Find and Search for various articles and features about Information Technology

Is Cloud Computing Good for a Bigger Site with Millions of Page Views

Is Cloud Computing Good for a Bigger Site with Millions of Page Views? My answer to this question purely depends on the architecture  and functionality of the site. Today’s world techies are really talking about cloud computing. Is it really worth it using a cloud computing? The answer to this question purely depends on the technology(…)

When Do You Park a Domain Name

To ensure that we are all talking about the same thing when I say “domain name”, let me briefly mention that a domain name is a name like “”. Loosely speaking, it’s the address of your website. Normally, if someone wants to set up a website, he/she will need to pay a small annual fee(…)

Google is developing an operating system (OS) for personal computers

Google Chrome OS will be aimed initially at small, low-cost netbooks, but will eventually be used on PCs as well. Google said netbooks with Chrome OS could be on sale by the middle of 2010. “Speed, simplicity and security are the key aspects of Google Chrome OS,” the firm said in its official blog. The(…)

Firefox 3.5 Final Officially Released

Firefox 3.5 makes surfing the Web easier and more enjoyable with exciting new features and platform updates that allow Web developers to create the next generation of Web content. Native support for open video and audio, private browsing, and support for the newest Web technologies will enable richer, more interactive online experiences. Performance. Firefox 3.5(…)

Introduction to Apache Lucene and Solr

Lucene is a Java-based search library. It was initially written over 10 years ago by Doug Cutting, who had worked on two search engines before that, including the once popular Excite Internet service. Lucene was one of the first 3rd generation search capabilities. Like Google and Microsoft’s recently acquired Fast, Lucene has an architecture that(…)

A Brief to WEB 2.0

WEB 2.0 is the second generation of web development and design which provides communication , secure information sharing and collaboration on world wide web. Evolution of WEB 2.0 created a lot of web communities which interacts each other, applications such as social networking sites , video and audio sharing sites , blogs etc. Main Characteristics of(…)

What is netfilter?

Netfilter is a framework for packet mangling, outside the normal Berkeley socket interface. It has four parts. Firstly, each protocol defines “hooks” (IPv4 defines 5) which are well-defined points in a packet’s traversal of that protocol stack. At each of these points, the protocol will call the netfilter framework with the packet and the hook(…)

Excel@Japanese! – The Japanese Language Proficiency Test or general reading fluency

Excel@Japanese is a new way to learn vocabulary and Kanji quickly to prepare you for all levels of the Japanese Language Proficiency Test or general reading fluency. Download the Excel@Japanese spreadsheet to learn up to 7000 Japanese words and their Kanji Features Covers all Kanji vocabulary words from all JLPT levels. We will be adding(…)

Nokia Open Source Web browser for S60 Smartphones

Nokia unveiled the new Web browser for its world leading smartphone software, S60 platform aimed to provide smartphone users with a true Web experience when browsing full Web pages on the Internet using a smartphone. “The new Web browser for S60 is based on the WebCore and JavaScriptCore components of Apple’s Safari Web Kit, the industry’s smallest(…)

What Is Samba ?

Samba is a big, complex project. The Samba project is ambitious and exciting. The team behind Samba is a group of some thirty individuals who are spread the world over and come from an interesting range of backgrounds. This team includes scientists, engineers, programmers, business people, and students. Team members were drawn into active participation(…)

How to Protect against the vulnerabilities

Protecting against zero day vulnerability exploitation is a matter of great concern for most system administrators. To reduce the impact of a zero day attack, follow best business practices such as: Adopt a deny-all stance on firewalls and perimeter devices that protect internal networks Separate public-facing servers from internal systems Turn off unneeded services and(…)

How to Protect against P2P Software Vulnerabilities

Standard users should not be permitted to install software. Restrict Administrative and Power User level privileges to support personnel acting in their support capacity. If a user must have Administrative or Power User privileges, create a separate account to be used for his/her daily office functions, Internet surfing and on-line communication. Use tools such as(…)