SlideShare a Scribd company logo
1 of 14
A Presentation on
REDTACTON
CONTENTS

•   Introduction
•   Human Area Network
•   Working Principle
•   Features
•   Prototypes
•   Applications
•   Merits and Demerits
•   Conclusion
INTRODUCTION
 RedTacton is a Human Area Networking technology,
 which is under development, that uses the surface
 of the human body as a safe, high speed network
 transmission path. It is completely distinct
 from wireless and infrared technologies as it uses
 the minute electric field emitted on the surface of the
 human body.
HUMAN AREA NETWORK
WORKING PRINCIPLE
 Red Tacton relies upon the principle that the optical
 properties of an electro-optic crystal can vary
 according to the changes of a weak electric field.
FEATURES:

The three main features are:
1.Touch
   Touching, gripping, sitting, walking, stepping and other
    human movements can be the triggers for unlocking or
    locking, starting or stopping equipment, or obtaining
    data
2.BROADBAND & INTERACTIVE

Device drivers can be downloaded instantly and
executable programs can be quickly sent.
3.ANY MEDIA
 In addition to the human body, various conductors and dielectrics
can be used as transmission media.

       Dielectrics                     Conductors
PROTOTYPES
APPLICATIONS
   One to one services
   Elimination of human error
   Marketing applications
   Intuitive operation
   Personalization of mobile phones
   Personalization of automobiles
   Conferencing system
MERITS:
   Data transfer is faster and easier.
   Data loss during transfer is less.
   Use of minimum amount of power.
   Security is more than in Blue tooth.
   Superior than infrared and Wi-Fi technologies.

DEMERITS:
 Used only for very short range communication.
 Personal contact is essential for data transfer.
 Equipment for transmission and receiving of RedTacton may
  prove to be costly.
CONCLUSION
 So we conclude that, RedTacton is the best
 technology when compared with other data
 communication technologies present today. In
 this technology there is no problem of hackers
 as our body is itself a media. If RedTacton is
 introduced into cyber market it brings a
 marvelous & tremendous change and will be
 adopted by many more people.
THANK YOU

More Related Content

What's hot (20)

Red Tacton
Red TactonRed Tacton
Red Tacton
 
Redtacton Presentation
Redtacton PresentationRedtacton Presentation
Redtacton Presentation
 
RedTacton
RedTactonRedTacton
RedTacton
 
Redtacton
RedtactonRedtacton
Redtacton
 
Red tacton
Red tactonRed tacton
Red tacton
 
Red tacton
Red tactonRed tacton
Red tacton
 
Red tacton
Red tactonRed tacton
Red tacton
 
Redtacton
RedtactonRedtacton
Redtacton
 
red tacton
red tactonred tacton
red tacton
 
RED TACTON
RED TACTONRED TACTON
RED TACTON
 
Redtacton
RedtactonRedtacton
Redtacton
 
Advance communication through red tacton human area networking technology
Advance communication through red tacton  human area networking technology Advance communication through red tacton  human area networking technology
Advance communication through red tacton human area networking technology
 
Human Area Networking Technology
Human Area Networking TechnologyHuman Area Networking Technology
Human Area Networking Technology
 
Redtacton
RedtactonRedtacton
Redtacton
 
Red tacton
Red tacton Red tacton
Red tacton
 
Sem
SemSem
Sem
 
REDTACTON
REDTACTONREDTACTON
REDTACTON
 
Red tacton ppt
Red tacton pptRed tacton ppt
Red tacton ppt
 
Red tacton manu
Red tacton manuRed tacton manu
Red tacton manu
 
Red tacton final ppt
Red tacton final pptRed tacton final ppt
Red tacton final ppt
 

Similar to Redtacton (20)

Red tacton
Red tactonRed tacton
Red tacton
 
Red tecton
Red tectonRed tecton
Red tecton
 
Red Tacton
Red TactonRed Tacton
Red Tacton
 
Redacton
RedactonRedacton
Redacton
 
RedTacton
RedTactonRedTacton
RedTacton
 
redtactonfinal
redtactonfinalredtactonfinal
redtactonfinal
 
Redtacton
Redtacton Redtacton
Redtacton
 
Redtacton
RedtactonRedtacton
Redtacton
 
Redtacton
RedtactonRedtacton
Redtacton
 
RED TACTON
RED TACTONRED TACTON
RED TACTON
 
Red tacton
Red tactonRed tacton
Red tacton
 
Red tacton
Red tactonRed tacton
Red tacton
 
RedTacton Technology
RedTacton TechnologyRedTacton Technology
RedTacton Technology
 
