Social Media Analytics and How Social Media Analytics Works

In the decade since social networking was born, we have seen the power of platforms that unite humanity. Across our professional and personal lives, social platforms have truly changed the world. Social media has been the tool to ignite revolutions and elections, deliver real-time news, connect people and interests, and of course, drive commerce. Social media plays a significant role in today‘s networked society. It has affected the online interaction between users, whom shares a lot of personal details and information online. Dynamic nature of social media data is a significant challenge for continuously and speedily evolving social media sites. Social media is growing rapidly and it offers something for everyone. Overview of Social Media Analytics Social Media Analytics is an on-demand offering that integrates, archives, analyzes and reports on the effects of online conversations occurring across professional, consumer-generated and social network media sites. As a result of the intelligence gleaned from this process, organizations can understand the effects online conversations are having on specific aspects of their business operations. Social media analytics (SMA) refers to the approach of collecting data from social media sites and blogs and evaluating that data to make business decisions. This process goes beyond the…

What is Blockchain Technology And How It Is Useful For Us

Blockchain is being termed as the fifth disruptive innovation in computing. Blockchain technology or the distributed, secure ledger technology has gained much attention in recent years. This article presents blockchain technology literature and its applications. A very significant plus of the blockchain technology is that it solves two of the most dreaded problems of currency based transactions, which have so long necessitated the requirement of a third party to validate the transactions. Blockchain Overview Blockchain technology is a sophisticated, interesting, and emerging technology. It provides a reliable way of confirming the party submitting a record to the blockchain, the time and date of its submission, and the contents of the record at the time of submission, eliminating the need for third-party intermediaries in certain situations. However, it is important to consider that blockchain technology does not verify or address the reliability or the accuracy of the contents, and additionally blockchain technology provides no storage for records, but instead the hashes thereof A blockchain is an electronic ledger of digital records, events, or transactions that are cryptographically hashed, authenticated, and maintained through a “distributed” or “shared” network of participants using a group consensus protocol. Much like a checkbook is a ledger…

What is Domain Name System (DNS) in Networking
Networking , Technology & Science / March 8, 2018

As a critical component of the Internet’s infrastructure, the Domain Name System (DNS) is the translation system that turns an Internet host name (domain name) into the unique series of numbers which constitute an Internet Protocol (IP) address for each specific domain name. The DNS plays a critical role in supporting the Internet infrastructure by providing a distributed and fairly robust mechanism that resolves Internet host names into IP addresses and IP addresses back into host names. The DNS is a critical application for the reliable and trustworthy operation of the Internet. Domain Name System (DNS) enables you to use hierarchical, friendly names to easily locate computers and other resources on an IP network. Overview of Domain Name System (DNS) To send a packet to a remote host over the internet, knowledge of the IP address of that specific host is necessary, similar to the working of the telephone network where a phone number is necessary to reach a specific person. However, remembering the IP addresses of all hosts somebody might want to communicate with is rather difficult. Furthermore one probably want to reach a certain remote application, e.g. a website, regardless of the physical machine this application is running…

What is Sybil Attack in Wireless Networks
Networking , Technology & Science / March 7, 2018

Wireless networking is inherently insecure. Wireless technologies, in the simplest sense, enable one or more devices to communicate without physical connections without requiring network or peripheral cabling. Security in computer world determines the ability of the system to manage, protect and distribute sensitive information. An ever-existing concern is the lack of security due to the very fact that the technology is wireless and is vulnerable to security threats & attacks. Many security mechanisms are based on specific assumptions of identity and are vulnerable to attacks when these assumptions are violated. Overview of Sybil Attack The Sybil attack in computer security is an attack wherein a reputation system is subverted by forging identities in peer-to-peer networks. A Sybil attack is one in which a malicious node on a network illegitimately claims to be several different nodes simultaneously. If an entity on a network does not have physical knowledge of the other entities, it will perceive them purely as informational abstractions called identities. . By illegitimately infusing false or biased information via the pseudonymous identities, an adversary can mislead a system into making decisions benefiting herself The term Sybil attack is to denote an attack where the attacker (Sybil node) tries to…

What is Universal Description, Discovery, and Integration (UDDI) in Web Services
Technology & Science / March 5, 2018

Universal Description, Discovery and Integration (UDDI) protocol is one of the major building blocks required for successful Web services. UDDI creates a standard interoperable platform that enables companies and applications to quickly, easily, and dynamically find and use Web services over the Internet (or Intranet). UDDI is a technology for publishing, querying, finding, and invoking Web services using a registry that provides data, metadata, and pointers to these services. Overview Universal Description Discovery and Integration (UDDI) is a standard sponsored by OASIS (Organization for the Advancement of Structured Information Standards). Often described as the yellow pages of Web services, UDDI is a specification for creating an XML-based registry that lists information about businesses and the Web services they offer. UDDI provides businesses a uniform way of listing their services and discovering services offered by other organizations. Though implementations vary, UDDI often describes services using WSDL and communicates via SOAP messaging. Registering a Web service in a UDDI registry is an optional step, and UDDI registries can be public or private (i.e. isolated behind a corporate firewall). To search for a Web service, a developer can query a UDDI registry to obtain the WSDL for the service he/she wishes to utilize….

What is Web service Discovery Language in web Services
Technology & Science / February 28, 2018

Web Services Description Language (WSDL) is a format for describing a Web Services interface. WSDL describes a web service at both an abstract and a concrete level. At the abstract level, the web service is described by the messages it sends and receives. Typically an XML Schema is used for this. At the concrete level, the web service’s transport and wire format for one or more interfaces are described. Overview of Web Services Description Language WSDL is an XML-based format for describing Web services. Clients wishing to access a Web service can read and interpret its WSDL file to learn about the location of the service and its available operations. In this way, the WSDL definition acts as the initial Web service interface, providing clients with all the information they need to interact with the service in a standards-based way. Through the WSDL, a Web services client learns where a service can be accessed, what operations the service performs, the communication protocols the service supports, and the correct format for sending messages to the service. A WSDL file is an XML document that describes a Web service using six main elements: The WSDL document that describes a Web service acts as…

What is Simple Object Access Protocol in Web Services
Technology & Science / February 27, 2018

Simple Object Access Protocol (SOAP) is the messaging protocol for web services. It is used to encode the information in the request and response messages. A SOAP message is operating system independent and it is a way for one program to communicate with other programs independently to the operating systems of the other programs. The SOAP messaging framework consists of four parts, the SOAP processing model, the SOAP extensibility model, the SOAP protocol binding framework, and the SOAP message construct. The processing model defines “the rules for processing a SOAP message”. Overview of Simple Object Access Protocol SOAP supports different styles of information exchanged. It supports a Remote Procedure Call (RPC) style, which allows a request- response processing. And it also supports message oriented information exchange. This is good if you like to exchange business documents or other types of documents where the sender may not expect to get a response immediately. SOAP also have the following features: Protocol independence Language independence Platform and operating system independence Simple and extensible SOAP is an XML-based protocol from the W3C for exchanging data over HTTP. It provides a simple, standards-based method for sending XML messages between applications. Web services use SOAP to send…

What is Cluster Computing
Technology & Science / February 24, 2018

Very often applications need more computing power than a sequential computer can provide. One way of overcoming this limitation is to improve the operating speed of processors and other components so that they can offer the power required by computationally intensive applications. Cluster computing is an increasingly popular high performance computing solution. Cluster computing is not a new area of computing. It is, however, evident that there is a growing interest in its usage in all areas where applications have traditionally used parallel or distributed computing platforms. The mounting interest has been fueled in part by the availability of powerful microprocessors and high-speed networks as off-the-shelf commodity components as well as in part by the rapidly maturing software components available to support high performance and high availability applications. Overview of Cluster Computing Cluster computing is best characterized as the integration of a number of off-the-shelf commodity computers and resources integrated through hardware, networks, and software to behave as a single computer. Initially, the terms cluster computing and high performance computing were viewed as one and the same. However, the technologies available today have redefined the term cluster computing to extend beyond parallel computing to incorporate load-balancing clusters (for example, web…

What is Secure Electronic Transaction (SET)
Networking , Technology & Science / February 23, 2018

Today is the era of information technology. Nowadays online shopping increase in market, use of E-payment gives more important benefits to merchants as well as customers. All online transactions must pass through a Payment Gateway to be processed. In effect, Payment Gateways act as a bridge between the merchant’s website and the financial institutions that process the transaction. Nowadays the payment approaches via the internet and the network has been growing at a furious pace. In this way, the variety of the electronic payment systems consists of a numerous types to achieve a strong level of the security. Electronic payment is the very important step of the electronic business system, and its security must be ensured. Overview of Secure Electronic Transaction (SET) The Secure Electronic Transaction protocol also known as SET is a method for providing secure credit card transactions on the Internet. The SET protocol is designed to operate both in real time, as on the World Wide Web, and in a store-and-forward environment, such as e-mail. Furthermore, as an open standard, SET is designed to allow consumers, merchants, and banking software companies to independently develop software for their respective clienteles and to have them interoperate successfully. However, in…

What is Password Authentication protocol (PAP)
Technology & Science , Web Security / February 22, 2018

In many systems, the user authentication is widely applied and discussed in security services. Password authentication, which is widely used for authenticated method, also is important protocol by requiring a username and password before being allowed access to resources. In an internet environment, a remote user has to obtain the access right from a server before doing any job. The procedure of obtaining access right is called a user authentication protocol. User authentication via user memorable password provides convenience without needing any auxiliary devices, such as smart card. It is very common that a server in a network of resources is used to provide controlled access to the network or to applications residing within the network. Therefore, it is necessary for the server to authenticate the client via username and password. Overview of Password Authentication protocol Password authentication is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. It is more frequently required in areas such as computer networks, wireless networks, remote login systems, operation systems, and database management systems. To access resources at remote systems, users should have proper access rights. One of the simplest and most convenient security mechanisms is…

Insert math as
Additional settings
Formula color
Text color
Type math using LaTeX
Nothing to preview