An ATM, or automated teller machine, allows bank customers to access their accounts and perform transactions like withdrawing cash or checking balances without interacting with a human teller. The document provides a history of the first ATM, how ATMs work by connecting to bank networks, common security features of ATMs, and tips for safe ATM usage. Modern ATMs use encryption and other technologies to securely process transactions and protect customers' financial information.
Watch the presentation about Presentation On ATM Technology .I have explained the detail of ATM in a concise manner.For any doubts message us.
Best Wishes
#ATM #ATMTECHNOLOGY #Atmtechnology
Watch the presentation about Presentation On ATM Technology .I have explained the detail of ATM in a concise manner.For any doubts message us.
Best Wishes
#ATM #ATMTECHNOLOGY #Atmtechnology
Government Developed ATM Machine those people who do not a stand for a rank of row. Maximum People is attract this system because it is time consuming and user friendly. Government provide many security of that system like, ATM Card No., PIN No
Government Developed ATM Machine those people who do not a stand for a rank of row. Maximum People is attract this system because it is time consuming and user friendly. Government provide many security of that system like, ATM Card No., PIN No
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Seminar on atm
1. Seminar
On
ATM
Submitted To:
Mrs. Debaswpna Mishra
Asst. Prof.,CSA Dept.
Submitted By:
Mr. Jyotiprakash Das
Roll No-58MCA/11
MCA 5th Semester
Orissa University of Agriculture & Technology, Bhubaneswar
2. Table of Contents
1. Introduction
2.Names
3. History
4. Networking
5. ATM Charges
6. Hardware and Software
6.1 Reliability
7. ATM Card VS Credit Card
8. How ATM Works
8.1 Parts of Machine
8.2 Settlement funds
9. Security
9.1 Tips for Safe ATM usage
10. New Innovations
Glossary
3. AUTOMATIC TELLER MACHINE
Introduction :
An Automatic Teller Machine (ATM) is a machine permitting a Bank’s
customers to make cash withdrawals and check their account at any time and
without the need for a human teller. Many ATMs also allow people to deposit cash
or cheque and transfer money between their bank accounts.
You're short on cash, so you walk over to the automated teller machine (ATM),
insert your card into the card reader, respond to the prompts on the screen, and
within a minute you walk away with your money and a receipt. These machines can
now be found at most supermarkets, convenience stores and travel centers. Have
you ever wondered about the process that makes your bank funds available to you
at an ATM on the other side of the country?
4. ATMs are a quick, convenient way to access money in your accounts.
5. Names:
ATMs are known by a wide variety of names, some of which being
more common in certain countries than others. Some examples are:
Automated Teller Machine
Automated Banking Machine
ATM Machine sic
Hole-in-the-wall
Cash Dispenser
Cash Machine
Robotic Teller
Cash point (in the United Kingdom particularly)
Bancomat or Bank mat (particularly in continental
Europe Bancomat is a trademark of UBS AG
Geld automat Germany (Geld = money)
Post mat, Switzerland (Swiss Post Bank ATM)
Bank machine (in Canada)
MAC machine, or MAC, (for Money Access Center)
(particularly on the East coast in the United States, esp.
New Jersey and Pennsylvania)
Ugly Teller
6. History
The world's first ATM was installed in Enfield Town in the London Borough of
Enfield London on June 27, 1967 by Barclays Bank.
In modern ATMs, customers authenticate themselves by using a plastic card
with a magnetic stripe, which encodes the customer's account number, and
by entering a numeric pass code called a PIN (personal identification
number), which in some cases may be changed using the machine.
Typically, if the number is entered incorrectly several times in a row, most
ATMs will retain the card as a security precaution to prevent an unauthorized
user from working out the PIN by pure guesswork.
7. Networking
Most ATMs are connected to interbank networks, enabling people to
withdraw money from machines not belonging to the bank where they have
their account. (Deposits can only be made at machines belonging to the
bank that has the account.) This is a convenience, especially for people who
are travelling: it is possible to make withdrawals in places where one's bank
has no branches, and even to withdraw local currency in a foreign country,
often at a better exchange rate than would be available by changing cash.
ATM Charges
Many banks in the USA charge fees for the use of their ATMs by nondepositors, for withdrawals over the network by their own customers, or both;
however, in the UK strong public reaction soon persuaded banks not to do
this. There is also now a flourishing business in the United States of placing
ATMs in grocery stores, malls, and other locations other than banks: some of
these machines have signs advertising "low" fees.