Red tacton (1)
Red tacton (1)Red tacton (1)
Red tacton (1)
 
redtacton
redtactonredtacton
redtacton
 
Myredtacton
MyredtactonMyredtacton
Myredtacton
 
Human Area Network
Human Area NetworkHuman Area Network
Human Area Network
 
RedTacton HAN
RedTacton HANRedTacton HAN
RedTacton HAN
 
Redtacton Technology Intro
Redtacton Technology IntroRedtacton Technology Intro
Redtacton Technology Intro
 
Redtacton
RedtactonRedtacton
Redtacton
 

More from PRADEEP Cheekatla (20)

Sachin...sachin
Sachin...sachinSachin...sachin
Sachin...sachin
 
White led
White ledWhite led
White led
 
Tracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networksTracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networks
 
The bio chips
The bio chipsThe bio chips
The bio chips
 
Tablet pc
Tablet pcTablet pc
Tablet pc
 
Super speed usb3.0
Super speed usb3.0Super speed usb3.0
Super speed usb3.0
 
Spect technology
Spect technologySpect technology
Spect technology
 
Smart note taker
Smart note takerSmart note taker
Smart note taker
 
Skinput
SkinputSkinput
Skinput
 
Rf controlled fire fighting robot
Rf controlled fire fighting robotRf controlled fire fighting robot
Rf controlled fire fighting robot
 
Remote accident report system for highways using rf
Remote accident report system for highways using rfRemote accident report system for highways using rf
Remote accident report system for highways using rf
 
Paper battery
Paper batteryPaper battery
Paper battery
 
Night vision technology
Night vision technologyNight vision technology
Night vision technology
 
Magnetic levitation trai ns
Magnetic  levitation  trai nsMagnetic  levitation  trai ns
Magnetic levitation trai ns
 
Image compression using singular value decomposition
Image compression using singular value decompositionImage compression using singular value decomposition
Image compression using singular value decomposition
 
Haptics touch the virtual
Haptics touch the virtualHaptics touch the virtual
Haptics touch the virtual
 
Crusoe processor
Crusoe    processorCrusoe    processor
Crusoe processor
 
Audio spotlighting
Audio spotlightingAudio spotlighting
Audio spotlighting
 
3 d integrated circuits
3 d integrated circuits3 d integrated circuits
3 d integrated circuits
 
Bluejacking
BluejackingBluejacking
Bluejacking
 

Recently uploaded

The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

Redtacton

  • 2. CONTENTS • Introduction • Human Area Network • Working Principle • Features • Prototypes • Applications • Merits and Demerits • Conclusion
  • 3. INTRODUCTION RedTacton is a Human Area Networking technology, which is under development, that uses the surface of the human body as a safe, high speed network transmission path. It is completely distinct from wireless and infrared technologies as it uses the minute electric field emitted on the surface of the human body.
  • 5. WORKING PRINCIPLE Red Tacton relies upon the principle that the optical properties of an electro-optic crystal can vary according to the changes of a weak electric field.
  • 6. FEATURES: The three main features are:
  • 7. 1.Touch  Touching, gripping, sitting, walking, stepping and other human movements can be the triggers for unlocking or locking, starting or stopping equipment, or obtaining data
  • 8. 2.BROADBAND & INTERACTIVE Device drivers can be downloaded instantly and executable programs can be quickly sent.
  • 9. 3.ANY MEDIA In addition to the human body, various conductors and dielectrics can be used as transmission media. Dielectrics Conductors
  • 11. APPLICATIONS  One to one services  Elimination of human error  Marketing applications  Intuitive operation  Personalization of mobile phones  Personalization of automobiles  Conferencing system
  • 12. MERITS:  Data transfer is faster and easier.  Data loss during transfer is less.  Use of minimum amount of power.  Security is more than in Blue tooth.  Superior than infrared and Wi-Fi technologies. DEMERITS:  Used only for very short range communication.  Personal contact is essential for data transfer.  Equipment for transmission and receiving of RedTacton may prove to be costly.
  • 13. CONCLUSION So we conclude that, RedTacton is the best technology when compared with other data communication technologies present today. In this technology there is no problem of hackers as our body is itself a media. If RedTacton is introduced into cyber market it brings a marvelous & tremendous change and will be adopted by many more people.