Thursday 31 December 2015

web hosting

                                        Web Hosting

web hosting service is a type of Internet hosting service that allows individuals and organizations to make their website accessible via the World Wide Web. Web hosts are companies that provide space on a server owned or leased for use by clients, as well as providing Internet connectivity, typically in a data center.

Web hosting is a place where individuals or organizations place their websites.
Normally when we talk about a web hosting, it means a company that provides space on a computer (server) to *host* the files for your website, as well as providing Internet connectivity so that other computers can access to the files on your website.
Normally when we talk about web hosting, the term “web hosting” refers to the server that host your website or the hosting company that rent that server space to you; when we talk about data center, we mean the facility that is used to house the servers.
A data center could be a room, a house, or a very large building equipped with redundant or backup power supplies, redundant data communications connections, environmental controls (e.g., air conditioning, fire suppression) and security devices

                          Types of web hosting

Generally, there are four different types of web hosting: Shared, Virtual Private Server (VPS), Dedicated, and Cloud Hosting. While all types of hosting servers will act as a storage centre for your website, they differ in the amount of storage capacity, control, technical knowledge requirement, server speed, and reliability. Let’s dig in and look at the main differences between a shared, VPS, dedicated, and cloud hosting.
Shared Server Hosting
What Is Shared Hosting?
Introduction
In shared hosting, one’s web site is placed on the same server as many other sites, ranging from a few to hundreds or thousands. Typically, all domains may share a common pool of server resources, such as RAM and the CPU. As cost is extremely low, most websites with moderate traffic levels running standard software are hosted on this type of server. Shared hosting is also widely accepted as the entry level option as it requires minimum technical knowledge.
Disadvantages
No root access, limited ability to handle high traffic levels or spikes, site performance can be affected by other sites on the same server.
 Recommended shared hosting services: iPage, WebHostingHub, A2 Hosting, and Hostgator.

Virtual Private Server (VPS) Hosting

What Is VPS Hosting
Introduction
A virtual private server hosting divides a server into virtual servers, where each websites is like hosted on their own dedicated server, but they’re actually sharing a server with a few different other users. The users may have root access to their own virtual space and better secured hosting environment with this type of hosting. Websites that need greater control at the server level, but don’t want to invest in a dedicated server.

Disadvantages
Limited ability to handle high traffic levels or spikes, your site performance can still be somewhat affected by other sites on the server.
 Recommended VPS hosting services: InMotion HostingRose Hosting, and A2 Hosting.
Dedicated Server Hosting
What Is Dedicated Hosting?
Introduction
A dedicated server offers the maximum control over the web server your website is stored on – You exclusively rent an entire server. Your website(s) is the only website stored on the server.
Disadvantages
With great power comes… well, greater cost. Dedicated servers are very expensive and it’s only recommended to those who need the maximum control and better server performance.
 Recommended dedicated hosting services: InMotion HostingRose HostingA2 Hosting, and Hostgator.

Cloud Hosting

What Is Cloud Hosting?
Introduction
Cloud hosting offers unlimited ability to handle high traffic or traffic spikes. Here’s how it works: A team of servers (called a cloud) work together to host a group of websites. This allows multiple computers to work together to handle high traffic levels or spikes for any particular website.
Disadvantages
Many cloud hosting setup do not offers root access (required to change server settings and install some software), higher cost.

What Is A Domain Name?

Before you can run a website, you will need a domain name.
A domain is the name of your website. A domain name is not something physical that you can touch or see; it is merely a string of characters that give your website an identity (yes, a name, like human and businesses).
Now, here are some quick examples: Google.com is a domain name; so are Alexa.com, Linux.org, WebRevenue.co,  eLearningEuropa.info, as well as Yahoo.co.uk.
To have your own domain, you will need to register your domain with a domain registrar.

