Happy Father’s Day
/ June 17, 2018

Fathers, do not provoke or irritate or fret your children [do not be hard on them or harass them], lest they become discouraged and sullen and morose and feel inferior and frustrated. Do not break their spirit. One of the greatest gifts a father can give his child is time! Time spent playing, reading, talking, laughing. Children crave that attention and become downcast when it doesn’t happen. Father’s Day is celebrated worldwide to recognize the contribution that fathers and father figures make to the lives of their children. This day celebrates fatherhood and male parenting. Although it is celebrated on a variety of dates worldwide, many countries observe this day on the third Sunday in June. Public Background Honoring thy father is a concept that dates back to the very roots of human civilization. Father’s Day isn’t just a day for dads to get more ties. It’s celebrated on the third Sunday of June to honor dads, grandfathers, step-dads and all men who act as a father figure. Like most holidays that go way back, the origin is hard to trace but most people will agree that Sonora Dodd played a big part in starting the holiday. This year Father’s…

What are Cryptocurrencies in Digital World?
Technology & Science / June 16, 2018

Cryptocurrencies have increasingly become all the rage in digital currency market. Although blockchain’s decentralise and unregulated platform has resulted in the creation of hundreds of new cryptocurrencies, this has also led to the digital currency market becoming somewhat unstable. Over the past couple of years, popular cryptocurrencies such as Bitcoin, Ethereum, Monero, and ZCash, among others saw massive fluctuations in their value. Cryptocurrency is a type of digital currency that uses cryptography for security and anti-counterfeiting measures. Public and private keys are often used to transfer cryptocurrency between individuals. Basic Overview of Cryptocurrencies A cryptocurrency is a digital or virtual currency designed to work as a medium of exchange. It uses cryptography to secure and verify transactions as well as to control the creation of new units of a particular cryptocurrency. Essentially, cryptocurrencies are limited entries in a database that no one can change unless specific conditions are fulfilled. As a counter-culture movement that is often connected to cypherpunks, cryptocurrency is essentially a fiat currency. This means users must reach a consensus about cryptocurrency’s value and use it as an exchange medium. However, because it is not tied to a particular country, its value is not controlled by a central…

What is Classless Inter-Domain Routing (CIDR) in Networking?
/ June 14, 2018

Understanding networking is a fundamental part of configuring complex environments on the internet. This has implications when trying to communicate between servers efficiently, developing secure network policies, and keeping your nodes organized. CIDR (Classless Inter-Domain Routing) was introduced in 1993 replacing the previous generation of IP address syntax – classful networks. CIDR allowed for more efficient use of IPv4 address space and prefix aggregation, known as route summarization or supernetting. Basic Overview of CIDR A system called Classless Inter-Domain Routing, or CIDR, was developed as an alternative to traditional subnetting. The idea is that we can add a specification in the IP address itself as to the number of significant bits that make up the routing or networking portion. Classless inter-domain routing (CIDR) is a set of Internet protocol (IP) standards that is used to create unique identifiers for networks and individual devices. The IP addresses allow particular information packets to be sent to specific computers. Shortly after the introduction of CIDR, technicians found it difficult to track and label IP addresses, so a notation system was developed to make the process more efficient and standardized. That system is known as CIDR notation. To illustrate the problems with the class…

What is Proxy Server in Networking?
/ June 12, 2018

A computer can act on the behalf of other computers to request content from the Internet or an intranet. Proxy Server is placed between a user’s machine and the Internet. It can act as a firewall to provide protection and as a cache area to speed up Web page display. Proxy server is a computer that sits between a client computer and the Internet, and provides indirect network services to a client. It may reside on the user’s local computer, or at various points between the user’s computer and destination servers on the Internet. A proxy server intercepts all client requests, and provides responses from its cache or forwards the request to the real server. A client computer is connected to the proxy server, which acknowledges client requests by providing the requested resource/data from either a specified server or the local cache memory. Client requests include files or any other resources available on various servers. Basic Overview of Proxy Server Basically proxy server plays an intermediary between the client computer and the server computer. The clients usually take the help of proxy server for requesting any files, any web pages or any other resources. The proxy server acts as an…

What is Deadloack in Operating System?
Technology & Science / June 10, 2018

A set of processes is deadlocked if each process in the set is waiting for an event that only another process in the set can cause. Deadlocks are a set of blocked processes each holding a resource and waiting to acquire a resource held by another process. Because all the processes are waiting, none of them will ever cause any of the events that could wake up any of the other members of the set, and all the processes continue to wait forever. For this model, we assume that processes have only a single thread and that there are no interrupts possible to wake up a blocked process. The no-interrupts condition is needed to prevent an otherwise deadlocked process from being awakened by, say, an alarm, and then causing events that release other processes in the set. In most cases, the event that each process is waiting for is the release of some resource currently possessed by another member of the set. In other words, each member of the set of deadlocked processes is waiting for a resource that is owned by a deadlocked process. None of the processes can run, none of them can release any resources, and none of…

