Pages

Search This Blog

Thursday, September 22, 2011

Features of 5G Technology

  • 5G technology offer high resolution for crazy cell phone user and bi-directional large bandwidth shaping.
  • The advanced billing interfaces of 5G technology makes it more attractive and effective.
  • 5G technology also providing subscriber supervision tools for fast action.
  • The high quality services of 5G technology based on Policy to avoid error.
  • 5G technology is providing large broadcasting of data in Gigabit which supporting almost 65,000 connections.
  • 5G technology offer transporter class gateway with unparalleled consistency.
  • The traffic statistics by 5G technology makes it more accurate.
  • Through remote management offered by 5G technology a user can get better and fast solution.
  • The remote diagnostics also a great feature of 5G technology.
  • The 5G technology is providing up to 25 Mbps connectivity speed.
  • The 5G technology also support virtual private network.
  • The new 5G technology will take all delivery service out of business prospect
  • The uploading and downloading speed of 5G technology touching the peak.
  • The 5G technology network offering enhanced and available connectivity just about the world
A new revolution of 5G technology is about to begin because 5G technology going to give tough completion to normal computer and laptops whose marketplace value will be effected. There are lots of improvements from 1G, 2G, 3G, and 4G to 5G in the world of telecommunications. The new coming 5G technology is available in the market in affordable rates, high peak future and much reliability than its preceding technologies.

5G Technology

5G Technology stands for 5th Generation Mobile technology. 5G mobile technology has changed the means to use cell phones within very high bandwidth. User never experienced ever before such a high value technology. Nowadays mobile users have much awareness of the cell phone (mobile) technology. The 5G technologies include all type of advanced features which makes 5G mobile technology most powerful and in huge demand in near future.

The gigantic array of innovative technology being built into new cell phones is stunning. 5G technology which is on hand held phone offering more power and features than at least 1000 lunar modules. A user can also hook their 5G technology cell phone with their Laptop to get broadband internet access. 5G technology including camera, MP3 recording, video player, large phone memory, dialing speed, audio player and much more you never imagine. For children rocking fun Bluetooth technology and Piconets has become in market.

5G technology going to be a new mobile revolution in mobile market. Through 5G technology now you can use worldwide cellular phones and this technology also strike the china mobile market and a user being proficient to get access to Germany phone as a local phone. With the coming out of cell phone alike to PDA now your whole office in your finger tips or in your phone. 5G technology has extraordinary data capabilities and has ability to tie together unrestricted call volumes and infinite data broadcast within latest mobile operating system. 5G technology has a bright future because it can handle best technologies and offer priceless handset to their customers. May be in coming days 5G technology takes over the world market. 5G Technologies have an extraordinary capability to support Software and Consultancy. The Router and switch technology used in 5G network providing high connectivity. The 5G technology distributes internet access to nodes within the building and can be deployed with union of wired or wireless network connections. The current trend of 5G technology has a glowing future.

Saturday, September 10, 2011

Cloud computing Now India is Top Ranking

India scored higher than both Singapore and Malaysia in current Cloud understanding levels.
The proportion of Asia Pacific enterprises viewing cloud computing as relevant to their businesses has doubled to 83 percent over the
India scored higher than both Singapore and Malaysia in current Cloud understanding levels.
The proportion of Asia Pacific enterprises viewing cloud computing as relevant to their businesses has doubled to 83 percent over the last 18 months, reveals a survey by VMware Inc.

According to the survey results, 76% in India want to virtualize and adopt cloud computing in the next 18 months, which is the highest percentage as compared to other cloud positive countries in the region like Japan and Australia. India scored higher than both Singapore and Malaysia in current Cloud understanding levels.

The September survey of 6,953 respondents, conducted by Springboard Research under VMware's sponsorship, also indicated that cloud adoption has accelerated across seven Asia Pacific markets over the last 18 months, particularly among larger firms.

Today, 59 percent of regional firms are either using or planning cloud computing initiatives compared to 45 percent six months ago and 22 percent in 2009. India and China lead the region in terms of adoption plans, with 43 percent and 39 percent of organisations respectively planning to implement cloud computing. Organisations in Japan and Australia lead in cloud adoption, with 36 percent and 31 percent respectively already running a cloud-related initiative.