The difference between web hosting and domain name

It is very common for newbies to get confused between a domain name with a web hosting. However, it is very important to be crystal clear on the differences between the two before you move on to your first website.
To simplify: A domain name, is like the address of your home; web hosting on the other hand, is the space of your house where you place your furniture.
Instead of street name and area code, set of words or/and numbers are used for the website’s naming’. The same goes with hosting, computer hard disk and computer memory are used instead of instead of wood and steel for storing and processing data files. The idea is presented clearer with the diagram below.
Domain vs Web Hosting






.

Wednesday 30 December 2015

KEVIN MITCNIK


                                       KEVIN MITNICK



Kevin Mitnick (born August 6, 1963) is an American computer security consultant, author, and hacker. In the mid nineties, he was “The World’s Most Wanted Hacker”. Since 2000, he has been a successful security consultant, public speaker and author. Kevin does security consulting for Fortune 500 companies, performs penetration testing services for the world’s largest companies and teaches Social Engineering classes to dozens of companies and government agencies. His last book Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker’ was a New York Times best-seller.

Computer hacking

At age 13, Mitnick used social engineering and dumper diving to bypass the punch card system used in the Los Angeles bus system. After he made a bus driver tell him where he could buy his own ticket punch "for a school project", he was able to ride any bus in the greater LA area using unused transfer slips he found in a dumpster next to the bus company garage. Social engineering later became his primary method of obtaining information, including user-names and passwords and modem phone numbers.
Mitnick first gained unauthorized access to a computer network in 1979, at 16, when a friend gave him the phone number for the Ark, the computer system Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. He broke into DEC's computer network and copied their software, a crime he was charged with and convicted of in 1988. He was sentenced to 12 months in prison followed by three years of supervised release. Near the end of his supervised release, Mitnick hacked into Pacific Bell voice mail computers. After a warrant was issued for his arrest, Mitnick fled, becoming a fugitive for two and a half years.
According to the U.S. Department of Justice, Mitnick gained unauthorized access to dozens of computer networks while he was a fugitive. He used cloned cellular phones to hide his location and, among other things, copied valuable proprietary software from some of the country's largest cellular telephone and computer companies. Mitnick also intercepted and stole computer passwords, altered computer networks, and broke into and read private e-mails.
Kevin Mitnick was once known as the ‘World’s Most Wanted’ social engineer and computer hacker. One doesn’t acquire a title like that – nor an accompanying prison sentence – for vanilla exploits. While in Federal custody, authorities even placed Mitnick in solitary confinement; reportedly, he was deemed so dangerous that if allowed access to a telephone he could start a nuclear war by just whistling into it.
From the 1970s up until his last arrest in 1995 Kevin Mitnick skillfully eluded and bypassed corporate security safeguards, penetrating some of the most well-guarded systems, including, amongst countless others, the likes of Sun Microsystems, Digital Equipment Corporation, Motorola, Netcom, and Nokia. He has even had to go on record and deny hacking into the Department of Defense’s North American Aerospace Defense Command (NORAD) and wiretapping the Federal Bureau of Investigation.
At a recent app-enabled cloud network performance and security briefing hosted by Citrix and Palo Alto Networks in Washington, DC, Mitnick opened up about his former life and introduced himself to the Washington crowd accordingly.
“I assume there are a lot of Federal agencies here so we may know each other from a past life,” Mitnick said in a devious, yet still tempered tone.
With the bylines of “Most Wanted” and “Infamous” and a laundry list of corporate names etched onto his belt of exploits, it’d be fair to assume that Mitnick’s hacking masterpiece evolved from one of his more high profile penetrations. That assumption, however, couldn’t be further from the truth.
Actually, the seminal stunt of his hacking career is much more puerile but nonetheless humorous. As Mitnick explained, “My favorite hack was actually when I was a kid.”
Mitnick hacked the frequency of a local McDonald’s drive-through ordering system and took control over the drive-through speaker, relishing the consequential bewilderment of unsuspecting McDonald’s employees.
