HTML5 Web Sockets Example

10:41 PM Add Comment
HTML5 Web Sockets Example -

HTML5 Web Sockets is only one hand to revolutionize the web technologies as we know it. The purpose of this post is to explain what techniques have been used to simulate push far servers, define HTML5 web sockets, and then give an example of how to use it in your HTML5 application.

What is polling?
Until now, the web was an executive. In other words, web pages can only send a request to a web server, and not vice versa. Once AJAX came in 05, web developers have quickly adopted the techniques to simulate a request from the client server known as polling. There are two types of polls, in short polling and long polling.

short polling is implemented by making a request to the web server every few seconds or so to see if the data has changed. If so, the Web server will respond with the new data. Otherwise, it will respond with a blank message. The disadvantage of this technique, however, is both a surplus requests to the server and use a CPU overhead of the Web server to constantly check whether you have made a data update.

long polling is implemented by making a single request to the web server and keep the connection open until the data is changed, the web server will then send back a response. The disadvantage of this technique, such as short surveys, is that the Web server must also be ascertained whether the data is changed every few seconds or so, the creation of an overhead of CPU usage.

What is a HTML5 web outlet?
This is where HTML5 web sockets are available. HTML5 will be the first HTML specification to support client-side web outlets. In other words, when the data changes on the web server, the web server may send a request to the customer, eliminating the need for polling.

as HTML5 web socket
Step 1: Create a WebSocket with a valid URL

Create a new connection to the WebSocket WebSocket server finance.example.com.

stockTickerWebSocket var = new WebSocket ( "WS: //finance.example.com");

Note that a ws: // and WSS: // prefix indicate a WebSocket and a secure WebSocket connection respectively. The default port for WebSockets is 81 and the default port for secure WebSocket is 815.

Step 2: Connect JavaScript callback functions

event listener associated to manage every phase of the life cycle of connection.

stockTickerWebSocket.onopen = function (evt) {

alert ( "Stock Ticker Open Connection ...");
};
stockTickerWebSocket.onmessage = function (evt) {
alert ( "Received Update Ticker:" + evt.data);
};

stockTickerWebSocket.onclose = function (evt) {

alert ( "Connection closed.");
};

Step 3: send and receive data

To send a message to the server, you simply call the method on postMessage webocket with the content you want to send to the server.

stockTickerWebSocket.postMessage ( "BUY: GOOG, 100 @ 0.25");

This will send the message to the server BUY. Any message from the server will be delivered to the onMessage callback recorded in step # 2.

Step 4: Disconnect When Done

When completed, calling the disconnect () method to close the WebSocket connection .

stockTickerWebSocket.disconnect ();

As shown in the example above, there are no HTTP requests to the server from the client side to retrieve the data, instead of the data has been pushed to the client from the server - when it becomes available.

When a new WebSocket connection is established the browser opens an HTTP connection to the server and then negotiates with the server to update the link to a dedicated and persistent WebSocket connection. This process automatically sets a tunnel through the server - through all the network agents (proxies, routers and firewalls) in the center (much like HTTPS to establish a secure, endtoend connection), solving many problems that the various programming techniques encountered Comet . Once the WebSocket is a full-duplex channel between the client and the server.

provided by vBulletin Example Http://www.indicthreads.com

Rise and fall of Napster

9:40 PM Add Comment
Rise and fall of Napster -

With a single program written in 1999, an 18-year-old student of computer Northeastern University named Shawn Fanning would always inadvertently transform how people use the Internet. The name of his program was Napster. Dubbed after his teenage nickname because of his nappy hair, Napster was a free downloadable program that could transform individual computers into servers that shared MP3 music files on the Internet. Instead of a central server, where all music files, Napster instead worked as a means were stored. Users may access to Napster, the search for a title of artist or song, and then proceed to download directly from another user's hard drive connected. In just over a year after its initial launch, Napster soon became one of the most famous and wildly popular sites in Internet history. At its peak, Napster was touting a total of about 60 million users worldwide (Collins, 02). Little did Fanning realize that his invention would soon become ubiquitous on the Internet as e-mail and instant messaging. Neither it has little Fanning realize the legal storm resulting in that its creation would eventually create. Ultimately what began as a simple program written for his friends to share music soon caught the attention not only of young people around the world, but also the wrath of the record industry.

The story of Napster begins just south of Boston, in the city of Brockton, Massachusetts. At 17 years old Colleen Fanning was a senior in high school there in 1980. One night, the elder brother held a party to celebrate her graduation from high school and hired a local band called "Macbeth" to play at the party. It 'was a great success, with around 3,000 people mobbing the house. Colleen's younger brother John went around with a hat collection of funds to pay for the band and a couple of large networks by the end of the night, his first business experience. That same night, they say the Fannings, Colleen connected with one of the musicians and settlement pregnant. With his father's support, Colleen kept her baby, and named Shawn. However, Shawn's biological father who happened to be the son of one of the richest families in Massachusetts saved. Colleen eventually ended up marrying an ex-Marine who drove a delivery truck for a local bakery. His name was Raymond Verrier. The couple had four more children, and Colleen took care of them all while her husband worked. "Money has always been a big enough problem," said Shawn in a Business Week article in 00. He added: "There was a lot of tension around that" (Ante, 00).

Shawn grew up near the public housing projects in Brockton. At that time, Verrier could see her son already shy was withdrawing from the city center chaos constantly surrounding him, "It went real deep within himself and said, 'I want to get out of this.' Even if it meant losing a little ', is what I wanted for him, "said Verrier, employed then as a nurse's aide. As Shawn grew older, Verrier turned to his business-minded brother, John, to help guide his son. As an incentive to learn, for each "A" took home from school his uncle John Fanning gave him the money. also he bought his nephew an Apple Macintosh computer that Verrier would have had the money for (Menn, 03). Life for Shawn Fanning at home, however, was constantly getting worse. The relationship between his parents finally culminated when his mother and stepfather had a split. For a year Shawn and his siblings were forced to live in a foster home (Ante, 00). However, the entrepreneurial uncle John Fanning Shawn was always there to offer support to the young nephew. Shawn worked summers as an intern in the division Chess.net his internet company's uncle John, NetGames, in the neighboring city of Hull. There, Shawn became quite adept at programming from fellow interns who were studying computer science at Carnegie Mellon University. Yet, in spite of John to take a vested interest in his nephew, Shawn was reluctant to absorb ethics of careful work of his uncle. Shawn had difficulty completing assignments and instead would often focus on video games. "I was entering programming, so I spent a lot of my time just fiddling with projects and hanging out," said Shawn (Ante, 00). E 'was also in this period, however, that Shawn learned about what would soon make it known, MP3 digital music files (Menn, 03).

Immediately after graduating from Harwich High School in 1998, Shawn enrolled at nearby Northeastern University. What it would eventually become Napster was created in the freshman dorm room of Fanning's roommate at Northeastern University. After listening to the complaints of his roommate finding nothing but dead links for MP3 music files with conventional search engines like Lycos and Yahoo !, Shawn tried a simpler alternative. His idea was simple. He wanted to combine the conventional ease of using the Internet with similar to Internet Relay Chat network file technology (IRC) transfer. Shawn knew that there should be a way to combine the breadth of search engines like Google with the "presence awareness" of systems like instant messaging, they know that it is signed at a given moment (Menn, 03). This was combined with having the ability to choose individual users which files can be shared with others while you are connected to the Napster network. These innovative elements of the program Napster network and finally eliminated the problems associated with dead links. In addition, having all users to store their music on their computer, electronic pipes would not clog if the new system just connected a couple of people and then dropped its own connection to them (Menn, 03). Finally, he added to these elements was a feature that allowed users of Napster to chat with each other in real time.

Shawn dropped out of Northeastern in January 1999 in order to devote his full time to perfect his invention. According Chess.net former colleague Tarek Loubani, he has rarely seen someone so. "I do not think people can appreciate how hard he worked," said Loubani (Menn, 03). Only remember vaguely that stage in mid-1999, unable to recall exact months, weeks or days. Among the only memories you have of that time you are hunched over his Dell notebook computer, writing code and dozing on his couch or on Uncle John's floor. Fear of having a software company to introduce a similar product before him, obsessively wrote the entire source code of Napster in 60 straight hours (Greenfeld, 00). In May 1999, Shawn's uncle John incorporated the company as Napster. John Fanning would retain a 70% stake in the company, while his nephew Shawn would retain only 30% of the company's capital. The justification offered by uncle John was that Shawn desperately needed a businessman expert like him to handle the nuances of management of the company. (Menn, 03).

