3 Levels of Grid Computing Deployment

Grid computing is the application of several computers to a single problem at the same time – usually to a scientific or technical problem that requires a great number of computer processing cycles or access to large amounts of data. Computational grids that couple geographically distributed resources are becoming the effective computing platform for solving large-scale problems in science, engineering, and commerce. According to John Patrick, IBM’s vice president for Internet strategies, “the next big thing will be grid computing.” Although Grid computing is firmly ensconced in the realm of academic and research activities, more and more companies are starting to turn to it for solving hard-nosed, real-world problems. Grid computing is emerging as a viable technology that businesses can use to wring more profits and productivity out of IT resources –and it’s going to be up to you developers and administrators to understand Grid computing and put it to Continue reading

The Five Phases of Ethical Hacking

It is debatable, if hacking can be ethical or not, the term “Hacking” over time has been associated with destructive activity. These are some of the terms used in the context of hacking which provides better clarity, Hacker is somebody who enjoys learning hacking for a defensive purpose; an ethical hacker is the security professional who exercises his skills for a defensive purpose. The term Cracker refers to a person who uses his hacking skills for destructive purpose. The ethical question here is in regard to the physical activity of hacking which is sometimes hard to differentiate from cracking. The main difference being, Ethical hacker just identifies vulnerabilities and does not exploit them unlike a cracker. Ethical hacking is the process adopted by ethical hackers to discover the vulnerabilities existing in information systems operating environments. With the growth of internet, computer security has become a major concern for business. Organizations Continue reading

Introduction to Grid Computing

The popularity of the Internet as well as the availability of powerful computers and high-speed network technologies as low-cost commodity components is changing the way we use computers today. These technology opportunities have led to the possibility of using distributed computers as a single, unified computing resource, leading to what is popularly known as Grid computing. Grid computing is a term referring to the combination of computer resources from multiple administrative domains to reach a common goal. The grid can be thought of as a distributed system with non-interactive workloads that involve a large number of files. What distinguishes grid computing from conventional high performance computing systems such as cluster computing is that grids tend to be more loosely coupled, heterogeneous, and geographically dispersed. Although a grid can be dedicated to a specialized application, it is more common that a single grid will be used for a variety of different Continue reading

What is Enterprise Application Integration (EAI)?

Supply Chain Management (SCM) applications (for managing inventory and shipping), Customer Relationship Management (CRM) applications (for managing current and potential customers), Business Intelligence (BI) applications (for finding patterns from existing data from operations), and other types of applications (for managing data such as human resources data, health care, internal communications, etc) typically cannot communicate with one another in order to share data or business rules throughout a company. Enterprise Application Integration (EAI) is the process of linking such applications within a single organization together in order to simplify and automate business processes to the greatest extent possible, while at the same time avoiding having to make sweeping changes to the existing applications or data structures. Enterprise Application Integration (EAI) is defined as the unrestricted sharing of data and business processes among any connected applications and data source in the enterprise. It is considered as a framework that is formed of Continue reading

Ethical Hacking – Need, Types, Applications and Problems

The word hacking is defined as an illegal use of the other’s computer system or the network resources. Hacker is the term which is formerly meant for the skillful programmer. The word hacker refers to the names of the persons who enjoys the work in learning the details of the computer systems and stretch the capabilities from the system. The system of hacking describes the fast improvement in the new programs that make the codes for the providing a better security to the system with more efficiency. The word cracker also belongs to the same field it make use of the hacking skills for the unlawful purposes like email id, intruding into other’s system. Hacking is of different types such as back door hacking, viruses and worms, Trojan horses, Denial of Services, anarchists, crackers, kiddies and ethical hacking. In the types of hacking system one of the most common hacking Continue reading

Blockchain Technology – Features, Types and Benefits

A Short History of the Blockchain Technology When an unknown scientist under the pseudonym Satoshi Nakamoto published his white paper about Bitcoin – a “purely peer-to-peer version of electronic cash”– in 2008, it was not the cryptocurrency itself but its underlying mechanism, known today as the blockchain, that was considered revolutionary.  But overall awareness of the blockchain technology remained rather limited, as Bitcoin itself was not yet widely known. Starting in the year 2012, increasing activity surrounding Bitcoin could be observed, as the cryptocurrency’s market capitalization grew and start-ups in the field of payments and coin wallets started to emerge. But still, Bitcoin and the underlying blockchain remained subject to a general scepticism, being associated mainly with the financing of rather sketchy online activities and other misconceptions. Nonetheless, by the year 2014, over 80 uses of blockchains had been reported. Slowly, the initial scepticism gave way to the increasing efforts of Continue reading