This post talks about what a RAID Controller is and some salient points you need to know about RAID Controllers and RAID Arrays. If you want a general introduction to...
GPS refers to Global Positioning System. In this article let us look at a short overview of GPS & also some of the applications enabled by GPS technology. You might...
In this article, let us look at what computer worms are, some techniques used by them to infect systems, what they can do and how they spread. But before that,...
This is a guest post by Sarika Periwal The bigger the company the more fronts at which the customer gets exposed to the company. Your staff at the customer care...
Earlier, Wireless Networks were slow to catch up with Wired Networks in terms of speed and bandwidth. With the implementation of IEEE 802.11n Wireless Networks, the equation slightly balanced out....
In this post, let us look at the factors that a company needs to consider before deciding on whether they should host their email server in-house or outsource it to...
While there are lot of advantages of moving to VOIP/ IP Telephony Systems, there are invariably some analog connections that are required to be interfaced to the IP world. One...
Network Ports: When one computing device wants to communicate with a remote computing device, it needs two important parameters to reach and communicate with it. First, it needs the IP...
Hallo Leute, There are numerous blogs on various topics out there, but very few of them focus on the Computer Networking domain. excITingIP.com is not only a Computer Networking Blog...
IOV or Server Input – Output Virtualization is a technology that enables the Input/Output Interface components like NIC/HBA to be removed from physical servers and consolidated using a separate device....
Energy/ Power conservation in Network devices has got a serious push with the introduction of IEEE 802.3az Standard, also called as Energy Efficient Ethernet. Let us learn more about what...
Optical Taps are passive devices that enable one to monitor Optical fiber links to identify faults & help trouble shoot an Optical network. They are generally placed in-line (in-between) the...
A Trojan Horse is a computer program that is attached to a genuine program / gets disguised as a genuine program to install a back-door to the user computer (enabling...