8. Hardware and Software
ATMs contain secure crypto processors, generally within an IBM PC
compatible host computer in a secure enclosure. The security of the machine
relies mostly on the integrity of the secure crypto processor: the host software
often runs on a commodity operating system.
9. In-store ATM
In store ATMs typically connect directly to their ATM Transaction Processor
via a modem over a dedicated telephone line, although the move towards
Internet connections is under way. Along with the move to the internet, ATMs
are moving away from custom circuit boards (most of which are based on
Intel 8086 architecture) and into full fledged PCs with commercial operating
systems like Windows 2000 and Linux. A good example of that is Banrisul,
the largest bank in the South of Brazil, which has replaced the MS-DOS
operating systems in its automatic teller machines with Linux. Also are used
RMX 86, OS/2 and Windows 98 bundled with Java. The newest use
Windows XP or Windows XP embedded.
Reliability
ATMs are generally reliable, but if they do go wrong customers will be left
without cash until the following morning or whenever they can get to the bank
during opening hours. Of course, not all errors are to the detriment of
customers; there have been cases of machines giving out money without
debiting the account or giving out a higher denomination of note by mistake.
Sometimes annoying software errors can occur which can appear as a dialog
10. ATM CARD VS CREDIT CARD
The card you use at the ATM is known as a debit card. When debit cards
first appeared it was easy to tell them apart from credit cards. Debit cards
didn't have a credit card company logo on them; instead, they usually just
had your bank name, your account number and your name.
Today debit cards look exactly like credit cards even carrying the same
logos. Both types of cards can be swiped at the checkout counter , used to
make purchases on the internet, or to pay for the fill-up at the gas pump.
When you use your debit card to make a purchase, it's just like using cash.
The account that is attached to your debit card, in most cases your checking
account, is automatically debited when you use your debit card. The cost of
your purchase is deducted from the funds you have in that account.
On the other hand, when you use your credit card to make a purchase you
are using someone's else's money, specifically the issuer of the credit card,
usually
a
banking
institution.
In effect, you agree to pay them back the money you borrowed to make
your purchase. In addition you will also pay interest on the money "loaned"
to you at the rate which you agreed to when you applied for their credit card.
This is known as the annual percentage rate (APR).
11. The protection offered to debit card fraud is similar but with a few exceptions. For
example, your liability under federal law is limited to $50, the same as for a credit
card, but only if you notify the issuer within two business days of discovering the
card's loss or theft. Your liability for debit card fraud can jump up to $500 if you don't
report the loss or theft within two business days.
And if you are the type of person that gives a passing glance to your monthly bank
statement, you could be totally liable for any fraudulent debit card charges if you wait
60 days or more from the time your statement is mailed.
Additional protection against fraudulent use of your credit or debit cards may be
available through your homeowner's or renter's insurance. Check your policy or with
your agent for more information about your coverage.
Also be aware that you should contact your card issuer by certified letter, return
receipt requested, after you've contacted them by phone to protect your consumer
rights.
12. As for which card to use for what type of purchase, most experts agree that you
should use your debit card for the same type of purchases you'd make as if you
were using cash. Therefore, it makes more sense to use your debit card than your
credit card at the grocery store or gas station (provided you have sufficient funds to
cover these purchases of course).
You should avoid using your debit card for any online purchase or for something
which is expensive. Why ? The main reason is that it is much easier to dispute a
charge when you use your credit card. If your gold-plated, limited edition, hipswinging Elvis wall clock arrives broken, your credit card company will remove the
charge until the problem is resolved.
With your debit card you are stuck dealing with the merchant directly to resolve any
problems with a purchase, even if your banking institution could really use a goldplated, limited edition, hip-swinging Elvis wall clock of their very own.
13. How
Do
ATMs
Work?
An ATM is simply a data terminal with two input and four output devices. Like any
other data terminal, the ATM has to connect to, and communicate through, a host
processor. The host processor is analogous to an Internet service provider (ISP) in
that it is the gateway through which all the various ATM networks become available to
the cardholder (the person wanting the cash).
Most host processors can support either leased-line or dial-up machines. Leasedline machines connect directly to the host processor through a four-wire, point-topoint, dedicated telephone line. Dial-up ATMs connect to the host processor through
a normal phone line using a modem and a toll-free number, or through an Internet
service provider using a local access number dialed by modem.
