Pages

Search This Blog

Thursday, September 22, 2011

WHAT IS NETWORK SECURITY?

The networks are computer networks, both public and private, that are used every day to conduct transactions and communications among businesses, government agencies and individuals. The networks are comprised of "nodes", which are "client" terminals (individual user PCs) and one or more "servers" and/or "host" computers. They are linked by communication systems, some of which might be private, such as within a company, and others which might be open to public access. The obvious example of a network system that is open to public access is the Internet, but many private networks also utilize publicly-accessible communications. Today, most companies' host computers can be accessed by their employees whether in their offices over a private communications network, or from their homes or hotel rooms while on the road through normal telephone lines.
Network security involves all activities that organizations, enterprises, and institutions undertake to protect the value and ongoing usability of assets and the integrity and continuity of operations. An effective network security strategy requires identifying threats and then choosing the most effective set of tools to combat them.
Threats to network security include:
Viruses : Computer programs written by devious programmers and designed to replicate themselves and infect computers when triggered by a specific event
Trojan horse programs : Delivery vehicles for destructive code, which appear to be harmless or useful software programs such as games
Vandals : Software applications or applets that cause destruction
Attacks : Including reconnaissance attacks (information-gathering activities to collect data that is later used to compromise networks); access attacks (which exploit network vulnerabilities in order to gain entry to e-mail, databases, or the corporate network); and denial-of-service attacks (which prevent access to part or all of a computer system)
Data interception : Involves eavesdropping on communications or altering data packets being transmitted
Social engineering : Obtaining confidential network security information through nontechnical means, such as posing as a technical support person and asking for people's passwords
Network security tools include:
Antivirus software packages : These packages counter most virus threats if regularly updated and correctly maintained.
Secure network infrastructure : Switches and routers have hardware and software features that support secure connectivity, perimeter security, intrusion protection, identity services, and security management.
Dedicated network security hardware and software-Tools such as firewalls and intrusion detection systems provide protection for all areas of the network and enable secure connections.
Virtual private networks : These networks provide access control and data encryption between two different computers on a network. This allows remote workers to connect to the network without the risk of a hacker or thief intercepting data.
Identity services : These services help to identify users and control their activities and transactions on the network. Services include passwords, digital certificates, and digital authentication keys.
Encryption : Encryption ensures that messages cannot be intercepted or read by anyone other than the authorized recipient.
Security management : This is the glue that holds together the other building blocks of a strong security solution.
None of these approaches alone will be sufficient to protect a network, but when they are layered together, they can be highly effective in keeping a network safe from attacks and other threats to security. In addition, well-thought-out corporate policies are critical to determine and control access to various parts of the network.

Features of 5G Technology

  • 5G technology offer high resolution for crazy cell phone user and bi-directional large bandwidth shaping.
  • The advanced billing interfaces of 5G technology makes it more attractive and effective.
  • 5G technology also providing subscriber supervision tools for fast action.
  • The high quality services of 5G technology based on Policy to avoid error.
  • 5G technology is providing large broadcasting of data in Gigabit which supporting almost 65,000 connections.
  • 5G technology offer transporter class gateway with unparalleled consistency.
  • The traffic statistics by 5G technology makes it more accurate.
  • Through remote management offered by 5G technology a user can get better and fast solution.
  • The remote diagnostics also a great feature of 5G technology.
  • The 5G technology is providing up to 25 Mbps connectivity speed.
  • The 5G technology also support virtual private network.
  • The new 5G technology will take all delivery service out of business prospect
  • The uploading and downloading speed of 5G technology touching the peak.
  • The 5G technology network offering enhanced and available connectivity just about the world
A new revolution of 5G technology is about to begin because 5G technology going to give tough completion to normal computer and laptops whose marketplace value will be effected. There are lots of improvements from 1G, 2G, 3G, and 4G to 5G in the world of telecommunications. The new coming 5G technology is available in the market in affordable rates, high peak future and much reliability than its preceding technologies.

