Category Archives: Internet

6

Difference Between WiMAX and Wi-Fi…………..

WiMAX and Wi-Fi are wireless technologies. “WiMAX” stands for “Worldwide Interoperability for Microwave Access” and “Wi-Fi” stands for “Wireless Fidelity.” They are different from each other in many ways. In this article we will discuss WiMAX IEEE 802.16 and Wi-Fi 802.11.

WiMAX has two different versions; fixed and mobile versions. The mobile version is 802.16 m and can replace CDMA and GSM technologies. The fixed version is 802.16d, and 802.16e is used for home whereas Wi-Fi which comes in 802.11 families has many versions like 802.11a, 802.11b, 802.11g, and 802.11n

Wi-Fi operates in spectrum which is unlicensed. It may interfere with each other and with cordless phones also. It can operate in uncontrolled environments along with Bluetooth, walkie-talkies, and sometimes microwave frequencies too. This results in a powerful device, and the one which is closer to the access point getting more airtime than its fair share. Whereas WiMAX was developed in a way that it requires a license. The frequencies and license has to be purchased. These frequencies are more powerful and of a higher range. It has more of control and command and can be used for cable, Internet, and DSL. It helps in providing services like video, data, voice, etc.

SHARE THE KNOWLEDGE


  

Advertisements

CSS Tools…….

Expression Web provides you with a comprehensive set of tools to create, apply, and manage styles and cascading style sheets. These tools include:

  • New Style and Modify Style: Design a new or existing style and preview the style’s appearance as you design it.
  • Apply Styles: Create, modify, apply, remove, or delete styles, and attach or remove an external CSS.
  • Manage Styles: Move a style from an internal CSS to an external CSS, or vice versa.
  • CSS Properties: See the styles that are used by the current selection in your Web page in order of precedence.
  • Style toolbar: Apply or remove class-based or ID-based styles, or create and apply new undefined styles.
  • CSS Reports: Generate a report of either CSS errors or CSS usage on one or more pages or within an entire site.
  • Style Application toolbar: Use the toolbar when authoring CSS in Manual style application mode.
  • IntelliSense for CSS: Increase your productivity when authoring and applying CSS in Code view.

SHARE THE KNOWLEDGE


  

Cloud Computing at a Higher Level……………….

        In many ways, cloud computing is simply a metaphor for the Internet, the increasing movement of compute and data resources onto the Web. But there’s a difference: cloud computing represents a new tipping point for the value of network computing. It delivers higher efficiency, massive scalability, and faster, easier software development. It’s about new programming models, new IT infrastructure, and the enabling of new business models.

Sun is developing critical technologies to deliver enterprise scale and systemic qualities to this new paradigm:

Interoperability — While most current clouds offer closed platforms and vendor lock-in, developers clamor for interoperability. Sun’s open-source product strategy and Java™ principles are focused on providing interoperability for large-scale computing resources. Think of the existing cloud “islands” merging into a new, interoperable “Intercloud” where applications can be moved to and operate across multiple platforms.

High-density horizontal computing — Sun is pioneering high-power-density compute-node architectures and extreme-scale Infiniband fabrics as part of our top-tier HPC deployments. This high-density technology is being incorporated into our large-scale cloud designs.

Data in the cloud — More than just compute utilities, cloud computing is increasingly about petascale data. Sun’s Open Storage products offer hybrid data servers with unprecedented efficiency and performance for the emerging data-intensive computing applications that will become a key part of the cloud.

These technology bets are focused on driving more efficient large-scale cloud deployments that can provide the infrastructure for next-generation business opportunities: social networks, algorithmic trading, continuous risk analysis, and so on.

SHARE THE KNOWLEDGE


  

Limitation of firewall………..

The top 10 firewall limitations :

  • Viruses. Not all firewalls offer full protection against computer viruses as there are many ways to encode files and transfer them over the Internet.
  • Attacks. Firewalls can’t protect against attacks that don’t go through the firewall. For example, your firewall may restrict access from the Internet, but may not protect your equipment from dial in access to your computer systems.
  • Architecture. Consistent overall organization security architecture: Firewalls reflect the overall level of security in the network. An architecture that depends upon one method of security or one security mechanism has a single point of failure. A failure in its entirety, or through a software application bug, may open the company to intruders.
  • Configuration. A firewall can’t tell you if it has been incorrectly configured. Trained professionals have the talent and experience to properly configure firewalls.
  • Monitoring. Some firewalls can notify you if a perceived threat occurs, however, they can’t notify you if someone has hacked into your network. Many organizations find they need additional hardware, software and network monitoring tools.
  • Encryption. While firewalls and Virtual Private Networks (VPNs) are helpful, they don’t encrypt confidential documents and E-mail messages sent within your organization or to outside business contacts. Formalized procedures and tools are needed to provide protection of your confidential documents and electronic communications.
  • Management. Firewalls stop incoming threats but organizations still require a formalized management, destruction, and archival procedure for their electronic documents. Electronic messages taken out of context can put an organization in financial jeopardy.
  • Masquerading. Firewalls can’t stop a hacker from masquerading as an employee. Hackers have a number of ways to acquire user ids and related passwords.
  • Policies. Firewalls are not a replacement for a strong Security Policy and Procedure Manual. An organization’s security structure is only as strong as its weakest link. Security professionals have the experience needed to help protect your reputation.
  • Vulnerabilities. Like a deadbolt lock on a front door, a firewall can’t tell you if there are other vulnerabilities that might allow a hacker access to your internal network. Organizations frequently rely on Security Vulnerability Assessments to help them manage their risks.

SHARE THE KNOWLEDGE


  

Difference Between SPSite & SPWeb………….