Word spread quickly throughout the Northeastern University campus as soon as their former classmate Shawn had a preliminary beta program of Napster ready for testing on June 1, 1999. Soon, hundreds of university students were busy commercial music. This revolutionary new file sharing service quickly became the buzz among the internet literati frequent message boards and chat rooms. The Napster network was growing and it was growing at a fast pace. Faced with the prospect of unprecedented popularity in a short period of time, the Fannings set out to raise capital for additional bandwidth and servers. The company moved from Hull, Massachusetts in San Mateo, California, to a more spacious location and hired additional workers. The additional capital investment in Napster came just in time. Napster became so popular that some university campuses were experiencing clogged servers by students using Napster quantity alone. Schools such as Pennsylvania State University in 1999 issued a moratorium on the use of Napster on campus computers and internet connections in an attempt to alleviate the problem. Napster troubles were just beginning.

The notoriety eventually caught the attention of the Recording Industry Association of America (RIAA). The RIAA has filed a lawsuit against Napster, December 7, 1999, relating to copyright infringement. In addition, the RIAA wanted compensation of $ 10,000 for each copyrighted song traded across the Napster network. The lawsuit unprecedented has garnered much media attention and further propelled the popularity of Napster, particularly with college students. Increasing droves of young people flocked to Napster to swap music, and the community soon touted millions of members around the world. At any time during this period, there would be millions of users, exchanging hundreds of thousands of songs.

Later, during the spring of 00, the heavy metal band Metallica learned that an unreleased studio outtake of their song "I Disappear" had been leaked and was being traded on Napster. The result was that the single was heard on numerous radio stations across America. Metallica was determined to find out how the song became so widely spread. The culprit was obvious Napster. A lawsuit for copyright infringement was filed on 13 April 00. After hiring consulting firms PDnet, early Metallica discovered that during a weekend in April 00, over 335,000 individual Napster users were trading their music online. On May 3, 00 Napster was presented with 60,000 pages of user names that had allegedly traded copyrighted Metallica songs through Napster network. Metallica demanded that Napster ban 335,000 users for trading their copyrighted material, and Napster agreed. Napster attorney Laurence Pulgram said, "Napster has taken extraordinary measures to meet the demands of Metallica to block hundreds of thousands of his fans to use the Napster system." He further added, "Napster has always stated that it would act in response to the notice from the copyright holders, and has lived up to that commitment in good faith." (Dansby & Uhelszki, 00).

On May 5, 00, Napster has received a fatal legal shot. The district Marilyn Hall Patel judge ruled that Napster was not entitled to the status of "safe harbor" under the Digital Millennium Copyright Act 1992. Original defense of Napster RIAA in her costume is that was included under section 1008. In this section in the law explicitly stated that:

"No action may be brought under this title alleging infringement of copyright [1] based on manufacture, importation or distribution of a digital audio recording device, a support digital audio recording, an analog recording device, or an analog recording medium or [2] not based on commercial use of a consumer of such a device or means for making musical recordings or analog musical recordings digital ".

The Court found that Napster's users were engaged in widespread violation of copyright. Furthermore, the judgment also stated that Napster is "contributorily and indirectly responsible for their actions." The exclusion under Section 1008 AHRA did not apply here, because the law provides immunity only from noncommercial copying and not public distribution. The Napster network was made up of over 20 million people. Therefore, each time a user is connected to the network and shared his hard drive contents, the user was distributing copyrighted material for the masses. Section 1008 AHRA deals with the reproduction and not the distribution of copyrighted material. Therefore, according to the court, the Napster users were in violation of copyright infringement and the Napster was facilitating copyright infringement. Judge Patel granted the RIAA request for a preliminary injunction and the site was ordered closed on 26 July 00.

Meanwhile, Napster appealed the judgment of 2 October 00. The Napster appeal was lost in the February 12, 01 an offer of $ 1 billion from Napster to settle out of court with the recording industry was shortly rejected. March 5, 01, the Ninth Circuit Court ordered Napster to stop the copyrighted material on its network business. As a result, Napster began using the filters in its search engine. The Napster system completely blocked any artist or song title that was copyrighted from user searches. popular artists and song titles were no longer showing up in search results. As a result, intelligent users of Napster circumvented the filters by intentionally misspelling the artist or song title on their hard drives. Napster users may still be able to download copyrighted music. As a result, completely shut down Napster throughout its network in July 01 to fully comply with the court order. On 24 September 01, Napster settled with the holders of the copyright to the tune of $ 26 million for the illegal use of music, and $ 10 million in advance to cover impending royalty agreements. Napster announced May 17, 02 an agreement with Germany's Bertelsmann AG. The agreement would allow a form-based Napster subscribers to develop with the music catalog of Bertelsmann AG, in exchange for the German company to drop its lawsuit against Napster. However, June 3, 01 Napster filed for bankruptcy under Chapter 11. The sale of Bertelsmann AG was blocked, and Napster was forced to sell its remaining assets.

The current legal incarnation of Napster is a subscriber-based service fee. Roxio bought the Napster assets at auction in 02. According to Wikipedia (05) a monthly fee of $ 9.95 is charged to members that can provisionally rent songs, with the option of paying an extra $ 0.80 and $ 0, 0 to permanently download songs. While the new Napster has only a fraction of the popularity of the old Napster, others have filled the void in the world of file-sharing peer-to-peer. Popular services like Kazaa, Limewire and Morpheus utilize the technology made infamous by Shawn Fanning. However, if the original Napster had a central server, these services rely on connecting directly to other network users. They are inherently more difficult to adjust for copyright infringement and likewise almost impossible to stop.

Pros and cons of managed services

8:39 PM Add Comment
Pros and cons of managed services -

Today, there are a lot of commercial companies who prefer to tie up with any third-party company to get support on it related chores. You can rely on managed services for technology outsourcing as this is considered as one of the best models for suppliers and also for outsourcing organizations if you have a business and want to expand the night. The use of technology is increasing in all areas. Previously, organizations have used calendars and various physical components to carry on their work. Now-a-days, competition is becoming very serious. You can not afford to lose any chance of progressing. Therefore, the third-party companies are coming forward to provide help to maintain proper organization's infrastructure. Before relying on that company you should know the pros and cons of such services.

In favor of Managed Services

Every business organization has a huge expansion of the burden from time to time business. They must make adequate strategies and game plans and execute those actually. Therefore, it becomes difficult to do all the necessary services for themselves or contact management service providers to take responsibility on their behalf.

The advantages of these services are-

1. favorable infrastructure maintenance of the place, managed hosting company has developed a series better choices and effective performance in a nutshell. It becomes difficult for companies to choose their myriad set of applications. But one thing is certain that if a company takes on these services, you will get well-integrated result within time. They always keep you updated, mange without any hassle and offer different levels of agreements which rely on efficient availability.

2. Cost Effectiveness Have you ever thought what will you need to invest to purchase new servers or the organization of the interview sessions to appoint recruits to host a single set of work? And 'more and more in touch with managed service providers. Why spend unnecessarily, while you can have the benefits of these services?

3. Easy to Install In the competitive market of business, time is money. If you can not run as fast as you will be left behind. Managed service providers to always keep in the race. They can be implemented very fast and takes less time to work immediately and meet the new requirements.

4. Expert Monitoring- That department has other tasks to complete. So, it is not possible to monitor the hardware and network servers. If the IT department of a company is using MSP, it will be easier to monitor technological performance on the basis of 24 * 7.

Against Managed services

1. Instability- there are some disadvantages of MSP. In fact, when an organization depends on these services, we assume that the company will be able to travel a lot. If the Managed Service Provider fails to meet the organization's needs, I am the one to blame. Such incidents may hinder their reputation.

2. enormous Pressure- It is natural that the organization could not get a positive result from an MSP. When you switch to another, they have high expectations from the new third party organization.