5G Technology

5G Technology stands for 5th Generation Mobile technology. 5G mobile technology has changed the means to use cell phones within very high bandwidth. User never experienced ever before such a high value technology. Nowadays mobile users have much awareness of the cell phone (mobile) technology. The 5G technologies include all type of advanced features which makes 5G mobile technology most powerful and in huge demand in near future.

The gigantic array of innovative technology being built into new cell phones is stunning. 5G technology which is on hand held phone offering more power and features than at least 1000 lunar modules. A user can also hook their 5G technology cell phone with their Laptop to get broadband internet access. 5G technology including camera, MP3 recording, video player, large phone memory, dialing speed, audio player and much more you never imagine. For children rocking fun Bluetooth technology and Piconets has become in market.

5G technology going to be a new mobile revolution in mobile market. Through 5G technology now you can use worldwide cellular phones and this technology also strike the china mobile market and a user being proficient to get access to Germany phone as a local phone. With the coming out of cell phone alike to PDA now your whole office in your finger tips or in your phone. 5G technology has extraordinary data capabilities and has ability to tie together unrestricted call volumes and infinite data broadcast within latest mobile operating system. 5G technology has a bright future because it can handle best technologies and offer priceless handset to their customers. May be in coming days 5G technology takes over the world market. 5G Technologies have an extraordinary capability to support Software and Consultancy. The Router and switch technology used in 5G network providing high connectivity. The 5G technology distributes internet access to nodes within the building and can be deployed with union of wired or wireless network connections. The current trend of 5G technology has a glowing future.

Saturday, September 10, 2011

Cloud computing Now India is Top Ranking

India scored higher than both Singapore and Malaysia in current Cloud understanding levels.
The proportion of Asia Pacific enterprises viewing cloud computing as relevant to their businesses has doubled to 83 percent over the
India scored higher than both Singapore and Malaysia in current Cloud understanding levels.
The proportion of Asia Pacific enterprises viewing cloud computing as relevant to their businesses has doubled to 83 percent over the last 18 months, reveals a survey by VMware Inc.

According to the survey results, 76% in India want to virtualize and adopt cloud computing in the next 18 months, which is the highest percentage as compared to other cloud positive countries in the region like Japan and Australia. India scored higher than both Singapore and Malaysia in current Cloud understanding levels.

The September survey of 6,953 respondents, conducted by Springboard Research under VMware's sponsorship, also indicated that cloud adoption has accelerated across seven Asia Pacific markets over the last 18 months, particularly among larger firms.

Today, 59 percent of regional firms are either using or planning cloud computing initiatives compared to 45 percent six months ago and 22 percent in 2009. India and China lead the region in terms of adoption plans, with 43 percent and 39 percent of organisations respectively planning to implement cloud computing. Organisations in Japan and Australia lead in cloud adoption, with 36 percent and 31 percent respectively already running a cloud-related initiative.

India had 693 respondents across various sectors. Highest adoption is anticipated from the IT/ITES infrastructure & manufacturing sectors. The survey reveals that India's understanding of virtualization and cloud computing has risen dramatically over the last couple of months and VMware has a 50 percent perceived mindshare when it comes to cloud computing in India.

Dynamic provisioning / capacity on demand, automated management, pay-per-use model, and applications that can scale on demand were considered the essential building blocks for Cloud Computing as far as the Indian audience is concerned.


Cloud associated with IT as a Service
The highest proportion of organizations in Japan (86 percent), Singapore (84 percent) and Thailand (74 percent) associate cloud computing primarily with IT as a Service, while in Australia, Malaysia and India, most firms (80 percent, 78 percent and 75 percent respectively) associate cloud mainly with applications-on-demand. In China, 80 percent of respondents look to cloud for on-demand provision of storage and network.

Sanchit Vir Gogia,Associate Research Manager, Software Springboard Research, said: "For most survey respondents in Asia Pacific, IT as a Service is the biggest theme of the day. These companies are looking for vendors and consultants that can help them enjoy serviced-based IT, particularly in the areas of cloud infrastructure and management."

