Core Networking

Core Networking

Setting Priorities for Next-Generation Web Apps - MICROSOFT

Through the use of new development environments, combined with Web services and an emerging set of collaboration technologies, Web applications are matching and threatening to exceed the capabilities of their shrink-wrapped antecedents. It's safe to say that the days of classical offline desktop applications and simple informational Web sites are rapidly drawing to a close. It's also safe to say that while the next generation of Web applications will combine both the richness of the desktop and the networking of the Internet, there are still a number of concerns that need to be addressed around security, transition costs, and other factors.

For this report, InformationWeek Analytics polled both technical decision makers (TDMs) and business decision makers (BDMs) for their interest in, and concerns about, next-generation Web applications in three areas: advancements in user interface; the integration of business intelligence and event processing with collaboration tools; and their interest in hosting some application functions in the cloud. One result of the survey that shouldn't surprise anyone is the popularity of "eye candy" rich Internet applications (RIAs) with both TDMs and BDMs.The consensus of our survey of 415 business technology professionals indicates that RIAs are widely accepted and are now the technology of choice for many new Web development projects.

Although not as far along as most corporate RIA initiatives, there is similar interest in the use of combined business intelligence, event processing, and collaboration tools to kick off complex tasks, such as bringing appropriate teams together to make critical decisions and alerting stake holders of key developments.While there is some interest among smaller companies and startups for hosting applications in the cloud—as a way to add robust IT infrastructure at minimal cost, for example—enterprise decision makers by and large are much more skeptical about cloud computing, citing issues such as security, governance, privacy, and control.That skepticism is reflected in the 50% negative response from both TDMs and BDMs who said they do not expect to host any application functions in the cloud over the next 24 months.

This point was made more vociferously by Scott Wentzka, a senior architect with Paisley Consulting, a Minnesota provider of governance, risk, and compliance software. "Cloud computing is an over-priced fraud," says Wentzka. "If you actually figure out the real TCO, it's about four times as expensive as internally hosted applications. On the other hand, RIA technology is the real deal—faster, more interactive, and less painful to develop than the ancient kludge that is HTML and JavaScript."

READ MORE - Setting Priorities for Next-Generation Web Apps - MICROSOFT

Social Network Services

Social network services allow people to come together online around shared interests, hobbies, or causes. For example, some sites provide dating services where users post personal profiles, locations, ages, gender, etc, and are able to search for a partner. Other services enable business networking (Ryze, XING, and LinkedIn) and social event meetups (Meetup).

Some large wikis effectively become social network services by encouraging user pages and portals.

Anyone can create their own social networking service using hosted offerings like Ning or rSitez, or more flexible, installable software like Elgg.



Social network search engines::

Social network search engines are a class of search engines that use social networks to organize, prioritize, or filter search results. There are two subclasses of social network search engines: those that use explicit social networks, and those that use implicit social networks:
Explicit social network search engines allow people to find each other according to explicitly stated social relationships such as XFN social relationships. XHTML Friends Network, for example, allows people to share their relationships on their own sites, thus forming a decentralized/distributed online social network, in contrast to centralized social network services listed in the previous section.
Implicit social network search engines allow people to filter search results based upon classes of social networks they trust, such as a shared political viewpoint. This was called an epistemic filter in a United Nations University report from 1993 which predicted that this would become the dominant means of search for most users.

Lacking trustworthy explicit information about such viewpoints, this type of social network search engine mines the web to infer the topology of online social networks. For example, the NewsTrove search engine infers social networks from content - sites, blogs, pods, and feeds - by examining, among other things, subject matter, link relationships, and grammatical features to infer social networks.



Deliberative social networks

Deliberative social networks are webs of discussion and debate for decision-making purposes. They are built for the purpose of establishing sustained relationships between individuals and their government. They rely upon informed opinion and advice that is given with a clear expectation of outcomes.


Commercial social networks

Commercial social networks are designed to support business transaction and to build a trust between an individual and a brand, which relies on opinion of product, ideas to make the product better, enabling customers to participate with the brands in promoting development, service delivery, and a better customer experience.[citation needed]. an example of these networks is Dell IdeaStorm.


Social guides

A social guide recommending places to visit or contains information about places in the real world such as coffee shops, restaurants, and wifi hotspots, etc. One such application is WikiTravel.


Social bookmarking
Main article: Social bookmarking

Some Web sites allow users to post their list of bookmarks or favorites websites for others to search and view them. These sites can also be used to meet others sharing common interests. Examples include digg, del.icio.us, StumbleUpon, reddit, Netvouz, and furl.