India had 693 respondents across various sectors. Highest adoption is anticipated from the IT/ITES infrastructure & manufacturing sectors. The survey reveals that India's understanding of virtualization and cloud computing has risen dramatically over the last couple of months and VMware has a 50 percent perceived mindshare when it comes to cloud computing in India.

Dynamic provisioning / capacity on demand, automated management, pay-per-use model, and applications that can scale on demand were considered the essential building blocks for Cloud Computing as far as the Indian audience is concerned.


Cloud associated with IT as a Service
The highest proportion of organizations in Japan (86 percent), Singapore (84 percent) and Thailand (74 percent) associate cloud computing primarily with IT as a Service, while in Australia, Malaysia and India, most firms (80 percent, 78 percent and 75 percent respectively) associate cloud mainly with applications-on-demand. In China, 80 percent of respondents look to cloud for on-demand provision of storage and network.

Sanchit Vir Gogia,Associate Research Manager, Software Springboard Research, said: "For most survey respondents in Asia Pacific, IT as a Service is the biggest theme of the day. These companies are looking for vendors and consultants that can help them enjoy serviced-based IT, particularly in the areas of cloud infrastructure and management."

Most organizations (60 percent) want to adopt cloud for scalability-on-demand to meet business needs, followed by drivers such as reduced hardware infrastructure costs and simplified resource/server provisioning.

Cost saving
Saving cost is the immediate incentive for adopting cloud computing for 57 percent of Asia Pacific firms. Only 37 percent, many of which are large firms with more than 10,000 employees, adopted or planned to adopt cloud as a long-term strategic investment.

Some 66% considered scalability on demand to meet business needs while 67% considered reduced hardware infrastructure and 43% considered simplified resource/server provisioning as some of the key factors that drive cloud adoption. 83 % said that they expect cloud investments to reduce hardware their spending while 74% would like reduction in their software spend.


Hybrid clouds on the rise
Companies wanting to deploy both public and private clouds were represented by the 38 percent of respondents, while a roughly equal amount - 37 percent - said they will only consider a private cloud. Preference for private cloud is more prevalent in banking and government sectors, with public cloud continuing to meet with the greatest resistance. Preference for hybrid cloud is higher in ASEAN, at more than four percentage points above the Asia Pacific average. In fact, even Japan – the most cloud-positive country in the survey – gave rise to survey findings suggesting that no more than 15 percent of organizations want to use public clouds. The mind set in India is changing and private cloud is slowly overtaking public cloud.

Storage (58 percent) represents the region's No.1 workload for private clouds, with Japan (62 percent) and China (61 percent) most likely to deploy storage in a private cloud. Cloud-based enterprise applications are the second most identified category across Asia Pacific at 49 percent.

In terms of deployment plans, 93 percent of respondents said their upcoming cloud deployments will revolve round web conferencing, IM, collaboration and email.

Andrew Dutton, SVP and GM, VMware Asia Pacific Japan, said: "It is clear that industry has great interest in the hybrid cloud model. The ability for enterprises to obtain a common cloud infrastructure platform, as well as a common management model and application services that bridge private and public clouds to deliver interoperable clouds allowing data and application portability, will be critical."

Integration concerns now match security worries as obstacles to cloud adoption

Integration with existing systems has caught up with traditional security concerns as a barrier to cloud adoption, with 46 percent of respondents identifying them equally as obstructions.

In emerging markets, the key factor holding back cloud adoption is lack of understanding among enterprises, according to 44 percent of respondents in China, 40 percent in Malaysia and 40 percent in Thailand, compared with a regional average of 36 percent.

These results strongly suggest that use of standards-based cloud solutions and education remain as significant cloud adoption drivers across Asia Pacific.


Virtualization seen as the foundation of cloud computing
Organizations across Asia Pacific (59 percent) consistently cited virtualization infrastructure as a primary building block for cloud computing. Awareness about virtualization is widespread in India, with 94% of the respondents either leveraging or planning to adopt virtualization technology.

