space Plane

The U.S. military’s secret space plane X-37B landed on Sunday at NASA’s Kennedy Space Center in Florida. The plane went to outer space on May 2015 and conduct classified mission that lasted nearly two years. It was the fourth and lengthiest mission so far for the secretive program, managed by the Air Force Rapid Capabilities Office.

Air force did not disclose any detail about the mission.

X-37B built by Boeing is one of two in the Air Force fleet. The space craft looks like a miniature space shuttle, Later this year. The Air Force intends to launch the fifth X-37B mission.

Writer – Rubayat M.

0

Online Secured Password Maker Software

Crack Proof Password

Your password is the last layer of protection between your privacy and the world. That is why it is important to use a strong password. But it is also difficult to create a strong password.

Don’t worry we have a solution for you. LinkMeshin Password Maker – your final steps to your privacy starts here.

Website : www.linkmeshin.com/passwordmaker

What is LinkMeshin Password Maker

LinkMeshin Password Maker is an online password generating software. It generates unique password instantly based on user’s criteria.

Use of LinkMeshin Password Maker

Lets say you are in website and trying to create an account. The one section where you will have most trouble, is the password section. Each website/App has it’s own password criteria.  And in most cases it is difficult to meet the criteria.

This is where LinkMeshin Password Maker comes. In a situation like this – all you have to is, go to www.linkmeshin.com/passwordmaker, then select what types of password you need and the password will be created for you instantly.

No more brain freeze moment ! Here are few things that you need to know.

Service Fees

No service fess – it’s free !

Technical Factors

  • Device friendly – support mobile, tablet laptop & desktop.
  • Browser based – support all major browsers.
  • No download required

How it Works –

First you will select you criteria, then click “Password” and LinkMeshin Password Maker’s algorithm will creates unique password for you. Very simple.

General Password

General Password

Create General Password

A general password a normal password – that contains only  random re-arrangemtnt of A to Z characters. You can define the length of the password. Select criteria, then click “Password” and your password will be created.

 

 

 

Create Difficult Password

Difficult Password

Difficult Password

 

A difficult password is a combination of A to Z characters and numbers. You can define the length of the password. Select criteria, then click “Password” and your password will be created.

 

 

 

Complex Password

Complex Password

Create Complex Password

A complex password is a combination of A to Z characters and special characters like # or @. You can define the length of the password. Select criteria, then click “Password” and your password will be created.

 

 

 

Create Crack Proof Password

Crack Proof Password

Crack Proof Password

 

A complex password is a combination of A to Z characters, numbers and special characters like # or @. You can define the  length of the password. Select criteria, then click “Password” and your password will be created.

 

 

 

 

Writer – Rubayat M.

0

How Google Collect and Use Our Personal Information

Google

Google – worlds most advanced search engine and tech company. These days any technology you see, you will find Google’s name on it. They have become a house hold commodity name and part of our life. Google changed our life so much.

But how much we actually know about Google. We all know that Google provide free information about everything and some of know that they also collect a massive amount of information about us. But how much information do they collect ? What types of information do they collect ? What do they do with that information ? Hers is your answer –

What Information They Collect

Personal Information

  • User’s name
  • Email address
  • Credit card associated with Google account.
  • What language you speak.

Device Information

  • Device type like cell phone, laptop, tablet, desktop, others.
  • Model of the device – eg. Samsung Galaxy s7 or iPhone 5 or Macbook Pro.
  • Device software – Operating system, browser name.
  • Device hardware unique number – like the IMEI (every cell phone has a unique 15 digit number) number for the cell phone
  • Telephone number – if you are using your cell phone.
  • ISP/Cell phone carrier information.

Location Information

  • Your physical location –  when you ware using Google’s service. Google is able to detect your physical location if you are using Google’s service from your home of from a grocery store.
  • Your IP address.

Activity History

  • Your search History– eg. If you search for cooking recipe or if you search for a famous person.
  • For Android Phone – phone number, calling-party number, forwarding numbers, time and date of calls, duration of calls, SMS routing information and types of calls.
  • YouTube – what video you watched and what videos you liked.

