Open Systems Interconnection Model (OSI Model)

What does Open Systems Interconnection Model (OSI Model) mean?

The Open Systems Interconnection (OSI) Model is a conceptual and logical layout that defines network communication used by systems open to interconnection and communication with other systems.

The model is broken into seven subcomponents, or layers, each of which represents a conceptual collection of services provided to the layers above and below it. The OSI Model also defines a logical network and effectively describes computer packet transfer by using different layer protocols.

The OSI Model may also be referred to as the seven-layer OSI Model.

Continue reading

Advertisements

Clojure

What does Clojure mean ?

Clojure is a dynamic programming language that is a dialect, or variant, of the Lisp programming language. It is designed to be general-purpose and combines the interactive development and approachability of a scripting language with a robust and efficient infrastructure used for multithreaded programming.

It is also a compiled language that compiles directly into JVM bytecode while remaining completely dynamic.

Clojure was developed by Rich Hickey as a dialect of Lisp that directly targets the Java Virtual Machine (JVM). Because of this, it shares the code-as-data philosophy and the powerful macro system of Lisp. It is predominantly considered a functional programming language that features a set of immutable and persistent data structures.

Continue reading

Cloud Computing

What does Cloud Computing mean?

Cloud computing is the the use of various services, such as software development platforms, servers, storage, and software, over the Internet, often referred to as the “cloud.”

In general, there are three cloud computing characteristics that are common among all cloud-computing vendors:

  1. The back-end of the application (especially hardware) is completely managed by a cloud vendor.
  2. A user only pays for services used (memory, processing time and bandwidth, etc.).
  3. Services are scalable.

Continue reading

Hype Cycle

What does Hype Cycle mean ?

A hype cycle is a graphical representation model produced by Gartner Inc. that helps organizations understand the maturity and adoption of new and emerging technologies and how they can be used to address and solve real business problems. An organization uses a hype cycle to complement decision-making when adopting a new technology application or solution.

A hype cycle is primarily designed to separate technology hype from reality and to help organizations determine the best time to adopt/acquire a new technology. A hype cycle is divided into five different technology cycles, as follows:

Continue reading

Yottabyte (YB)

What does Yottabyte (YB) mean?

A yottabyte (YB) is a unit of digital information storage used to denote the size of data. It is equivalent to a quadrillion gigabytes, 1,000 zettabytes or 1,000,000,000,000,000,000,000,000 bytes.

The prefix “yotta” is part of the International System of Units (SI), and means 1024. Hard disk manufacturers label their products in SI, which may confuse some people in the IT field. The ISO, IEEE and the IEC all recommend using the unit yobibyte, which signifies 280 bytes and is more accurate for the measure of bytes.

Continue reading

How to Protect Your Business from Phone Hackers

Businesses requirement to manage clients proficiently and viably calls for a steady change in their telephone framework. What’s more, they have to minimise issues, for example, unauthorised utilization of telephone services and toll fraud (Phone Hacking). One of the real tests is to screen the uncalled for utilization of corporate correspondence offices for toll calls. The abuse of authorisation codes is a significant concern for different sorts of businesses. Toll fraud can happen with TDM and IP-based voice frameworks. From representatives that try to make a couple of free calls to programmers, any telephone framework could be helpless. Notwithstanding, call logging programming can dispose of this issue by guaranteeing that a phone framework is not traded off. Call logging includes catching call records, archiving them in a database, and after that recovering them by method of a reporting interface.

Continue reading

Ladyphone

Definition – What does Ladyphone mean?

A ladyphone is a tongue-in-cheek term coined by tech bloggers to refer to a smartphone that’s designed and marketed toward women. Although there are no clear standards for what qualifies as a ladyphone, devices that are promoted based on color, design and accessories designed for women – and whose marketing clearly targets women – are often labeled as ladyphones.

Research suggests that the majority of early adopters of smartphones are men, which may be causing a push among device manufacturers to increase their prevalence among women. However, ladyphones have also faced stiff criticism for promoting form over function – and charging a higher price for it.

Continue reading

Android Malware ‘Krysanec’ masquerading as legitimate apps

Security Experts always recommend android users to download applications only from official Google Play store. If you are downloading apps from third-party markets, you may end up with malware on your device.

Researchers at ESET found a new piece of android malware that masquerading as legitimate android applications.

The sample ESET analyzed is detected as Android/Spy.Krysanec and found to be disguising as mobile banking application for Russian users, data usage monitoring apps. One to them is disguised as Set Mobile security.

Continue reading

Encryption Key

What does Encryption Key mean?

An encryption key is a random string of bits created explicitly for scrambling and unscrambling data. Encryption keys are designed with algorithms intended to ensure that every key is unpredictable and unique.

The longer the key built in this manner, the harder it is to crack the encryption code. An encryption key is used to encrypt, decrypt, or carry out both functions, based on the sort of encryption software used.

Encryption is a type of security that converts data, programs, images, or other information into unreadable cipher. This is done by using a collection of complex algorithms to the original content meant for encryption.

Symmetric forms of encryption systems make use of a single password to serve as both decryptor and encryptor. Symmetric types use algorithms that are very safe. One of such type was adopted by the US Government as Advanced Encryption Standard (AES) to store classified information.

Continue reading

Why Google Is No Longer Updating PageRank?

PageRank is a link analysis algorithm that rates websites on a logarithmic scale of 0-10, with 10 being the best. Google has had a tradition of updating the algorithm quarterly, but it has now been more than 8 months since the last PageRank in December last year, which in turn was 7 months too late. While in service, it remained one of the more trusted metrics for evaluating the quality and importance of a website, which is why some unfortunate websites are stuck with an undesirable PR rating. So will Google ever update PageRank again? And exactly how important is this metric in SEO today?

Why PageRank updates stopped?

The update was due in the second or third quarter of 2013, but it was not to be, apparently owing to some problem with the PR algorithm. Google’s Matt Cutts explained that the ‘pipeline’ to send PageRank updates to the toolbar is broken, which means that PR will not update automatically.

Continue reading