Explaining the link between the two technologies, Dutton said: "Virtualization lets organizations decouple critical business applications and information from underlying physical hardware, and in turn, provides a fast and cost effective way to the cloud. More and more Asia Pacific organizations are realizing this and are moving to unlock more value from their virtualization investments."

Virtualization adoption in Asia Pacific is highest in Australia (87 percent) and Japan (82 percent). Among verticals, virtualization adoption is highest in insurance (82 percent) and banking/financial services (76 percent).

Thailand (67 percent), Singapore (65 percent) and Malaysia (65 percent) all lag Australia and Japan in current adoption, while virtualization penetration stands at about 30 percent across ASEAN.

Most Asia Pacific firms use virtualization for servers and data centres, with many organisations focused on leveraging virtualization to drive business continuity/disaster recovery initiatives. In India, server virtualization has grown in importance, compared to 12 months ago, as it is the bedrock to cloud.

The biggest growth opportunity for virtualization in Asia Pacific is in the end-user computing space, although most organisations rank desktop virtualization as low in their list of priorities.

However, significant advantages can be gained from a new approach to end-user computing that virtualizes the desktop by de-coupling the operating system, user persona and applications, thereby enabling great flexibility in delivering applications and data to end-users when and where they need them and regardless of access device. There is more focus in India on Desktop Virtualization at 68% when compared to China and Japan

Dutton said, "By enabling large-scale end-user self-service, desktop virtualization is really the final piece of the puzzle in making the modern enterprise flexible, scalable and ultimately responsive to business needs."

10 useful accessories for your desk

 

 
 


 
USB Hub & Mug Warmer
For many people, office doesn’t start without a cup of morning coffee. This USB powered mug warmer has a metal heating plate protected by insulation material — it can keep your coffee warm while you take your time to enjoy it. The heating plate works great for ceramic, glass and metal mugs. There is also a status light to indicate that the warmer is ready to be used. The additional USB ports can be used to connect other devices. 699 from www.ebay.in


USB Display
This little monitor is completely powered off USB – just one cable is needed for both the video signal and
power. The 7-inch 800 x 480 pixel panel is touchscreen enabled too – you can move certain items onto it to
clear space from your primary display. The best part is that since the display connects via USB, your regular
VGA/HDMI out is unused and can be used to output to another device simultaneously. The display is compatible
with both PC and Mac (the touchscreen functionality is only compatible with Intel-powered Macs and needs an dditional driver). $229.99 from www.thinkgeek.com


USB Cooler 
This tiny refrigerator-shaped USB accessory can actually keep a canned beverage chilled. A cool blue LED lights p when the door is opened, just like the light inside an actual fridge. Practically, it can’t cool a hot can, ut it can keep an already chilled can colder for a longer time (as compared to if it was left in the open). he flamboyant red colour also adds a little zing to your desk. $19.99 from www.thinkgeek.com


Phantom Keystroker 
Quite an effective and hard-to-catch office prank, this. The Phantom Keystroker looks like a simple USB flash rive but it actually mimics a keyboard and mouse when connected to a computer. All you have to do is plug it nto a (hidden) USB port and it randomly inserts letters while typing or moves the mouse pointer around. The nfuriated victim will never find out. $12.99 from www.thinkgeek.com


USB Foldable keyboard
If your netbook’s keyboard proves too small for you or you just prefer to carry your own keyboard around, this lexible USB keyboard is ideal. Since the keys and base material are made of silicon, it is completely silent. ven though it has the full 104 keys, you can roll it up into a small package. The added advantage is that the keys are completely waterproof and dustproof. $23.99 from www.thinkgeek.com


USB paper schredder
A lot of information about you can be accumulated by anyone who goes through your trash. That’s why any
personally identifiable or sensitive information (bank statements, credit card alerts, PIN numbers) should be
completely destroyed using a paper shredder. This little USB (or battery) powered shredder is small enough to it quietly under your desk. 2,022 from www.ebay.in


USB Vaccum Cleaner 
A full-size vacuum cleaner would be overkill for use on your keyboard or smaller computer peripherals. That’s hy you’ll need this dainty little handheld USB vacuum cleaner with a reusable dust bag. A couple of small ttachments (tube and brush) are included so that you can get all the muck out of the keyboard crevices and ther hard-to-reach places like speaker grills. It also has a small LED to light the way for more effective
cleaning. 150 from www.ebay.in