How Do They Collect

Google collect your information every time you use any Google service like –

  • Google website – www.google.com to search something.
  • Google Product – Android phone, android tablet, Chrome operating system.
  • Google has created software that runs in the hardware level and collect these information.

How Google Use The Collected Information

  • They use the collected information mainly to maintain and improve their products.
  • They also use these information to (eg. location or language etc.) to display adds and other commercial contexts.

With Whom do They Share Information

Share For Business

Google do not share their users personal information with companies, organizations and individuals outside of Google unless one of the following circumstances applies:

  • They share their user’s personal information with companies, organizations or individuals outside of Google when they have their user’s consent to  do so.
  • Google provide their user’s personal information to their affiliates to process the collected information for them.

Share with Law Enforcement Agency

According to Google – They share personal information with companies, organizations or individuals outside of Google if they
(in good-faith) belief that access, use, preservation or disclosure of the information is reasonably necessary to:

  • Meet any applicable law, regulation, legal process or enforceable governmental request.
  • Enforce applicable Terms of Service, including investigation of potential violations.
  • Detect, prevent, or otherwise address fraud, security or technical issues.
  • Protect against harm to the rights, property or safety of Google, our users or the public as required or permitted by law.

Google’s Warranties and Liabilities

Google provide their services using a commercially reasonable level of skill and care. But there are certain things that they don’t promise about their Services. They will not be responsible for lost profits, revenues, or data, financial losses or indirect, special, consequential, exemplary, or punitive damages.

 

We are giving away so much our personal information to get free information every day to Google and other search engines. Google’s sophisticated algorithm now knows more about us, then what we know about our self. I guess this also makes us a resource and at the same time product of Google.

Writer – Rubayat M.

0

About Internet of Things and What You Need to Know

Wearable Device

Definition of Internet of Things – IoT

Independent individual devices connected with each other or to system to share information over the standard internet.

This is a cloud based system. IoT or Internet of Things does not mean artificial intelligence, but they can be part of an AI. They usually perform some certain tusk, but together they create an ecosystem. In other word, it is more than a machine to machine communication without human interaction.

Impact and Use

It’s impact and use is huge. From regular house hold application to health, transportation to large-scale industry. One example – lets say your favorite yogurt is out of stock. Your IoT equipped fridge (it comes with sensor and knows it’s inventory list) will then use the home WiFi to contact the yogurt company’s ordering server and place order for you. Your per-approved credit will make the payment. Yogurt company then send the ordered items to your house. The whole inventory maintenance happens without any action from you.

History of Internet of Things

Carnegie Mellon University

Carnegie Mellon University

The idea was first discussed at the begging of 80s.In 1982 a coke vending machine was placed in Carnegie Mellon University. The machine was able to send report about the inventory to the main system automatically. The name Internet of Things was first used in 1985 by Peter T.Lwise at US FCC meeting. In his speech Peter talked about interconnected devices and how it can be used to ease the system of collecting data and managing system. Even though it took some time, but at the end of 90s the concept became popular.

 

Common Internet of Things Devices

Wearable Deceives

Wearable devices are the device that people ware in their hand like wristwatch. These are connected to internet. It send and receive data. Some shows live update of text message or phone call.
Examples: Fitbit, jawbone used to collect user’s physical movement and update the online database.

Household Devices

Nest Thermostat

Nest Thermostat

Smart thermostat :   These devices can collect the weather data and save user preference. Based on that, the device can set the house temperature.
Example -Nest Thermostat

Home Assistant :
Amazon Echo. Users can verbally ask Alexa to play music, provide a weather report,

 

 

Transportation : Public transportation system has WiFi, that connect millions other devices. Some personal cars also connected to internet. So users can use that. This system also connect other cars as well.
Example : Connected cars

 

What you need to know – The Good, The Bad and The Ugly

The Good : Ease of Life

If properly use, IoT or Internet of Things are a big blessing for us. One good example of this – the Fall Alarm Devices used by the elderly people or nursing home. These devices can send a distress call, if the person who is wearing this fell or have a medical emergency.

