Saturday, December 31, 2011

Cloud Computing in Simple Terms

Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. This technology allows for much more efficient computing by centralizing storage, memory, processing and bandwidth.

A simple example of cloud computing is Yahoo email, Gmail, or Hotmail etc. You dont need a software or a server to use them. All a consumer would need is just an internet connection and you can start sending emails. The server and email management software is all on the cloud ( internet) and is totally managed by the cloud service provider Yaho , Google etc. The consumer gets to use the software alone and enjoy the benefits. 

The analogy is , 'If you need milk , would you buy a cow ?' All the users or consumers need is to get the benefits of using the software or hardware of the computer like sending emails etc. Just to get this benefit (milk) why should a consumer buy a (cow) software /hardware ? Cloud computing is broken down into three segments: "application" "storage" and "connectivity." Each segment serves a different purpose and offers different products for businesses and individuals around the world.

Tuesday, December 20, 2011

Actuators

An Actuator is something that converts energy into motion. It also can be used to apply a force. An actuator typically is a mechanical device that takes energy, usually energy that is created by air, electricity or liquid, and converts it into some kind of motion. That motion can be in virtually any form, such as blocking, clamping, ejecting or many other types of motion.

In simple words, an actuator that generates linear motion or movement is called Linear Actuator. Most of these actuators are operated using hydraulic or mechanical actuation techniques and they are using non-linear motion as their input. Electric Linear Actuators are most suitable for the movement of final control elements which require linear movement. The rotary to linear conversion is done without any wear and thrust rod can transfer force directly to the final element. 

Many actuators are designed to be used in hazardous areas. They are operated by standard electronic units. Literally hundreds of actuators are available in the market. One needs to understand the required force, rated speed, maximum stroke range, and whether explosion protection is needed or not. Then one can select appropriate linear actuator for their needs. A standard linear actuator commonly has the motor as a separate cylinder attached to the side of the actuator, It is attached either in parallel way with the actuator or it sticks out to the side 90 degrees to the actuator. Motion control also plays an important role in the working of this device.The motor may also be attached to the back of the actuator. The drive motor has a solid drive shaft. This shaft is geared to the drive nut or drive screw.

Saturday, November 26, 2011

Google+ was never a comptetior to Facebook

The social web is a well reported topic within the media today, and for good reason. We are in a transitional change with how we communicate with each other online, how brands reach consumers and how organisations market to their audience. We are undoubtedly immersed in the technology age, and our lives, the way we 
interact with others, is changing totally.

The monumental success of Facebook, Mark Zuckerberg's world leading social platform, has enticed brands, consumers, investors alike, and the world is continually awaiting for that 'next big thing'. A likely reason therefore that the majority of news stories, magazine articles and blog posts on Google's latest foray into the social web repeatedly draw up comparisons to Zuckerberg's global giant.

Predicting the next big thing is often easier than some might think. You simply have to look at what is already out there, not at who's focusing on doing something different, but rather someone who's doing it better.
Take the iPod for example. Certainly not the first digital music player on the market, but Apple's cult status products have led the way in both design and function. Google was certainly not the first search engine. Remember the likes of Lycos, Hotbot and AltaVista? Google simply developed a product that was faster, cleaner, and easier to use than its rivals, and they now command a dominating portion of the search market.
Skype too was not the first online video chat service, but with successful brand building and fantastic integration with offline communication, it continues to be the world's favourite online audio/video communication tool.

Contrary to popular belief, Google+ was never created to directly compete for people's time on the internet. A simple, ad free system, Google+ was launched to compete for users' personal data. Becoming the primary platform for social networking would simply be a bonus.
Speaking at the Monaco Media Forum recently, Nikesh Arora, Google's chief business officer said that Google+ is a platform that allows the bringing together of all the services and products that they currently offer. It was never 'just about getting people together on one site and calling it a social network'.
The real power behind what Google has created comes down to the integration of Google's products, meaning that as people are using the search engine, they are also logged into Google+. The combination of that user data and knowing when people are actively searching for something opens up the possibility of the most targeted advertising platform in history, and Google are very aware of the fact.
Contrary to popular belief, Google+ was never created to directly compete for people's time on the internet. A simple, ad free system, Google+ was launched to compete for users' personal data. Becoming the primary platform for social networking would simply be a bonus
Little over a week into taking the reigns as CEO, Larry Page prioritised the company's social media strategy, by directly linking the annual bonuses of over 25% of Google employees to the success or failure of their social products.

Friday, August 12, 2011

What is Subnet and Subnet Mask?

Subnet:A subnet (short for "subnetwork") is an identifiably separate part of an organization's network. Typically, a subnet may represent all the machines at one geographic location, in one building, or on the same local area network (LAN). Having an organization's network divided into subnets allows it to be connected to the Internet with a single shared network address. Without subnets, an organization could get multiple connections to the Internet, one for each of its physically separate subnetworks, but this would require an unnecessary use of the limited number of network numbers the Internet has to assign. It would also require that Internet routing tables on gateways outside the organization would need to know about and have to manage routing that could and should be handled within an organization.

A subnet is a also logical grouping of connected network devices. Nodes on a subnet tend to be located in close physical proximity to each other on a LAN. Network designers employ subnets as a way to partition networks into logical segments for greater ease of administration. When subnets are properly implemented, both the performance and security of networks can be improved.

Subnet Mask:
A mask used to determine what subnet an IP address belongs to. An IP address has two components, the network address and the host address. For example, consider the IP address 150.215.017.009. Assuming this is part of a Class B network, the first two numbers (150.215) represent the Class B network address, and the second two numbers (017.009) identify a particular host on this network.

Subnetting enables the network administrator to further divide the host part of the address into two or more subnets. In this case, a part of the host address is reserved to identify the particular subnet. This is easier to see if we show the IP address in binary format. The full address is:

10010110.11010111.00010001.00001001

The Class B network part is:

10010110.11010111

and the host address is

00010001.00001001

If this network is divided into 14 subnets, however, then the first 4 bits of the host address (0001) are reserved for identifying the subnet.

The subnet mask is the network address plus the bits reserved for identifying the subnetwork. (By convention, the bits for the network address are all set to 1, though it would also work if the bits were set exactly as in the network address.) In this case, therefore, the subnet mask would be 11111111.11111111.11110000.00000000. It's called a mask because it can be used to identify the subnet to which an IP address belongs by performing a bitwise AND operation on the mask and the IP address. The result is the subnetwork address:
Subnet Mask 255.255.240.000 11111111.11111111.11110000.00000000
IP Address 150.215.017.009 10010110.11010111.00010001.00001001
Subnet Address 150.215.016.000 10010110.11010111.00010000.00000000

The subnet address, therefore, is 150.215.016.000.

Hope you enjoyed !!!

Please visit my other blogs
Operating System Concepts
Technomedia
Enter into world of Technology
Hina Rabbani Khar

Wednesday, August 3, 2011

Unicast,Multicast,Broadcast

Unicast:Unicast traffic is traffic addressed to a single device on the network.Unicast packets are sent from host to host. The communication is from a single host to another single host. There is one device transmitting a message destined for one reciever.Unicast uses IP delivery methods such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), which are session-based protocols. When a Windows Media Player client connects using unicast to a Windows Media server, that client has a direct relationship to the server.

Multicast:Multicast is a special protocol for use with IP. Multicast enables a single device to communicate with a specific set of hosts, not defined by any standard IP address and mask combination. This allows for communication that resembles a conference call.Multicast is a true broadcast. The multicast source relies on multicast-enabled routers to forward the packets to all client subnets that have clients listening. There is no direct relationship between the clients and Windows Media server. The Windows Media server generates an .nsc (NetShow channel) file when the multicast station is first created. Typically, the .nsc file is delivered to the client from a Web server.

Broadcast:Broadcast is when a single device is transmitting a message to all other devices in a given address range. This broadcast could reach all hosts on the subnet, all subnets, or all hosts on all subnets. Broadcast packets have the host (and/or subnet) portion of the address set to all ones. By design, most modern routers will block IP broadcast traffic and restrict it to the local subnet.

Friday, July 29, 2011

IEEE Standards

IEEE 802.1 Bridging (networking) and Network Management
IEEE 802.2 Logical link control (upper part of data link layer)
IEEE 802.3 Ethernet (CSMA/CD)
IEEE 802.4 Token bus (disbanded)
IEEE 802.5 Defines the MAC layer for a Token Ring (inactive)
IEEE 802.6 Metropolitan Area Networks (disbanded)
IEEE 802.7 Broadband LAN using Coaxial Cable (disbanded)
IEEE 802.8 Fiber Optic TAG (disbanded)
IEEE 802.9 Integrated Services LAN (disbanded)
IEEE 802.10 Interoperable LAN Security (disbanded)
IEEE 802.11 Wireless LAN & Mesh (Wi-Fi certification)
IEEE 802.12 demand priority (disbanded)
IEEE 802.13 Not Used
IEEE 802.14 Cable modems (disbanded)
IEEE 802.15 Wireless PAN
IEEE 802.15.1 (Bluetooth certification)
IEEE 802.15.4 (ZigBee certification)
IEEE 802.16 Broadband Wireless Access (WiMAX certification)
IEEE 802.16e (Mobile) Broadband Wireless Access
IEEE 802.17 Resilient packet ring
IEEE 802.18 Radio Regulatory TAG
IEEE 802.19 Coexistence TAG
IEEE 802.20 Mobile Broadband Wireless Access
IEEE 802.21 Media Independent Handoff
IEEE 802.22 Wireless Regional Area Network

Tuesday, July 26, 2011

Ethernet

The ethernet is a system for connecting computers within a building using hardware running from machine to machine. It differs from the Internet, which connects remotely located computers by telephone line, software protocol and some hardware. Ethernet uses some software (borrowed from Internet Protocol), but the connecting hardware was the basis of the patent (#4,063,220) involving newly designed chips and wiring. The patent* describes ethernet as a "multipoint data communication system with collision detection".

In simple terms ethernet is the most common LAN (Local Area Network) technology in use today.Ethernet was developed by Xerox in the 1970s, and became popular after Digital Equipment Corporation and Intel joined Xerox in developing the Ethernet standard in 1980.Ethernet was officially accepted as IEEE standard 802.3 in 1985.
The original Xerox Ethernet operated at 3Mbps. Ethernet networks up to 10Gbps now exist.

Ethernet uses CSMA/CD when transmitting packets. The Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is an algorithm, for transmitting and receiving packets over a common network hardware medium, by aiding in avoiding transmission collisions. The network is checked for other transmissions; when the way is clear, the computer transmissions can begin. If a collision is detected the packet is retransmitted later.

Saturday, July 23, 2011

Routing Tables

A routing table is an electronic document that stores the routes to the various nodes in a computer network. The nodes may be any kind of electronic device connected to the network. The Routing Table is usually stored in a router or networked computer in the form of a database or file. When data needs to be sent from one node to another on the network, the routing table is referred to in order to find the best possible route for the transfer of information.

Almost all computers and network devices connected to Internet use routing tables to compute the next hop for a packet. It is electronic table that is stored in a router or a networked computer. The routing table stores the routes (and in some cases, metrics associated with those routes) to particular network destinations. This information contains the topology of the network immediately around it. The construction of routing table is the primary goal of routing protocols and static routes.

Routing tables can generally be maintained manually when the network is small and static. The routing tables for all static network devices never change unless and until the administrator of the network changes them manually. In dynamic routing, the devices themselves automatically build and maintain their own routing tables. They do this by exchanging information regarding the network topology using routing protocols. This enables the devices in the network to automatically adapt to the changes in the network like device failures and network congestion as and when they occur.

Thursday, July 21, 2011

Network Topologies

In this post we are going to discuss about the type of network topologies that are available to a network administrator.Based on the requirement he can select any of them.In this post we will also see for which type of network which type of topology suited most.

A network topology is like a framework, although purely in virtual terms. A topology is a layout of how computers should connect, not how they are physically arranged in a space.

Bus Topology:

The most common network topologies include the bus topology, which connects all the computers with a single cable. The computers are all able to see when a machines taps into the wire to connect to another machine, however privacy is assured as only the connecting units can access the data. This arrangement work well with less devices, it’s easy enough to set up (10Base-2 ("ThinNet") and 10Base-5 ("ThickNet") cables work well). However the downside is that if the connecting cable fails all the units attached cannot interact.

Ring Topology:
The second one is the ring topology, typically used in schools; the arrangement is such that each unit is connected to two other units, hence like a ring. If one of the units crashes however the whole network ceases to function properly (FDDI, SONET, or Token Ring technology are good for implementing this topology).

Star Topology:

Next, the star topology typically has a hub (hub, router or switch) to which all units are connecting using a unshielded twisted pair cable. The benefits of this type are that if a unit crashes, the network still continues to function. The downside is that more cable is required.

Tree Topology:
The tree topology consists of a number of star topologies connected through a bus topology. Confusing? It’s actually quite simple; we simple connect the central hubs of the star networks in the form of a bus topology. This type of network is easy to expand.

Mesh Topology:
The mesh topology uses routes, therefore any messages transferred can take a number of routes to get to their destination, in a full mesh network, every device connects to every other device.

The type of topology you choose to implement really depends on you requirements, so look carefully at the number of units involved and how complicated your network is expected to be.

Tuesday, July 19, 2011

Golf Platzreife

Golf is now the emerging game that is popularized among all the people. Earlier only the rich and educated people played it. Now the popularity of the game is wide spread, so that every one has interest in playing the game. This particular game attracts all the types of crowds regardless of their age. Many people are now interested in learning this game. Mainly students involve themselves in this game so much and are very eager to learn the game. They are interested in learning in all the nuances, rules and regulations of the game. Since many people are interested in learning the game, there are many golf academies newly erecting in and around the city. Golf academies bear the responsibility to teach the young generation about the game. The rules of the golf etiquette are the first and fore most things, the golf academies teach their students. The rules of the game mainly aim at the safety of the golfers and to the pace of the play, which helps in keeping the game enjoyable. The golf etiquette is an essential part of the game. This is something very vital that all the new comers and the new beginners should learn on the course. For any game to be played successfully, the instruments used for the play should be manufactured or prepared with utmost care and you can found all these instruments at their Golf shop. A standard set of a golf club mainly consists of three woods, eight irons and a putter. Actually according to the rules and regulations of the play a golfer is allowed to carry 14 clubs in the bag. The more clubs the player carries the easier is his victory. To know more about golf academies, please visit Golfkurse.
The above site explains you all the details about the game. They are one of the largest German golf shops with a full range of all brand names. You can also visit Golf Platzreife it will be useful for you.

Thursday, July 14, 2011

Ideal Destination for Golf Lovers

A truly exciting sport that requires patience and skill. The sport of men. The Sport of sophisticates. The sport of men with way too much money. Jokes aside but, no gaming console is really complete without its own golf game.

Yesterday I was visiting some sites on golf club house locations and in those the one that i really found interesting is Whisper Rock Golf Course Homes.They provides you such a wonderful location in Scottsdale area that is ideal for any golf course home.

The whisper rock country club is nestled in amongst meandering hillsides and is laid out in a jungle setting. This golf course has some of the most beautifully designed holes on the Eastern side. The 18-hole course is carved through a virgin forest of full-grown trees that make for excellent playing under mature conditions.

Fairways and greens are kept in excellent condition. Utilizing water hazards, dog-legs and four island greens to good effect, the relatively short 18-hole course is well suited for golfers of all levels.

Greens are fast and generally have large undulations making reading the correct line especially important. The narrow palm tree lined fairways make it a challenge to recover from errant tee shots. Adding to the difficulty is also the relative long distance between the tees and the fairways. Shorter tee shots often wind up in the difficult to hit out of semi rough.

If you have any doubt or queries regarding buying or selling the club house in the space you can always contact to Holm Group that will help you in exploring more.

Monday, July 11, 2011

More Ideas On Business Gifts

As all we know christmas is on its way and like always we want to gift something to our specials.In this post i am going to majorly concentrate on business gifts ideas that you can gift to your loving ones.If you are tired of always gifting the same type of thing always then here this post can help you in selecting the ideal business gift for your lovable.You can gift the same old type of items like umbrella,pens,mugs,briefcase and etc but in little bit different fashion.

Lets assume that you want to gift a Mug to your dear one.A lovely coffee mug designed with your business name and logo on it is a great way to give your business a leg up. It may seem like a small item but it is one that is extremely significant because it is an item that is used in homes and offices all around the world. It is used on the go and in the public eye on many occasions and it is also the type of item that can be given out alone for a business referral or to a special customer or one that can serve a variety of other purposes can be jazzed up to make a nice gift or even an incredible centerpiece.

You can also consider umbrellas as an option for business gifts because wherever it goes it will promote your business.Logo umbrellas can will help you to make your business stand out at a tradeshow or community event and what you will find is that colorful umbrella will make people take notice and come in for a closer look of what is being offered under the umbrella. Because these items are so large and eye catching they really do help to attract customers to your booth or table and help to get you more attention than others when at such a large event.

If you are interested in knowing more,please leave a comment or you can visit yourcoworkers.blogspot.com.

Sunday, July 10, 2011

Format FAT32 Drive

There are many cases where you need a FAT32 drive. For example, I had to reformat my HDD in FAT32 for transferring files to my PS3.

You can format your drive (HDD, usb etc) easily by using the mkfs utility. But before you issue the mkfs command you need to verify that your system supports FAT32. Open your terminal and type:

cat /proc/filesystem

If the output contains vfat, you can proceed. Now issue the following command:

sudo mkfs.vfat -n