Social cataloging

In Social cataloging much like social bookmarking, this software is aimed towards academics, and allows the user to post a citation for an article found on the internet or a website, online database like Academic Search Premier or LexisNexis Academic University, a book found in a library catalog, and so on. These citations can be organized into predefined categories or a new category defined by the user through the use of tags. This allows academics researching or interested in similar areas to connect and share resources. Examples for those services include CiteULike, Connotea, BibSonomy and refbase.


Social libraries

This applications allows visitors to keep track of their collectibles, books, records, and DVDs. Users can share their collections. Recommendations can be generated based on user ratings, using statistical computation and network theory. Some sites offer a buddy system, as well as virtual "check outs" of items for borrowing among friends. Folksonomy or tagging is implemented on most of these sites. Examples include discogs.com, imdb.com and LibraryThing.


Virtual worlds
Main article: Virtual world

Virtual Worlds are services where it is possible to meet and interact with other people in a virtual environment reminiscent of the real world. Thus the term virtual reality. Typically, the user manipulates an avatar through the world, interacting with others using chat or voice chat.


Massively Multiplayer Online Games (MMOGs)
Main article: Massively Multiplayer Online Games

MMOGs are virtual worlds that add various sorts of point systems, levels, competition, and winners and losers to virtual world simulation. Commercial MMOGs (or, more accurately, massively multiplayer online role-playing games or MMORPGs,) include Everquest and World of Warcraft. The Dotsoul Cyberpark is one of the more innovative non-commercial worlds, with the look and feel of Second Life and Active Worlds, but an adamantly anti-corporate stance. Other open-source and experimental examples include Planeshift, Croquet project, VOS and Solipsis.


Non-game worlds

Another development are the worlds that are less game-like, or not games at all. Games have points, winners, and losers. Instead, some virtual worlds are more like social networking services like MySpace and Facebook, but with 3D simulation features. Examples include Second Life, ActiveWorlds, The Sims Online, and There.


Economies

Very often a real economy emerges in these worlds, extending the non-physical service economy within the world to service providers in the real world. Experts can design dresses or hairstyles for characters, go on routine missions for them, and so on, and be paid in game money to do so. This emergence has resulted in expanding social possibility and also in increased incentives to cheat. In the case of Second Life, the in-world economy is one of the primary features of the world.


Other specialized social applications

There are many other applications with social software characteristics that facilitate human connection and collaboration in specific contexts. Project management and e-learning applications are among these.




Emerging technologies

Emerging technological capabilities to more widely distribute hosting and support much higher bandwidth in real time are bypassing central content arbiters in some cases.


Peer-to-peer social networks

A hybrid of web-based social networks, instant messaging technologies and peer-to-peer connectivity and file sharing, peer-to-peer social networks generally allow users to share blogs, files (especially photographs) and instant messages. Some examples are imeem, SpinXpress, Bouillon, Wirehog, and Soulseek. Also, Groove, WiredReach and Kerika have similar functionality, but with more of a work-based, collaboration bias.


Virtual presence

Widely viewed, virtual presence means being present via intermediate technologies, usually radio, telephone, television, or the internet. In addition, it can denote apparent physical appearance, such as voice, face, and body language.

More narrowly, the term virtual presence denotes presence on World Wide Web locations which identified by URLs. People who are browsing a web site are considered to be virtually present at web locations. Virtual presence is a social software in the sense that people meet on the web by chance or intentionally. The ubiquitous(in the web space) communication transfers behavior patterns from the real world and virtual worlds to the web. Research has demonstrated effects of online indicators
READ MORE - Social Network Services

CCTV IP camera

IP cameras are Closed-circuit television (CCTV) cameras that utilize Internet Protocol to transmit image data and control signals over an Fast Ethernet link. As such, IP cameras are also commonly referred to as network cameras. IP cameras are primarily used for surveillance in the same manner as analog closed-circuit_television. A number of IP cameras are normally deployed together with a digital video recorder (DVR) or a network video recorder (NVR) to form a video surveillance system.

The terms IP camera and network camera are most commonly used to refer to surveillance cameras with a Fast Ethernet interface. In this context, the term IP camera does not include GigE_Vision camera, which is a machine vision camera with a Gigabit Ethernet interface.
READ MORE - CCTV IP camera

Is Your Networking Caught A Virus?

Caught A Virus?

If you've let your guard down--or even if you haven't--it can be hard to tell if your PC is infected. Here's what to do if you suspect the worst.