The Bad : Security

Most of the IoT or Internet of Things devices that we use these days are not secured. They are easy to compromise. For example – if a hacker is able take control of the home  smart thermostat (IoT or Internet of Things device), they can do damage to the home. Like in -25C cold temperature, if the home heating system is turned off,  it will create serious damage. Like the water pipe could get frozen and that can eventually cause flood.

The Ugly : Privacy

IoT or Internet of Things devices maker companies collect users information. But with whom do they share this information ? How extent does this sharing goes ? How the other companies is going to use that information ? Because of this information sharing, what if someones social  reputation is damaged whom should they  contact to rectify the problem ? There is no specific guide line about this.

IoT or Internet of Things is a great thing. But it will only became truly helpful once –
These deceives become fully secured
and
The companies who makes them – start strictly following the ethical and consumer guideline.

Writer – Rubayat M.

Disclaimer – all images collected from internet. Please let us know if there is any concern or copyright issue regarding these images. We will remove them.

0

All About Electric Car and Hybrid Car

Tesla

I am planing to buy a new car. So I have been doing my research on different cars and technologies.Based on my research findings – I found that there are mainly four different types of technology. They are electric, hybrid , hydrogen cell and conventional. Conventional cars are the one that we know as the regular cars that we use present days. Here is what I have found.

Electric

Electric cars also known as Battery electric vehicles or BEV. These car has electric motor and rechargeable batteries. Electric motor get the power from the batteries to move. Batteries also supply power to the rest of the system. Like headlight, wiper etc. Once the battery charge is depleted, they can be recharged from a electrical outlet. Most of them do not have any conventional transmission – as it is not required.

Tesla is a good example of electric car.

Tesla

Tesla – courtesy internet

How Tesla Works

Tesla cars are full electric. Tesla cars have batteries. And just like a cell phone, drivers need to recharge it. They can use a standard electrical outlet to recharge their car. Once the batteries have enough juice, the car can be driven and when the batteries are depleted, drivers need to recharge it again.

 

Hybrid

Hybrids care are between conventional car and electric car. Hybrid cars has battery, electric motor and gasoline engine. The best thing about the hybrid is that gasoline engine doesn’t have to work as hard and thus uses less fuel. Hybrids also get better mileage.

There are 2 main types of hybrid

Conventional Hybrids

During startup, the car use juice from battery to run the electric motor. When the battery charge is depleted, the gasoline engine kicks in and start powering the electric motor and also recharge the battery.When maximum acceleration is needed, both can work together.

Toyota Prius is the best example of hybrid car

Toyota Prius

Toyota Prius courtesy internet

How does Toyota Prius work?

During start-up and low speeds, the Prius is powered only by the electric motor, which is fed by the battery. As the battery charge is depleted, the gasoline engine responds by powering the electric generator, which recharges the battery.

 

Plug-in Hybrids

Plug-in hybrids has the same functionality like a Conventional hybrids. Major difference is –

  • These car can be plugged in to an electric outlet to recharge their batteries.
  • At the same time batteries can also be recharged when the car is on move. (like a conventional hybrid )
  • Their batteries are larger then the Conventional hybrid’s batteries. Plug-in hybrids cars can go longer distances on electric power. And just like Conventional hybrids, when maximum acceleration is needed, both can work together.

Mitsubishi’s Outlander PHEV is good example of Plug-in hybrids.

 

Hydrogen Fuel Cell

Fuel cell is a device that convert chemical energy to electricity. Fuel cells are different then battery. Battery holds electric charge and gets depleted when use. But fuel cells can continuously create electricity as long as there is a continues supply of source chemical.Fuel cell use hydrogen gas as source chemical and then it mix oxygen with it.

Benefits of Fuel Cell

  • By products are heat and water.Which is environment friendly.
  • Two to threes times more efficient than traditional combustion engines.

 

So what is the best option ?

This is hard to answer. It depends on personal preference and financial situation.

Electric Car

Good : if you live in big city. Big cities has more more people and base of that more charging stations. So in the middle of your daily commute, if your electric car lost it’s charge, you can call a tow truck and while you are wating, you are not in danger. Beside they are environment friendly.