Most organizations (60 percent) want to adopt cloud for scalability-on-demand to meet business needs, followed by drivers such as reduced hardware infrastructure costs and simplified resource/server provisioning.

Cost saving
Saving cost is the immediate incentive for adopting cloud computing for 57 percent of Asia Pacific firms. Only 37 percent, many of which are large firms with more than 10,000 employees, adopted or planned to adopt cloud as a long-term strategic investment.

Some 66% considered scalability on demand to meet business needs while 67% considered reduced hardware infrastructure and 43% considered simplified resource/server provisioning as some of the key factors that drive cloud adoption. 83 % said that they expect cloud investments to reduce hardware their spending while 74% would like reduction in their software spend.


Hybrid clouds on the rise
Companies wanting to deploy both public and private clouds were represented by the 38 percent of respondents, while a roughly equal amount - 37 percent - said they will only consider a private cloud. Preference for private cloud is more prevalent in banking and government sectors, with public cloud continuing to meet with the greatest resistance. Preference for hybrid cloud is higher in ASEAN, at more than four percentage points above the Asia Pacific average. In fact, even Japan – the most cloud-positive country in the survey – gave rise to survey findings suggesting that no more than 15 percent of organizations want to use public clouds. The mind set in India is changing and private cloud is slowly overtaking public cloud.

Storage (58 percent) represents the region's No.1 workload for private clouds, with Japan (62 percent) and China (61 percent) most likely to deploy storage in a private cloud. Cloud-based enterprise applications are the second most identified category across Asia Pacific at 49 percent.

In terms of deployment plans, 93 percent of respondents said their upcoming cloud deployments will revolve round web conferencing, IM, collaboration and email.

Andrew Dutton, SVP and GM, VMware Asia Pacific Japan, said: "It is clear that industry has great interest in the hybrid cloud model. The ability for enterprises to obtain a common cloud infrastructure platform, as well as a common management model and application services that bridge private and public clouds to deliver interoperable clouds allowing data and application portability, will be critical."

Integration concerns now match security worries as obstacles to cloud adoption

Integration with existing systems has caught up with traditional security concerns as a barrier to cloud adoption, with 46 percent of respondents identifying them equally as obstructions.

In emerging markets, the key factor holding back cloud adoption is lack of understanding among enterprises, according to 44 percent of respondents in China, 40 percent in Malaysia and 40 percent in Thailand, compared with a regional average of 36 percent.

These results strongly suggest that use of standards-based cloud solutions and education remain as significant cloud adoption drivers across Asia Pacific.


Virtualization seen as the foundation of cloud computing
Organizations across Asia Pacific (59 percent) consistently cited virtualization infrastructure as a primary building block for cloud computing. Awareness about virtualization is widespread in India, with 94% of the respondents either leveraging or planning to adopt virtualization technology.

Explaining the link between the two technologies, Dutton said: "Virtualization lets organizations decouple critical business applications and information from underlying physical hardware, and in turn, provides a fast and cost effective way to the cloud. More and more Asia Pacific organizations are realizing this and are moving to unlock more value from their virtualization investments."

Virtualization adoption in Asia Pacific is highest in Australia (87 percent) and Japan (82 percent). Among verticals, virtualization adoption is highest in insurance (82 percent) and banking/financial services (76 percent).

Thailand (67 percent), Singapore (65 percent) and Malaysia (65 percent) all lag Australia and Japan in current adoption, while virtualization penetration stands at about 30 percent across ASEAN.

Most Asia Pacific firms use virtualization for servers and data centres, with many organisations focused on leveraging virtualization to drive business continuity/disaster recovery initiatives. In India, server virtualization has grown in importance, compared to 12 months ago, as it is the bedrock to cloud.

The biggest growth opportunity for virtualization in Asia Pacific is in the end-user computing space, although most organisations rank desktop virtualization as low in their list of priorities.

