Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Network Articles - Page 70 of 66
536 Views
Netdata is an enormously optimized Linux utility that presents real-time (per 2nd) efficiency monitoring for Linux techniques, applications, SNMP devices, etc. And shows full interactive charts that certainly renders all collected values over the web browser to investigate them. This article explains about how to find a real-time performance monitoring tool for Linux Systems.FeaturesIt monitors total and per Core CPU usage, interrupts, softirqs and frequency.It monitors Memory, RAM, Swap and Kernel usage.It monitors Disk I/O (per disk: bandwidth, operations, backlog, utilisation, etc).It monitors Network interfaces including: bandwidth, packets, errors, drops, etc).It monitors Netfilter / iptables Linux firewall connections, events, errors, ... Read More
1K+ Views
Cyber Security and Information Security both terms are synonymous with each other the difference between the two comes when nature of data which is going to secure. In nutshell Cyber security deals with protecting networks, computers, and data from unauthorized electronic access while Information security deals with protecting information assets regardless of whether the information is in physical or digital format.Data security is all about securing data. But there is difference between data and information. Not every data can be information. Data can be called as information when it is interpreted in a context and given meaning. For example, “14041989″ ... Read More
7K+ Views
Channel allocation techniques are used in radio resource management for wireless and cellular networks to distribute bandwidth and communication channels to base stations, access points, and terminal devices.The objective of channel allocation is to maximize system spectral efficiency in bits/s/Hz/site through frequency reuse while maintaining a high level of service by minimizing co-channel and neighboring channel interference among neighboring cells or networks that share the bandwidth.Channel allocation techniques can be grouped into two categories: Fixed Channel Allocation and Dynamic Channel Allocation.Read through this article to find out how these two channel allocation techniques are different from each other.What is Fixed ... Read More
19K+ Views
Fuzzification is the process of converting a crisp quantity into a fuzzy quantity. On the other hand, defuzzification is the process of translating a fuzzy quantity into a crisp quantity. Read this article to learn more about fuzzification and defuzzification and how they are different from each other. What is Fuzzification? Fuzzification may be defined as the process of transforming a crisp set to a fuzzy set or a fuzzy set to fuzzier set. Basically, this operation translates accurate crisp input values into linguistic variables. In a number of engineering applications, it is necessary to defuzzify the result or rather "fuzzy ... Read More
342 Views
From a connoisseur to a novice who deal in Bitcoin have a number of questions in terms of the security of this currency. However, they should not be worried because crypto is securer than existing currencies, banks, and other financial institutes.Thanks to Blockchain technology, which is backing it. Transactions are recorded in public, distributed ledger turn it more transparent and makes it even harder to temper it.However, cryptocurrency transactions and Blockchain ledgers do have a few security flaws, but they are not essentially the fault of the underlying technology. The structure of Bitcoin and its Blockchain means there are facets ... Read More