Bad : If you live in a rural area. Less population means less charging station. Yes you can always charge your car at your home, but what if your car’s charge depleted, in the middle of nowhere ? You are stranded in the middle of no where. Besides electric cars are still very expensive. Close to $100,000 UD dollar.

Conventional Car

There is nothing much to choose – you know your budget and what you are looking for. You can a good deal from any car dealer.

Hydrogen Fuel Cell

This is another environment friendly car.

Hybrid Car

This is the best options. They are environment friendly and good on gas.

 

Writer – Rubayat M.

0

How Expensive is Formula 1

formula-1-car

The Formula One came from the European Grand Prix Motor Racing. Grand Prix motor started in France around 1890. After the second world war, Grand Prix racing teams agreed upon to make some changes to the racing industry. That is when the idea of Formula 1 racing was born.

The reason it called Formula 1 or F1 because unlike Grand Prix Motor Racing, Formula 1 maintain some strict guideline or rules. These guideline or rules ware first imposed in 1950. Over the years many of the guidelines has been changed or updated Here are some of the guidelines or rules-

Guideline 1 : Chassis

  • An F1 car can be no more than 180 cm wide and 95 cm tall. There is no rule for maximum length.
  • The car must only have four wheels
  • Front two will be used for steering
  • Rear two will use for drive.
  • The cockpit must survive a 25 kN or 5,600 lbf) of pressure.

Guideline 2 : Engine

Engine size not not allowed to exceed 2.4L. The crankshaft must be made of steel or cast iron. As a matter of fact engine design need to follow the maximum number of guidelines.

Guideline 3 : Refueling

Every car starts with a full tank and refueling is no longer permitted during the race.

Guideline 4 : Tires

Currently there is only one official supplier – Perelli. Tires comes with five difference specification – ultra soft, super soft, soft, medium and hard. Different types of tines can only be used based on track condition. So same type of tire cannot be used in all types track.

Guideline 5 :How Winner is Decided

Winners are decided by number of points. To earn points, driver may not need to complete the race, but 90% of the racing distance must be completed during a race.

Guideline 6 : Communication between Driver and Team

  • Driver must drive the car completely unassisted.
  • Racing teams are prohibited to supply all types of track related information to the driver.
  • Driver need to win and complete the race using his driving skill and cars performance.
  • There are may other guidelines and regulation for safety and standards

 

Drivers License

Formula 1 driving license criteria list is quite long. No one can drive a Formula 1 car without a FIA Super License. To be a Formula 1 driver, one must have long driving experience.Here are few of them –

  • They must be 18 years or older and meet strict performance standards.
  • Driver must an experienced race driver and only one way to do that is to be in the racing industry for long time,
  • Driver must have different type of speed racing experience and must win numerous race. Because this is how they will collect points. Once a driver accumulated certain point they can apply for a formula 1 drivers license.
  • Licenses fess (include all regulatory fees) can go more then US $250000 dollars a year.
formula-1-logo

Formula 1 Official Logo

Speed Record

Gilles-Villeneuve (Canada) 325 km/h (203 mph),
Indianapolis (USA) 335 km/h (210 mph),
Maxium Monza (Italy) 360 km/h (225 mph).

 

Cost of the Car

Cost of the car depends on the team. Teams like Mclaren and Ferrari can spend up-to $500 million in a session. The car itself has many parts and each has it’s individual price. But the engine is the most expensive section. 2011 Mercedes spent $178.6 million on its F1 engine division.

So it all cost of the car depends how much each team is spending on different parts. On an average each formula 1 car can cost more then five million.

Driver’s Salary

Formula 1 is the ultimate goal for a speed car racer and only few can make it. It is the most expensive sporting event. Depends on the racing team, a driver can easily make millions in a years. Here are some of the driver who made big in 2016

  • Sebastian Vettel (Ferrari) – $50 million (£33.4m)
  • Fernando Alonso (McLaren) – $40 million
  • Lewis Hamilton (Mercedez) – $31 million
  • Daniel Ricciardo (Red Bull) $5.5 million
  • Pastor Maldonado (Renault) $3.2 million
  • Felipe Nasr (Sauber) $185k

Writer – Rubayat M.

1

Carleton University of Canada is The Latest Victim of Hacking Attack

NewspaperNov 29, 2016 Carleton University of Canada confirms their computer network was attacked by ransomware. Mostly the windows based systems ware compromised. To stop further attack and to fix the issue, users ware advised not to use windows based system.

University’s other operation remains unchanged and classes continued without interruption.

Attacker demands payment in bitcoins. To release the encrypted files, they demanded two bitcoin per machine which is equal to $38,941 (Canadian dollar). But university management did not pay anything. Systems are coming back online slowly when we wrote this article.

Carleton University  (www.carleton.ca) is located in Ottawa, capital of Canada. University was found in 1942.

What is Ransomware ? Click here to learn more about Ransomware.

Writer – Rubayat M.

 

Latest technology news from all over the world. Technology is constantly changing and it’s hard to keep up with it. This is Linkmeshin Blog’s effort to keep you posted all the time with interesting tech news.

0

Coolest Online Translator

I love online translator. This beautiful piece of technology makes our life easy and interesting. It’s not just a tool for translating language, but it is a great tool to learn new language also. Thanks to online-translator, now I can say – “hello”, “good morning” and “how are you” in more than 5 different major languages fluently.

Reliable Online Translator
Every body has their own choice. But still most people use Google or Bing when it comes to translate language. But there are other similar services is available also. So which one is a reliable online translator ? I decided to conduct some research on it.

** Please remember, purpose of this article is not to do marketing for any online-translating service.

How I conducted the research ?

  • My criteria : I start looking for online-translator service that support Bengali or other less known language.
  • Step 1: first I select Google and Bing, as they are the two most prominent online-translating service.
  • Step 2 :Then I use Google search engine with the following query “Online translator”. And I randomly selected few from the first page.
  • Step 3 : I open the each website (from step 2) and start exploring, how many of this online translator service support Bengali and other less known languages.

** Wikipedia link for Bengali

And these are my findings –

PROMPT online translator
Website: http://www.online-translator.com

prompt-online-translator

prompt-online-translator

PROMT is the company that created the “www.online-translator.com“. PROMT was founded in 1991 by two researcher from Herzen University (St. Petersburg, Russia). PROMT is marketing its software in Europe and the USA. The company has opened a subsidiary in Germany and is developing distribution networks in Germany, Austria, Switzerland, France, Spain, the United Kingdom, Portugal, Italy, the USA, Canada, and other countries. One thing I notice – some other online-translator service use PROMT’s translating engine.
PROMPT online translator do not support Bengali or other lesser known language. They support less than 20 different language.

 

Collins
Website : http://www.collinsdictionary.com/translator

Collins Online translator

Collins Online translator

Collins has been publishing educational and informative books for almost 200 years. They produce resources for UK and International curricula to support teachers and pupils at school and outside the classroom environment. This is one of the oldest running company who deals with education and language-translation related services. Their corporate website http://www.collins.co.uk/
Collins online translator do not support Bengali or other lesser known language.

 

Worldlingo
Website : http://www.worldlingo.com/products_services/worldlingo_translator.html

Worldlingo

Worldlingo online translator

Worldlingo support less than 20 different language. But also support on-request based translation. Their website did not mention clearly who they are and how long they are in the business. Worldlingo online translator do not support Bengali or other lesser known language.

 

 

 

Google

Google Online translator

Google Online translator

Google offers two different methods to translate language

  • Method 1 : You can go to https://translate.google.ca and translate language.
  • Method 2 : You type in the search box “Translate aeroplane ” and hit search. It will give you another search box and some options. Surprisingly Method 2 offers more options.

You can actually hear how the word is pronounced by different accent ! Something that no other online translator service offer. Yes – Google online translator support Bengali and many other lesser known language.

 

Microsoft Bing
Website : http://www.bing.com/translator

Bing online translator

Bing online translator

For the last few years Microsoft has been trying to make Bing a popular search engine. I must say they have made some significant improvement. But I was surprised to find one specific language that Bing online-translator service offers.

