What is Web access Management?
Technology & Science / July 18, 2018

What is Management Information System (MIS)?
Technology & Science / July 17, 2018

Information system managers typically move up to such a position from other areas of information technology. The Management Information System (MIS) is a concept of the last decade or two. It has been understood and described in a number ways. It is also known as the Information System, the Information and Decision System, the Computer- based information System. MIS is the use of information technology, people, and business processes to record, store and process data to produce information that decision makers can use to make day to day decisions. Management Information Systems (MIS), referred to as Information Management and Systems, is the discipline covering the application of people, technologies, and procedures collectively called information systems, to solving business problems. Basic Overview of MIS MIS is the acronym for Management Information Systems. In a nutshell, MIS is a collection of systems, hardware, procedures and people that all work together to process, store, and produce information that is useful to the organization. “’MIS’ is a planned system of collecting, storing and disseminating data in the form of information needed to carry out the functions of management.” Academically, the term is commonly used to refer to the group of information management methods tied to the…

What is Cache Memory in Computer Architecture?
Technology & Science / July 15, 2018

Processors are generally able to perform operations on operands faster than the access time of large capacity main memory. Though semiconductor memory which can operate at speeds comparable with the operation of the processor exists, it is not economical to provide all the main memory with very high speed semiconductor memory. The most frequently used data or instructions are kept in cache so that it can be accessed at a very fast rate improving overall performance of the computer. There are multiple level of cache with last level being largest and slowest to the first level being fastest and smallest. Basic Description about Cache memory Cache memory is a small-sized type of volatile computer memory that provides high-speed data access to a processor and stores frequently used computer programs, applications and data. It is the fastest memory in a computer, and is typically integrated onto the motherboard and directly embedded in the processor or main random access memory (RAM). Cache memories are small fast memories used to temporarily hold the contents of portions of main memory that are (believed to be) likely to be used. The idea of cache memories is similar to virtual memory in that some active portion…

What is General Packet Radio Service (GPRS)?
/ July 14, 2018

GSM was the most successful second generation cellular technology, but the need for higher data rates spawned new developments to enable data to be transferred at much higher rates. The General Packet Radio Service (GPRS) is an enhancement to the existing GSM network infrastructure and provides a connectionless packet data service. The same cellular base-stations that support voice calls are used to support GPRS and as a consequence GPRS can be used wherever it is possible to make a voice call. GPRS roaming agreements exist with a large number of countries and this means users can use GPRS devices whilst abroad. GPRS is based on internet Protocols (IP) and enables users to utilize a wide range of applications – email and internet and/or intranet resources for instance. With throughput rates of up to 40 Kbit/s, users have a similar access speed to a dial-up modem, but with the convenience of being able to connect from anywhere. Basic Overview of GPRS GPRS (General Packet Radio Service) is a service within the GSM network, just like the two most popular services SMS and voice connections. GPRS is used for transmitting data in the GSM network in from of packets. The connection to…

What is Packet Sniffing in Networking?
/ July 13, 2018

Packets in computer communications can be defined as a quantity of data of limited size. In Internet all traffic travels in the form of packets, the entire file downloads, Web page retrievals, email, all these Internet communications always occur in the form of packets. In the internet, packet is a formatted unit of data carried by a packet mode in computer network Packets are the base of all data sent on the internet, yet they are often used insecurely. Tampering with live packets and the process it takes in order to alter packets traveling along the network are getting easier. Packet sniffing is commonly described as monitoring packets as they go across a network. Packet sniffers are typically software based, but can be hardware pieces installed directly along the network. Sniffers can go beyond network hosts that are seen in local area networks (LAN) that only handle data that is sent specifically to them. Basics Overview of Packet Sniffing Packet sniffing is the act of capturing packets of data flowing across a computer network. The software or device used to do this is called a packet sniffer. Packet sniffing is to computer networks what wiretapping is to a telephone network. …

What is Information System?
Technology & Science / July 12, 2018

An information system is designed to collect, process, and store and information. Although information systems are upgraded continuously in this context Information Technology (IT) plays an important role. Due to technological innovations, today most information systems are based on modern IT technology. That enables efficient computing as well as effective management for all sizes of organizations. The information systems enable more diverse human behavior, therefore a profound influence over society is also affected by information system. These systems accelerate speed of daily jobs. That technology also enables us to develop and maintain new and more-rewarding relationships. Defining Information System An information system is integrated and co-ordinate network, which combine together to convert data into information. Information system (IS) refers to a system of people, data records and activities.  For example, that process information for organizations and includes manual and automated processes. Therefore large amounts of data are needed to be process. Basically, data is a value for given facts and stored on a database. However, information actually consists of data that can be organized is some information model that help in various application such as answers questions and solve problems. Such system is defined as software program that organize and…