What is Digital Certificate in Network Security?
/ June 9, 2018

Digital certificates are a core component in the provision of secure data communications. Gaining an understanding of the nature, creation and operation as well as the variety of these certificates is an essential step for students of computer, information or network security. Digital Certificates provide a means of proving your identity in electronic transactions; much like a driver license or a passport does in face-to-face interactions. With a Digital Certificate, you can assure friends, business associates, and online services that the electronic information they receive from you are authentic. Basic Overview of Digital Certificate A Digital Certificate is an electronic “password” that allows a person, organization to exchange data securely over the Internet using the public key infrastructure (PKI). Digital Certificate is also known as a public key certificate or identity certificate. Digital certificates provide a mechanism to authenticate and secure information on open networks. Applications using this mechanism include secure email, secure web communications, digital signing of software files, smart card authentication, and encrypting file systems. Certificates are a key building block for providing security services within an IT infrastructure, usually referred to as a public key infrastructure (PKI). Such contexts support: the binding of public keys to entities the distribution of public key…

What is Multimedia Communication in Computer Graphics?
/ June 8, 2018

Multimedia communication deals with the transfer, the protocols, services and mechanisms of discrete media data (such as text and graphics) and continuous media data (like audio and video) in/over digital networks. Multimedia systems have attracted much attention during the last few years in the society as a whole and in the information technology field in particular. Multimedia communication comprises the techniques needed for distributed multimedia systems. To enable the access to information such as audio and video data, techniques must be developed which allow for the handling of audiovisual information in computer and communication systems Basic Overview of Multimedia Communication Multimedia is everywhere as a communication method to educate, inspire, and encourage people through several digital forms like photography, video, illustration, animation, audio, text, interactive websites and engaging environments. Expressive and talented people with digital communication skills have the desirable job skills that employers are seeking including analytical thinking, creative problem solving, and working collaboratively. Our multimedia communication degrees are designed to balance artistic technique and technical proficiency with professional competency in print, web, and social media applications. Visual literacy, creativity, and collaboration are integrated into a curriculum that teaches you how to develop digital media content that responds to…

What is Network Time Protocol (NTP) in networking?
/ June 7, 2018

Network Time Protocol (NTP) is very important for modern networks. If the time across network devices is not accurate, this can have a direct impact on network security and network management, just to name two. The key to accurate time in the network is to have your devices receive the correct time from an atomic clock, and then synchronize this correct time across all of the devices. Network Time Protocol ensures this process is automated and secure. This article serves as your introduction to this critical network function. NTP is a protocol designed to synchronize the clocks of computers over a network. Network Time Protocol (NTP) provides a mechanism to synchronize time throughout the network. An NTP device will form an association with NTP devices closer to the time source. NTP devices use a special measurement, called a stratum, to determine how far they are away from the time source. Basic Overview of the NTP NTP stands for Network Time Protocol, and it is an Internet protocol used to synchronize the clocks of computers to sometime reference. NTP is an Internet standard protocol originally developed by Professor David L. Mills at the University of Delaware. The NTP system is based…

What is CORBA in Distributed System?
/ June 6, 2018

In recent years, with the growing maturity and application of new technologies such as software architecture, software component, large-granularity software reuse and so on, software engineering methodology based on product line, which rises the widespread concern and attention, has become a hot and key topic in software engineering field. ORBA is often described as a “software bus” because it is a software-based communications interface through which objects are located and accessed. The illustration below identifies the primary components seen within a CORBA implementation. Overview of CORBA The Common Object Request Broker Architecture (CORBA) is a standard developed by the Object Management Group (OMG) to provide interoperability among distributed objects. CORBA is the world’s leading middleware solution enabling the exchange of information, independent of hardware platforms, programming languages, and operating systems. CORBA is essentially a design specification for an Object Request Broker (ORB), where an ORB provides the mechanism required for distributed objects to communicate with one another, whether locally or on remote devices, written in different languages, or at different locations on a network. The OMG’s vision of a distributed application is shown in Figure, which I have adapted from Siegel’s diagram of the Object Management Architecture (Siegal, 1998). This…

World Environmental Day
/ June 5, 2018

Humans are both creatures and moulders of their environment, which gives them physical sustenance and affords them the opportunity for intellectual, moral, social and spiritual growth. In the long and tortuous evolution of the human race on this planet a stage has been reached when, through the rapid acceleration of science and technology, humans have acquired the power to transform their environment in countless ways and on an unprecedented scale. Every June 5th is World Environment Day. On this day, communities and individuals around the world work to increase awareness of the importance of conserving the environment, the positive global impact of environmental regulations and controls and engage in activities that serve to educate and improve their environment locally. It grew out of the efforts of leading environmentalists who recognized the need for there to be a coordinated global focus to begin to make conserving the environment and our natural resources a priority. Facts about Environmental Day Earth Overshoot Day is the date on which humanity’s resource consumption for the year exceeds the Earth’s capacity to regenerate those resources that year. In 2016 it was on August 8th, and it’s getting earlier each year. The most hazardous pollutants are released…

Insert math as
$${}$$