“I would sit across the street from McDonald’s and I would take their order and tell them they were the 50th customer so your order is free. Please drive through your order is free,” Mitnick reminisced. “People would drive up to the window and I would say, ‘Our weight detection system detected your car is a little heavy so we recommend the salad instead of the Big Mac’.”
“It got to the point that the manager of the McDonald’s was wondering what the heck was going on and he walked outside and looked in the cars and around the parking lot, but he could not see anything because I was across the street. He even walked up to the drive-through speaker and looked at it and then stuck his head inside to see if there was actually someone inside and I yelled, ‘What are you looking at?!’”
Mitnick didn’t only revel in the joy of trolling individual customer orders, though. He went on to explain, “But my favorite was when the police drove up and I would say, ‘Hide the cocaine, hide the cocaine!’” Alas, the theater of the ensuing build-up and moment when the unsuspecting employee met the suspicious glances of the police would befit any comedic late night show.
McDonald’s, when reached for comment, was less than amused by Mitnick’s claims. As all Fortune 500 companies take hacking very seriously, Danya Proud, Director of Media Relations, McDonald’s USA stated, “We are not aware of this matter; however, security of our business, information and systems remains a top priority.”
No word yet if McDonald’s plans to hire Mitnick to consult on the protection of the integrity of their drive-through ordering process. One can only hope that measures to counter such nefarious hacks have been implemented.
At any length, look across the street if you ever encounter a problem during a wee-hours drive-thru run to Mickey D’s. The world’s once most wanted and infamous Mitnick may be enjoying a little bit of reflective levity at your expense, especially if you’re the 50th customer.
Could you hack into the New York Times best-seller list and change the ranking of your new book, Ghost in the Wires?
Probably. These days companies hire me to break into their systems to find their security vulnerabilities. I don't know if I could compromise the New York Times network, but I think it's likely. Of course, I would only do it with authorization.
Your first crime involved fake bus transfers. Do you think if somebody had cracked down on you earlier, your life might have gone a different way?
I think it goes back to my high school days. In computer class, the first assignment was to write a program to print the first 100 Fibonacci numbers. Instead, I wrote a program that would steal passwords of students. My teacher gave me an A.
What made you a good hacker was less the coding skills and more the social-engineering skills. What were they?
Social engineering is using deception, manipulation and influence to convince a human who has access to a computer system to do something, like click on an attachment in an e-mail. Most of the computer compromises that we hear about use a technique called spear phishing, which allows an attacker access to a key person's workstation. It's extremely difficult to defend against.
Has social networking changed hacking?
Made it easier. I can go into LinkedIn and search for network engineers and come up with a list of great spear-phishing targets because they usually have administrator rights over the network. Then I go onto Twitter or Facebook and trick them into doing something, and I have privileged access. If I know you love Angry Birds, maybe I would send you an e-mail purporting to be from Angry Birds with a new pro version. Once you download it, I could have complete access to everything on your phone.
How easy was it for those tabloid reporters to hack into celebrities' phones?
This kind of boggles my mind. A lot of the cellular operators would create a default PIN for people's voice mail as 1111 or 1234. It doesn't take a hacker to guess a PIN like that.
What is the perfect PIN then?
The perfect PIN is not four digits and not associated with your life, like an old telephone number. It's something easy for you to remember and hard for other people to guess.
What do you think of people like Julian Assange and the WikiLeaks crowd?
It's more Bradley Manning who was responsible for all of that. Here's an enlisted guy who's able to dump secret documents from SIPRNet to CDs. It is a huge security failure on the part of the U.S. government--the worst that I know of.
Which of your hacks are you most proud of?
I think when I hacked into Pac Bell Cellular to do traffic analysis on the FBI agents who were tasked with capturing me--not for hacking into Pac Bell but for how I leveraged that information to stay one step ahead of the government.
You used Money's rankings of the 10 most livable cities to find places to hide. Should the FBI monitor that list?
No, it was just allowing Money to randomize my choice. If I had my own choice, somebody might have figured it out.
You served five years. How do hackers get treated in prison?
Pretty well. A Colombian drug dealer offered me $5 million to hack into the Bureau of Prisons network to get him an early release date. I said, "Let's talk."