ASUS CrossLink Cable
Connecting two computers directly without a network is a pain. Thanks to Asus’ Crosslink USB cable and adapter, ou can quickly connect and transfer data at high-speeds between two computers. The adapter is shaped like a SB drive, has 2GB storage and a miniUSB port on the other side to connect using the Crosslink cable. You can ven share an internet connection and optical drive between two PCs. 4,000 from eBay Global EasyBuy


USB Phone2PC
This handly little device is great if you want to keep a record of all your voice calls. It can be connected to ost phones using an analog or digital connection and then it connects to the PC using USB. A software is equired to be installed which provides an easy-to-use interface to record incoming/outgoing calls. It includes n external microphone for recording meetings and interviews directly to the PC as well. 10,000 from www.ebay.in

5 steps: How to set up your home wireless network

You can use a wireless network (WLAN) to share Internet access, files, printers, game consoles, and other devices among all the computers in your home. After you’ve completed the initial wireless router setup and added your computers and devices to the network, you can use your home network to surf the web or to play online games—whether you're sitting in your living room or relaxing in your backyard.
It's easier than ever to set up a wireless network, especially now that Internet access and routers (like Linksys wireless routers and D-link wireless routers) have become widely available.
Man with a laptop in a hammock

What you’ll need to set up your wireless network

  • An operating system that supports wireless networking
    The Windows 7 operating system fully supports wireless networking. For Windows Vista users, we recommend installing Windows Vista Service Pack 2 before setting up your wireless network. For Windows XP users, we recommend installing Windows XP Service Pack 3. Use Windows Update to check whether you need the service pack and to install it. Click the Start button, click All Programs, click Windows Update, and then click Check for updates. Although the service packs for Windows Vista and Windows XP are not required for wireless networking, they can make things much easier and can help protect you against hackers, worms, and other Internet intruders.
  • A broadband (DSL or cable) Internet connection
    To set up a wireless network, you need a broadband or high-speed Internet connection (not a dial-up connection) provided by an Internet service provider (ISP), usually for a monthly fee. Two common broadband technologies are Digital Subscriber Line (DSL) and cable technology. These require a DSL modem or a cable modem (often provided by your ISP). After you have an ISP and a modem, you're ready to connect to the Internet.
  • A wireless router, a DSL modem, or a cable modem with built-in wireless networking support
    The router converts the signals coming across your Internet connection into a wireless broadcast, sort of like a cordless phone base station. Newer DSL and cable modems come with integrated wireless networking capability and are called modem routers. If the modem router you received or purchased from your ISP already has wireless capability built in, you do not need to purchase a separate wireless router. Just follow the instructions provided by your ISP for activating your wireless connection.

    If you do need to purchase a wireless router, be sure that you buy a wireless router and not a wireless access point. The Linksys router is a popular router for wireless networks because it’s simple to set up. There are many routers to choose from, for example:





    Picture of a Linksys wireless routerPicture of a D-Link wireless routerPicture of a Cisco wireless routerPicture of an ASUS wireless router
    Linksys wireless routersD-Link wireless routersCisco wireless routersASUS wireless routers
    While you're looking for a wireless router or other wireless equipment in stores or on the Internet, you might notice that you can choose equipment that supports four different wireless networking technologies: 802.11a, 802.11b, 802.11g, and 802.11n. We recommend 802.11g (Wireless-G) or 802.11n (Wireless-N) because they offer excellent performance and are compatible with almost everything.

    NOTE: If you do not want to buy a wireless router or if you want to connect computers or devices temporarily for a specific purpose, like sharing devices or games, you can set up a temporary wireless network without a router. This is called an ad hoc network.

  • A computer with built-in wireless networking support or a wireless network adapter
    If you have a newer computer, you may already have built-in wireless capabilities. If this is the case, you don’t need a wireless network adapter. Here’s how to check whether your computer has wireless support installed:

    Windows 7 and Windows Vista


    • Click Start, click Control Panel, and then click Network and Internet. If you see any of these words listed, “Wireless,” “WLAN,” “Wi-Fi,” “802.11a,” “802.11b,” “802.11g,” or “802.11n,” your computer has wireless capability installed.