Overall, it can be said that from managed services providers are on full of benefits for all types of business organizations. If you expand your business, take help from them and do chores without any tension.

Data Disaster Recovery Plan for Total Disaster

7:38 PM Add Comment
Data Disaster Recovery Plan for Total Disaster -

(A) Area

This DR plan is designed for the worst case scenario. that is to say the complete loss of the site - fires, water damage (flooding), earthquake.

Here are the key areas you need to focus on:

* Crisis Management Procedures

* Safety procedures held by the security building

* List emergency contact names held by the management.

* Backup / restore procedures

* Inventory (s) (as required / can be slaughtered)

* Business Continuity Plans

* Test DR , test BCP (which can be provided by DR Managed Service)

(B) the Invocation procedures

This is an important and often ignored section of the plan that should be given great attention. It is also imperative that the procedures defined here are included in the test program plans invariably flounder at this early stage because of the lack of familiarity with how to set in motion the recovery process. It should contain details of who is authorized to invoke the plan, and how this should be done.

purpose

in a disaster situation people will need to take special responsibility to perform data recovery.

These responsibilities must be clearly defined, and assignments can be made by personal pool available at the time. Provisional allocations were made, but they will be confirmed at the time with the staff available.

Records must be kept of personnel to specific teams so that the recovery process is checked on a regular basis and a personal record does not actively involved in the site is maintained (this can be used, if necessary call the extra resource as / when needed).

The telephone numbers are one of the most important factors that contribute to successful disaster recovery of data. Imagine that during an emergency, you can not contact the technical personnel responsible for a specific system, as you do the / his number!

At the disaster recovery site, check the following are available:

* Server Room File

* standard build documentation

* Restore Application Procedures

* technical Manuals

* copy Disaster Recovery Plan

* Contact number of its personnel

* Contacts Number of Disaster Recovery Service (your DR designated supplier)

remote backup help in the backup process, the backup center offsite. Remote backup can be done via the lines of communication, such as wide area network, or Private Line location (we recommend encrypted line).

Inventory

Following the loss of hardware and software, you need to set insurance claims
transformation in motion. To facilitate this process of hardware and software inventories it should be maintained.

hardware and software inventory (this includes IT, for example, PCs, servers, and even non-IT asset such as furniture and furnishings, telephones, important documents, etc.

test plan

end of

and 'imperative that detailed test plans are produced to support the Disaster Recovery document. the plan is a working document until it has been fully tested and tried using the software disaster recovery.

Here's an example of disaster recovery shape data that you can use:

Please enter details of all attempts whether successful or unsuccessful

Recovery of the country Data Center

in. the event of disaster (eg fire, flood - flooding) in the company with a total loss of servers and networks, which will bring critical servers at this location

.

(C) Recovery In-House

* Action: Recover backup tapes off-site from the center

* Action: 2 hours - Can Recovery of a data month . backup tape offsite is 1 month old data.

Disaster Recovery Site TEAM data

Once the decision to bring this plan to the disaster data recovery plan, we recommend the following checklists:

* Locate / Install DR server (s) - disaster

recovery server

* contact third-party vendors for additional equipment (if necessary)

* equipment available at the site DR Install and test equipment disaster recovery and connectivity

* Connect up Switches and Server

* test all network points

* Install / test stations

* DR site established restore application (s)

* Retrieve latest copies of the system and data backup

* restore operating system environment

* restore

applications

* restore data files

* Notify user management of availability and status

* complete hands Restoration of

* gain user acceptance

* leave contact details for support.

The Troubleshooting startup problems in Windows Server 03

6:37 PM Add Comment
The Troubleshooting startup problems in Windows Server 03 -

Most of us have had the problem before. You start your Windows system and were greeted with a cryptic error message or "blue screen of death" before the system startup. It 'a sinking feeling. You can not access the operating system and the resolution of the problem can be difficult. In most cases, people end up resorting to drastic measures, such as formatting the hard drive and reinstall the operating system. It is not always a lost cause. Windows Server 03 includes a number of alternative boot options that address and solve these problems.

When you try to recover from a Windows boot failure, the first step is to get to the menu of the boot options. You can do this by pressing the F8 key on your keyboard immediately after you see the Windows boot loader screen. Once in the menu of the boot options, you will have a number of options that are described below:

Safe Mode

This option starts the operating system with a minimum of system drivers. safe mode will help when troubleshooting boot failures caused by device drivers and registry problems. This mode does not provide network support, and most of the system services are disabled.

Safe Mode with Networking

The same as Safe mode, only with network support.

Safe Mode with Command Prompt

This is a command-line interface. It may be useful to rename files and do other routine of basic command line. The Windows Explorer shell is not loaded and is basically just a DOS prompt.

Enable Boot Logging

start recording starts the system normally, but creates a detailed log of all the services and drivers that are trying to load at boot time. This can help you determine what is causing the system to crash. The default location for the log file is C: Windowsntbtlog.txt.

Enable VGA mode

This charge is actually the video driver that is currently installed, it uses the resolution and depth of lower color available. This is useful if you are troubleshooting a problem with the video card or the monitor driver.

Last Known Good Configuration

You can use this option to restore a saved copy of the registry during the last successful logon to Windows. Even if it sounds good, I can not recall a single case that this has never worked for me in the past, and believe me, I tried several times.

Directory Services Restore mode

This is only applicable for the Active Directory domain controller. It allows you to perform maintenance and backup recovery tasks on Active Directory.

debug mode

This will allow you to connect a working server via a serial cable to send debug messages for analysis. This requires a large amount of configuration on the wrong side and can not be a realistic option for most people.

Finally, you can use the Recovery Console to perform the resolution of the most advanced problems. The Recovery Console is not installed by default. If not installed, you can still use it to boot the operating system CD and choosing the "Repair the Recovery Console with the" option. The Recovery Console allows you to change the boot options of services, create or extend volumes and or to select alternate boot options.

In this article we covered the multiple boot options provided by Windows Server 03. If this is not a hardware failure, you can often narrow down and fix most startup problems in Windows Server 03 by using these instruments.

Importance of IT support services for your business and what are the benefits of using them?

5:36 PM Add Comment
Importance of IT support services for your business and what are the benefits of using them? -

These days, the companies around the world are growing at a rapid pace. The development of gorgeous computer systems and proving to be a worthy competition for the main commercial competitors and maintaining a solid presence on the web are the basic objectives of these companies. However, achieving these objectives is not an easy task, since so many different hazards are prevalent in the environment.

As a means to grab the largest share of the market, the modern day society enthusiastically put their effort and time to develop suitable IT or computer support systems. In terms of revenue and customers, many companies have failed due to make choices without the proper research, data leakage and inappropriate IT resources. For all types of businesses, new or old, you can get wonderful achievements with the support of computers and infrastructure.

The following is an overview of how to choose the right IT support service provider and the composition of these services.

Mostly, the following main areas are covered by technology support services:

Help Desk Support:

in essence, help desk is remote and offline support given by e-mail and telephone. The problems are resolved remotely by IT service providers through technical maintenance and support services. The technical remote support usually take control of a computer to solve network problems and software to identify the root cause of the problem.

The consultation and on-site support:

Typically, the companies belonging to IT infrastructure for the most part must address the problems likely network failures, re-installations and replacements hardware and software. on-site support is required when it comes to solving problems like these in a timely manner. Many IT support companies guarantee to solve these problems in minimal frames during which they personally arrive at work and solve problems as a result.

Server Support:

Most businesses today basically need a server that is installed in the workplace. The client computer requests are processed by these servers, which includes the distribution of e-mail coming or retrieving a file from the main server. It helps connect the structure to the outside world, and as a central point in the network information of a company. IT support services providers to do a lot of things:

- They help install the service pack and the latest updates to Microsoft Remote
- They check whether enough free disk space is available
- Reduce downtime by providing automatic fixes for typical problems
- improve system availability

backups and security:

damage and data loss is one of the most serious issues that many companies face. Some companies have a significant amount of data that includes the whole credentials for marketing purposes and their clients. How to contact computer support providers, after a loss of data it becomes necessary because the revenues and the company's reputation greatly depend on it. Business contingency, data back up and disaster recovery solutions are offered by IT support companies in order to ensure that business critical data can be recovered in unexpected situations. So, back to work it becomes more convenient with less problems involved.

