Posts

Showing posts from 2015

Variant object,HTTP , Origin Content Server,Accept headers

Variant objects in the context of HTTP are objects served by an Origin Content Server in a type of transmitted data variation (i.e. uncompressed, compressed, different languages, etc.). HTTP/1.1 (1997?1999) introduces Content/Accept headers. These are used in HTTP requests and responses to state which variant the data is presented in.

Transport Layer Security,Secure Sockets Layer, by-product, message authentication,web browsing, electronic mail, Internet faxing, instant messaging, and voice-over-IP,transport layer

Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols designed to provide communications security over a computer network.They use X.509 certificates and hence asymmetric cryptography to authenticate the counterparty with whom they are communicating,and to negotiate a symmetric key. This session key is then used to encrypt data flowing between the parties. This allows for data/message confidentiality, and message authentication codes for message integrity and as a by-product, message authentication. Several versions of the protocols are in widespread use in applications such as web browsing, electronic mail, Internet faxing, instant messaging, and voice-over-IP (VoIP). An important property in this context is forward secrecy, so the short-term session key cannot be derived from the long-term asymmetric secret key. As a consequence of choosing X.509 certificates, certificate authorities and a public key infrastructure are necessary

Usage in social media,iPhone ,Widget, web experiences

End users primarily use widgets to enhance their personal web experiences, or the web experiences of visitors to their personal sites. The use of widgets has proven increasingly popular, where users of social media are able to add stand-alone applications to blogs, profiles and community pages. Widgets add utility in the same way that an iPhone application does. The developers of these widgets are often offering them as a form of sponsored content, which can pay for the cost of the development when the widgets' utility maps to the user's needs in a way where both parties gain. For example, a sports news brand might gain awareness and increased audience share in exchange for the utility of current game scores being instantly and dynamically available - the blog which posted the Sports score widget might gain in having a stickier site. Element of control One important factor with Widgets is that the host does not control the content. The content or the functionality it provides

TLS handshake,control,client and server

When the connection starts, the record encapsulates a "control" protocol the handshake messaging protocol  (content type 22). This protocol is used to exchange all the information required by both sides for the exchange of the actual application data by TLS. It defines the messages formatting or containing this information and the order of their exchange. These may vary according to the demands of the client and server i.e., there are several possible procedures to set up the connection. This initial exchange results in a successful TLS connection (both parties ready to transfer application data with TLS) or an alert message

Suffix proxy,web content ,bypassing,web filters

A suffix proxy allows a user to access web content by appending the name of the proxy server to the URL of the requested content (e.g. "en.wikipedia.org.SuffixProxy.com"). Suffix proxy servers are easier to use than regular proxy servers but they do not offer high levels of anonymity and their primary use is for bypassing web filters. However, this is rarely used due to more advanced web filters.

Shared web hosting service_Name-based,virtual hosting,shared IP hosting,multiple host,single machine

In name-based virtual hosting, also called shared IP hosting, the virtual hosts serve multiple host names on a single machine with a single IP address. This is possible because when a web browser requests a resource from a web server using HTTP/1.1 it includes the requested host name as part of the request. The server uses this information to determine which web site to show the user.

Shared web hosting service,Shared web hosting service,sits,Internet

A shared web hosting service refers to a web hosting service where many websites reside on one web server connected to the Internet. Each site "sits" on its own partition, or section/place on the server, to keep it separate from other sites. This is generally the most economical option for hosting, as many people share the overall cost of server maintenance.

Router,networking device,web pages, email, IM,DSL router,ISP networks, Internet backbone

A router is a networking device that forwards data packets between computer networks. A router is connected to two or more data lines from different networks (as opposed to a network switch, which connects data lines from one single network). When a data packet comes in on one of the lines, the router reads the address information in the packet to determine its ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey. This creates an overlay internetwork. Routers perform the "traffic directing" functions on the Internet. A data packet is typically forwarded from one router to another through the networks that constitute the internetwork until it reaches its destination node. q The most familiar type of routers are home and small office routers that simply pass data, such as web pages, email, IM, and videos between the home computers and the Internet. An example of a router would be the own

Quick Start Joomla Package,Joomla,CMS, modules,

Quick Start Package is fully functional Joomla package which contains CMS, modules, selected templates and plugins with the configurations and the data that is used in the demo website. The sample data can also be personalized based on the template in quick start package and is different from the default Joomla! 3.x (2.5.x) package.