First of all – Yes Bing online translator support Bengali and some other lesser known language. And Microsoft Bing online translator is the only online translator that supports Klingon !!! Yes Klingon !!! This makes Bing online translator is most coolest online translator.

** Wikipedia link for Klingon

 

 


Conclusion
Language translation is in its advanced stage. But it is still evolving.Yes there are many other online-translator service available, but if you need to translate a language for professional or business purpose, then it is better to use a professional service. Must say again, it is a great tools to learn new language and words.

Phila futhi eside ube nempumelelo (Zulu)

Writer – Rubayat M.

0

Cellphone Encryption – do we need it or not

encryption-graphics-image

Encryption (Image Source PCMag)

Encryption is one of the most discussed topic through out the year 2016. At the beginning of 2016 tech giant Apple was involved in a legal battle with FBI regarding Apple’s encryption technology. This legal battle raises many questions and concerns about encryption.

We are here to shed some light on the encryption technology and to understand whether we need to encrypt our phone or not. Not to discuss about the legal battle.

 

 

What is encryption

Before we go further, let me explain, what is encryption-
Encryption is the process of convert readable information in such a way that only authorized parties can read it. Here is a simple example:
Plain message “welcome to linkmeshin blog”
Encrypted message “w2345 5abbjdy3 tas563dfr afdrer 66ggww rt2swe”

Encryption is not a security tool like antivirus or firewall. Some one who do not have authority, will not be able to see the actual message. Authorized user will require another technology called “decryption” to convert the encrypted message to a plain message again. Encryption and decryption is an extremely complex algorithm. A topic that I will discuss in another article.

 

Who use encryption

Cell-phone

Cell phone

In past only government and large corporation used to use encryption in their devices. Present days most the latest mobile and non-mobile(laptop, desktop, tablet etc.) devices available for general consumers comes with encryption technology. If you use upgraded version of Windows 7 or upgraded version of Android or upgraded version OS Mac OS, then you already have the encryption technology in your possession.

 

 

 

Do you actually need encryption ?

For your cell phone – yes, as it the most common device people lost frequently or stolen frequently. For other device it is a personal choice. Here is the most important reason – encryption add protection in case your device is stolen. If your cell phone is stolen, the bad guy will have access to the following-

  • Private correspondence (your personal or business contact, email account)
  • Personal details (Your home address, personal and family picture)
  • Sensitive company information (if your work provide the phone)
  • Financial information ( Bank-account information, Credit-card information )
  • Social network information (Facebook, Instagram, snap chat and similar other)
  • Professional network information (LinkedIn, Twitter and other related network.)
  • Social Security numbers(if you save it in your phone)

Even though most thieves will not try too hard to break the encryption, as they are more interested in the device it self. So they will wipe the data and sale it. But still it is a good practice to encrypt the phone.

 

Final word
Encryption is a method to scramble information for protection. In case you lost your phone or some one stole your phone, your personal information will be safe if you encrypt your phone. Now a days most of us have a regular human life and then a digital life. We do everything to keep our regular life protected and safe. It is time to think seriously about the security of our digital life.

 

Writer – Rubayat M.

 

 

0

Tribute to Dennis Ritchie

dennis_ritchie

Dennis Ritchie

Every once in while human civilization get a forward leap by the work of some individual. In the past we had Galileo, Newton, Einstein and others. In our life time we have Hawkins. All these individuals had different work field and had significant impact in their own respective areas. Because of the nature of their work, it’s not possible to compare each person’s achievement or work with another. But their work impacted and shapes our life. They are all well-respected to all of us. We always wanted to be someone like them. One such unique Individual was Dennis Ritchie.

 

Short Bio
Dennis Ritchie was born in Bronxville, New York in September 9, 1941. His father Alistair E. Ritchie was a scientist at Bell Labs and co-author of The Design of Switching Circuits on switching circuit theory. Ritchie went to Summit High School and graduated from Harvard University with degrees in physics and applied mathematics. Even though he defended his PhD thesis in 1968 on “Program Structure and Computational Complexity” but never officially received his PhD.