So, it is quite clear that the modern business today rely on IT support services and taking significant advantage of the different areas covered by them.

What are the components needed to create a wireless LAN (WLAN)?

4:35 PM Add Comment
What are the components needed to create a wireless LAN (WLAN)? -

In order to create a WLAN, you need some basic components, which are as follows;

1.The wireless client devices; equipped with a wireless network interface card (wireless NIC)

2. Access Points (AP), or control module

3. The wired LAN backbone

The devices wireless client

this simply refers to users' devices such as desktop computer systems, laptop computers and mobile devices such as personal digital assistants (PDAs) and smart phones. Have built-in wireless network interface cards (wireless NIC), which allows users to have access to the wireless network. The wireless NIC is a hardware device that connects a computer to a network to send and receive data. A wireless NIC has an antenna, internal or external, and a wireless network adapter has a door (usually an RJ-45 port for the cable connection). The cable connects the adapter to the network, thus establishing a link between the computer and the network. A wireless NIC performs the same functions as the wired NIC but one important exception - there is no port for the cable connection, rather an antenna is used to send and receive data in the form of radio frequency (RF) signals. When a wireless NIC transmits, specifically it performs the following functions;

i. Change your computer data from parallel to serial transmission

II. It divides data into packets (small data blocks) and attach the sending and receiving addresses Computers

III. Decide when to send

iv. Send package

access points (AP)

As the name suggests, an access point (AP) provides WLAN client with an access point to the wired backbone. It performs two key functions; I. First, it serves as a wireless communication base station for the wireless network. All devices that contains a wireless NIC transmits to the AP, which in turn redirects the signal to other wireless devices. ii. Second, the AP serves as a bridge between the wireless and wired networks. The AP can be connected to the wired LAN with a network cable, allowing the wireless device access to the wired network (for example, to access a file server on the local network through it).

SPINE LAN

This is the component of the WLAN that serves as a backbone connection to the wireless clients and access. Usually it provides access to the servers and the Internet.

The addition of a WiFi Access Control List

3:34 PM Add Comment
The addition of a WiFi Access Control List -

What is an Access Control List (ACL)? An access control list is a list, stored on a network router, the devices allowed on a network. The list determines which devices can connect to the network and what devices are not allowed. Using this list, a wifi administrator (or home user) can block unauthorized access to your network.

Access Control Lists are configured by a wireless router. A network hub device does not work. A network hub allows all traffic to pass in both directions; it does not filter all traffic. A traffic router filters, you can block traffic in both directions or re-route traffic. A router may be a basic router (eg. NetGear, Linksys) from any electronics store, an advanced router (Cisco Router for example) or a configured server / workstation as a router. A router stores information in the ACL and on the basis of that information, directs traffic in and out of a network.

This screen shows the list control of a NETGEAR router access. This list has a device listed. If the access list is activated, only this device could access the wireless network. You can build an ACL on a router and has chosen not to implement filtering of access, but if you spent the time to create the list, you might as well use it. There are now devices, which can access a WiFi network a few years ago. Such devices are Smart Phones, Gaming Systems, laptops, tablets, etc.

The most routers are pre-configured to broadcast their SSID (the name of the Wi-Fi network) and allow traffic to connect . The majority of Internet users are now familiar with protecting their WiFi networks with the addition of a password for access to the network. This allows you to protect your network, but it is possible that some hackers could find the network password. Adding an Access Control List will help to further reduce unauthorized access with the addition of a second layer of defense. An access list stores the MAC address of the device. If the computer attempting to access the network is not listed in this list, you will not be allowed to access the network. There are some hackers who are able to hi-jack a valid MAC address, so there are no systems 100% guaranteed, but some security is better than none. An additional security measure could be added (after the implementation of ACL), it would be to disable the SSID broadcast. This will cause some problems with some WiFi devices that automatically combines the wi-fi network, but well worth the safety.

manual review of the specific router for proper way to configure your specific router. we will discuss in a future broadcast SSID post, subscribe to the blog for alerts about upcoming post.

Fix Windows 7 Taskbar Shivering

2:33 PM Add Comment
Fix Windows 7 Taskbar Shivering -

a taskbar is a bar displayed on a full edge of a GUI desktop that is used to launch and monitor running applications.

The most common question that I had seen on the internet is "because Windows 7 Taskbar is freezing?" I know that's an annoying problem and the computer does not respond, even if you try to load the Task Manager. I will explain the reasons and solutions for this problem.

Solutions:

1. Use the fastest method of transferring data to slave DMA IDE Drives IDE
2. Defragment and clean the
Log 3. Problem in Microsoft Office shortcuts Outlook / Windows live Outlook with Microsoft Exchange Server
4. download DLL
5. Both Windows Rebuilding the taskbar
6. Disable network Icon and other unnecessary icons from the notification area
7. load Too many background processes and their icons in the system tray

Use the fastest mode of IDE DMA data transfer of Slave IDE disks

using Management devices, enable DMA transfer mode IDE faster data IDE Slave Drives. Please make the steps below if you are using a SATA / ATA hard disks drive.

1. Click Start | Search.
2. Type Device Manager and press ENTER.
3. Expand the following:
Computer Name | IDE ATA / ATAPI controllers.
4. Double-click on the primary IDE channel, such as ATA Channel 0.
5. Click the Advanced tab in the Properties dialog box.
6. Check the box called Enable DMA.
7. Click OK.
8. Close Device Manager.

Registry defragmentation and cleaning

The performance registry determines the whole performance Of computer. The Windows 7 computer, the taskbar is locked if the registry fragmented and junk data is stored. You should defragment the whole registry errors and clean the interior.

1. Download Best Registry Cleaner and PC Optimizer software.
2. Install and run it.
3. Click Registry Cleaner, and then the Start Scan button.
4. Reboot your system.
5. Click Disk Defragmenter, and then the Analyze button.
6. make a system reboot when prompted.

Problem in the Microsoft Office Outlook / Windows Live Outlook with Microsoft Exchange Server

Microsoft Office Outlook and Windows Both Outlook Live is responsible for personal information from Microsoft.

One problem, especially a wrong method to connect Outlook with Microsoft Exchange Server results in frost on the taskbar in Windows 7 operating systems. You must modify the registry settings in order to solve this problem.

1. Click Start | Run.
2. Type regedit, and press ENTER.
3. Navigate to the following registry key:
HKEY_LOCAL_MACHINE SOFTWARE Microsoft Exchange Exchange Provider
4. Double-click the string named Rpc_Binding_Order.
5. Replace the existing value with the following new:
ncacn_ip_tcp, ncacn_spx, ncacn_np, NetBIOS, ncacn_vns _spp, ncalrpc
6. Close the Registry Editor and restart the computer.

download DLL

Program using Dynamic Link Library (DLL) for loading and using the various resources and objects. After the program ends, the DLLs are still open. This results in the bar of the freezing applications on Windows 7 computers. We may want to change a setting in the registry in order to download the DLLs after the corresponding operation or task is executed.

1. Click Start | Run.
2. Type regedit, and press ENTER.
3. Navigate to the following registry key:
HKEY_LOCAL_MACHINE Software Microsoft Windows CurrentVersion Explorer
4. Double-click the string named AlwaysUnloadDLL.
5. Replace the existing value with 1.
6. Press ENTER.
7. Close the Registry Editor and restart the computer.

Let Windows Rebuilding the taskbar

To stop Taskbar freezing problem, let Windows 7 to rebuild the system tray, as follows:

1. Click Start | Run.
2. Type regedit, and press ENTER.
3. Navigate to the following registry key:
HKEY_CURRENT_USER Software Microsoft Windows CurrentVersion Explorer
4. Delete the registry key StuckRects name.
5. Close the Registry Editor.
6. Reboot the system to rebuild your system tray.

Disable Network icon and other useless icons in the notification

is displayed 'icon of the network connection on the system tray of the taskbar. It is a system icon and constantly updates. This can cause the taskbar stops responding or freezing on Windows 7. That's why; you may want to disable the network icon to solve this problem.

1. Click Start | Control panel.
2. elements of the type Control Panel Panel All Control Notification Area icon in the toolbar of your control panel addresses.
3. Press ENTER.
4. In the new page that opens, select Hide icons and notifications from the network dropdown box. Button
5. Click OK.