Sunday 27 December 2015

DHIRU BHAI AMBANI : A TRUE STORY

                           DHIRUBHAI AMBANI 


The story of Reliance Industries (RIL) is almost folklore in India. It was founded in the late 1950s by the late Dhirubhai Ambani, a former petrol-pump attendant, who even in the 1960s lived in a one-room chawl in Mumbai with his wife and children.
The group’s interests now include the manufacture of synthetic fibres, textiles and petrochemical products, oil and gas exploration, petroleum refining, besides telecommunications, media, retail and financial services.
Dhirubhai showed he had that street smarts and a nose for profit early. While working in Aden, he spotted that local coins had a face value less than the value of the silver from which they were made. So he bought every coin he could, melted them down and pocketed the difference. “I don't believe in not taking opportunities,” he said, according to his unofficial biographer, Hamish McDonald.


Published in 1998, the book is still not available in Indian bookshops because the Ambanis have threatened legal action for anything they perceive as defamatory in the book.
But, truth to be told, it took a lot more than just opportunity to turn Reliance into a Rs 75,000-crore (Rs 750-billion) colossus by the time Dhirubhai passed away in 2002. It took a rare kind of genius to succeed where so many others have tried and failed.

Humble Beginnings 

Dhirubhai, born on 28 December, 1932, was the the third son of a school teacher in Gujarat. No one could have imagined then that the student of Junagadh’s Bahadur Kanji High School – who stopped studying after the tenth standard to join his elder brother, Ramniklal in Aden – would one day claim a rightful place among the richest men in the world.
In 1957, Dhirubhai arrived in Mumbai after spending 8 years in Aden (Yemen), he had only Rs 500 in his pocket. Now Rs 500 wasn't a pricely sum even back then but it had value and it allowed Dhirubhai to take his first steps in the world of business.
By 1958, when he started his first small trading venture, his family used to reside in a one room apartment at Jaihind Estate in Bhuleshwar. After trading in a range of products, primarily spices and fabrics, for eight years, Dhirubhai managed to become the owner of a small spinning mill at Naroda, near Ahmedabad. This was a turning point for him.

Blast Off



By 1976-77, Reliance had an annual turnover of Rs 70 crore (Rs 700 million). For many that would have been enough. But Dhirubhai was just getting started.
In 1977, Reliance Industries went public and raised equity capital from 58,000 investors, many of them located in small towns. From then onwards, Dhirubhai started extensively promoting his company’s textile brand name, Vimal. The story goes that on one particular day, the Reliance group chairman inaugurated the retail outlets of as many as 100 franchises.
But the deal-breaker in the eyes of his critics was how he managed to cultivate favours among the politicians. Indira Gandhi returned to power in the 1980 general elections and Dhirubhai shared a platform with the then prime minister of India at a victory rally. He had also allegedly become very close to the then finance minister Pranab Mukherjee, not to mention the prime minister’s principal aide R.K. Dhawan.

Negotiating Success



If you want to succeed in business, especially in India, your networking skills need to be simply superb. You need to have the right contacts to push your projects through and Dhirubhai had them. 
His admirers say that Ambani’s success came down to his financial acumen, innovations in marketing and technology, and project execution skills. But his critics will say that the consummate skills with which he could win friends and influence people were just as criticial. They say, that is what allowed him to bend and twist the license-permit system to his advantage.
As Dhirubhai once said: “We cannot change our rulers, but we can change the way they rule us.”

His rivals

Of course, success is never a one-way street. Dhirubhai Ambani had his rivals and they tried to bring him down in every way possible. This Rediff article sheds light on the rivalries:
“There is the fight-to-the-finish battle with Ramnath Goenka -- the fiery and fearless proprietor of the Indian Express; then the war with industrialist Nusli Wadia of Bombay Dyeing; the much publicised allegations against some Ambani staffers over a plot to murder Wadia; Reliance's travails during the V P Singh government, which almost brought the business house to its knees, and sundry other controversies over licensed capacities, export manipulation and share switching.”

But he survived all that – despite suffering a stroke in 1986 – and his company continued to grow. In the 1990s he turned aggressively toward petrochemicals, oil refining, telecommunications and financial services. When he breathed his last in 2002 – he was ranked by Forbes as the world’s 138th-richest person, with an estimated net worth of $2.9 billion.

How big are Reliance now?

India is home to 56 of the world’s 2,000 largest and most powerful public companies, according to the Forbes’s annual list and the Mukesh Ambani-led Reliance Industries Ltd leads the pack with a rank of 142 -- with a market value of $42.9 billion and $71.7 billion in sales. Their revenues are roughly equal to 2.8% of India’s GDP. It also contributes 8.2% of India’s total exports, 8% of the Government of India’s Indirect tax revenues. RIL is India’s largest exporter with exports constituting nearly 37% of its revenues.
Dhirubhai had a dream; he dreamt of India becoming a great economic superpower and through his life, he showed the country that nothing was impossible if you set your mind to it. If that isn't inspiration then nothing ever will be.

Tuesday 15 December 2015

Wordpress

WORDPRESS

      Image result for wordpress

WordPress started in 2003 with a single bit of code to enhance the typography of everyday writing and with fewer users than you can count on your fingers and toes. Since then it has grown to be the largest self-hosted blogging tool in the world, used on millions of sites and seen by tens of millions of people every day.
Everything you see here, from the documentation to the code itself, was created by and for the community. WordPress is an Open Source project, which means there are hundreds of people all over the world working on it. (More than most commercial platforms.) It also means you are free to use it for anything from your recipe site to a Fortune 500 web site without paying anyone a license fee and a number of other important freedoms.
A Little History
WordPress was born out of a desire for an elegant, well-architectured personal publishing system built on PHP and MySQL and licensed under the gplv2 (or later). It is the official successor of b2/cafelog. WordPress is fresh software, but its roots and development go back to 2001. It is a mature and stable product. We hope by focusing on user experience and web standards we can create a tool different from anything else out there.
 Features of wordpress-
  • Simplicity Simplicity makes it possible for you to get online and get publishing, quickly. Nothing should get in the way of you getting your website up and your content out there. WordPress is built to make that happen.
  • Flexibility With WordPress, you can create any type of website you want: a personal blog or website, a photoblog, a business website, a professional portfolio, a government website, a magazine or news website, an online community, even a network of websites. You can make your website beautiful with themes, and extend it with plugins. You can even build your very own application.
  • Publish with Ease If you’ve ever created a document, you’re already a whizz at creating content with WordPress. You can create Posts and Pages, format them easily, insert media, and with the click of a button your content is live and on the web.
  • Publishing Tools WordPress makes it easy for you to manage your content. Create drafts, schedule publication, and look at your post revisions. Make your content public or private, and secure posts and pages with a password.
  • User Management Not everyone requires the same access to your website. Administrators manage the site, editors work with content, authors and contributors write that content, and subscribers have a profile that they can manage. This lets you have a variety of contributors to your website, and let others simply be part of your community.
  • Media Management They say a picture says a thousand words, which is why it’s important for you to be able to quickly and easily upload images and media to WordPress. Drag and drop your media into the uploader to add it to your website. Add alt text, captions, and titles, and insert images and galleries into your content. We’ve even added a few image editing tools you can have fun with.
  • Full Standards Compliance Every piece of WordPress generated code is in full compliance with the standards set by the W3C. This means that your website will work in today’s browser, while maintaining forward compatibility with the next generation of browser. Your website is a beautiful thing, now and in the future.
  • Easy Theme System WordPress comes bundled with two default themes, but if they aren’t for you there’s a theme directory with thousands of themes for you to create a beautiful website. None of those to your taste? Upload your own theme with the click of a button. It only takes a few seconds for you to give your website a complete makeover.
  • Extend with Plugins WordPress comes packed full of features for every user, for every other feature there’s a plugin directory with thousands of plugins. Add complex galleries, social networking, forums, social media widgets, spam protection, calendars, fine-tune controls for search engine optimization, and forms.
  • Built-in Comments Your blog is your home, and comments provide a space for your friends and followers to engage with your content. WordPress’s comment tools give you everything you need to be a forum for discussion and to moderate that discussion.
  • Search Engine Optimized WordPress is optimized for search engines right out of the box. For more fine-grained SEO control, there are plenty of SEO plugins to take care of that for you.
  • Multilingual WordPress is available in more than 70 languages. If you or the person you’re building the website for would prefer to use WordPress in a language other than English, that’s easy to do.
  • Easy Installation and Upgrades WordPress has always been easy to install and upgrade. If you’re happy using an FTP program, you can create a database, upload WordPress using FTP, and run the installer. Not familiar with FTP? Plenty of web hosts offer one-click WordPress installers that let you install WordPress with, well, just one click!
  • Importers Using blog or website software that you aren’t happy with? Running your blog on a hosted service that’s about to shut down? WordPress comes with importers for blogger, LiveJournal, Movable Type, TypePad, Tumblr, and WordPress. If you’re ready to make the move, we’ve made it easy for you.
  • Own Your Data Hosted services come and go. If you’ve ever used a service that disappeared, you know how traumatic that can be. If you’ve ever seen adverts appear on your website, you’ve probably been pretty annoyed. Using WordPress means no one has access to your content. Own your data, all of it — your website, your content, your data.
                     Image result for wordpress
  • Freedom WordPress is licensed under the GPL which was created to protect your freedoms. You are free to use WordPress in any way you choose: install it, use it, modify it, distribute it. Software freedom is the foundation that WordPress is built on.
  • Community As the most popular open source CMS on the web, WordPress has a vibrant and supportive community. Ask a question on the support forums and get help from a volunteer, attend a WordCamp or Meetup to learn more about WordPress, read blogs posts and tutorials about WordPress. Community is at the heart of WordPress, making it what it is today.
Contribute You can be WordPress too! Help to build WordPress, answer questions on the support forums, write documentation, translate WordPress into your language, speak at a WordCamp, write about WordPress on your blog. Whatever your skill, we’d love to have you!

Developer features


For developers, we’ve got lots of goodies packed under the hood that you can use to extend WordPress in whatever direction takes your fancy.
  • Plugin System The WordPress APIs make it possible for you to create plugins to extend WordPress. WordPress’s extensibility lies in the thousands of hooks at your disposal. Once you’ve created your plugin, we’ve even got a plugin repository for you to host it on.
  • Theme System Create WordPress themes for clients, customers, and for WordPress users. The WordPress API provides the extensibility to create themes as simple or as complex as you wish. If you want to give your theme away for free you can give it to users in the Theme Repository
Application Framework If you want to build an application, WordPress can help with that too. Under the hood WordPress provides a lot of the features that your app will need, things like translations, user management, HTTP requests, databases, URL routing and much, much more.           


 Image result for wordpress



  • Custom Content Types WordPress comes with default content types, but for more flexibility you can add a few lines of code to create your own custom post types, taxonomies, and metadata. Take WordPress in whatever direction you wish.
The Latest Libraries WordPress comes with the latest script libraries for you to make use of. These include jQuery, Plupload, Underscore.js and Backbone.js. We’re always on the lookout for new tools that developers can use to make a better experience for our users.

                                      














Monday 14 December 2015

Sundar Pichai in SRCC College

  
                                       SUNDAR PICHAI
Google fans woke up to a surprise restructuring on Monday (Tuesday in India). One that the search-focused Google will now be a subsidiary of a new parent company called Alphabet inc. headed by the CEO of Google Larry Page. And replacing Page as the CEO of Google is India-born Sundar Pichai. From discovering what technology can do through a rotary telephone to running the show for Android - the most popular mobile OS, Google's newest CEO has come a long way.
1. Sundar Pichai was born in Chennai and his family of four (Pichai, his mother, his father and younger brother) lived in a two-room apartment. Pichai was the captain of his school cricket team and under him, the crew won several competitions in the region.
2. Growing up, Pichai had neither a television nor did his family own a car. They would either all hop on to their blue Lambretta scooter or use public transport.
3. The two sons slept in the living room. Pichai's mother was a stenographer until she had her sons and his father was an electrical engineer for the British conglomerate GEC and managed a factory that made electrical components. His father introduced him to technology, by sharing stories and challenges he faced during his work day.
4. For Pichai, the wonders of technology were revealed to him when the family bought their first telephone. Pichai was just 12 years old and the rotary helped him realise his talent for numerical recall. He could remember every number he dialled, but did not know at the time, how useful this skill would be in the future.
5. He studied metallurgical engineering at IIT Kharagpur and was described by his teachers as "the brightest of his batch". He eventually earned himself a scholarship at Stanford.
6. His father, Regunatha Pichai applied for a loan in order to pay for his air tickets and other miscellaneous expenses. When it didn't come through, Regunatha withdrew the required amount from the family's savings - it was more than his annual salary.
7. Pichai surprised his parents - though probably not pleasantly at the time - by dropping out of Stanford to work as an engineer and product manager at Applied Materials, a semiconductor maker in Silicon Valley. However, he got an MBA from Wharton in 2002 and did a stint at McKinsey as a consultant.
8. In 2004, Pichai joined Google and was part of a team that worked on Google's search toolbar. He later proposed that Google create its own browser, for which he won the support of all the co-founders, but an objection from then CEO Eric Schmidt. Today, according to Adobe, Google Chrome holds 32 per cent of the browser market on phones and desktop PC.
9. Another product under Pichai's watch was Android, the world's most popular mobile operating system. In 2012 Google announced a version of Pichai's Chrome browser for Android, which would replace the mobile browser Rubin had developed within his own group. Andy Rubin founded Android in 2003 and sold it to Google in 2005, after which he successfully navigated the OS to keep Apple from dominating the market for the next eight years. In 2013, Page handed responsibility for Android over to Pichai, when Rubin felt he would be unable to integrate Android with the rest of Google.
10. Though Google usually waits until the fall to announce their annual version of Android, Pichai previewed the next release at Google's annual developer event, I/O, in May. This change in timing, which seems like no big deal, actually addresses a large problem Android hardware makers face - which was that an announcement the fall gave them no time to prepare for the holidays and it put them at a disadvantage to the company selected every year to develop a phone in partnership with Google.

SUNDAR PICHAI TO VISIT SRCC COLLEGE
Google top boss Sundar Pichai who is making his way to India to meet with Prime Minister Narendra Modiwill also be making an appearance in Delhi University at the Shri Ram College of Commerce on December 17.Pichai will be addressing and interacting with students at the college during the session 'Ask Sundar'. "We had invited Pichai and after his meeting with the PM, he will be coming to address our students," said a source close to the college. While it is not confirmed, Pichai is likely to launch the Google's Android One smartphone in India.

Image result for sundar pichai








Sunday 11 October 2015

HARDWARE NETWORKING

                                  COMPUTER HARDWARE

It refers to objects that you can actually touch, like disksdisk drives,display screenskeyboardsprintersboards, and chips. In contrast,software is untouchable. Software exists as ideas, concepts, and symbols, but it has no substance.Books provide a useful analogy. The pages and the ink are the hardware, while the words, sentences, paragraphs, and the overall meaning are the software. A computer without software is like a book full of blank pages -- you need software to make the computer useful just as you need words to make a book meaningful.
                                             HARDWARE COMPONENTS
1.MOTHERBOARD
Now, the first thing is the motherboard. It's the basis of your computer. It's the first component installed in the system unit, and it holds all of the circuitry that ties the functions of the computer components together.
You can think of it like your car (which has many computer systems of its own). If you have a frame and tires, you've got a car (or you've got a system unit), but it won't take you very far! Now, add your engine - the motherboard - where all the systems tie in one way or another, and you've got the start of a working vehicle.
Image result for intel mother board
2.CENTRAL PROCESSING UNIT
The central processing unit, or the brains of the computer, sits on the motherboard and does actually have its own cooling fan. The processors now are so fast they need to be cooled down. All the instructions you give the computer - like a click of a mouse - go through the CPU, which processes in billions of cycles per second. 
Image result for cpu
3.RANDOM ACCESS MEMORY 
Random-access memory (RAM) is a type of computer data storage. A RAM device makes it possible to access data in random order, which makes it very fast to find a specific piece of information. Certain other types of storage are not random-access. For example, a hard disk drive and a CD will read and write data in a predetermined order. The mechanical design of these devices prescribes that data access is consecutive. This means that the time it takes to find a specific piece of information can vary greatly depending on where it is located on the disc.RAM devices are used in computer systems as the main memory. RAM is considered volatile memory, which means that the stored information is lost when there is no power. So, RAM is used by the central processing unit (CPU) when a computer is running to store information that needs to be used very quickly, but it does not store any information permanently.Present-day RAM devices use integrated circuits to store information. This is a relatively expensive form of storage and the cost per unit of storage is much higher than for devices like a hard drive. However, the time to access data is so much faster for RAM that speed outweighs cost. A computer therefore uses a certain amount of RAM for fast-access, temporary storage of information and a much larger amount of non-random, permanent mass storage, like a hard disk drive. For example, a typical computer system may have two to eight GB (gigabytes) of RAM. 
Image result for ram
3.CACHE MEMORY
Cache memory, also called CPU memory, is random access memory (RAM) that a computer microprocessor can access more quickly than it can access regular RAM. This memory is typically integrated directly with the CPU chip or placed on a separate chip that has a separate bus interconnect with the CPU.The basic purpose of cache memory is to store program instructions that are frequently re-referenced by software during operation. Fast access to these instructions increases the overall speed of the software program.As the microprocessor processes data, it looks first in the cache memory; if it finds the instructions there (from a previous reading of data), it does not have to do a more time-consuming reading of data from larger memory or other data storage devices.Most programs use very few resources once they have been opened and operated for a time, mainly because frequently re-referenced instructions tend to be cached. This explains why measurements of system performance in computers with slowerprocessors but larger caches tend to be faster than measurements of system performance in computers with faster processors but more limited cache space.Multi-tier or multilevel caching has become popular in server and desktop architectures, with different levels providing greater efficiency through managed tiering. Simply put, the less frequently access is made to certain data or instructions, the lower down the cache level the data or instructions are written.
Image result for cache memory
4.READ ONLY MEMORY(ROM)
Computer memory on which data has been prerecorded. Once data has been written onto a ROM chip, it cannot be removed and can only be read.Unlike main memory (RAM), ROM retains its contents even when the computer is turned off. ROM is referred to as being nonvolatile.
Image result for read only memory
TYPES OF ROM
Programmable Read-Only Memory (PROM)
Electrically Programmable Read-Only Memory (EPROM)
Electrically Erasable Programmable Read-Only Memory (EEPROM; also called Flash ROM)
Electrically Alterable Read-Only Memory (EAROM)

5.MOUSE
A device that controls the movement of the cursor or pointer in a display screen. A mouse is a small object you can roll along a hard, flat surface. Its name is derived from its shape, which looks a bit like a mouse, its connecting wire that one can imagine to be the mouse's tail, and the fact that one must make it scurry along a surface. As you move the mouse, the pointer on the display screen moves in the same direction. Mice contain at least one button and sometimes as many as three, which have different functions depending on what programe  is running. Some newer mice also include a scroll wheelfor scrolling through long documents.
Image result for mouse
6.KEYBOARD
A keyboard is the set of typewriter-like keys that enables you to enter data into a computer and other devices. Computer keyboards are similar to electric-typewriter keyboards but contain additional keys. 
Image result for keyboard
7.MODEM (mō´dem) (n.) Short for modulator-demodulator
A modem is a device or programe  that enables a computer to transmit data overfor example, telephone or cable lines. Computer information is stored digitally, whereas information transmitted over telephone lines is transmitted in the form of analog waves. A modem converts between these two forms.
Image result for modem