Uncategorized

Uncategorized

Importance of Cheap Web Hosting Services in the Third World

by: Dwslenin
Technological advancement in the world has seen most third world countries embrace modern ways of doing business. The use of internet has therefore penetrated almost every sphere of urban life in these countries, with a good percentage of people especially the youth, using the social networking sites to share ideas and communicate important messages on issues that affect their day-to-day lives. Most businesses in the third world countries are now using the internet to run their affairs.
This has been necessitated by the urge to remain competitive in the global market. The introduction of cheap web hosting services has therefore come at an opportune time. Cheap web hosting services have enabled the most businesses to have websites. This is a good development since even growing businesses with limited cash flow can afford to advertise their services in the web and reach their target audience globally. In this case, you will find that the rate of job creation in most third world countries will go up and are the people’s standards of living. Cheap web hosting services has seen the creation of many online businesses in the developing countries.
These businesses may be subsidiaries of companies that operate globally .In this case, there has been an extensive transfer of technology from developed countries to developing countries. Increase in the number of online businesses has led to the creation of both direct and indirect jobs. Most countries in the have very high unemployment rates and such new online businesses play an important role in fighting unemployment.
Since most third world countries are bedeviled with poor governance, most people are relying on social networking sites to fight the ills of the government of the day. Some courageous third world citizens have been able to have their own websites, where people are invited to share their views on various issues of importance, thanks to cheap web hosting service providers.

Uncategorized

Everything you need to know about firewalls

by: Nick Roche

Did you know that when your computer is connected to the internet, it has over 131,000 ‘ports’ that a hacker could connect to? These ports are like doors in a building and if they aren’t protected properly, then someone could sneak in without you noticing. If the hacker is not installing a virus, they can still do some serious damage without alerting your security software, including transmitting your personal information. So how do you watch all of these doorways to your information? You need a firewall!

In construction terms, a firewall is a fire-resistant wall that subdivides a building to stop the spread of fire from one area to another. In computer terms, we need to stop communications between your computer and others on the internet. A total block of all internet communication would be useless though, so you need a way of selecting which type of communications you want to receive. For this, computer firewalls have rules and filters much like construction firewalls have access doors.

Where do I put this firewall?

Firewalls can be on a hardware box (a separate unit or part of your internet modem or router) or can be software installed on your computer. Most popular security software packages also include a firewall. A hardware firewall is great for providing a barrier before your computer is even reached and will also mean that your computer doesn’t have to spend its precious resources on running the firewall software. It also reduces the risk of the firewall itself being compromised, as some viruses can try and disable security software features that are running on your computer. The downside is that a hardware-based firewall can be more expensive and not as easy to configure and maintain if you are unsure of how to use them.

If Microsoft gives me a firewall, do I need another one?

The Windows Firewall (on Windows XP Service Pack 2 and Vista) only examines inbound communications coming into your computer from the internet. If your computer becomes infected (e.g. if you install some free software that turns out to have a hidden nasty) then your outbound communication to other computers on the internet won’t be examined or filtered. This can turn your computer into a source of infection, impacting your security and internet connection. It’s also not recommended that you run more than one software firewall as this uses more processing power and can cause conflicts, so if your security software includes a firewall, turn off the Windows Firewall.

If I have a secure wireless connection do l need a firewall?

A wireless connection is another way to get onto the internet and wireless security controls who can use that connection. This is similar to allowing who can plug into your phone line. Once you are connected, your 131,000 ports are still open to hackers, so you still need a firewall. A firewall may be included on your wireless router but it pays to check.

Why does it keep on giving me messages?

If you are doing something specific (like installing new software or troubleshooting a connection problem) you may need to temporarily disable your firewall. Software firewalls may alert you that a connection has been attempted and blocked and may ask if you wish to allow that kind of connection in the future. In general, if you are doing something new which would probably involve a connection to the internet, you can allow the connection – either ‘this time only’ or for all future connection attempts. If in doubt, block it, as you can always allow it later if you find that it is needed.

Firewalls provide an enhanced level of security that has now become the minimum standard to protect your computer. They do require a certain level of knowledge or a great computer support person, so talk to your local Computer Troubleshooter to ensure that you are protected.

Uncategorized

FCoE vs. iSCSI – Making the Choice

A well written article by Stephen Foskett describing the decreasing disparity between Fibre Channel and iSCSI due to the increases in LAN speeds and decreases in cost.

“The notion that Fibre Channel is for data centers and iSCSI is for SMB’s and workgroups is outdated. Increases in LAN speeds and the coming of lossless Ethernet position iSCSI as a good fit for the data center. Whether your organization adopts FC or iSCSI depends on many factors like current product set, future application demands, organizational skill-set and budget. In this session we will discuss the different conditions where FC or IsCSI are the right fit, why you should use one and when to kick either to the curb.”

FCoE vs. iSCSI – Making the Choice

Uncategorized

Cloud Computing Comparison

by: SINGER.
Cloud computing can be defined as a data service, software and storage service, where the end user is not aware of the physical location and system configuration that delivers the services. Comparison to this concept can be made with electricity power grid where the consumer is mostly ignorant of the component devices that are needed to give this service.
Cloud computing has evolved from virtualization, autonomic utility computing as well as service oriented architecture.
Here are some clouds computing comparison, which have similar characteristics but should not be confused with the following:
1.Autonomic computing-This is can be defined as a self-capable management computer system.
2.Grid computing-This is a form of parallel computing that is distributed and connected to a main super computer. This super and virtual computer is networked to a cluster of loosely interconnected couple of computers working in unison to perform large tasks.
3.Client-server model-This kind of server computing is a general term that refers to any application that is distributed and is able to differentiate between service requesters (clients) and service providers (server).
4.Mainframe computer-These are very powerful computers that are found mostly in large organizations that work with important applications, usually bulky data processing like census, statistics of both consumers and industry, financial transactions and resource planning.
5.Utility computing-This can be defined as packaging of computing resources that involves computation and storage. A good example is the metered service that draws similarities to public utility like electricity.
6.Peer to peer-here the distribution architecture is devoid or doesn’t require central coordination, having the participants acting as both the suppliers and consumers of the resources unlike the client server model.
7.Service oriented computing-it models around computing techniques that revolve on software service. Cloud on the other hand relies on services that have a relation with computing.
One of the notable characteristic of cloud computing is that the processing and data is dynamic meaning that it is not found in a static place. The model is totally different from the ones in which the processes take place in known specified servers and “not in the cloud” like cloud computing. In other words all the other concepts act as complementary or supplementary to this concept.
The cloud computing comparisons don’t end there. The system software architecture that is involved in delivery of cloud computing involves the following: Multiple cloud components that inter-communicate over interfaces application programming. This is achieved through web services on the 3 tier architecture. The principle follows that of UNIX where multiple programs work concurrently over universal interfaces.
Front end and back end are the two most significant components of cloud computing architecture. The computer user is able to see the front end which is the computer as well as the applications that are used to access the cloud on web browser and other interfaces. The back end, on the other end of the cloud architecture is the ‘cloud’ that comprises of data storage devices, servers and various computers.
Those are some of the cloud computing comparisons.