The taskbar does not freeze after he had done this setting.

overburdened background processes and their icon in

System Tray

When the operating system has finished booting, a series of programs (including Microsoft and non-Microsoft) runs in the background. In addition to this, most of them have their input tray icons in the notification. This causes the freezing problem taskbar because of an increased load of background processes in Windows 7.

1. Click Start | Search.
2. type msconfig, and press ENTER.
3. Disable unnecessary startup items from the startup cards and services.
4. Click Apply | OK.
5. Reboot the system.

Experts Recommendation

IT job titles - What do they mean?

1:32 PM Add Comment
IT job titles - What do they mean? -

Although only a few decades old, information technology, or IT industry is the broader and deeper as the industries that have been around for centuries. IT job categories, titles and specialties abound - so many that anyone investigating how a career is likely to be very, very confusing. What is the difference between a network engineer and an analyst of network support? Between a Web developer, Web Designer and Web Technology Specialist? Just what does a database administrator to do?

Although the labels and responsibilities tend to vary from employer to employer, here are some common IT job titles and their descriptions. Consider these when looking for an IT career that best suits your interests, talents and temperament:

Database Administrator - A database is any collection of information that a company or organization continues to file (eg customer names, addresses, inventory, etc.) the database administrator (DBA) is responsible for organizing, maintaining and updating the database and creating systems so that people authorized to view, add or remove the information they are able to do it as quickly and easily as possible.

Internet Solutions Developer - This is a description " catch-all" for a person responsible for the elaboration and execution of Internet-based projects. The job usually involves working with programs that allow the public to view and interact with a company, organization or agency website.

Program IT Project Manager - This is a managerial position which requires several years of experience in the IT industry. The IT Manager Project Plan is responsible for finding solutions to IT-related problems and then implementing these solutions, often with the help of a team.

Network Administrator - "Network" A is any collection of computers that are connected with each other or to a central server so that the information can be created, shared and updated. The network administrator is generally responsible for ensuring that an existing network running smoothly and for the addition or removal of hardware (computers, printers, etc.) and software (programs, applications) from the system.

Network and Security Specialist - The network and Internet Security Specialist is responsible for the production person that people who use a computer network only to have access to the information they are allowed to see, that the information in the network database is protected and well preserved, and that the network is not accessible (or "hacked") by unauthorized people, wherever they are.

Network Engineer - The network engineer is usually responsible for 1) Design of new computer networks, 2) creating reality these networks, 3) Installing the computer and software connect to networks and, 4) Ensure the network is able to grow and function as needed.

Network Support Analyst - An analyst support network is very similar to a network administrator in that he / she is responsible for keeping an existing network that operates according to the needs, but it has less management responsibilities. The Network Support Analyst may also be responsible for monitoring how people actually use the network, identifying problem areas and then recommending and implementing solutions.

Software Developer / Engineer - "Software" is the set of instructions that make a computer do what you want it to do. Software Developer / Engineer is the person who writes the instructions, also known as "code" for these computer / applications programs. Software Developer / Engineer can work "in-house" in developing customized programs for an employer or client, or it can work on programs which are then sold on the market.

specialized technical support - Computers and networks invariably have problems, and it is the Office responsible for the technical support specialist to identify these problems and find a way to fix them. Technical Support Specialists often work in "help desk" where they communicate with company employees or customers by phone, IM or email.

Web Developer - Web Developers create, maintain and update the functional aspects of websites, whether on the Internet or internal company intranet. When designing a new site, they are usually responsible for creating its architecture, navigation and interactive functions. May also be responsible for creating programs or apps designed specifically for the Web.

Web Designer - As the Web Developer is concerned with the technical aspects of a web site or web-based application, the Web designer is responsible for how such a site or application looks in reality. It is an artistic position that requires training and experience in graphic design and layout - and perhaps even animation - as well as the technical aspects of Web operations.

Web Technology Specialist - This position combines i responsibility of web developer and web designer. The Web Technology Specialist must not only the technical aspects of web sites and applications, but it also needs to manage often the design and graphic aspects as well.

Considering if you are on vocational training in Information Technology , you need to understand these (and: other) job descriptions in order to pursue education and training which qualify for the type iT job that fits your talents and personality.

CCNA Certification Training: Configuring Static Routes on a Cisco Router

12:31 PM 3 Comments
CCNA Certification Training: Configuring Static Routes on a Cisco Router -

The great thing about training for the CCNA certification is that the skills you learn will truly come in handy when working with routers Cisco and production networks switch. This is particularly true for the static route configuration. While most networks use dynamic routing protocols such as RIP, EIGRP, and OSPF to build routing tables, static routes still come in handy sometimes - especially if a routing protocol configuration goes awry.

Let's say that you have just added a new segment to your network and you've successfully added to the network routing tables. Suddenly, on Monday morning, users on that segment can not get to a network resource such as an email server, or they can not get out to the Internet. We all know what it's like for groped to fix something while the phone is ringing like crazy. This is when we have to do two things ...

1. Resist the temptation to tell the caller "I would fix it, but I 'm too busy to talk to you "

2. Apply a" quick fix "that will give you time to study the problem

static routes are a great quick fix. You can use a static route to get the users where they need to be, which gives you time to find out what the problem is with the dynamic routing protocol. (You must also resist the temptation to apply a static route and declare the problem solved!)

Static routes are configured with the ip route command, followed by the destination network and mask. After that, you need to specify the next-hop IP address or the local exit interface. Both of the following masks are acceptable:

ip route 172.10.1.0 255.255.255.0 210.1.1.1

ip route 172.10.1.0 255.255.255.0 Serial0

using IOS Help on a Cisco router shows the various options:

R1 (config) # ip route?

ABCD Destination prefix

profile profile Enable IP routing table

VRF Configure static route for instance VPN Routing / Forwarding

path R1 (config) # ip 172.10.1.0?

ABCD Destination prefix mask

R1 (config) # ip route 172.10.1.0 255.255.255.0?

router forwarding address ABCD

BRI ISDN Basic Rate Interface

Dialer Dialer interface

loopback interface loopback

Null Null interface

Serial

IEEE 802.5 Token Ring

Remember, you are specifying the IP address of the next-hop router or the local router output interface!

Configuring static routes is a great skill to have in the network room and in the CCNA exam room. Be ready to configure them in either case!

The advantages of dynamic IP and static IP

11:30 AM Add Comment
The advantages of dynamic IP and static IP -

One of techie words that you would often come across when you sign up for broadband package home or the business package is the address IP or Internet Protocol address. When you get a broadband connection, they are normally offered an IP address so that other PCs in the world wide web network that can connect and communicate with the PC (if you are a home user) or your web server (assuming , you host a web site on your web space).

not technically speaking, the IP address is a unique number assigned to your PC often over a network. If you are connected to the Internet, just check the Internet options to go to LAN Settings. You might find the IP address of your PC. This helps address other PC to identify the PC as well as help your PC to get information from other PCs which have similar unique numbers.

The IP addresses are of two types: Dynamic IP and Static IP. What are their characteristics? Because you get free Dynamic IP, why not get a static IP costs a little '? What are the advantages and disadvantages of each type?

Remember, when the PC is not connected to the Internet, can have any type of IP that is offered by the administrator. Usually, in a LAN, the IP address of individual PC will be unique and it is the only request for such a network unless the PC is connected to internet.

dynamic IP

Dynamic IP is usually offered for free by all ISPs and this IP changes every time you log on to the Internet. This means that the PC will be assigned different numerical codes at different times.

The advantages of dynamic IP

In a network that is administered by the Dynamic Host Configuration Protocol (DHCP), the assignment of IP address and network configuration made much faster.

All computers (clients) to obtain the IP address, DNS, gateway from the DHCP server automatically. This also makes your task of adding new computers to the network much easier. Regardless of the size of the network, dynamic IP is very useful as it is easy to allocate, deploy and manage.

In a large LAN network, dynamic IP administration helps you to save time, as the need to manually configure hundreds of computers.

Dynamic IP also helps you to log in as an anonymous user.

The main disadvantage of dynamic IP is that It is not suitable for web hosting. is required so static IP. However, home users will not find difficulty in using this type of IP.

Static IP

Some broadband providers offer this option, which has several advantages. This is a useful feature when you consider web hosting server often needs this type of IP address of the DNS will be able to interpret the domain names such as IP addresses, that never change in the network. Static IP is very useful to identify a specific computer on a large network of PCs. So, static IP is often used in a large infrastructure environment.

The static IP advantages

How static IP never changes in the Internet environment, a specific computer can be accessed and controlled and maintained from anywhere.

For the purposes of web hosting, static IP is very ideal. If you are a business and want to promote your internet user, go for a business broadband package that can sometimes provide you with a free static IP address. Companies can see better growth and to be in touch with their customers when they have their own websites. If you are looking for a cheaper option, find a commercial package that comes with free and free web space Static IP.

Make sure that you choose the right package of wide-band business after crossing the extras provided by Internet service providers, such as free e-mail address , free domain name, web space, etc.

Just think that you can create your own e-mail addresses with your own domain name. If your e-mail accounts have a certain unique identity, which make a big difference and become an important part of better management of your business, you better have your own e-mail account with your own domain name. It will also help your company to cut a niche among your competitors.

If you are a player and uses a broadband connection dedicated to this purpose, take a static IP and calculate the difference. It would certainly help to have a significant advantage over others. This is because the FTP servers make data transfer faster.

As ALS and IT Service Management can benefit your Business System Monitoring

10:29 PM Add Comment
As ALS and IT Service Management can benefit your Business System Monitoring -

SLA comes into picture when you access a third-party service. In this circumstance you should have a legally binding service agreement (SLA) in place to have a clear understanding of what you are getting, and at the same time you can also take action if you are not enjoying the service you have requested.

What is Service Level Agreement (SLA)

The SLA is a legal link between the outsourcing provider and a society. It is a document that explains your services and its levels specifically, along with the details of the agreement and its terms and conditions.

What is IT Service Management?

Today's businesses are increasingly delivered facilitate information technology. IT Business and management need guidance and support on how to manage their IT infrastructure in order to catapult the quality and functionality in a cost effective manner. IT Service Management is seen things from the customer's point of view, that is, which is a service relationship that the customer receives.

How IT Service Management is useful

Information Technology segment is growing now-a-days. However, connectivity does not solve the whole problem and this fact can not be ignored. But, the availability of cost-effective IT service management opens the door for network problems solutions. Internet connectivity that provides high-quality IT service management is a winning combination that leads to an increasingly competitive technological future for the whole world to enjoy. The main advantages of IT service management include:

- The IT service management professionally optimizes troubleshooting analyzing the impact of application performance on different locations, end users, service contracts level together with business processes.

- It also conducts proactive monitoring application from the health system and application monitoring and take corrective action before it affects end users.

- separates the performance issues to the server, network, or client-level applications.

- ensures that every new application will address expectations post implementation performance.

- It takes well-informed investment decisions and the use of infrastructure.

Entering into a Service Level Agreement (SLA) is a critical and complex process. It must be handled with extensive expertise and attention. Service Level Agreement helps follow their principles to support the governance of the sound field that can be sustained with the terms and human and technical resources. To equip business strategies with better professionalism and survive in the dynamic global market economy, there is no alternative to the Service Level Agreement.

Set your V-Ray Render Farm

9:28 PM Add Comment
Set your V-Ray Render Farm -

If you are tired of watching the screen for long hours waiting for the next pixels to appear, you have the option of building your own render farm. The best thing about building your own render farm is that it is a convenient and easy process. If you are going to make scenes with V-Ray, you really need to have faster processors. The good news is that the advancement of technology has made it possible for you to make your scenes faster. However, before looking at how you can build your own V-Ray farm, it is essential that you understand what is meant by V-Ray.

V-Ray is software that is mostly used by render farms. E 'extremely easy to install and is equipped with a network rendering option. Before installing the V-Ray render farm, there are a number of things that you may need.

- The first thing you need is to have V-Ray installed on computers. Essential to note it is that there is not a standalone version of V-Ray, and must be installed with Maya or Max, among others.

- You will also need a local network of computers with access to each other. And 'essential that the computers are all connected and that are part of the same network. In addition, the connection must not be blocked or interrupted by firewall.

- It 's vital that you have access to a fast network. It is not acceptable for you to have a slow or wireless network connections. It is also not advisable to use Wi-Fi or data connection. The fastest network, the better you will be able to work.

After collecting all the things you need, you should go ahead and set the render farm. The first thing you need to do is set the V-Ray rendering server. The rendering server can be set on the slave machines, simply by using the launch V-Ray DR spawner in the installation folder V-Ray. The route usually varies depending on which software is installed on V-Ray. If you are using Windows 7 or Vista, it recommends that you get an administrator before setting the farm, otherwise it will not start.

Once the V-Ray is up and running, the next step is for you to set the parameters. This must be done on the master machine, which should be running at high capacity. Look for the rendering of the installation process and you are ready to start. Once you have already set up V-Ray renderer as production, all you have to do is go to the Settings tab. While here, look for and select the distributed rendering check box. Next, click Settings, which is located right next to the box.

Overall, the configuration of the V-Ray render farm is not a difficult task, especially if you know all the things you need. However, after you set up your farm, you must make sure that you are using it correctly; otherwise it will end up confusing the V-Ray.

Overview of Cloud Computing

8:27 PM Add Comment
Overview of Cloud Computing -

Cloud Computing, a paradigm of computing is one of the simplest means of access and data storage on the Internet, instead of storing the data in computer hard drive. It is also recognized as a large pool of systems that helps us to stay connected to the public or private networks and provide dynamically scalable infrastructure for data, storage of files and applications.

With the launch of this technology, has significantly reduced the storage of content, delivery, the cost of computation, and application hosting. It has the potential to transform the data center from a capital intensive along with a variable price environment.

According to one of the search industry - Forrester defines cloud computing as an abstract computing infrastructure pools, highly scalable, and managed in a position to host the final customers and billed according to consumption applications. Whereas, the National Institute of Standards and Technology (NIST) has developed the definition of cloud computing as a model for enabling convenient, on-demand access to the network to a shared pool of configurable computing resources (such eg, networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.

The feature of Cloud Computing consists of self-service, in which a customer can request and manage their computing resources. Access to the vast network service allows you to be available for private networks or the Internet. This technology provides a shared resource pool, where the customer draws from a pool of computing resources, usually in a remote data center.

of Cloud Computing Service models

The Cloud Computing services are grouped into three categories - software-as-a-Service (SaaS), Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS).

Software-as-a-Service ( SaaS)

In this service model, the cloud-based applications are offered to the customer, as a service on demand. It is a single instance of the service that runs on remote computers "in the cloud", which are owned and managed by others and is connected to the computer of Internet users and, usually, a web browser. Social networking sites like Facebook, Twitter, Flickr, and Google are all examples of SaaS, although users can access the services through any Internet-enabled device.

Platform-as-a-Service ( PaaS)

The Platform-as-a-Service (PaaS) is a model superior tuning software-as-a-Service and provides hardware, network and operation, so that a customer can design your application and software. In order to meet the requirements of applications such as scalability and manageability, a predefined combination of OS and application server operating system is offered by PaaS providers like limited J2EE, LAMP platform (Linux, Apache, MySQL and PHP), etc., for example, at every stage of the process to develop, test and finally host their web sites, web developers can use individual PaaS environments.

Infrastructure-as-a-Service ( IaaS)

Infrastructure-as-a-Service (IaaS) is a computer science Basic and storage capacity, which is provided by a standardized service on the network. This model has made the workload easier to pool Space Center data, storage systems, network equipment, servers, etc. together and make them available. In addition to it, the client can develop and install their own operating systems, software and applications.

deployment models of Cloud Computing

To make available and to deploy applications, companies can choose to Cloud Computing on public, private or hybrid clouds . In order to determine the right cloud path for each organization, Cloud supplements play a vital role.

Public Cloud

In principle, the services provided by a public cloud are offered via the Internet and are managed and owned by companies who use it to provide quick access to reasonable computing resources to other organizations or individuals. Through this deployment model, consumers do not need to buy support infrastructure, hardware or software, which is owned and operated by suppliers.