    Windows XP

    1. Click Start, right-click My Computer, and then click Properties
    2. In the System Properties window, click the Hardware tab.
    3. Near the top of this window, click the Device Manager button.
    4. In the Device Manager window, there is a list of hardware components which are installed on the computer. Press the Plus sign (+) to the left of the icon to open the Network adapters item in the list. The Network adapters section of the window expands to reveal a list of all network adapters installed on the computer.
    5. If you see any of these words in the list of installed network adapters, “Wireless,” “WLAN,” “Wi-Fi,” “802.11a,” “802.11b,” “802.11g,” or “802.11n,” your computer has wireless network support installed.

    If your desktop or laptop computer does not have built-in wireless support, you need to purchase a network adapter to wirelessly connect your computer to your wireless router. If you need an adapter for a desktop computer, buy a USB wireless network adapter. If you have a laptop, buy a PC card-based network adapter. Make sure that you have one adapter for every computer on your network.

    NOTE: To make setup easy, choose a network adapter made by the same vendor that made your wireless router. For example, if you find a good price on a Linksys router, choose a Linksys network adapter to go with it. To make shopping even easier, buy a bundle, such as those available from Linksys, Actiontec, D-Link, Netgear, Microsoft, and Buffalo. If you have a desktop computer, make sure that you have an available USB port where you can plug in the wireless network adapter. If you don't have any open USB ports, buy a USB hub to add additional ports.
  • A copy of your router setup instructions
    Before you begin setting up your wireless network, it’s a good idea to make sure that you have the copy of the setup instructions provided by the router manufacturer or your ISP. If you do not have a copy, visit the manufacturer’s website for get instructions on how to set up your router. All routers vary, and you may need to consult the instructions to set up your wireless network using your specific router.

1. Connect to the Internet

Make sure that your Internet connection and your DSL or cable modem are working. Your wireless network depends on this connection.

2. Connect your wireless router

These are the steps for connecting a stand-alone wireless router to your DSL modem or cable modem. If you have a modem router, follow your ISP’s instructions for connecting your network.
Since you'll be temporarily disconnected from the Internet, print these instructions before you go any further.
First, locate your cable modem or DSL modem and unplug it to turn it off.
Next, connect your wireless router to your modem. Your modem should stay connected directly to the Internet. Later, after you've hooked everything up, your computer will wirelessly connect to your router, and the router will send communications through your modem to the Internet.
Wireless router setup mapNext, connect your router to your modem:
Note: The instructions below apply to a Linksys wireless router. The ports on your router may be labeled differently, and the images may look different on your router. Check the documentation that came with your equipment for additional assistance. Or do a Bing search on “[your manufacturer/model] wireless router setup” to find images and instructions.
  • If you currently have your computer connected directly to your modem: Unplug the network cable from the back of your computer, and plug it into the port labeled Internet, WAN, or WLAN on the back of your router.
  • If you do not currently have a computer connected to the Internet: Plug one end of a network cable (included with your router) into your modem, and plug the other end of the network cable into the Internet, WAN, or WLAN port on your wireless router.
  • If you currently have your computer connected to a router: Unplug the network cable connected to the Internet, WAN, or WLAN port from your current router, and plug this end of the cable into the Internet, WAN, or WLAN port on your wireless router. Then, unplug any other network cables, and plug them into the available ports on your wireless router. You no longer need your original router, because your new wireless router replaces it.
Wireless modem lightsNext, plug in and turn on your cable or DSL modem. Wait a few minutes to give it time to connect to the Internet, and then plug in and turn on your wireless router. After a minute, the Internet, WAN, or WLAN light on your wireless router should light up, indicating that it has successfully connected to your modem.