However, significant advantages can be gained from a new approach to end-user computing that virtualizes the desktop by de-coupling the operating system, user persona and applications, thereby enabling great flexibility in delivering applications and data to end-users when and where they need them and regardless of access device. There is more focus in India on Desktop Virtualization at 68% when compared to China and Japan

Dutton said, "By enabling large-scale end-user self-service, desktop virtualization is really the final piece of the puzzle in making the modern enterprise flexible, scalable and ultimately responsive to business needs."

10 useful accessories for your desk

 

 
 


 
USB Hub & Mug Warmer
For many people, office doesn’t start without a cup of morning coffee. This USB powered mug warmer has a metal heating plate protected by insulation material — it can keep your coffee warm while you take your time to enjoy it. The heating plate works great for ceramic, glass and metal mugs. There is also a status light to indicate that the warmer is ready to be used. The additional USB ports can be used to connect other devices. 699 from www.ebay.in


USB Display
This little monitor is completely powered off USB – just one cable is needed for both the video signal and
power. The 7-inch 800 x 480 pixel panel is touchscreen enabled too – you can move certain items onto it to
clear space from your primary display. The best part is that since the display connects via USB, your regular
VGA/HDMI out is unused and can be used to output to another device simultaneously. The display is compatible
with both PC and Mac (the touchscreen functionality is only compatible with Intel-powered Macs and needs an dditional driver). $229.99 from www.thinkgeek.com


USB Cooler 
This tiny refrigerator-shaped USB accessory can actually keep a canned beverage chilled. A cool blue LED lights p when the door is opened, just like the light inside an actual fridge. Practically, it can’t cool a hot can, ut it can keep an already chilled can colder for a longer time (as compared to if it was left in the open). he flamboyant red colour also adds a little zing to your desk. $19.99 from www.thinkgeek.com


Phantom Keystroker 
Quite an effective and hard-to-catch office prank, this. The Phantom Keystroker looks like a simple USB flash rive but it actually mimics a keyboard and mouse when connected to a computer. All you have to do is plug it nto a (hidden) USB port and it randomly inserts letters while typing or moves the mouse pointer around. The nfuriated victim will never find out. $12.99 from www.thinkgeek.com


USB Foldable keyboard
If your netbook’s keyboard proves too small for you or you just prefer to carry your own keyboard around, this lexible USB keyboard is ideal. Since the keys and base material are made of silicon, it is completely silent. ven though it has the full 104 keys, you can roll it up into a small package. The added advantage is that the keys are completely waterproof and dustproof. $23.99 from www.thinkgeek.com


USB paper schredder
A lot of information about you can be accumulated by anyone who goes through your trash. That’s why any
personally identifiable or sensitive information (bank statements, credit card alerts, PIN numbers) should be
completely destroyed using a paper shredder. This little USB (or battery) powered shredder is small enough to it quietly under your desk. 2,022 from www.ebay.in


USB Vaccum Cleaner 
A full-size vacuum cleaner would be overkill for use on your keyboard or smaller computer peripherals. That’s hy you’ll need this dainty little handheld USB vacuum cleaner with a reusable dust bag. A couple of small ttachments (tube and brush) are included so that you can get all the muck out of the keyboard crevices and ther hard-to-reach places like speaker grills. It also has a small LED to light the way for more effective
cleaning. 150 from www.ebay.in


ASUS CrossLink Cable
Connecting two computers directly without a network is a pain. Thanks to Asus’ Crosslink USB cable and adapter, ou can quickly connect and transfer data at high-speeds between two computers. The adapter is shaped like a SB drive, has 2GB storage and a miniUSB port on the other side to connect using the Crosslink cable. You can ven share an internet connection and optical drive between two PCs. 4,000 from eBay Global EasyBuy


USB Phone2PC
This handly little device is great if you want to keep a record of all your voice calls. It can be connected to ost phones using an analog or digital connection and then it connects to the PC using USB. A software is equired to be installed which provides an easy-to-use interface to record incoming/outgoing calls. It includes n external microphone for recording meetings and interviews directly to the PC as well. 10,000 from www.ebay.in