Cryptography is defined as hiding the message to make it secret using scrambled codes. It allows the date to be changed into a code that is not legal for not permitted person and it needs to be converted back to its original message for it to become readable. Encryption and decryption are the process of cryptography. Encryption is when the readable text is converted into coded text while the decryption is where the coded text is converted into readable text. There are numerous types of cryptography but the symmetric and asymmetric key cryptography is the most used technique. 1. Symmetric-key Cryptography Symmetric-key Cryptography is also known as the private key cryptography. It is the oldest and well-known technique of cryptography. This method is simple which only requires each computer that has a code that will be encrypted by an encryption software into packets of data before it is sent across Continue reading
Business and Technology
Blockchain Technology – Advantages and Disadvantages
In 2017, a new form of currency and heated topic came to light, Bitcoin. Soon after its emergence, Bitcoin turned into the most invested in and discussed topic. It was considered to be a future form of digital currency. Investors and debaters understood the basics of how Bitcoin operated, however, the system behind Bitcoin was unclear. Bitcoin, alike many other cryptocurrencies, uses a system called Blockchain. What is Blockchain? How does Blockchain play a role in cryptocurrency? According to Bitcoin.org, “The block chain is a shared public ledger on which the entire Bitcoin network relies.” For example, imagine an iron chain full of square blocks, each block is bind by a transaction between two parties. The blocks are added one after another in chronological order. Within this block, information from both participants is contained. Once the transaction is made, it will be displayed for the public to view. Blockchain plays a Continue reading
Factors Affecting the Performance of Computer Networks
Networking is very important in the world of computer. Networking is the activity of connecting the computers to each other to make-up the computer network. In other word is the purpose of sharing data through linking of two or more computing devices together. Networks are built with a mix of computer hardware and computer software. A computer network is a collection of computers and devices connected together via communications devices and transmission media. There are few factors that affect the performance of computer networks. Those factors will reduce the quality of service of the network. The major factors are Latency, Packet loss, Retransmission, Throughput and Queuing delay. 1. Latency Latency is the kinds of delays typically incurred in processing of network data. A low latency network connection is one that generally experiences small delay times, while a high latency connection generally suffers from long delays. Although the peak bandwidth of Continue reading
Scope of Grid Computing
EXPLOITING UNDERUTILIZED RESOURCES The easiest use of grid computing is to run an existing application on a different machine. The machine on which the application is normally run might be unusually busy due to an unusual peak in activity. The job in question could be run on an idle machine elsewhere on the grid. There are at least two prerequisites for this scenario. First, the application must be executable remotely and without undue overhead. Second, the remote machine must meet any special hardware, software, or resource requirements imposed by the application. In most organizations, there are large amounts of underutilized computing resources. Most desktop machines are busy less than 5 percent of the time. In some organizations, even the server machines can often be relatively idle. Grid computing provides a framework for exploiting these underutilized resources and thus has the possibility of substantially increasing the efficiency of resource usage. Another Continue reading
Security Issues of Cloud Computing and Countermeasures
Along with the rapid development of information technology, all the organizations are seeking unique ways of driving their businesses forward, and the responsibility to manage these increasing demands is now placed on computer networks to provide a competitive edge and create new opportunities at reduced cost with efficient service. This has accelerated all the business and technological initiatives that promise to provide these services at the comparably low infrastructure and operating costs. A fine example of this scenario is the rapid growth of cloud computing. Cloud Computing, often referred to as simply “the cloud”, is a distributed architecture that centralizes server resources on a scalable platform, enabling ubiquitous access to configurable resources and services. It provides storage and access for data over the internet instead of our computer’s hard drive. Leveraging the Internet, it provides unparalleled and distributed services based on virtualization and service-oriented architecture. Cloud is not another recent Continue reading
The Impact of the Internet of Things (IoT)
The Internet of Things (IoT) has the ability to interconnect the world in unprecedented way and is considered by many to be the next step in the evolution of the internet. The creation of the internet had a significant impact on the way in which society accesses and uses information. For the first time in history there was virtually unlimited access to information from all over the world at any time of the day. Information that used to take weeks or months to gather and analyze was now just a click away enabling people from all over the world to interact and collaborate at unprecedented speeds and significantly reduced costs. People were more connected to each other than ever before sharing knowledge and experiences faster than any time in history. Soon, businesses started leveraging the power of the internet to connect to devices or, things, as well as other people Continue reading