• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here:Home » Archives for Abhishek Ghosh

Articles by Dr. Abhishek Ghosh

Here is something about Dr. Abhishek Ghosh

Dr. Abhishek Ghosh is a businessman, surgeon, author, blogger. You can contact him by using this form.

Dr. Abhishek Ghosh
Dr. Abhishek Ghosh is a surgeon, editor of The Customize Windows. You can contact him via the email address admin@thecustomizewindows.com or may be you can text/Whatsapp him on his cell phone +919831836673 or send postal letter to the below address.
F-04/502, Peerless Nagar, 29F B.T. Road, Panihati, City - Kolkata, State - West Bengal, PIN700114,India.
And this website, The Customize Windows
can be found on Google Maps as The Customize Windows which is located at 22.572646, 88.363895 precisely.
Here is the usual author box of his profile followed by the list of articles with excerpt written by Dr. Abhishek Ghosh within this website.

By Abhishek Ghosh November 4, 2013 5:14 am Updated on November 4, 2013

WebRTC or Web Real-Time Communication

WebRTC or Web Real-Time Communication is a programming interface which is currently at the stage of draft in the W3C for voice call, video chat, file sharing. Programming interface here means API which was discussed before.WebRTC or Web Real-Time Communication is a dedicated list, which was created in April 2011 and a working group within the IETF created in May 2011. It is an example of software … [Read more...]

By Abhishek Ghosh November 3, 2013 4:48 am Updated on November 3, 2013

Cloud Based WebApp for Patient Interview : Prototype

Cloud Based WebApp for Patient Interview can be conducted over the Internet and we will consider the advantages and disadvantages in this context. The development of information technology in recent decades has led to changes in many industries. Even the health is affected by this and terms such as eHealth and telemedicine, which since the late nineties, underscoring this change. However, in the … [Read more...]

By Abhishek Ghosh November 2, 2013 9:41 am Updated on November 2, 2013

Cloud Computing in Small Business : Outlook

Cloud Computing in Small Business such as ERP, also shows expected competitive advantages through cloud until the competitor has implemented a similar model. This article is an outlook based on our previous three articles - Strategic Requirements for Including Cloud computing for Small Businesses, Opportunities and Risks of Cloud Computing for Small Business and Use of Cloud Computing in Small … [Read more...]

By Abhishek Ghosh November 2, 2013 4:42 am Updated on November 2, 2013

Command and Control Server and Technologies

Command and Control Server are centralized servers which are able to send commands and a part of Botnet. Botnet is group of computers to run automated program. The bots (came from the English words - "robots") can run on the networked computers whose network connections are available as well as on local resources and collect the available data. So, as can be understood, Command and Control Server … [Read more...]

By Abhishek Ghosh November 1, 2013 3:51 am Updated on November 1, 2013

Google+ Custom URL : Interesting Findings

Google+ Custom URL email request gave us time to do some research as we received two emails one is regular email and one for Google Apps for one person. Obviously, none of them are created deliberately - one is associated with AdWords, AdSense accounts and the another is this domain's one email which is binded with Google Apps. It is quite obvious, only one was taken / claimed. Other email was not … [Read more...]

By Abhishek Ghosh October 31, 2013 8:05 pm Updated on October 31, 2013

Sandbox in Computer Security

Sandbox allows the execution of software(s) with less risk to the operating system. These are often used to execute untested code of dubious origin. We talked about Advanced Persistent Threats or APT in an older article, also we mentioned we use Sandbox mode to check them. The term Sandbox is also used in a broader sense to refer to a test environment for software or websites - we are not talking … [Read more...]

By Abhishek Ghosh October 31, 2013 11:34 am Updated on October 31, 2013

Advanced Persistent Threat

Advanced Persistent Threat (APT) is a terminology which is often used in the area of cyber threats (cyber attack) for describing the complex, purposeful and effective attack on critical IT infrastructures and confidential data from public authorities, large- and medium-sized enterprises from all sectors, which represent potential victims because of their technological lead. In the course of such … [Read more...]

By Abhishek Ghosh October 31, 2013 5:19 am Updated on October 31, 2013

Use of Cloud Computing in Small Business

Use of Cloud Computing in Small Business is important from the aspect of economy - in contrast to large firms, small firms often have little financial reserve. According to numerous media reports, cloud computing will revolutionize the PC and Internet usage in the coming years in the private and business environment. Often we read about the considerable advantages of the new approach through the … [Read more...]

By Abhishek Ghosh October 30, 2013 9:53 pm Updated on October 30, 2013

How to Analyze Network Traffic to Detect Advanced Persistent Threats

Many IT workers feel more like firemen than like networking professionals. They detect network attacks, respond to them and move on to the next problem. However, putting out fires is an ineffective approach because research has shown that most cyber attacks are not one-time events. They are a series of ongoing attacks designed to probe a network's weakness and compromise it. While knowing that … [Read more...]

By Abhishek Ghosh October 30, 2013 6:13 pm Updated on October 30, 2013

Google Plus Custom URL : Short is Open to All

Google Plus Custom URL, that is the short URL is now open to all. Google is sending invitation Emails in the first phase with Pop up prompt to get Custom URL. As all business are associated with my father's name, my father received multiple invitations from Google via email to grab the Google Plus Custom URL. It appears that, AdWords and AdSense users - whose addresses are actually verified via … [Read more...]

By Abhishek Ghosh October 30, 2013 9:03 am Updated on October 30, 2013

LaTeX – Details and Softwares for using LaTeX

LaTeX is a typesetting system for document preparation and works as document markup language. LaTeX uses the TeX typesetting program for formatting the output. Previously we wrote about Markdown Syntax, LaTeX is geared especially towards the creation of books, scientific and technical documents containing mathematical formulas. LaTeX is pronounced like Lahtekh. T, E, X in the name are capital … [Read more...]

  • « Previous Page
  • 1
  • …
  • 420
  • 421
  • 422
  • 423
  • 424
  • …
  • 786
  • Next Page »

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

vpsdime

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Cloud-Powered Play: How Streaming Tech is Reshaping Online GamesSeptember 3, 2025
  • How to Use Transcribed Texts for MarketingAugust 14, 2025
  • nRF7002 DK vs ESP32 – A Technical Comparison for Wireless IoT DesignJune 18, 2025
  • Principles of Non-Invasive Blood Glucose Measurement By Near Infrared (NIR)June 11, 2025
  • Continuous Non-Invasive Blood Glucose Measurements: Present Situation (May 2025)May 23, 2025
PC users can consult Corrine Chorney for Security.

Want to know more about us?

Read Notability and Mentions & Our Setup.

Copyright © 2026 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy