The topic is quite commonly asked by the webmasters. Here is a List of Open Source Question and Answer Software, Better Known as Q&A software. Most Are Standalone PHP MySQL Web Software, Some Are Simple WordPress Plugins. Some of these are exactly like Quora, some are like Stack Exchange, some looks quite different. Since there are many dedicated Q&A sites emerged as multi-million dollar … [Read more...]
WordPress and Paid GNU GPL Themes
WordPress and Paid GNU GPL Themes combination is always a matter of debate. Here is some clarification about the Paid Themes and Paid GNU GPL Themes as a whole. The question arose as one visitor from WordPress dot org Forum bounced from the forum and hit us a direct email asking for clarifying the practical part as we on that thread declined to provide any support/help for a paid theme. It was … [Read more...]
Zoom Lens : Design and Technical Details
Zoom Lens contains the word zoom, means a quick motion indicating the capability of changing focal length. Technical know how of zoom lens is discussed in this article. We have a basic article on Zoom Lens too - Zoom Lens and Digital Photography. Also common designations such as varifocal lens or Vario system are used to indicate this Zoom Lens. While the zoom and varifocal lenses hold constant … [Read more...]
WebRTC or Web Real-Time Communication
WebRTC or Web Real-Time Communication is a programming interface which is currently at the stage of draft in the W3C for voice call, video chat, file sharing. Programming interface here means API which was discussed before.WebRTC or Web Real-Time Communication is a dedicated list, which was created in April 2011 and a working group within the IETF created in May 2011. It is an example of software … [Read more...]
Cloud Based WebApp for Patient Interview : Prototype
Cloud Based WebApp for Patient Interview can be conducted over the Internet and we will consider the advantages and disadvantages in this context. The development of information technology in recent decades has led to changes in many industries. Even the health is affected by this and terms such as eHealth and telemedicine, which since the late nineties, underscoring this change. However, in the … [Read more...]
Cloud Computing in Small Business : Outlook
Cloud Computing in Small Business such as ERP, also shows expected competitive advantages through cloud until the competitor has implemented a similar model. This article is an outlook based on our previous three articles - Strategic Requirements for Including Cloud computing for Small Businesses, Opportunities and Risks of Cloud Computing for Small Business and Use of Cloud Computing in Small … [Read more...]
Sandbox in Computer Security
Sandbox allows the execution of software(s) with less risk to the operating system. These are often used to execute untested code of dubious origin. We talked about Advanced Persistent Threats or APT in an older article, also we mentioned we use Sandbox mode to check them. The term Sandbox is also used in a broader sense to refer to a test environment for software or websites - we are not talking … [Read more...]
Advanced Persistent Threat
Advanced Persistent Threat (APT) is a terminology which is often used in the area of cyber threats (cyber attack) for describing the complex, purposeful and effective attack on critical IT infrastructures and confidential data from public authorities, large- and medium-sized enterprises from all sectors, which represent potential victims because of their technological lead. In the course of such … [Read more...]
Use of Cloud Computing in Small Business
Use of Cloud Computing in Small Business is important from the aspect of economy - in contrast to large firms, small firms often have little financial reserve. According to numerous media reports, cloud computing will revolutionize the PC and Internet usage in the coming years in the private and business environment. Often we read about the considerable advantages of the new approach through the … [Read more...]
How to Analyze Network Traffic to Detect Advanced Persistent Threats
Many IT workers feel more like firemen than like networking professionals. They detect network attacks, respond to them and move on to the next problem. However, putting out fires is an ineffective approach because research has shown that most cyber attacks are not one-time events. They are a series of ongoing attacks designed to probe a network's weakness and compromise it. While knowing that … [Read more...]
LaTeX – Details and Softwares for using LaTeX
LaTeX is a typesetting system for document preparation and works as document markup language. LaTeX uses the TeX typesetting program for formatting the output. Previously we wrote about Markdown Syntax, LaTeX is geared especially towards the creation of books, scientific and technical documents containing mathematical formulas. LaTeX is pronounced like Lahtekh. T, E, X in the name are capital … [Read more...]