Data Transmission Modes in Computer Networks

Data communication circuits can be configured in a huge number of arrangements depending on the specifics of the circuit, such as how many stations are on the circuit, type of transmission facility, distance between the stations, how many users at each station and so on. Data communication circuits can however be classified as either two point or multipoint. A two-point configuration involves only two stations, whereas a multipoint configuration involves more than two stations. Regardless of configuration, each station can have one or more computers, computer terminals or workstations. A two point circuit involves the transfer of digital information from a mainframe computer and a personal computer, two mainframe computers, two personal computers or two data communication networks. A multipoint network is generally used to interconnect a single mainframe computer to many personal computers or to interconnect many personal computers. Coming to transmission modes, there are three modes of transmission Continue reading

E-Business Model – Meaning, Elements and Types

In this Globalization era the developed, undeveloped and developing countries are preparing their societies and communities for globalization. The globalization is possible only because of revolution in communication technology. The concept of global economy is emerging which is making e-business, an indivisible component of business strategy planning. Banking, tourism, shopping, hotel booking, airlines booking, auctioning and the list is non-ending. Millions of internet users just rely for their financial as well as other services on their online transactions. As more and more people have started using internet, more specifically e-business, for their day to day working, e-business has become more and more popular. The excitement of using e-services has grown and the potential for success of businesses increased. As more and more companies have started using internet for their business growth, some problems have to be understood properly and the solutions to them have to be thought carefully. At one Continue reading

The Five Phases of Ethical Hacking

It is debatable, if hacking can be ethical or not, the term “Hacking” over time has been associated with destructive activity. These are some of the terms used in the context of hacking which provides better clarity, Hacker is somebody who enjoys learning hacking for a defensive purpose; an ethical hacker is the security professional who exercises his skills for a defensive purpose. The term Cracker refers to a person who uses his hacking skills for destructive purpose. The ethical question here is in regard to the physical activity of hacking which is sometimes hard to differentiate from cracking. The main difference being, Ethical hacker just identifies vulnerabilities and does not exploit them unlike a cracker. Ethical hacking is the process adopted by ethical hackers to discover the vulnerabilities existing in information systems operating environments. With the growth of internet, computer security has become a major concern for business. Organizations Continue reading

What is Enterprise Application Integration (EAI)?

Supply Chain Management (SCM) applications (for managing inventory and shipping), Customer Relationship Management (CRM) applications (for managing current and potential customers), Business Intelligence (BI) applications (for finding patterns from existing data from operations), and other types of applications (for managing data such as human resources data, health care, internal communications, etc) typically cannot communicate with one another in order to share data or business rules throughout a company. Enterprise Application Integration (EAI) is the process of linking such applications within a single organization together in order to simplify and automate business processes to the greatest extent possible, while at the same time avoiding having to make sweeping changes to the existing applications or data structures. Enterprise Application Integration (EAI) is defined as the unrestricted sharing of data and business processes among any connected applications and data source in the enterprise. It is considered as a framework that is formed of Continue reading

Case Study: How Walmart Enhances Supply Chain Management with ERP Initiatives?

Wal-Mart was founded in 1962 by Sam Walton and is been in the business of selling anything and everything people need for their everyday life with an everyday low price strategy. The success of Wal-Mart is mainly due to its focus on continuously improving operations through its efficient supply chain management practices. Sam Walton was not mainly concerned about opening more stores in small towns, but also came up with several innovative practices to improve the way business was conducted in the store. From the inception, Sam Walton provided products at a reduced cost than its competitors. Wal-Mart follows the “Everyday low prices” business model. As the years passed Wal-Mart grew to a size which gave it power to bargain the cost of products with its suppliers. To provide customers with “Everyday low prices”, Wal-Mart has highly invested in IT system to effectively manage their supply chain activities. Wal-Marts company Continue reading

Ethical Hacking – Need, Types, Applications and Problems

The word hacking is defined as an illegal use of the other’s computer system or the network resources. Hacker is the term which is formerly meant for the skillful programmer. The word hacker refers to the names of the persons who enjoys the work in learning the details of the computer systems and stretch the capabilities from the system. The system of hacking describes the fast improvement in the new programs that make the codes for the providing a better security to the system with more efficiency. The word cracker also belongs to the same field it make use of the hacking skills for the unlawful purposes like email id, intruding into other’s system. Hacking is of different types such as back door hacking, viruses and worms, Trojan horses, Denial of Services, anarchists, crackers, kiddies and ethical hacking. In the types of hacking system one of the most common hacking Continue reading