3. Configure your wireless router

Wireless cablesUsing the network cable that came with your wireless router, you should temporarily connect your computer to one of the open network ports on your wireless router (any port that isn't labeled Internet, WAN, or WLAN). If you need to, turn your computer on. It should automatically connect to your router.
Next, open Internet Explorer and type in the URL or address to configure your router.
NOTE: Do this on the computer that you are using to set up your wireless network. The computer automatically links you to the router’s page. If you type the router’s URL on a different computer, typing the address in the navigation bar will not take you to your router’s configuration page.
On the router configuration page, you might be prompted for a password. The address and password you use varies depending on what type of router you have, so refer to the instructions included with your router or on the manufacturer’s website.
For quick reference, this table shows the default addresses, user names, and passwords for some common router manufacturers. If the address is not listed here, you can read the documentation that came with your router or go to the manufacturer's webpage to find it. There may be multiple website addresses you can use.
RouterAddressUsernamePassword
3Comhttp://192.168.1.1adminadmin
D-Linkhttp://192.168.0.1adminadmin
Linksyshttp://192.168.1.1adminadmin
Microsoft Broadbandhttp://192.168.2.1adminadmin
Netgearhttp://192.168.0.1adminpassword
Actiontechttp://192.168.0.1usernamepassword
Internet Explorer shows your router's configuration page, along with the modem IP address and other information. Most of the default settings should be fine, but you need to configure three things:
  • Your wireless network name, known as the SSID. This name identifies your network, and it appears in a list of available wireless networks. You should change the default SSID that your ISP provided and give your network a unique name that none of your neighbors are using. This helps you identify your network, and it can help keep your wireless network secure by preventing it from overlapping with other wireless networks that might be using the default SSID.
  • Wi-Fi Protected Access (WPA or WPA2), which can help protect your wireless network. It’s important to help secure your wireless network by setting up a network security key, which turns on encryption. With encryption, people can't connect to your network without the security key, and all information sent across your network is encrypted so that only computers with the key to decrypt the information can read it. This can help prevent attempts to access your network and files without your permission. Wi Fi Protected Access (WPA or WPA2) is the recommended wireless network encryption method. Wireless encryption (WEP) is not as secure. Windows 7, Windows Vista Service Pack 2, and Windows XP Service Pack 3 support WPA2.

    When you set up most routers (stand-alone routers and modem routers), you are asked to provide a pass phrase that the router uses to generate several keys. Make sure that your pass phrase is unique and long (you don't need to memorize it). Some routers and modem routers now come with a function called Quick Security Setup (or QSS) that automatically issues you a key when you press a button on the router.

    Be sure to keep a hard copy and a digital copy of your network security key and pass phrase, in case you lose or misplace them. You can recover a lost network key or reset it on your router, but these are complicated processes that are different for every router and they sometimes entail setting up your network again.
  • Your administrative password, which controls your wireless network. Just like any other password, it should not be a word that you can find in the dictionary, and it should be a combination of letters, numbers, and symbols. Be sure to save a hard copy and a digital copy of this password, too, because you'll need it if you ever have to change your router's settings.
The exact steps you follow to configure these settings will vary depending on the type of router you have. After each configuration setting, be sure to click Save Settings, Apply, or OK to save your changes.
Now, before connecting your computers and devices to the network, you should disconnect the wireless network cable from your computer.

4. Connect your computers, printers, and other devices to the wireless network

You can connect multiple computers, printers, and many other peripheral devices, such as an Xbox, Xbox 360, TV, cell phone, iTouch, or iPad, to your network. Before you connect them to your network, make sure that the computer or device you want to add has built-in wireless networking or a network adapter. Many newer devices have built-in wireless capability. If the computer or device you want to add does not have built-in wireless network support, plug the network adapter into your USB port and place the antenna on top of your computer (in the case of a desktop computer) or insert the network adapter into an empty PC card slot (in the case of a laptop). Windows automatically detects the new adapter and may prompt you to insert the CD that came with your adapter. The on-screen instructions guide you through the configuration process.
Use the following links to find step-by-step instructions for adding your specific computer or device to your network using your operating system. There are instructions for each operating system, and they show you how to automatically or manually add wired (Ethernet) or wireless computers and how to add computers running Windows 7, Windows Vista, or Windows XP. There are also instructions for adding printers and both wired and wireless devices.

5. Share files, printers, and more

Now that your computers and devices are connected, you can begin sharing files, printers, games, and much more. One of the top reasons for setting up a home network is to share a printer. Another is to share files. The steps for doing this, however, aren’t always obvious, so here are instructions to get you started: