Posts

Showing posts from January, 2019

Is IP address Enough To Track a user?

  When you wish to trace someone through their  IP address on the network , not only is the IP address needed but also the data and time details of the person accessing an IP address. What happens when you want to browse on the internet? You are assigned an IP address. Now an IP address is of the format ABCD.ABCD.ABCD.ABCD Value of each ABCD ranges from 0 to 255. Each combination of the above will lead to a different address. An example of an IP address can be 1234.0A12.91BE. Since the number of IP addresses are then, limited, a limited number of IP addresses exist in the world. Given the number of internet users and multiple devices accessing the internet, it is not always possible to assign a user a unique static IP address. So here comes the role of dynamic IP addresses. Now, Dynamic IP is provided in real-time to users on the web. Dynamic IP or DHCP is provided by your ISP provider for a fixed time depending on location, date and time of the day. Every time you acces

How does firewall Work?

Firewall work like a filter between your computer network and the internet. You can program what you want to get out on the internet. Firewalls can be used in numerous ways to add security to your home or business. This ensures that your network is secure from cyber attacks . Firewalls in business protection: Large corporations employ multiple firewalls to protect their complex network data On the outbound side, firewalls can be configured to prevent employees from transmitting sensitive data outside of the network On the inbound side, firewalls can be configured to prevent access to certain social networking websites Firewalls can prevent outside computers from accessing computers inside the network Firewalls for Personal Use: For home use, firewalls protect computers from malicious software(malwares) Firewalls prevent identity theft and prevent hacking techniques such as phishing of personal data There are two ways a firewall can be programmed- to prevent traf
Image
How Facility Management Services enable organizations to achieve their goals                         Facility Management Services - By General Technologies Successful organizations have a goal; all day-to-day activities  are driven towards the achievement of that goal. Technology remains a definite enabler that has helped redefine the paradigms of operation for any business. Given the plethora of gadgets, software, storage devices, machines, and equipment, that are undoubtedly necessary for smooth operations of technology, what are the advantages of having  facility management service  in your organization? The need to safeguard the health and well-being of every device- small and big, brings about the need for facility management services in any organization that depends upon technology today. Facility Management Services take care of the process (which includes digital workstations,  servers ,  networks ,  security ) and map it to the work-place environment (the la

How Adaptation To Enterprise Tablets Can Benefit Your Organization

Image
                                      Enterprise Tablets- General Technologies Tablets are the new form factors in Enterprises to offer computing capabilities on the go. They are helping organizations a new way to interface their data and applications . Enterprise tablets, if adapted wisely, can offer great time saving and help your teams work smarter, not harder. So what are enterprise tablets? Enterprise tablets, are mobile devices with mobile operating system, LCD display touchscreen greater than 7 inches, processing and compute hardware along with rechargeable batteries packed into a single, thin, flat package. They may or may not support network capabilities. They differ from smart phones as they can be connected to any mouse, trackpad or keypad and also have higher storage and processing capabilities. Unlike consumer tablets, Enterprise Tablets are designed specifically for enterprise usage.   So how are they different from consumer tablets and wha

What is Server Virtualization

What is Server Virtualization What is a Server? A server serves information to the computers that connect it. When users connect to a server, they can access files, programs and other server information. So what is Server Virtualization? Server virtualization  is the masking of server resources (number and identity of individual physical servers, processors, operating sytems) from server users. With the use of a virtualization application, a physical server is converted into multiple virtual machines. Each virtual server runs multiple operating systems on the same time.

What is Virtualization?

Image
What is Virtualization? Virtualization   is the act of creating a virtual version of something- computer hardware, storage and network. It allows for the distribution of a machine’s capacity among multiple user environments. Traditionally, it was easier and more reliable to run individual tasks on individual servers: a single server hosts a single operating system that runs a single task at a time. With virtualization, one can split independent tasks onto different hardware resources. Hence, hardware resources are utilized to their maximum capacities with multiple tasks . The technology that enables virtualization is called the  hypervisor -  it gives multiple users simultaneous access to perform batch processing. Most enterprises have single-vendor IT stacks that don’t allow their legacy applications to run on a different vendor’s hardware. With virtualization, companies can partition their servers and run multiple operating systems and versions. Hypervisors si