Author: Rahul Reddy

VMware is a cloud computing and virtualization technology company that has its headquarters in California, United States. It is a leading technology in the field of hardware virtualization which allows the users worldwide to install and use virtual machines with operating systems such as windows, Linux etc. on various hosts. It also allows systems to migrate virtual machines between the hosts (Suse, 2020). These Virtual machines are mainly used to test applications that can only be run on some specific operating system which is not present on the user’s system. Instead of installing the operating system on the whole system,…

Read More

An embedded system is the fusion of hardware components and software designed to form specific and dedicated functions either as an independent system or as a component of a more extensive procedure. Embedded systems are based on the core principle of providing computations in real-time physical environments. Furthermore, the embedded systems may have fixed functionality or be programmable, depending on the system they are part of. These systems have a range of applications and are used in industrial machines, manufacturing, electronic, and healthcare equipment, among others (Lutkevich, 2019). Embedded systems are generally computing devices and may vary from having no…

Read More

Introduction The advancement in modern technologies and the use of IoT have been reaching new heights with every minute passing. By using these devices and technologies, a huge amount of data is gathered and analyzed; this data is known as big data. This data can be of different types such as structured, semi-structured or unstructured. All these data types are useful in extracting useful insights that can be used for various purposes. Big data analytics has the tendency to provide organizations with deep insights from large volumes of data gathered from multifarious data sources. The example of the results of…

Read More

SAN A storage area network is a network of storage devices dedicated to providing a shared pool of storage for each computer. It also appears as if this pool of storage is connected directly to the computer. This interconnected network of hosts, switches and storage devices can be connected to a computer using various protocols. All the fibre channel is supposed to be the original protocol for data transportation. Still, the same can be done by fibre channels over Ethernet internet, small computing system interface(Used in small and mid-sized organisations) and InfiniBand(used in high-performance computing environments). (al-Aswad & ALWAJEH, 2020)…

Read More

DoS attack- Denial of service or DoS attack is an attempt made by attacker to slow down the target machine so that its intended users cannot access it. Ins DoS attack, target machine or server is flooded with TCP and UDP requests. Attackers mainly perform DoS attack to restrict victim’s access server or a particular resource by making the target machine unavailable for its intended user. In DoS attack, target system’s operations and functions are delayed so that an authorized and trusted user cannot access computer resources, meanwhile attacker compromised target system. DoS attacks are mainly performed to stop and…

Read More

Introduction In essence, technology is advancing every day to new heights, but to build these technologies, there is a long process where a lot of services, hardware and software are significantly required. This includes infrastructure requirements, development tools, testing platforms, software licensing, computing resources and many more. To get all these services, a considerable cost needs to be spent. Cloud computing provides all these services over the internet at lower prices. It refers to the on-demand delivery of IT resources through the internet on a pay-as-you-go basis. These services include hardware, middleware and software services and can be accessed remotely.…

Read More

In this digitalised era, technologies are increasing every day for fulfilling the requirements and demands of customers. Everything in this modern era is based upon the internet (mobile society) that is from sending messages to one another to paying all the bills online. For this, customers require high-speed wireless access whereas, in recent years, Wi-Fi is getting faster day by day so as to overcome the challenges faced by customers while accessing the internet from anywhere and at any time. In the last decade, most people have moved online due to increased services provided by Wi-Fi. Introduction to Wi-Fi Wi-Fi…

Read More

What is a server? A server is a device capable of providing many computers with resources such as computational power, data storage facility, security for data, and a wide range of programs such as operating systems and applications for productivity purposes. This device focuses on fulfilling the clients’ requests to perform any function or provide any service. All the organisations in the world are using servers as engines to power themselves and make advancements by providing the organisation’s network, devices and infrastructure with sufficient resources (INGALLS, 2021). Servers have taken computing beyond the scope of a traditional computer as it…

Read More

Introduction For the purpose of enabling communication over the internet, there exists a significant need for a unique identifier for hardware, unlike email addresses, so that communication can be established. Without having a unique identifier for a device, it is impossible to initiate communication over the internet is impossible. Unique identifier here refers to an IP address that lays out standards as well as rules for routing and connecting devices to the internet globally. Primarily, this protocol provides a set of rules which certainly needs to be followed by every user for the purpose of bidirectional data flow. IP addresses…

Read More

Introduction Over the past few decades, the security threat has been potentially considered the cause of an unwanted event that is likely to damage a network or a system. To combat cyber-related attacks, there exists an essential need for deploying high-end security systems to certify that several folds maintain confidentiality, integrity and availability. Companies could use several security mechanisms to safeguard networks from unauthorised users, such as demilitarized zone, intrusion detection systems, sandboxing, dedicated firewalls, and network segmentation. One of the most effective security mechanisms which can be used on the network is the RADIUS server. An acronym used for…

Read More