Proxy server,web proxies,file, connection, web page

In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server and the proxy server evaluates the request as a way to simplify and control its complexity. Proxies were invented to add structure and encapsulation to distributed systems.Today, most proxies are web proxies, facilitating access to content on the World Wide Web and providing anonymity.

Programming on Linux,Compiler, LLVM, PHP, Perl, Ruby, Python QuickBASIC,Turbo BASIC programming

Linux distributions support dozens of programming languages. The original development tools used for building both Linux applications and operating system programs are found within the GNU toolchain, which includes the GNU Compiler Collection (GCC) and the GNU build system. Amongst others, GCC provides compilers for Ada, C, C++, Go and Fortran. Many programming languages have a cross-platform reference implementation that supports Linux, for example PHP, Perl, Ruby, Python, Java, Go, Rust and Haskell. First released in 2003, the LLVM project provides an alternative cross-platform open-source compiler for many languages. Proprietary compilers for Linux include the Intel C++ Compiler, Sun Studio, and IBM XL C/C++ Compiler. BASIC in the form of Visual Basic is supported in such forms as Gambas, FreeBASIC, and XBasic, and in terms of terminal programming or QuickBASIC or Turbo BASIC programming in the form of QB64. A common feature of Unix-like systems, Linux includes traditional specifi

Plesk Plesk Control Panel, Plesk Server Administrator, Novosibirsk, Russia, Plesk

Plesk (ex: Parallels Plesk Control Panel, Plesk Server Administrator, or just Plesk) software package is a commercial web hosting automation program. Originally released under the U.S. company Plesk Inc. and designed in Novosibirsk, Russia, Plesk was acquired by SWSoft in July 2003.SWSoft renamed themselves under the Parallels name (a brand which had been acquired by SWSoft) in 2008.

PHP_Mascot

The mascot of the PHP project is the elePHPant, a blue elephant with the PHP logo on its side, designed by Vincent Pontier. The elePHPant is sometimes differently colored when in plush toy form.

PHP ,Hypertext Preprocessor,server-side scripting language,Zend Engine, PHP interpreter

PHP is a server-side scripting language designed for web development but also used as a general-purpose programming language. As of January 2013, PHP was installed on more than 240 million websites (39% of those sampled) and 2.1 million web servers. Originally created by Rasmus Lerdorf in 1994, the reference implementation of PHP (powered by the Zend Engine) is now produced by The PHP Group.While PHP originally stood for Personal Home Page,it now stands for PHP: Hypertext Preprocessor, which is a recursive backronym. PHP code can be simply mixed with HTML code, or it can be used in combination with various templating engines and web frameworks. PHP code is usually processed by a PHP interpreter, which is usually implemented as a web server's native module or a Common Gateway Interface (CGI) executable. After the PHP code is interpreted and executed, the web server sends resulting output to its client, usually in form of a part of the generated web page; for example, PHP code can

Operating system support,Linux , Unix , Red Hat Network,FreeBSD, NetBSD, OpenBSD

Availability, price and employee familiarity often determines which operating systems are offered on dedicated servers. Variations of Linux and Unix (open source operating systems) are often included at no charge to the customer. Commercial operating systems include Microsoft Windows Server, provided through a special program called Microsoft SPLA. Red Hat Enterprise is a commercial version of Linux offered to hosting providers on a monthly fee basis. The monthly fee provides OS updates through the Red Hat Network using an application called yum. Other operating systems are available from the open source community at no charge. These include CentOS, Fedora Core, Debian, and many other Linux distributions or BSD systems FreeBSD, NetBSD, OpenBSD. Support for any of these operating systems typically depends on the level of management offered with a particular dedicated server plan. Operating system support may include updates to the core system in order to acquire the latest security fi

MySQL ,My Sequel,relational database management system,Linux, Apache, MySQL, Perl

