- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 166 Articles for Technology
![Sumana Challa](https://www.tutorialspoint.com/assets/profiles/1372755/profile/60_1283629-1720674689.jpg)
40 Views
Devin AI is a fully automated AI software engineer, that has been hyped since the release of its demo. Well there are quite different opinions circulating on the internet regarding whether the demo was faked or will the technology result in the end of career in software engineering. What is Devin AI? Devin is the first AI engineer which is a combination of human expertise and machine learning developed by Cognition Labs. It is not just another AI assistant like Alexa but is designed to be a teammate in coding with capabilities beyond just automation. It is known for its ... Read More
![Satadru Jati](https://www.tutorialspoint.com/assets/profiles/661891/profile/60_2185285-1685599991.jpg)
145 Views
Introduction to Near Field Communication (NFC) Near Field Communication (NFC) may be a short-range remote communication technology that permits two electronic gadgets to set up communication when they are set in the near vicinity, ordinarily inside some centimeters. NFC is an expansion of Radio Recurrence Distinguishing Proof (RFID) innovation and works at a recurrence of 13.56 MHz. NFC innovation empowers contactless communication and information trade between gadgets, making it helpful and proficient for different applications. Working of NFC The essential rule behind NFC is using electromagnetic areas for information exchange. It utilizes inductive coupling, where the NFC-enabled gadgets create attractive ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
2K+ Views
Introduction A File Transfer Protocol (FTP) server is a network protocol that allows users to transfer files between computers over internet or a local area network (LAN). FTP servers are commonly used in businesses and organizations for file sharing and storage. In this article, we will discuss how to configure an FTP server using Cisco Packet Tracer. Setting up FTP server Before configuring an FTP server, we need to have a server machine and an FTP client machine. In this example, we will be using two virtual machines (VMs) on Cisco Packet Tracer, one acting as FTP server and other ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
1K+ Views
Introduction In distributed systems, file service architecture is an essential component that enables users to access and manipulate files remotely. file service architecture enables multiple users to access a shared file system over a network. This article will explore file service architecture in distributed systems, including its design, components, and examples of implementations. Design of File Service Architecture The design of file service architecture is based on a client-server model. client sends a request to server, and server processes request and sends back requested data. client-server model provides a scalable, fault-tolerant, and reliable file service architecture in distributed systems. The ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
951 Views
In a distributed system, multiple computers work together to provide a cohesive service to users. One of most critical components of a distributed system is ability to access files stored on different computers in network. Different file accessing models have been developed to manage this complexity and ensure efficient and secure file sharing. In this article, we will explore various file accessing models in a distributed system. Centralized File Accessing Model In a centralized file accessing model, all files are stored on a single server or node, and users access these files through server. This model is simple to implement ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
155 Views
In today's digital age, high-speed internet is no longer a luxury but a necessity. With growing demand for streaming services, video conferencing, and online gaming, traditional copper-based internet connections are becoming outdated. Fiber optics broadband connection has emerged as go-to solution for reliable, high-speed internet that meets needs of modern-day user. In this article, we will explore what fiber optics broadband connection is, its benefits, and its applications. What is Fiber Optics Broadband Connection? Fiber optics broadband connection is an internet connection that uses fiber-optic cables to transmit data. Unlike traditional copper cables, which transmit data through electrical signals, fiber ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
674 Views
In a distributed system, message passing is a critical component of communication between processes or nodes. Message passing allows processes to share data, coordinate their activities, and respond to changes in system. A well-designed message passing system can improve performance, reliability, and scalability of a distributed system. In this article, we will discuss features of good message passing in distributed systems and provide examples of how these features can be implemented. Reliability Reliability is one of most important features of message passing in distributed systems. Messages should be delivered to intended recipient, even in presence of failures, network delays, and ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
203 Views
Introduction The Enhanced Interior Gateway Routing Protocol (EIGRP) is a widely used routing protocol in computer networks. It is an advanced version of Interior Gateway Routing Protocol (IGRP), which was developed by Cisco Systems. EIGRP is an advanced, distance vector, routing protocol that provides faster convergence and better scalability compared to other distance vector routing protocols. This article will discuss features of EIGRP that make it one of most preferred routing protocols for large networks. Fast Convergence One of significant features of EIGRP is its fast convergence. Convergence is process by which all routers in a network come to agree ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
783 Views
Introduction Transmission Control Protocol (TCP) is a widely used protocol for data transmission over internet. However, data transmission over TCP is not always error-free. transmission can be disrupted due to several reasons such as network congestion, packet loss, or failure of intermediate devices. In such cases, TCP uses a loss recovery technique to recover lost data and retransmit it. This technique is crucial in ensuring reliability of data transmission over internet. In this article, we will discuss fast recovery technique for loss recovery in TCP. Understanding TCP loss recovery technique TCP uses a three-way handshake mechanism to establish a connection ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
175 Views
Introduction Access control lists (ACLs) are an important component of network security. ACLs are used to regulate network traffic and restrict access to network resources. An ACL is a set of rules that is applied to a network interface, router or firewall, which dictates which packets are allowed to pass through and which are dropped. ACLs can be either standard or extended, and they can be configured to allow or deny traffic based on source and destination IP addresses, protocols, and port numbers. In this article, we will explore extended access list in network security, its importance, and how to ... Read More