Cookie Respawning

What does Cookie Respawning mean?

Cookie respawning is the process of recreating browser cookies from information in that have been previously deleted.

With cookie respawning, companies can take information stored in ‘flash cookies’ to re-create a cookie in a browser. There are concerns that cookie respawning can violate a user’s privacy and become problematic for the operation of the computer, in the same way that any kind of cookie storage can ultimately challenge an operating system.

Continue reading


Desktop Virtualization

What does Desktop Virtualization mean?

Desktop virtualization is a virtualization technology that separates an individual’s PC applications from his or her desktop. Virtualized desktops are generally hosted on a remote central server, rather than the hard drive of the personal computer. Because the client-server computing model is used in virtualizing desktops, desktop virtualization is also known as client virtualization.

Desktop virtualization provides a way for users to maintain their individual desktops on a single, central server. The users may be connected to the central server through a LAN, WAN or over the Internet.

Continue reading

Apache Pig

What does Apache Pig mean?

Apache Pig is a platform that is used to analyze large data sets. It consists of a high-level language to express data analysis programs, along with the infrastructure to evaluate these programs. One of the most significant features of Pig is that its structure is responsive to significant parallelization.

Pig operates on the Hadoop platform, writing data to and reading data from the Hadoop Distributed File System (HDFS) and performing processing by means of one or more MapReduce jobs. Apache Pig is available as open source.

Apache Pig is also known as Pig Programming Language or Hadoop Pig.

Apache Pig has two parts: Pig Latin language and Pig engine. The Pig Latin language is a scripting language that allows users to illustrate the way in which data flow from one or more inputs must be read and processed, and the location in which must be stored.

Continue reading

Fog Computing

What does Fog Computing mean?

Fog computing is a term for an alternative to cloud computing that puts some kinds of transactions and resources at the edge of a network, rather than establishing channels for cloud storage and utilization. Proponents of fog computing argue that it can reduce the need for bandwidth by not sending every bit of information over cloud channels, and instead aggregating it at certain access points, such as routers. This allows for a more strategic compilation of data that may not be needed in cloud storage right away, if at all. By using this kind of distributed strategy, project managers can lower costs and improve efficiencies.

Continue reading


What does Burp mean?

A burp is generally defined as a process for resetting certain network hardware in order to reboot network operations. This term can also be used to refer to the initial interruption in services. In some cases, those in IT use the term burp or hiccup to describe some interruption, such as a router losing a packet of data.

Some of those who use network technologies might refer to a network burp in a number of scenarios, including when a wide array of users experiences the same interruption at the same time. Here, the term burp can be used during efforts to reconnect users after the initial interruption. Users can respond to questions about a network burp with troubleshooting advice or personal feedback about their interactions with the network.

Continue reading


What does Intercloud mean?

Intercloud is a term used in IT to refer to an, as of yet, theoretical model for cloud computing services. The idea of the intercloud relies on models that have already been shown to be effective in cases like the global Internet and the 3G and 4G wireless networks of various national telecom providers.

Experts sometimes refer to the intercloud as a ‘cloud of clouds.’ The idea is that a single common functionality would combine many different individual clouds into one seamless mass in terms of on-demand operations. To understand how this works, it’s helpful to think about how existing cloud computing setups are designed.

Continue reading

VPN Token

What does VPN Token mean?

A VPN token is a type of security mechanism that is used to authenticate a user or device on a VPN infrastructure.

It is a type of security or authentication token, designed and used specifically to validate and grant users and/or devices with access to a VPN.

A VPN token works similarly to a standard security token. It primarily provides an additional layer of authentication and security within a VPN. It is generally enabled with two-factor authentication where the end user not only provides a password but also authenticates the device. This is done to ensure that the user connects with a VPN only through an authorized device. A VPN token can be hardware or software based, however, most VPNs utilize software tokens to authorize remotely connected users.

Wired Equivalent Privacy (WEP)

What does Wired Equivalent Privacy (WEP) mean?

Wired Equivalent Privacy (WEP) was first released as a portion of the IEEE 802.11 standard in 1999. Its security was deemed to be the equivalent of any wired medium, hence its name. As the years passed, WEP was deemed broken, and it has since been replaced by two other iterations of wireless security protocols, Wi-Fi Protected Access (WPA) and WPA2.

Wired Equivalent Privacy is sometimes erroneously referred to as Wired Equivalent Protocol (WEP).

Continue reading

Intrusion Detection System

What is Intrusion Detection System ?

An intrusion detection system (IDS) inspects all inbound and outbound network activity and identifies suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system.

There are several ways to categorize an IDS

  • misuse detection : in misuse detection, the IDS analyzes the information it gathers and compares it to large databases of attack signatures. Essentially, the IDS looks for a specific attack that has already been documented. Like a virus detection system, misuse detection software is only as good as the database of attack signatures that it uses to compare packets against.
  • Continue reading

VM Sprawl

What does VM Sprawl mean?

Virtual machine (VM) sprawl or virtualization sprawl is the phenomenon which occurs when the number of virtual machines connected to the network exceeds the network’s capabilities.

VM sprawl often happens when there is freedom to provision instances because of a lack proper implemented policies regarding provisioning.

To prevent VM sprawl, a proper virtual machine lifecycle management (VMLM) has to be implemented, with tools that will allow administrators to oversee the implementation, operation, delivery and maintenance of all virtual machines during their entire existence. In such a way, all VM creation are monitored so accountability can be set, and then each created VM can be decommissioned once their purpose has been served.