In 1967, Ritchie began working at the Bell Lab’s Computing Sciences Research Center. Ritchie worked together with another legend Ken Thompson. Ken was the designer of the original UNIX operating system. Ritchie made some important contributions to UNIX. But his most significant work was creating the C programming language.

ken_thompson_dennis_ritchie

Ken Thompson & Dennis Ritchie

Ritchie wins numerous awards in his life. On April 21, 1999 he along with Thompson received the National Medal of Technology from President Bill Clinton. They were given the award because “their work led to enormous advances in computer hardware, software, and networking systems and stimulated growth of an entire industry, thereby enhancing American leadership in the Information Age”.

On October 12, 2011, Ritchie was found dead at his home. He was 70. Ritchie’s full name was “Dennis MacAlistair Ritchie” but was known by his username “dmr”.

Programming Language C

Ritchie’s most significant work was the development of the programming language C. C is relatively small and portable language (it means it can be written for one computer, but can be easily run on another computer, without making any major change). This is a versatile language. That means you can write code, to make changes in the computer hardware (commonly known as driver) and you can also write code to create user interface (commonly known as software).

Impact of his work
Ritchie was a very private person through his life. His death news did not create any significant impact in social media or any main stream news media. His death was like the “death news of some well-known person”. After Ritchie’s death,

Paul E. Ceruzzi (curator of Aerospace Electronics and Computing at the Smithsonian’s National Air and Space Museum in Washington, D.C) wrote “… his name was not a household name at all, but… if you had a microscope and could look in a computer, you’d see his work everywhere inside.”

It is difficult to fathom the impact of his work. Most of the major software and computer system ware created using Ritchie’s C programming language.

But before I write the list – let me know explain about the “kernel”. All operating system has kernel. Consider it as the muscle of human body. A human body has skeleton as the base structure(as hardwire) and then has the muscle(kernel) and other parts(software) on top of skeleton. And finally we have the outer skin(user interface) as protector.

Official Definition of Kernel
The core of an operating system of a computer, responsible for resource allocation, file management, and security.

Here is the list of some of the major software and computer system used by billions. Most of them written in C or different upgraded version of original C.

Operating System
What we use in our regular computer and handheld device as user interface.

Operating System Written in
Microsoft Windows Operating System kernel written in – C
Apple Operating System kernel written in – C
Linux Operating System kernel written in – C
Android Operating System Android is an edited version of Linux operating system. Therefore without the Linux, there is no Android.
Google Chrome Operating System kernel written in – C
Symbian Operating System Written in different upgraded version of original C (C++)

Major Browsers
Like the operating system, most of the major browsers are written in different upgraded version of original C.

Browsers Name Written in
Firefox browser Written in C and other upgraded version of original C (mostly C and C++)
Chrome browser Written in other upgraded version of original C (Objective-C and C++)
Safari browser Written in other upgraded version of original C (Objective-C and C++)
Internet Explorer browser Written in other upgraded version of original C (All C++)

Major Databases
Like the operating system, most of the major database is written in different upgraded version of original C. And these databases are used my all major and minor corporation and various governments.

Databases Name Written in
Oracle kernel is written in C
SAP – Sybase Adaptive Server Enterprise Written in C and other upgraded version of original C (C, C++)
Microsoft SQL Server Written in C and other upgraded version of original C. (C, C++).
MySQL Written in C and other upgraded version of original C.(C, C++)

Programming Language
Like the operating system, most of the Programming Language are written in C and other different upgraded version of original C.
Widely use languages are –
C++, C–, C#, Objective-C, Java, JavaScript, Perl, PHP, Python
Other languages are –
AMPL, AWK, csh, BitC, D, Go, Julia, Limbo, LPC, Pike, Processing, , Rust, Seed7, Vala, Verilog.

Other Hardware Devices
Our home internet router and many other devices like that is has tiny operating system or instruction set. Which was written using C or a different upgraded version of original C.

Our Tribute to Dennis Ritchie
Think about a world without computer, cell phone, internet? Our life and our modern economy are practically standing on this these. Our life would be completely different without these technologies and devices. Ritchie’s work shapes these technology and thus shapes our life. Famous tech giants and billionaires are actually standing on Ritchie’s shoulders. We are forever grateful to this person.

Writer – Rubayat M.