Cloud Computing, often referred to as simply “the cloud”, is a distributed architecture that centralizes server resources on a scalable platform, enabling ubiquitous access to configurable resources and services. It provides storage and access for data over the internet instead of our computer’s hard drive. Leveraging the Internet, it provides unparalleled and distributed services based on virtualization and service-oriented architecture. Cloud is not another recent technology, but rather it can be described as a delivery model for information services using existing technologies. It does an excellent job of reducing the time spent on IT infrastructure and maintenance. Cloud presents itself as a ubiquitous, dynamically scalable, and on-demand model, that can be purchased on a ‘pay-as-you-go’ basis without any prior subscription or under/overprovisioning. Cloud Computing Models 1. Service-Based Models There are three delivery models that the cloud utilizes to provide different types of services are delivered to the end-user. All the Continue reading
Business and Technology
Voice Over Internet Protocol (VoIP)
Voice over Internet Protocol or Voice over IP or VoIP is a general term for a family of transmission technologies for delivery of voice communications over internet protocol networks such as the internet or other packet-switched networks. Other terms frequently encountered and synonymous with voice over internet protocol are internet protocol telephony, internet telephony, voice over broadband, broadband telephony, and broadband phone. Internet telephony refers to communications services – voice, facsimile, and/or voice-messaging applications – that are transported via the internet, rather than the public switched telephone network. Definition of Voice Over Internet Protocol (VoIP) Voice over internet protocol can be defined as the ability to make telephone calls and to send facsimiles over internet protocol- based data networks with a suitable quality of service and a much superior cost/benefit. Equipment producers see Voice over Internet Protocol (VoIP) as a new opportunity to innovate and compete. The challenge for then Continue reading
Data Transmission Modes in Computer Networks
Data communication circuits can be configured in a huge number of arrangements depending on the specifics of the circuit, such as how many stations are on the circuit, type of transmission facility, distance between the stations, how many users at each station and so on. Data communication circuits can however be classified as either two point or multipoint. A two-point configuration involves only two stations, whereas a multipoint configuration involves more than two stations. Regardless of configuration, each station can have one or more computers, computer terminals or workstations. A two point circuit involves the transfer of digital information from a mainframe computer and a personal computer, two mainframe computers, two personal computers or two data communication networks. A multipoint network is generally used to interconnect a single mainframe computer to many personal computers or to interconnect many personal computers. Coming to transmission modes, there are three modes of transmission Continue reading
3 Levels of Grid Computing Deployment
Grid computing is the application of several computers to a single problem at the same time – usually to a scientific or technical problem that requires a great number of computer processing cycles or access to large amounts of data. Computational grids that couple geographically distributed resources are becoming the effective computing platform for solving large-scale problems in science, engineering, and commerce. According to John Patrick, IBM’s vice president for Internet strategies, “the next big thing will be grid computing.” Although Grid computing is firmly ensconced in the realm of academic and research activities, more and more companies are starting to turn to it for solving hard-nosed, real-world problems. Grid computing is emerging as a viable technology that businesses can use to wring more profits and productivity out of IT resources –and it’s going to be up to you developers and administrators to understand Grid computing and put it to Continue reading
The Five Phases of Ethical Hacking
It is debatable, if hacking can be ethical or not, the term “Hacking” over time has been associated with destructive activity. These are some of the terms used in the context of hacking which provides better clarity, Hacker is somebody who enjoys learning hacking for a defensive purpose; an ethical hacker is the security professional who exercises his skills for a defensive purpose. The term Cracker refers to a person who uses his hacking skills for destructive purpose. The ethical question here is in regard to the physical activity of hacking which is sometimes hard to differentiate from cracking. The main difference being, Ethical hacker just identifies vulnerabilities and does not exploit them unlike a cracker. Ethical hacking is the process adopted by ethical hackers to discover the vulnerabilities existing in information systems operating environments. With the growth of internet, computer security has become a major concern for business. Organizations Continue reading
Introduction to Grid Computing
The popularity of the Internet as well as the availability of powerful computers and high-speed network technologies as low-cost commodity components is changing the way we use computers today. These technology opportunities have led to the possibility of using distributed computers as a single, unified computing resource, leading to what is popularly known as Grid computing. Grid computing is a term referring to the combination of computer resources from multiple administrative domains to reach a common goal. The grid can be thought of as a distributed system with non-interactive workloads that involve a large number of files. What distinguishes grid computing from conventional high performance computing systems such as cluster computing is that grids tend to be more loosely coupled, heterogeneous, and geographically dispersed. Although a grid can be dedicated to a specialized application, it is more common that a single grid will be used for a variety of different Continue reading