SPSite class:

    • SPSite Represents a collection of sites on a virtual server, including a top-level site and all its subsites.
    • Each SPSite object, or site collection, is represented within anSPSiteCollection object that consists of the collection of all site collections on the virtual server.
    • SPSite.OpenWeb Method: Returns the site that is located
      at the specified server-relative or site-relative URL.

SPWeb class :
SPWeb Simply represents Windows SharePoint Services Web site.

Code sample to create a site:

SPSite mySite = new SPSite(“http://servername/”);
SPWeb myWeb = mySite.AllWebs[“Site_Name”];
SPWeb myRootWeb = mySite.RootWeb;

Note:

  • SPSite and SPWeb inherit directly from System.Object
  • Calling Dispose ensures all resources used by those objects are immediately released.

SHARE THE KNOWLEDGE


  

Boost Broadband Internet Speed Using CCleaner………

Ccleaner is useful for system optimization, privacy and cleaning tool for getting rid of useless files. The tool helps you in cleaning all the temporary internet files in your browers like internet explorer, firefox, google chrome, opera and also starts scanning your registry and removes all the unused and old entries. It also removes all the temporary files and recent files list in different 3rd party applications like WinAmp, WinZip, WinRar, Limewire, Google Toolbar etc and the main reason for recommending this software is that its 100% spyware free making your pc more secure.

Once you complete the process of cleaning your pc now you need to check out your broadband speed using any 15 speed test tools and iam sure you will see a higher broadband speed because all the useless files and stuff from your computer are removed now.

SHARE THE KNOWLEDGE


  

Storage Area Network (SAN)

A storage area network (SAN) is a high-speed special-purpose network (or subnetwork) that interconnects different kinds of data storage devices with associated data servers on behalf of a larger network of users.

Typically, a storage area network is part of the overall network of computing resources for an enterprise. A storage area network is usually clustered in close proximity to other computing resources such as IBM z990 mainframes but may also extend to remote locations for backup and archival storage, using wide area network carrier technologies such as ATM or SONET.

A storage area network can use existing communication technology such as IBM’s optical fiber ESCON or use Fibre Channel technology. Some SAN system integrators liken it to the common storage bus (flow of data) in a personal computer that is shared by different kinds of storage devices such as a hard disk or a CD-ROM player.

SANs support disk mirroring, backup and restore, archival and retrieval of archived data, data migration from one storage device to another and the sharing of data among different servers in a network. SANs can incorporate subnetworks with network-attached storage (NAS) systems.

SHARE THE KNOWLEDGE


  

Communication Protocols…………..

You may be wondering how computers send and receive data across communication links. The answer is data communication software. It is this software that enables us to communicate with other systems. The data communication software instructs computer systems and devices as to how exactly data is to be transferred from one place to another. The procedure of data transformation in the form of software is commonly known as protocol. The data transmission software or protocols perform the following functions for the efficient and error free transmission of data.

1. Data sequencing : A long message to be transmitted is broken into smaller packets of fixed size for error free data transmission.
2. Data Routing : It is the process of finding the most efficient route between source and destination before sending the data.
3. Flow control : All machines are not equally efficient in terms of speed. Hence the flow control regulates the process of sending data between fast sender and slow receiver.
4. Error Control : Error detecting and recovering is the one of the main functions of communication software. It ensures that data are transmitted without any error.

SHARE THE KNOWLEDGE


  

IPv6: Are You Ready?

As IPv6 is around the corner and set to grow in the coming few years, are you ready for it yet?

IPv6 is an IP address standard designed to replace the current IPv4 protocol, which has been in use since the 1980s for routing Internet traffic. The new protocol has been available for several years now and supports several magnitudes more address spaces than IPv4, while also providing better security and reliability.

For more than 30 years, 32-bit addresses have served us well,but the growth of the Internet has mandated a need for more addresses than is possible with IPv4. IPv6 allows for vastly more addresses. IPv6 is the only long-term solution,  it has not yet been widely deployed. With IPv4 addresses expected to run out in 2011, only 0.2% of Internet users have native IPv6 connectivity.

While IPv4 allows 32 bits for an Internet Protocol address, and can therefore support 232 (4,294,967,296) addresses, IPv6 uses 128-bit addresses, so the new address space supports 2128 (approximately 340 undecillion or 3.4×1038) addresses. This expansion allows for many more devices and users on the internet as well as extra flexibility in allocating addresses and efficiency for routing traffic. It also eliminates the primary need for network address translation (NAT), which gained widespread deployment as an effort to alleviate IPv4 address exhaustion.

On 8 June, 2011, top websites and Internet service providers around the world, including Google, Facebook, Yahoo!, Akamai and Limelight Networks joined together with more than 1000 other participating websites in World IPv6 Day for a successful global-scale trial of the new Internet Protocol, IPv6. By providing a coordinated 24-hour “test flight”, the event helped demonstrate that major websites around the world are well-positioned for the move to a global IPv6-enabled Internet, enabling its continued exponential growth.

SHARE THE KNOWLEDGE


  

what is a cookie…………..

Cookies are small text files that are placed on your computer by websites for various different reasons. For example, web-based email providers normally utilise cookies to “remember” who you are while you are using their service.

Are cookies safe?

Cookies, in themselves, are generally harmless and are actually required for using certain functions of a website.

The information stored in these cookies can include: your IP address, which is usually logged anyway when you visit a website; your username, if logged into a website such as web-based email; the contents of your shopping cart, if shopping online.

Any sensitive information, such as passwords, is usually encrypted by the website before they are stored on your computer. When the cookie is accessed by the website again, the information is decrypted securely.

SHARE THE KNOWLEDGE


  

%d bloggers like this: