What is Abstraction Layer? You might have noticed the usage of this terminology in various technical article but ever wondered what this Abstraction Layer is? An abstraction layer or level of abstraction is a way to hide the way the things are running behind certain functionalities. The best known example of Abstraction Layer can be the OSI model for network protocols. Basic Examples … [Read more...]
Strategic Requirements for Including Cloud computing for Small Businesses
Strategic requirements for including cloud computing for small businesses are not limited to choosing the provider, platform but also calculating the risks. The outsourcing of business activities is a major change in the business processes in this decade and it should be well planned and supported using standardized methods and procedures of decision making. Before a company decides it needs for a … [Read more...]
Cloud Computing in Home Care Scenarios : Opportunities and Risks
Cloud Computing in Home Care Scenarios is based on real-world scenarios to analyze the opportunities and risks, as well as the practicality of such systems. With cloud computing, in information technology there is a current trend, which also opens up areas and industries that still have the networking of computer systems with lot of potential. This also includes the medical and healthcare … [Read more...]
OS X Mavericks Review
OS X Mavericks Review rather Micro Review highlighting only the significant points by a real user. All of the readers already has been overloaded with reviews - we will not make you to read pages after pages. Hardly a reader is either hesitating to buy RAM to upgrade or thinking to delay the purchase of a new Mac with Mavericks Pre-installed - these are the practical audience. Other part is who … [Read more...]
What Cloud Users Need to Know
What Cloud users need to know are legal aspects of the concept, Security and Privacy and Copyright and Licenses. We have answered the most important questions. Cloud computing demands input not only from the IT professionals and users, but also from the lawyers on the planning aspect - is not surprising. But, it is interesting that the legal arguments not primarily serve as limitations of the new … [Read more...]
Multi-Core Processor Based Computer vs. Multi-CPU Computer
Multi-Core Processor Based Computer vs. Multi-CPU Computer has differences. For Servers, Workstations the processors are multiple plus multi-core on one board. We wrote about Multi-Core Processors before.It is important to understand what is Workstation computer and the minute difference of Server Operating System Versus Desktop Operating System. Mac Pro is only practical consumer market … [Read more...]
MacBook Pro SuperDrive Keeps Ejecting CD/DVD Discs : Fix
A basic theory about the higher end Macs like MacPro, MacBook Pro etceteras is nothing but to consider it as your attention grabbing girlfriend. Apple uses the highest possible materials, now some glues are also used, but they are far better glue than HP uses. Some amusement before going through it. HP-Compaq uses cellotape inside. At least my one had such! One person in Google person supported … [Read more...]
64-bit Processors in Brief
64-bit Processors is an adjective used to indicate the Microarchitecture of CPU and ALU to describe the registers, address buses or data buses and as whole instructions of 64 bits (8 octets). We talked about 32 bit (x86) and 64 bit (x64) Virtualization in a previous article. From the perspective of software, 64-bit computing means using code with virtual memory addresses of 64-bit. 64-bit … [Read more...]
How Many Photos You Take and How You Select Them?
How many photos you take? How you select the good from them? This problem has always existed but has become more since the introduction of digital photography. In fact, now we can take hundreds, thousands of photos, at no cost. Previously, we talked about how to keep massive photo archive tidy - that can be a part of the solution, but in order to keep tidy, you need to sort them! Additionally, how … [Read more...]
Latest Authentication Technologies at a Glance
Latest authentication technologies for identity and access management strategy requires a good planning. Appropriate technologies and products must be tested. In this article, we will discuss about the latest authentication technologies in terms of encryption, access control, biometrics and authentication. The introduction of a modern identity and access management (IAM) can quickly find the key … [Read more...]
What is Software Defined Data Center (SDDC)?
What is Software Defined Data Center (SDDC)? The Software Defined Data Center is easier and cheaper to deploy IT resources for the next evolutionary step. Previously, we talked about Software Defined Datacenter in conjunction with VMware vFabric. First it is cost savings in respect to hardware, then the simplified, centralized administration and better availability of the systems that the trend … [Read more...]