What is Statistical Learning?
/ July 10, 2018

Statistical learning (SL) is the third mainstream in machine learning research. The main goal of statistical learning theory is to provide a framework for studying problem of inference. That is of gaining knowledge, making predictions, making decisions or constructing models from a set of data. Statistical Learning provides an accessible overview of the field of statistical learning, an essential tool-set for making sense of the vast and complex data sets that have emerged in fields ranging from biology to finance to marketing to astrophysics in the past twenty years. Basic Overview of Statistical Learning Statistical learning refers to a set of tools for modeling and understanding complex datasets. It is a recently developed area in statistics and blends with parallel developments in computer science and, in particular, machine learning. The field encompasses many methods such as the lasso and sparse regression, classification and regression trees, and boosting and support vector machines. It refers to a vast set of tools for understanding data. These tools can be classified as supervised or unsupervised. Broadly speaking, supervised SL involves building a statistical model for predicting, or estimating, an output based on one or more inputs. Problems of this nature occur in fields as…

What is Machine Learning & why it is important?
Technology & Science / July 7, 2018

Machine Learning (ML) is new age computing technology. It was born from pattern recognition and theory of computers. It can learn without being programmed to perform specific tasks. Researchers interested in artificial intelligence want to see if computers could learn from data. The iterative aspect of machine learning is important because as models are exposed to new data, they are able to independently adapt. They learn from previous computations to produce reliable, repeatable decisions and results. It’s a science that’s not new – but one that has gained fresh momentum. Machine learning is domain of engineering where algorithms and computer based programs are learnt from data and past experience and provides decisions and analysis based on their experience and learned knowledge. Machine Learning: Basic description Machine learning is a set of tools that, broadly speaking, allow us to “teach” computers how to perform tasks by providing examples of how they should be done. For example, suppose we wish to write a program to distinguish between valid email messages and unwanted spam. Machine learning is one of the fastest growing areas of computer science, with far-reaching applications. Machine learning is programming computers to optimize a performance criterion using example data or past experience. We need…

What is Artificial Intelligence (AI)?
/ July 6, 2018

Everything we love about civilization is a product of intelligence, so amplifying our human intelligence with artificial intelligence has the potential of helping civilization flourish like never before – as long as we manage to keep the technology beneficial. Recent trends in the arena of Machine Learning have paved the way for advancements in Artificial Intelligence, and with the advent of Context and Contextual Applications for various platforms, the field of Artificial Intelligence just keeps getting better and better Definition of Artificial Intelligence Artificial Intelligence (AI) is fundamentally transforming the way businesses operate. It is a combination of cutting-edge technologies that enables machines to think, comprehend, and execute tasks hitherto carried out by humans. AI can be considered as an intelligent robot which possesses the cognitive characteristics of a human being. “Artificial intelligence is part of computer science concerned with designing intelligent computer systems that is systems that exhibit the characteristics we associate with intelligence in human behavior”. Communication has been one of the important aspects of intelligent behavior where vision and speech are all used effectively for communication purposes. Speech recognition, computer vision and language understanding have been some of the goals of artificial intelligence, because the possession of…

What is Denial of Service (DoS) Attack in Networking?
/ July 5, 2018

Network Security deals with all aspects related to protection of sensitive information on the network. It covers various mechanisms to provide fundamental security for data in communication systems. Security in computer network determines the ability of administration to manage, protect and distribute sensitive information. Data Security was found many years before the advent of wireless communication due to mankind’s need to send information without exposing its content to others. Every security system must provide a list of security functions. That can assure secrecy of the system. These functions are usually referred to as goals of security system. There are a number of different kinds of attacks are exist in network security that impact the system performance and security protocols. Among them a serious kind of attack namely Denial of Service (DoS) attack is described. Basic Description about denial of service (DoS) Attack Denial of Service attacks is undoubtedly a very serious problem in the Internet, whose impact has been well demonstrated in the computer network literature. The main aim of Denial of Service is the disruption of services by attempting to limit access to a machine or service instead of subverting the service itself. This kind of attack aims at…

Insert math as
$${}$$