14. Leased-line ATMs are preferred for very high-volume locations because of their thruput capability, and dial-up ATMs are preferred for retail merchant locations where
cost is a greater factor than thru-put. The initial cost for a dial-up machine is less
than half that for a leased-line machine. The monthly operating costs for dial-up are
only a fraction of the costs for leased-line.
The host processor may be owned by a bank or financial institution, or it may be
owned by an independent service provider. Bank-owned processors normally
support only bank-owned machines, whereas the independent processors support
merchant-owned machines.
15. Parts of the Machine
You're probably one of the millions who has used an ATM. As you know, an ATM has
two input devices:
16. Card reader - The card reader captures the account information stored on the
magnetic stripe on the back of an ATM/debit or credit card. The host processor uses
this information to route the transaction to the cardholder's bank.
Keypad - The keypad lets the cardholder tell the bank what kind of transaction is
required (cash withdrawal, balance inquiry, etc.) and for what amount. Also, the bank
requires the cardholder's personal identification number (PIN) for verification. Federal
law requires that the PIN block be sent to the host processor in encrypted form.
And an ATM has four output devices:
Speaker - The speaker provides the cardholder with auditory feedback when a key is
pressed.
Display screen - The display screen prompts the cardholder through each step of
the transaction process. Leased-line machines commonly use a monochrome or color
CRT (cathode ray tube) display. Dial-up machines commonly use a monochrome or
color LCD.
Receipt printer - The receipt printer provides the cardholder with a paper receipt of
the transaction.
Cash dispenser - The heart of an ATM is the safe and cash-dispensing mechanism.
The entire bottom portion of most small ATMs is a safe that contains the cash.
17. The cash-dispensing mechanism has an electric eye that counts each bill as it exits
the dispenser. The bill count and all of the information pertaining to a particular
transaction is recorded in a journal. The journal information is printed out periodically
and a hard copy is maintained by the machine owner for two years. Whenever a
cardholder has a dispute about a transaction, he or she can ask for a journal printout
showing the transaction, and then contact the host processor. If no one is available to
provide the journal printout, the cardholder needs to notify the bank or institution that
issued the card and fill out a form that will be faxed to the host processor. It is the
host processor's responsibility to resolve the dispute.
18. Besides the electric eye that counts each bill, the cash-dispensing mechanism also
has a sensor that evaluates the thickness of each bill. If two bills are stuck
together, then instead of being dispensed to the cardholder they are diverted to a
reject bin. The same thing happens with a bill that is excessively worn, torn, or
folded.
The number of reject bills is also recorded so that the machine owner can be
aware of the quality of bills that are being loaded into the machine. A high reject rate
would indicate a problem with the bills or with the dispenser mechanism.
19. Settlement Funds
When a cardholder wants to do an ATM transaction, he or she provides the
necessary information by means of the card reader and keypad. The ATM forwards
this information to the host processor, which routes the transaction request to the
cardholder's bank or the institution that issued the card. If the cardholder is
requesting cash, the host processor causes an electronic funds transfer to take
place from the customer's bank account to the host processor's account. Once the
funds are transferred to the host processor's bank account, the processor sends an
approval code to the ATM authorizing the machine to dispense the cash. The
processor then ACHs the cardholder's funds into the merchant's bank account,
usually the next bank business day. In this way, the merchant is reimbursed for all
funds dispensed by the ATM.
So when you request cash, the money moves electronically from your account to the
host's account to the merchant's account.
20.
21. ATM Security
Early ATM security focused on making the ATMs invulnerable to physical attack;
they were effectively safes with dispenser mechanisms. A number of attacks on
ATMs resulted, with thieves attempting to steal entire ATMs by ram-raiding.
Modern ATM physical security concentrates on denying the use of the money inside
the machine to a thief, by means of techniques such as dye markers and smoke
canisters. This change in emphasis has meant that ATMs are now frequently found
free-standing in places like shops, rather than mounted into walls.
Another trend in ATM security leverages the existing security of a retail
establishment. In this scenario, the fortified cash dispenser is replaced with nothing
more than a paper-tape printer. The customer requests a withdrawal from the
machine, which dispenses no money, but merely prints a receipt. The customer then
takes this receipt to a nearby sales clerk, who then exchanges it for cash from the
till.
ATM transactions are usually encrypted with DES but most transaction processors
will require the use of the more secure Triple DES by 2005.
There have also been a number of incidents of fraud where criminals have used
fake machines or have installed fake keypads or card readers to existing machines.
They have used these to record customers' PIN numbers and bank accounts and
have then used this information to create fake accounts and steal money from
consumers.
A bank is always liable when a customer's money is stolen from an ATM, but there
have been complaints that banks have made it difficult to recover money lost in this
way.
22. Many banks recommend that you select your own personal identification number
(PIN). Visa recommends the following PIN tips:
Don't write down your PIN. If you must write it down, do not store it in your
wallet or purse.
Make your PIN a series of letters or numbers that you can easily remember,
but that cannot easily be associated with you personally.
Avoid using birth dates, initials, house numbers or your phone number.
Visa also recommends the following tips for safe ATM usage:
Store your ATM card in your purse or wallet, in an area where it won't get
scratched or bent.
Get your card out BEFORE you approach the ATM. You'll be more vulnerable to
attack if you're standing in front of the ATM, fumbling through your wallet for your
card.
Stand directly in front of the ATM keypad when typing in your PIN. This prevents
anyone waiting to use the machine from seeing your personal information.
After your transaction, take your receipt, card and money away. Do not stand in
front of the machine and count your money.
23. If you are using a drive-up ATM, get your vehicle as close to the machine as
possible to prevent anyone from coming up to your window. Also make sure that your
doors are locked before you drive up to the machine.
Do not leave your car running while using a walk-up ATM. Take your keys with you
and lock the doors before your transaction.
If someone or something makes you uncomfortable, cancel your transaction and
leave the machine immediately. Follow up with your bank to make sure the
transaction was cancelled and alert the bank to any suspicious people.
Many retail merchants close their store at night. It is strongly recommended that
they pull the money out of the machine when they close, just like they do with their
cash registers, and leave the door to the security compartment wide open like they
do with an empty cash-register drawer. This makes it obvious to any would-be thief
that this is not payday.
For safety reasons, ATM users should seek out a machine that is located in a welllighted public place. Federal law requires that only the last four digits of the
cardholder's account number be printed on the transaction receipt so that when a
receipt is left at the machine location, the account number is secure. However, the
entry of your four-digit personal identification number (PIN) on the keypad should
still be obscured from observation,
25. which can be done by positioning your hand and body in such a way that the PIN
entry cannot be recorded by store cameras or store employees. The cardholder's PIN
is not recorded in the journal, but the account number is. If you protect your PIN, you
protect your account.
New
Innovations
Several companies are advertising ATMs for the blind. These machines would be
located at kiosks rather than bank drive-thrus. For several years, the keypads at
ATMs were equipped with Braille for the blind or visually impaired.
New innovations in this technology will include machines that verbally prompt the
customers for their card, their PIN and the type of transaction they would like to
make.
26. GLOSSARY
Secure Crypto processor
: A secure crypto processor is a dedicated
computer for carrying out cryptographic operations, embedded in a packaging with
multiple physical security measures, which give it a degree of tamper resistance.
The purpose of secure crypto processor is to act as a keystone of a security subsystem, eliminating the need to protect the rest of the sub-system with physical
security measures.
Modem : The word "modem", a portmanteau word constructed from "modulator"
and "demodulator", refers to a device that modulates an analog "carrier" signal
(such as sound), to encode digital information, and that also demodulates such a
carrier signal to decode the transmitted information. The goal is to produce a signal
that can be transmitted easily and decoded to reproduce the original digital data.
Primarily used to communicate via telephone lines, modems can be used over any
means of transmitting analog signals, from driven diodes to radio.
ACH Transfer
: "ACH" is short for "automated clearing house."
terminology means that a person or business is authorizing another
business to draft on an account. It is common for fitness centers
businesses to ACH a monthly membership fee from member accounts,
small businesses use ACH for direct deposit of paychecks
Ram-Raiding
This bank
person or
and other
and many
: is the act of using a heavy vehicle such as a small truck to
smash windows, tow away heavy objects, and other such actions.
27. DES : The Data Encryption Standard (DES) is a cipher (a method for encrypting
information) selected as an official standard for the United States in 1976, though it
subsequently enjoyed widespread use internationally. The algorithm was initially
controversial, with classified design elements, suspicions about a National Security
Agency (NSA) backdoor and a relatively short key length. DES consequently
became the most intensely studied block cipher ever, and motivated the modern
understanding of the subject. The cipher has since been superseded by the
Advanced Encryption Standard (AES).