Web Application Firewalls are quite different from normal packet inspection firewalls because they primarily operate in the application layer identifying and protecting web based applications/ servers from specific application based...
When you use a swipe card/ smart card to enter your office premises, have you wondered what happens in the background before the door opens to let you in? Well...
There maybe certain situations (like school/ college labs) where a large number of computers are required but none of them would require a huge amount of processor/ memory capacity. In...
Unlike a Wired Network, where adding more network switches gives better performance, a wireless network cannot be optimized for performance by adding more access points/ denser deployment of access points...
The power lines, are present in almost all the localities (including rural homes). Is it possible to access Internet through these all-reaching power lines? And more importantly, is it feasible?...
There are many advantages of moving over to VOIP / IP Telephony. One of them, is the ability to receive your land line calls (Corporate PBX extension number) on your...
If you want to run an application in another operating system from your computer, you either need to reboot the system (provided the other operating system is installed in dual...
STP is the short form for Spanning Tree Protocol & RSTP (Rapid Spanning Tree Protocol), MSTP (Multiple Spanning Tree Protocol) are all advanced/ improved implementations of STP. In this article,...
Mobile broadband networks are becoming increasingly faster and increasingly more pervasive. In this article, let us have a look at one popular technology – The 3GPP LTE (Long Term Evolution)...
Server Virtualization, as you know, utilizes servers in a very efficient way by dividing them in to a number of logical units called virtual servers. So, every host server may...
Optical Fiber Networks have become very common, and form the backbone of many enterprise networks. In fact, even your home might soon get a direct optical fiber link through FTTH....
While giving technical support to your customers (or) while trying to help your mother to install some software, from a remote location either through phone or chat (or) any other...
With so many ways/ devices to transfer data, it is becoming difficult for companies to track and prevent confidential documents/ files from being copied and sent to unwanted sources. But...
Just like Desktop Virtualization, where individual desktop sessions (OS & Applications) are virtualized and run from a centralized server, Application Virtualization virtualizes the Applications so that, i. It can either...