Heard this one before? You must run antivirus software and keep it up to date or else your PC will get infected, you'll lose all your data, and you'll incur the wrath of every e-mail buddy you unknowingly infect because of your carelessness.

You know they're right. Yet for one reason or another, you're not running antivirus software, or you are but it's not up to date. Maybe you turned off your virus scanner because it conflicted with another program. Maybe you got tired of upgrading after you bought Norton Antivirus 2001, 2002, and 2003. Or maybe your annual subscription of virus definitions recently expired, and you've put off renewing.

It happens. It's nothing to be ashamed of. But chances are, either you're infected right now, as we speak, or you will be very soon.

For a few days in late January, the Netsky.p worm was infecting about 2,500 PCs a day. Meanwhile the MySQL bot infected approximately 100 systems a minute (albeit not necessarily desktop PCs). As David Perry, global director of education for security software provider Trend Micro, puts it, "an unprotected [Windows] computer will become owned by a bot within 14 minutes."

Today's viruses, worms, and so-called bots--which turn your PC into a zombie that does the hacker's bidding (such as mass-mailing spam)--aren't going to announce their presence. Real viruses aren't like the ones in Hollywood movies that melt down whole networks in seconds and destroy alien spacecraft. They operate in the background, quietly altering data, stealing private operations, or using your PC for their own illegal ends. This makes them hard to spot if you're not well protected.

Is Your PC "Owned?"

I should start by saying that not every system oddity is due to a virus, worm, or bot. Is your system slowing down? Is your hard drive filling up rapidly? Are programs crashing without warning? These symptoms are more likely caused by Windows, or badly written legitimate programs, rather than malware. After all, people who write malware want to hide their program's presence. People who write commercial software put icons all over your desktop. Who's going to work harder to go unnoticed?

Other indicators that may, in fact, indicate that there's nothing that you need to worry about, include:

* An automated e-mail telling you that you're sending out infected mail. E-mail viruses and worms typically come from faked addresses.
* A frantic note from a friend saying they've been infected, and therefore so have you. This is likely a hoax. It's especially suspicious if the note tells you the virus can't be detected but you can get rid of it by deleting one simple file. Don't be fooled--and don't delete that file.

I'm not saying that you should ignore such warnings. Copy the subject line or a snippet from the body of the e-mail and plug it into your favorite search engine to see if other people have received the same note. A security site may have already pegged it as a hoax.

Sniffing Out an Infection

There are signs that indicate that your PC is actually infected. A lot of network activity coming from your system (when you're not actually using Internet) can be a good indicator that something is amiss. A good software firewall, such as ZoneAlarm, will ask your permission before letting anything leave your PC, and will give you enough information to help you judge if the outgoing data is legitimate. By the way, the firewall that comes with Windows, even the improved version in XP Service Pack 2, lacks this capability.

To put a network status light in your system tray, follow these steps: In Windows XP, choose Start, Control Panel, Network Connections, right-click the network connection you want to monitor, choose Properties, check "Show icon in notification area when connected," and click OK.

If you're interested in being a PC detective, you can sniff around further for malware. By hitting Ctrl-Alt-Delete in Windows, you'll bring up the Task Manager, which will show you the various processes your system is running. Most, if not all, are legit, but if you see a file name that looks suspicious, type it into a search engine and find out what it is.

Want another place to look? In Windows XP, click Start, Run, type "services.msc" in the box, and press Enter. You'll see detailed descriptions of the services Windows is running. Something look weird? Check with your search engine.

Finally, you can do more detective work by selecting Start, Run, and typing "msconfig" in the box. With this tool you not only see the services running, but also the programs that your system is launching at startup. Again, check for anything weird.

If any of these tools won't run--or if your security software won't run--that in itself is a good sign your computer is infected. Some viruses intentionally disable such programs as a way to protect themselves.

What to Do Next

Once you're fairly sure your system is infected, don't panic. There are steps you can take to assess the damage, depending on your current level of protection.

* If you don't have any antivirus software on your system (shame on you), or if the software has stopped working, stay online and go for a free scan at one of several Web sites. There's McAfee FreeScan, Symantec Security Check, and Trend Micro's HouseCall. If one doesn't find anything, try two. In fact, running a free online virus scan is a good way to double-check the work of your own local antivirus program. When you're done, buy or download a real antivirus program.
* If you have antivirus software, but it isn't active, get offline, unplug wires-- whatever it takes to stop your computer from communicating via the Internet. Then, promptly perform a scan with the installed software.
* If nothing seems to be working, do more research on the Web. There are several online virus libraries where you can find out about known viruses. These sites often provide instructions for removing viruses--if manual removal is possible--or a free removal tool if it isn't. Check out GriSOFT's Virus Encyclopedia, Eset's Virus Descriptions, McAffee's Virus Glossary, Symantec's Virus Encyclopedia, or Trend Micro's Virus Encyclopedia.

A Microgram of Prevention

Assuming your system is now clean, you need to make sure it stays that way. Preventing a breach of your computer's security is far more effective than cleaning up the mess afterwards. Start with a good security program, such Trend Micro's PC-Cillin, which you can buy for $50.

Don't want to shell out any money? You can cobble together security through free downloads, such as AVG Anti-Virus Free Edition, ZoneAlarm (a personal firewall), and Ad-Aware SE (an antispyware tool).

Just make sure you keep all security software up to date. The bad guys constantly try out new ways to fool security programs. Any security tool without regular, easy (if not automatic) updates isn't worth your money or your time.

Speaking of updating, the same goes for Windows. Use Windows Update (it's right there on your Start Menu) to make sure you're getting all of the high priority updates. If you run Windows XP, make sure to get the Service Pack 2 update. To find out if you already have it, right-click My Computer, and select Properties. Under the General tab, under System, it should say "Service Pack 2."

Here are a few more pointers for a virus-free life:

* Be careful with e-mail. Set your e-mail software security settings to high. Don't open messages with generic-sounding subjects that don't apply specifically to you from people you don't know. Don't open an attachment unless you're expecting it.
* If you have broadband Internet access, such as DSL or cable, get a router, even if you only have one PC. A router adds an extra layer of protection because your PC is not connecting directly with the Internet.
* Check your Internet ports. These doorways between your computer and the Internet can be open, in which case your PC is very vulnerable; closed, but still somewhat vulnerable; or stealthed (or hidden), which is safest. Visit Gibson Research's Web site and run the free ShieldsUP test to see your ports' status. If some ports show up as closed--or worse yet, open--check your router's documentation to find out how to hide them.
READ MORE - Is Your Networking Caught A Virus?

Apple 3G iPhone Improving Networking


General

2G Network GSM 850 / 900 / 1800 / 1900
3G Network HSDPA 850 / 1900 / 2100
Announced 2008, June
Status Available. Released 2008, July

Size

Dimensions 115.5 x 62.1 x 12.3 mm
Weight 133 g
Display Type Capacitive touchscreen, 16M colors
Size 320 x 480 pixels, 3.5 inches
- Multi-touch input method
- Accelerometer sensor for auto-rotate
- Proximity sensor for auto turn-off
- Scratch-resistant surface
- Ambient light sensor

Ringtones

Type Polyphonic, MP3
Customization Download
Vibration Yes
- 3.5 mm headset jack

Memory

Phonebook Practically unlimited entries and fields, Photocall
Call records 100 received, dialed and missed calls
Internal 8 GB/ 16 GB
Card slot No

Data

GPRS Yes
HSCSD No
EDGE Yes
3G HSDPA
WLAN Wi-Fi 802.11b/g
Bluetooth Yes, v2.0, headset support only
Infrared port No
USB Yes, v2.0


Camera

Primary 2 MP, 1600x1200 pixels
Video No
Secondary No

Features

OS Mac OS X v10.4.10
Messaging SMS (threaded view), Email
Browser HTML (Safari)
Radio No
Games Downloadable
Colors Black(8/16 GB), White (16 GB)
GPS Yes, with A-GPS support
Java No
- Google Maps
- Audio/video player
- TV-out
- Photo browser
- Voice memo
- Integrated handsfree


Battery Standard battery, Li-Ion

Stand-by Up to 300 h

Talk time Up to 10 h
READ MORE - Apple 3G iPhone Improving Networking

Analysis (Insertion and deletion operation)

The best possible case in insertion operation is when the item is inserted at the last position. In this case, no movement of elements is required. The worst case occurs when the element has to be inserted at the beginning of the list. In this case, we have to move all the elements down the list. Therefore, the while loop executes n times, each moving one element down. Thus complexity of insertin operation is O(n), i.e linear time.

.The best case in deletion occurs when the element to be deleted is the last element of the array. In this case, no element is moved up. The worst case occurs when element is deleted from the first position. In this case, all (n-1) elements are moved up. The while loop executes n-1 times, each time moving one element down. Thus complexity of deletion operation is also O(n) i.e linear time.
READ MORE - Analysis (Insertion and deletion operation)

Subscribe Core Networking