Private Cloud

In this deployment model, the infrastructure the cloud is only used for a specific organization and is managed by the organization or a third party. While providing greater control of resources and steering clear of multi-tenancy, private clouds are there to exploit the efficiency of the various cloud.

hybrid cloud

This cloud computing deployment model merges both public and private cloud models. A service provider can use third-party cloud providers in all or part of hybrid clouds, and thus increasing the flexibility of computing.

So, for the user of the computer every day, this technology offers a number of options, as well as for large and small businesses. And for organizations and individuals, your Cloud Computing offers the benefits, and the action moves to the interface Flanked by vBulletin more groups of service consumers and providers.

What types of software testing should be considered

7:26 PM Add Comment
What types of software testing should be considered -

black box testing - This test is not based on any knowledge of internal design or coding. These tests are based on the requirements and functionality.

white box testing - This is based on knowledge of the internal logic of the application code. The tests are based on a coverage of code statements, branches, paths, conditions.

Unit testing - the scale more 'micro' test; to test particular functions or code modules. This is typically done by the programmer and not by testers, as it requires the detailed knowledge of the internal program, and code. Not always easily done unless the application is well-designed architecture with tight code; It may require the development of test driver modules or harnesses tests.

Incremental integration testing - continuous testing of an application when you add new features; It requires that the various aspects of the functionality of an application to be independent enough to work separately before all parts of the program have been completed, or testers to be developed according to the needs; done by programmers or by testers.

Integration testing - testing of combined parts of an application to determine if it works properly together. The "actors" can be code modules, individual applications, client and server applications on a network, etc. This type of testing is especially relevant to client / server and distributed systems.

Functional test - this test is oriented to the functional requirements of an application; This type of test should be done by testers. This does not mean that programmers should not check that their code works before releasing

Testing System - This is based on overall requirements specifications (which of course applies to any testing.); It covers all combined parts of a system.

end-to-end testing - this is similar to system testing; It involves the testing of a complete application environment in a situation that mimic real-world use, such as interacting with a database, using network communications, or interacting with other hardware, applications or systems.

sanity testing or smoke testing - usually it comes to an initial test to determine if a new software version is performing well enough to accept for a major testing effort. For example, if the new software freezes systems every 5 minutes, making the systems to be scanned or corrupted database, the software may not be in a normal condition to warrant further testing in its current state.

Regression testing - this is the re-testing after bug fixes or modifications of the software. It is difficult to determine how much you need to re-test, especially at the end of the development cycle. automated testing tools are very useful for this type of test.

Acceptance Testing - this can be said as a final test and this was done on the basis of specific end-user or customer, or on the basis of use by users / customers over a certain period of limited time.

load test - this is nothing more than the application testing in the presence of heavy loads, how to test a website in a wide range of loads to determine at what point the system's response time degrades or fails.

The stress test - the term often used interchangeably with 'load' and testing 'performance'. Also used to describe such tests as a functional test of the system, though in the case of particularly heavy loads, heavy repetition of certain actions or inputs, input of large numerical values, large complex queries to a database system, etc.

performance testing - the term often used interchangeably with 'stress' testing and 'load'. Ideally 'performance' testing is defined in the documentation or QA requirements or test plans.

usability test - This test is made to 'ease'. Clearly this is personal, and will depend on the end user or targeted customer. User interviews, surveys, video recording of user sessions, and other techniques can be used. Programmers and testers are usually not suitable as usability testers.

Compatibility testing - testing how well the software performs in a particular hardware / software / operating system / network / etc environment.

user acceptance testing - to determine if the software is satisfactory to an end user or customer.

Comparison tests - comparing software weaknesses and strengths to other competing products.

Alpha testing - if an application development testing is being completed; minor design changes can still be made as a result of such tests. This is typically done by users or other, but not for programmers or testers.

Beta testing - testing when the development and testing are essentially completed and final bugs and problems need to be found before the final release. This is typically done by users or others, not by programmers or testers.

Mutation testing - a method of determining a test data set or test cases it is useful or not, intentionally introducing various changes to the code ( 'bugs') and repeat the test with the original data test / cases are detected to determine whether the 'bugs'.

Microsoft Office 365 -? Pros and cons

6:25 PM Add Comment
Microsoft Office 365 -? Pros and cons -

What is Office 365

Traditionally, Microsoft Office is a software application that you download and install on one or more PC as part of a licensing contract for single user or multiple.

the first time in 2010 and expanded in 2013 to include new floors, Microsoft Office 365 is a pay-as-you-go subscription version that provides online access to various software and services, eliminating the need for Microsoft have their own small business server. Typically the projects may include:

  • Microsoft Office (Word, Publisher, Excel, etc.)
  • Microsoft Exchange Online (e-mail hosting)
  • Microsoft Lync 2010 (communication server)
  • Sharepoint Document Management (Document server)
  • Skydrive Storage
  • Malware Protection

So is MS Office 365 right for you and your business?

The Pros Office 365

  • The applications are accessible from any device (including mobile), through any web browser as long as you have the necessary permissions and access to an internet connection (also WiFi).
  • Reduction of capital spending
  • Instead of paying for new versions, Office 365 updates are automatically included in your subscription
  • Multiple users can have access to the same documents, for example You can store the documents in SharePoint 2010 and have the ability to make changes, review the versions or even leave notes for colleagues.
  • removes any infrastructure sore head office relocation should be undertaken.
  • of the server stability, with a high uptime Service Level Agreement. (Assumes the network reliability)

The Cons of Office 365

  • The data is stored in 'the Cloud' in Microsoft data centers so that they are relying on both network and bandwidth. If your Internet connection is not lost access to software and data until it is restored
  • we have very little control over this 'cloud' environment data is stored in, while there are uptime warrants any infrastructure failure data center can have a direct impact on the availability of Office 365. If Microsoft or other providers of data center high-end disruptions occur, small businesses have no leverage.
  • can be considered that there is higher security risks associated with storing 'online data'. If this is a key factor for your business, there are upgrade options available but may be cost prohibitive.
  • application performance may be slower on an internet connection, especially if you have users at home plate with internet connection speed broadband and lower quality. This could have the knock on effect of reducing productivity
  • There are no limits to the number of email recipients you can have in a 24 hour period

in the end, if you are considering the move to Office 365, it is necessary to evaluate its suitability to meet your individual business needs. How would your business be affected if they were able to access applications? Are the possible implications for the security problem? What budget do you have available? Do you have any IT support? Would you still need a local server for certain requirements?

With IT decisions is always better to seek help to identify the impact on your business and how to minimize any potential risk.

IT work in different sectors

5:24 PM Add Comment
IT work in different sectors -

This is the time of rapid expansion in the IT industry and many countries are experiencing. Because of this technical and non-technical work in the Information Technology sector are also increasing, with a wide field of application in all industrial sectors. IT infrastructure services are required by most of the growing organizations around the world. There is an important place for these services in almost all sectors of activity, such as IT, human resources, banking and finance, energy and power, telecommunications, etc.

In the present time there are many job options in the industry IT after class 12th. They can do some 'work-oriented technical courses. There are some degree courses that students can do after the series 12 as BSc., BTech, BCA etc. Today, most electronic devices are based on certain software and the latest technology, so the software professionals are in a good question. There is a 25% annual increase in the Indian software industry by a report of NASSCOM.

There are good opportunities for the IT professionals in software and hardware lines. Many jobs are there for fresher also as a system analyst in which the candidate must be aware of all the software and hardware. As in the work of a system administrator must have the professional networking skills. He should know about two or more computers are connected through LAN, WAN and WAN. A hardware engineer should have the knowledge of the hardware components of a computer system, how to assemble, how to repair and replace them. Many types of support services are also offered by IT companies as they are available vacancies for various IT certified courses. These companies provide technology support services like server support, network management and support, helpdesk services.

The majority of courses are provided by Microsoft and many large technology institutes, CCNA, MCSE, many hardware and networking courses, courses of the chip level and many Di More. The IT industry in India is having one side of 5.19% of GDP of the country and more than 2.6% professionals are taken from this area. With significant growth in sectors other than technology professionals are always jobs in telecommunications, manufacturing, banking and finance, health care, etc.

What and why it is important bandwidth?

4:23 PM Add Comment
What and why it is important bandwidth? -

Bandwidth is the measure of the amount of data transferred in a particular time interval, usually in bits / sec. Bandwidth is the reason that an Internet user can check a file or video to be downloaded faster from a website and the exact file to take longer to download from another site. Bandwidth also determines how quickly a website takes to load. Here we look at why the bandwidth is important for the user of the Internet and especially to a site owner.

To understand the bandwidth, we must first explain how the Internet works. Internet is a global system of interconnected computer networks that consists of millions of users, including you, me, local businesses, international business and academic institutions. The Internet's network is connected through a set of wires and cables and optical network technologies. Bandwidth refers to the group of wires of connection to the network server. The files are transferred from the server through this network of fibers at various speeds. The speed at which data is transferred depends on the degree and quality of the thread. The higher the degree or higher quality is the speed.

As an Internet user you want to be able to access files, websites and downloads quickly. It 'so important that you have access to the internet at exceptional speed. Bandwidth is a factor which influences the speed at which the computer connects to the Internet. His Internet service providers, for example, may restrict or limit the bandwidth of your Internet connection the width especially during rush hour or if they used their limit for the month. This limited bandwidth will consequently affect the speed with which you can access the Internet.

band also plays an important role for website owners when building their website and choosing a web hosting service. In today's society, we live in a world "I want everything immediately", where it was shown that people want their information and answers immediately. For this reason, website owners need to make sure your web site has access to greater bandwidth speeds to meet visitors to your site and to account for times when you can have a lot of visitors to the your site at the same time. Most webhosting companies can offer different hosting packages and sometimes the different packages have restrictions on the amount of bandwidth provided. Others, however, may have a sufficient number of servers and services to offer unlimited bandwidth and, therefore, are of most benefit and value.

Overall, the bandwidth has an important role both for the Internet user and the website owner. When choosing a reliable web hosting service, make sure you understand how much bandwidth you will be provided with and that this is sufficient for your proposed site. If possible, find a web hosting service with unlimited bandwidth is much more beneficial and saves a lot of time and money in the future.

Registration for PCI DSS - How to collect Trails Server and Firewall audit for PCI DSS Requirement 10

3:22 PM Add Comment
Registration for PCI DSS - How to collect Trails Server and Firewall audit for PCI DSS Requirement 10 -

PCI DSS Requirement 10 calls for a full path review of all activities for all devices and users, in particular requires that all log and event monitoring to be collected centrally and securely back up. The thought here is twofold.

First, as a proactive security measure, the PCI DSS requires all records to be reviewed on a daily basis (yes - you read that right - review all agendas - we will return to this potentially overwhelming burden later. ..) requires that the security team to become more intimate with the 'business as usual' daily operation of the network. this way, when it poses a threat to genuine security, will be more easily detected by unusual events and patterns activities.

the second pilot for the registration of all activities is to give a 'black box' recorded control track so that if a crime is committed, the forensic analysis of the activities surrounding the 'security incident can be conducted. at best, the author and the extent of their misdeeds can be identified and remediated. at worst - the lessons can be learned from the attack so that the processes and / or technological security defenses that can be improved. Of course, if you're a PCI reading this merchant, then the main driver is that this is a mandatory requirement PCI DSS - so we should get moving!

What devices are within the scope of the requirement PCI 10? Same answer as to which devices are within the scope of the PCI DSS as a whole - not involved with the management of, or access to the card information is in the field of application and there for we need to acquire an audit trail by each of them . The most critical devices are firewalls, servers with Regulation files or transaction and any domain controllers for the PCI held, although all 'flow' devices must be covered without exception.

How do you get from the event logs' within the scope of "PCI devices?

We take them in turn -

How do I get events from logs PCI firewall? - The exact command set varies between manufacturers and firewall versions, but you will need to turn on 'registration' Firewall via the web interface or the command line. Taking a typical example - Cisco ASA - the sequence of CLI commands is as follows accessed without logging console no logging monitor logging abcd (where abcd is the syslog server address) trap registration information This will make sure all level 'Informational' and above messages are forwarded to the syslog server and provide everyone access and log off events are captured.

How do i get PCI Audit Trail from Windows servers and EPoS / Tills? - There are a couple of steps required for Windows servers and PC / EPoS devices. First of all you need to make sure that the events log on or off, privilege use, policy change and, depending on your application and how the card data is handled, access to objects. Use the Local Security Policy You can also enable logging of system events, if you want to use the SIEM system to help solve problems and anticipate the system such as a failed disk problems you can be preempted before complete failure by identifying disk errors. Usually we need success and failure to register for each event -

  • Access Events- success and failure Account
  • Account Management Events- success and failure
  • Service Directory access Events- failure
  • Logon Events- success and failure
  • object access Events- success and failure
  • Change the Events- political success and failure
  • Use of Events- failure
  • privileges
  • process Tracking No check
  • success and failure of Events- system

* Directory Service access events available on a domain controller only

** object access - Used in conjunction with the file and folder auditing. Failures audit reveals access attempted to secure prohibited items that may be an attempt to violate security. The successful revision is used to give an audit trail of all access to the fixed date, such as, card data in a settlement file / transaction / folder.

*** Process monitoring - not recommended as this will generate a large number of events. Best to use a professional whitelist / blacklist technology l

**** system events - Not required for PCI DSS compliance, but often used for 'added value provided' as extra PCI DSS initiative by providing early warning signs of problems with the hardware, and so failure of the pre-apply without affecting system. Once the events are checked, so they need to be sent back to your central syslog server. An agent program for Windows Syslog bind automatically in the Windows event log and send all events via syslog. The advantage of an agent like this is that events can be formatted syslog severity codes and standard facilities and also pre-filtered. It 'important that events are forwarded to the real-time secure syslog servers to ensure they are backed up before there is any possibility to remove the local server event log.

Unix / Linux servers - Enable recording using the syslog daemon, which is a standard part of all UNIX and Linux operating systems, such as Red Hat Enterprise Linux, CentOS and Ubuntu. Edit the /etc/syslog.conf file and enter the syslog server data.

For example, add the following line to /etc/syslog.conf

*. * @ (ABCD)

Or if you are using Solaris or other UNIX-5-System

* .debug @abcd

* .info @ Abcd

* .Notice @ Abcd

* .warning @ Abcd

* .err @ Abcd

* .crit @ Abcd

* .alert @ Abcd

* .emerg @ Abcd

Where abcd is the IP address of the targeted syslog server.

If you need to collect logs from a third party application such as Oracle, so you may need to use specialized Unix Syslog Agent that allows third-party log files for routing via syslog.

Other network devices routers and switches inside of scope of PCI DSS application will also need to be configured to send events via syslog. As has been described above for firewalls, syslog is a function almost universally supported by all devices and network devices. However, in the rare case that is not supported syslog, SNMP traps can be used, provided that the syslog server used to receive and interpret SNMP traps.

PCI DSS Requirement 10.6 "the audit log to all system components at least daily" We covered as get the right logs all devices within range of the PCI DSS, but this is often the easiest part of the requirement 10. treat the appearance of requirement 10, which often covers PCI traders most is the extra workload that expect now to be responsible for the analysis and understanding of a potentially huge volume of logs. There is often a philosophy of 'out of sight, out of mind', or 'we can not see the logs, then we can not be responsible for reviewing their' mind-set, since if the records are made visible and positioned on the screen in front of the dealer, there is no longer any excuse to ignore them.

Significantly, although the PCI DSS avoids being prescriptive on how to deliver against the requirements of 12, 10 Special requirements specifically "Log collection, analysis and alerting tools may be used to meet compliance with Requirement 10.6" . In practice, it would be a very labor intensive task to review all the event logs in an environment even small and half automated log analysis is essential.

However, if properly implemented, it will become much more than just a tool to help you cope with the awkward weight of the PCI DSS. An intelligent system Security Information and Event Management will be extremely beneficial to all investigations troubleshooting and problem. This system will allow potential problems to be identified and resolved before they impact business operations. From the point of view of security, allowing you to become 'intimate' with the normal operation of your systems, they are then well placed to detect truly unusual and potentially significant security incidents.

More information go to La Since Http://www.newnettechnologies.com

All material is protected by copyright New Network Technologies Ltd.