Wednesday, January 23, 2013

Cloud Computing: An Icon in the IT world

Cloud computing means using the computing resources both hardware and software, that are delivered as a service over Internet. In other words, computer and software services necessary for computing works provided via the internet is called cloud computing.

When we think about the need of IT, cloud computing comes into focus like the requirement of a way to increase or add capabilities on the fly without investing in new infrastructure, training new personnel, licensing new software etc. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT’s existing capabilities.

Cloud Computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. This technology allows for much more efficient computing by centralizing data storage, processing and bandwidth.

It is named as cloud computing because all the services are provided via the internet and cloud symbol is used as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts remote services with a user's data, software and computation.

There are three types of services offered in Cloud Computing which are as follows;

Infrastructure as a service
Platform as a service
Software as a service

Infrastructure as a service:
In Infrastructure as a service, the service provider provides the necessary servers, hardware and networking components to an organization for a fee. The organization in turn installs the necessary programs in the service provider's server and uses them. The service provider is responsible for the maintenance of the servers.

Platform as a service:

In Platform as a service, the service provider provides the necessary softwares and the tools for creating softwares which are installed in their server to an organization for a specified amount. The organization creates the necessary softwares on his platform and uses them. It’s like renting in a house which has all the necessary things.


Software as a service:
In Software as a service, the applications hosted in the service provider’s server are made available to customers via the internet. The provider also interacts with the user through a front end panel. The provider provides the necessary support to the customer. The services range from e-mail to data processing.


Advantages of Cloud Computing

  1. The main advantage of cloud computing is that the customer can get the service at any time.
  2. Also there are no problems of computer crash or server down. All the responsibility is of the service provider. 
  3. There is no investment cost for computers, servers, software, etc. 
  4. Amount can be paid according to usage. 
  5. Now days, the service providers provide the service on a monthly basis. The provider and the customer can cancel the agreement at any time.


Disadvantages of Cloud Computing

  1. Possible downtime: Cloud computing makes your small business dependent on the reliability of your Internet connection. When it's offline, you're offline. And even the most reliable cloud computing service providers suffer server outages now and then. 
  2. Security issues: How safe is your data? Cloud computing is Internet computing. So you should not be using cloud computing applications that involve using or storing data that is private and confidential. That being said, established, reliable cloud computing vendors will have the latest, most sophisticated data security systems possible as they want your business and realize that data security is a big concern. 
  3. Cost: At first glance, a cloud computing application may appear to be a lot cheaper than a particular software solution installed and run in-house, but you need to be sure that cloud application have all the features that the software does and if not, are the missing features important to you? 
  4. Inflexibility: Be careful when you're choosing a cloud computing vendor that you're not locking your business into using their proprietary applications or formats. 
  5. Lack of support: Customer service for Web apps leaves a lot to be desired -- All too many cloud-based apps make it difficult to get customer service promptly – or at all. Sending an email and hoping for a response within 48 hours is not an acceptable way for most of us to run a business".

Thursday, January 17, 2013

Wi-Fi: An important Technology for Communication



In Today’s world there is no need to grab the telephone receiver and dial a specific number to transmit voice through cables merely to hear the voice of your Friend. Now each of us carries our own handsets with a built-in phonebook and text messages. The facilities like Wi-Fi have further improved the standard of communications by cutting down expenditure and increasing availability.

No matter where you are, you can access the world of web through your Mobile handsets, Laptops and even on your Tablets. The technology that enables you to plug in internet without any wires, no matter you are in a cafe, in a library, in a shopping mall, in college campus or on any airport, it is all Wi-Fi. The wireless network also known as 802.11 standard. The circumference where wireless technology is present and available to the users is known as Hotspot.

The inexpensive, user-friendly Wi-Fi networks are also conspicuous. Wi-Fi is commonly installed in home or offices these days, in order to transmit information in the air without the use of wires. In near future you would find wireless networking available in every nook and corner of the country due to its demand and usefulness. And that day is not very far.

Wi-Fi is derived from the decades old term Hi-Fi that stands for the output’s type produced by quality music hardware. Wi-Fi Technology is WIRELESS FIDELITY and stands for all those technologies that fall under the specifications of IEEE 802.11 including 802.11a, 802.11b and 802.11g. The association of the term Wi-Fi with various technologies is merely because of the promotions made by the Wi-Fi Alliance.

Wi-Fi transmits data through radio waves. The two-way radio communication: the wireless adapter translates data into a radio signal then transmits it via antenna; and the signal is received and decoded by the wireless router that uses a tangible wired Ethernet connection to send information to the internet. The equation is reversed when wireless router receives data from the internet and translates it into a signal where the wireless adaptor receives the signal and decodes it.

If your laptops and cell phones do not have a built-in wireless transmitter then you could purchase a wireless adaptor and inject it into USB port. A Wi-Fi hotspot is automatically discovered and connected by the transmitters. The presence of Wi-Fi in public places makes it convenient to stay connected to your official tasks or to the social networking.

Thus the Wi-Fi Technology is very beneficial to always stay connected with your Colleagues, Friends and Relatives.

Thursday, November 22, 2012

Smartphone security risks rise on top



If you are using a Smartphone and using the internet with different applications especially in the public networks or free Wi-Fi network then you really need to secure your phone from the crackers who can hijack your device or steal your data.

Cyber Crime Investigator & Security expert Dr. Anup Girdhar, (CEO-Sedulity Solutions) said that as more people use their mobile devices in free and open Wi-Fi networks, the risks are increasing as well. It’s time to lookout for fraudulent applications, messages and Wi-Fi networks which can trick users of mobile devices to divulge passwords, personal data or even credit card numbers.
In case you are using any Android device, then you are often targeted by spyware, including one system called FinFisher, capable of taking a mobile device, or Loozfon, "an information-stealing piece of Malware."

Dr. Girdhar said that as the popularity of apps is increasing, the chances of Cyber Crimes have also been increased. You download an application which could be malicious and designed to steal your personal information or could even send out paid text messages without your knowledge."
Some crackers are using Twitter or some other ads offering special discounts for popular gifts, which link to a malicious software. Now a days, "Criminals are more Tech Savvy with authentic-looking social ads that take consumers to legitimate looking websites.  "In order to take advantage of the best deals consumers provide their personal information including credit card number, email address, phone number, home address etc."

Dr. Girdhar has advised and appeal from all the Smartphone users to "Be careful what you do on public Wi-Fi networks especially when you're shopping”. Do not expose passwords, account numbers or credit card information unless you are certain that you are on a secure connection. "Use carefulness when downloading apps. Only download apps from legitimate sites you trust or experts suggest.

Friday, September 28, 2012

Topology in Network Design | Sedulity Groups

In computer networking, topology refers to the layout of connected devices. Network topologies are categorized into the following basic types:
Bus, Star, Tree, Ring, Mesh & More complex networks can be built as hybrids of two or more of the above basic topologies.

Bus Topology
Bus network uses a common backbone to connect all devices. The backbone functions as a shared communication medium that devices attach into with an interface connector. A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes the message.