MySQL officially, but also called  "My Sequel") is (as of July 2013) the world's second most[a] widely used relational database management system (RDBMS) and most widely used open-source RDBMS.It is named after co-founder Michael Widenius's daughter, My.The SQL acronym stands for Structured Query Language. The MySQL development project has made its source code available under the terms of the GNU General Public License, as well as under a variety of proprietary agreements. MySQL was owned and sponsored by a single for-profit firm, the Swedish company MySQL AB, now owned by Oracle Corporation. MySQL is a popular choice of database for use in web applications, and is a central component of the widely used LAMP open source web application software stack (and other 'AMP' stacks). LAMP is an acronym for "Linux, Apache, MySQL, Perl/PHP/Python." Free-software-open source projects that require a full-featured database management system often use MySQL. For

Mobile Web widget,mobile phone,tablet,personal computer,laptop computer

A Mobile Web widget has the same purpose and function as a web widget, but it is made for use on a mobile device such as mobile phone or tablet. In contrast, a web widget is on a personal computer or laptop computer

Microsoft SQL Server_Data storage,Microsoft SQL Server,Symmetric Round Down,database, index, allocation map,page number, page type, free space

Data storage is a database, which is a collection of tables with typed columns. SQL Server supports different data types, including primary types such as Integer, Float, Decimal, Char (including character strings), Varchar (variable length character strings), binary (for unstructured blobs of data), Text (for textual data) among others. The rounding of floats to integers uses either Symmetric Arithmetic Rounding or Symmetric Round Down (Fix) depending on arguments: SELECT Round(2.5, 0) gives 3. Microsoft SQL Server also allows user-defined composite types (UDTs) to be defined and used. It also makes server statistics available as virtual tables and views (called Dynamic Management Views or DMVs). In addition to tables, a database can also contain other objects including views, stored procedures, indexes and constraints, along with a transaction log. A SQL Server database can span multiple OS-level files with a maximum file size of 260 bytes (1 exabyte). The data in the database are s

Microsoft SQL Server_Buffer management,RAM ,checksum ,Buffer Manager, buffer cache,memory

SQL Server buffers pages in RAM to minimize disc I/O. Any 8 KB page can be buffered in-memory, and the set of all pages currently buffered is called the buffer cache. The amount of memory available to SQL Server decides how many pages will be cached in memory. The buffer cache is managed by the Buffer Manager. Either reading from or writing to any page copies it to the buffer cache. Subsequent reads or writes are redirected to the in-memory copy, rather than the on-disc version. The page is updated on the disc by the Buffer Manager only if the in-memory cache has not been referenced for some time. While writing pages back to disc, asynchronous I/O is used whereby the I/O operation is done in a background thread so that other operations do not have to wait for the I/O operation to complete. Each page is written along with its checksum when it is written. When reading the page back, its checksum is computed again and matched with the stored version to ensure the page has not been damag

Linux_Video input infrastructure,kernel-userspace,APIs , DVB API,userspace

Linux currently has two modern kernel-userspace APIs for handing video input devices: V4L2 API for video streams and radio, and DVB API for digital TV reception. Due to the complexity and diversity of different devices, and due to the large amount of formats and standards handled by those APIs, this infrastructure needs to evolve to better fit other devices. Also, a good userspace device library is the key of the success for having userspace applications to be able to work with all formats supported by those devices.

Microsoft SQL Server,relational database management system,Microsoft,database server,network ,workloads ,T-SQL,ANSI SQL

Microsoft SQL Server is a relational database management system developed by Microsoft. As a database server, it is a software product whose primary function is to store and retrieve data as requested by other software applications, be it those on the same computer or those running on another computer across a network (including the Internet). There are at least a dozen different editions of Microsoft SQL Server aimed at different audiences and for workloads ranging from small single-machine applications to large Internet-facing applications with many concurrent users. Its primary query languages are T-SQL and ANSI SQL.

Linux_User interface,CLI shells ,text-based user interfaces,userland,K Desktop Environment (KDE), GNOME, Cinnamon, Unity, LXDE, Pantheon and Xfce

The user interface, also known as the shell, is either a command-line interface (CLI), a graphical user interface (GUI), or through controls attached to the associated hardware, which is common for embedded systems. For desktop systems, the default mode is usually a graphical user interface, although the CLI is available through terminal emulator windows or on a separate virtual console. CLI shells are the text-based user interfaces, which use text for both input and output. The dominant shell used in Linux is the GNU Bourne-Again Shell (bash), originally developed for the GNU project. Most low-level Linux components, including various parts of the userland, use the CLI exclusively. The CLI is particularly suited for automation of repetitive or delayed tasks, and provides very simple inter-process communication. On desktop systems, the most popular user interfaces are the GUI shells, packaged together with extensive desktop environments, such as the K Desktop Environment (KDE), GNOME

Joomla_Extensions,components, modules, plugins, templates, and languages,boxes,login module,Joomla conversions

Joomla extensions extend the functionality of Joomla websites. Five types of extensions may be distinguished: components, modules, plugins, templates, and languages. Each of these extensions handles a specific function.     Components are the largest and most complex extensions. Most components have two parts: a site part and an administrator part. Every time a Joomla page loads, one component is called to render the main page body. Components produce the major portion of a page because a component is driven by a menu item.     Plugins are advanced extensions and are, in essence, event handlers. In the execution of any part of Joomla, a module or a component, an event may be triggered. When an event is triggered, plugins that are registered to handle that event execute. For example, a plugin could be used to block user-submitted articles and filter text. The line between plugins and components can sometimes be a little fuzzy. Sometimes large or advanced plugins are called components

Linux ,POSIX,Unix,computer operating system,open-source software development,automation controls, televisions and video game consoles

Linux is a Unix-like and mostly POSIX-compliant computer operating system assembled under the model of free and open-source software development and distribution. The defining component of Linux is the Linux kernel, an operating system kernel first released on 5 October 1991 by Linus Torvalds. The Free Software Foundation uses the name GNU/Linux to describe the operating system, which has led to some controversy. Linux was originally developed as a free operating system for Intel x86?based personal computers, but has since been ported to more computer hardware platforms than any other operating system.It is the leading operating system on servers and other big iron systems such as mainframe computers and supercomputers, but is used on only around 1.5% of desktop computers.Linux also runs on embedded systems, which are devices whose operating system is typically built into the firmware and is highly tailored to the system; this includes mobile phones, tablet computers, network routers

Joomla_Deployment,LAMP stack,control panels,Microsoft Web Platform Installer,PHP ,MySQL

Like many other web applications, Joomla may be run on a LAMP stack. Many web hosts have control panels for automatic installation of Joomla. On Windows, Joomla can be installed using the Microsoft Web Platform Installer, which automatically detects and installs dependencies, such as PHP or MySQL. Many web sites provide information on installing and maintaining Joomla sites.

Joomla,content management system (CMS),open-source,web content, web application framework,page caching, RSS feeds, printable versions of pages, news flashes, blogs, polls, search

Joomla is a free and open-source content management system (CMS) for publishing web content. It is built on a model view controller web application framework that can be used independently of the CMS. Joomla is written in PHP, uses object-oriented programming (OOP) techniques (since version 1.5) and software design patterns, stores data in a MySQL, MS SQL (since version 2.5), or PostgreSQL (since version 3.0) database, and includes features such as page caching, RSS feeds, printable versions of pages, news flashes, blogs, polls, search, and support for language internationalization. As of February 2014, Joomla has been downloaded over 50 million times.Over 7,700 free and commercial extensions are available from the official Joomla! Extension Directory, and more are available from other sources.It is estimated to be the second most used content management system on the Internet after WordPress.

Interface, Java, JavaScript, DHTML, Flash, Silverlight,operating system, Ajax, PHP

Through Java, JavaScript, DHTML, Flash, Silverlight and other technologies, application-specific methods such as drawing on the screen, playing audio, and access to the keyboard and mouse are all possible. Many services have worked to combine all of these into a more familiar interface that adopts the appearance of an operating system. General purpose techniques such as drag and drop are also supported by these technologies. Web developers often use client-side scripting to add functionality, especially to create an interactive experience that does not require page reloading. Recently, technologies have been developed to coordinate client-side scripting with server-side technologies such as PHP. Ajax, a web development technique using a combination of various technologies, is an example of technology which creates a more interactive experience.

I2P anonymous proxy,proxy network,anonymity,network ,communications ,I2P route,I2P runs

The I2P anonymous network ('I2P') is a proxy network aiming at online anonymity. It implements garlic routing, which is an enhancement of Tor's onion routing. I2P is fully distributed and works by encrypting all communications in various layers and relaying them through a network of routers run by volunteers in various locations. By keeping the source of the information hidden, I2P offers censorship resistance. The goals of I2P are to protect users' personal freedom, privacy, and ability to conduct confidential business. Each user of I2P runs an I2P router on their computer (node). The I2P router takes care of finding other peers and building anonymizing tunnels through them. I2P provides proxies for all protocols (HTTP, IRC, SOCKS, ...). The software is free and open-source, and the network is free of charge to use.

HTTP compression_Security implications,CRIME,HTTP compression,dubbed BREACH,SPDY header compression,BREACH

In 2012, a general attack against the use of data compression, called CRIME, was announced. While the CRIME attack could work effectively against a large number of protocols, including but not limited to TLS, and application-layer protocols such as SPDY or HTTP, only exploits against TLS and SPDY were demonstrated and largely mitigated in browsers and servers. The CRIME exploit against HTTP compression has not been mitigated at all, even though the authors of CRIME have warned that this vulnerability might be even more widespread than SPDY and TLS compression combined. In 2013, a new instance of the CRIME attack against HTTP compression, dubbed BREACH, was published. A BREACH attack can extract login tokens, email addresses or other sensitive information from TLS encrypted web traffic in as little as 30 seconds (depending on the number of bytes to be extracted), provided the attacker tricks the victim into visiting a malicious web link.All versions of TLS and SSL are at risk from BRE

HTTP compression,bandwidth utilization,web servers,browsers ,HTTP message,cached,transferred,Compression,Transfer-Encoding

HTTP compression is a capability that can be built into web servers and web clients to improve transfer speed and bandwidth utilization. HTTP data is compressed before it is sent from the server: compliant browsers will announce what methods are supported to the server before downloading the correct format; browsers that do not support compliant compression method will download uncompressed data. The most common compression schemes include gzip and Deflate, however a full list of available schemes is maintained by the IANA.Additionally, third parties develop new methods and include them in their products, for example the Google Shared Dictionary Compression Over HTTP (SDCH) scheme implemented in the Google Chrome browser and used on Google servers. There are two different ways compression can be done in HTTP. At a lower level, a Transfer-Encoding header field may indicate the payload of a HTTP message is compressed. At a higher level, a Content-Encoding header field may indicate th

HTML and the DOM,web development tools, DOM viewer,web browsers,CSS properties

HTML and DOM viewer and editor is commonly included in the built in web development tools. The difference between the HTML and DOM viewer, and the view source feature in web browsers is that the HTML and DOM viewer allow you to see the DOM as it was rendered in addition to allowing you to make changes to the HTML and DOM and see the change reflected in the page after the change is made. In addition to selecting and editing, the HTML elements panels will usually also display properties of the DOM object, such as display dimension, and CSS properties.

Drupal_Database abstraction,SQL queries,SQLite,database engine,PHP distribution,abstraction ,multi-site table

Prior to version 7, Drupal had functions that performed tasks related to databases, such as SQL query cleansing, multi-site table name prefixing, and generating proper SQL queries. In particular, Drupal 6 introduced an abstraction layer that allowed programmers to create SQL queries without writing SQL. Drupal 7 extends the data abstraction layer so that a programmer no longer needs to write SQL queries as text strings. It uses PHP Data Objects to abstract the database. Microsoft has written a database driver for their SQL Server.Drupal 7 supports the file-based SQLite database engine, which is part of the standard PHP distribution.

Drupal_Core modules, Blogs, books, comments, forums, and polls,OpenID support ,RSS feed, feed aggregator

Drupal core includes optional modules that can be enabled by the administrator to extend the functionality of the core website. The core Drupal distribution provides a number of features, including:     Access statistics and logging     Advanced search     Blogs, books, comments, forums, and polls     Caching and feature throttling for improved performance     Descriptive URLs     Multi-level menu system     Multi-site support     Multi-user content creation and editing     OpenID support     RSS feed and feed aggregator     Security and new release update notification     User profiles     Various access control restrictions (user roles, IP addresses, email)     Workflow tools (triggers and actions)

Drupal_Core themes,browser interface,color scheme,Color Module

Drupal includes core themes, which customize the "look and feel" of Drupal sites,for example, Garland and Bartik. The Color Module, introduced in Drupal core 5.0, allows administrators to change the color scheme of certain themes via a browser interface.

Drupal_Auto-update notification,administrator ,Drupal security,vulnerability

Drupal can automatically notify the administrator about new versions of modules, themes, or the Drupal core. It's important to update quickly after security updates are released. On October 15, 2014, a sql injection vulnerability was announced and update released.Two weeks later the Drupal security team released an advisory explaining that everyone should act under the assumption that any site not updated within 7 hours of the announcement are infected.Thus, it can be extremely important to apply these updates quickly and usage of a tool to make this process easier like drush is highly recommended.

Drupal_Accessibility,Web accessibility,framework,WAI-ARIA,administrator ,CSS

With the release of Drupal 7, Web accessibility has been greatly improved by the Drupal community.Drupal is a good framework for building sites accessible to people with disabilities, because many of the best practices have been incorporated into the program code Core. The accessibility team is carrying on the work of identifying and resolving accessibility barriers and raising awareness within the community. Drupal 7 started the adoption of WAI-ARIA support for Rich Internet Applications and this has been carried further in Drupal 8. There have been many improvements to both the visitor and administrator sides of Drupal, especially:     Drag and drop functionality     Improved color contrast and intensity     Adding skip navigation to Core themes     Adding labels by default for input forms     Fixing CSS display:none with consistent methods for hiding and exposing text onfocus. The community also added an accessibility gate for Core issues in Drupal 8.

Drupal,content-management framework,GNU General Public License,taxonomy,RSS feeds,menu management,MySQL, MongoDB, MariaDB, PostgreSQL, SQLite, or Microsoft SQL Server

Drupal is a free and open-source content-management framework written in PHP and distributed under the GNU General Public License. It is used as a back-end framework for at least 2.1% of all Web sites worldwide ranging from personal blogs to corporate, political, and government sites including WhiteHouse.gov and data.gov.uk.It is also used for knowledge management and business collaboration. The standard release of Drupal, known as Drupal core, contains basic features common to content management systems. These include user account registration and maintenance, menu management, RSS feeds, taxonomy, page layout customization, and system administration. The Drupal core installation can serve as a simple Web site, a single- or multi-user blog, an Internet forum, or a community Web site providing for user-generated content. As of April 2015, there are more than 30,000 free community-contributed addons, known as contributed modules, available to alter and extend Drupal's core capabili

DNS proxy ,Internet Domain Name Server,DNS records

A DNS proxy server takes DNS queries from a (usually local) network and forwards them to an Internet Domain Name Server. It may also cache DNS records.

DNS and Name Servers,IP number,Name Server,hosting provider

DNS stands for "Domain Name System." The domain name system acts like a large telephone directory and in that it's the master database, which associates a domain name such as www.wikipedia.org with the appropriate IP number. Consider the IP number something similar to a phone number: When someone calls www.wikipedia.org, the ISP looks at the DNS server, and asks "how do I contact www.wikipedia.org?" The DNS server responds, for example, "it can be found at: 216.198.221.66.". As the Internet understands it, this can be considered the phone number for the server, which houses the web site. When the domain name is registered/purchased on a particular registrar's "name server", the DNS settings are kept on their server, and in most cases point the domain to the Name Server of your hosting provider. This Name Server is where the IP number (currently associated with your domain name) resides.

cPanel ,web hosting,administrators,resellers, end-user,CentOS,Red Hat Enterprise Linux (RHEL),CloudLinux

cPanel is a Linux based web hosting control panel that provides a graphical interface and automation tools designed to simplify the process of hosting a web site. cPanel utilizes a 3 tier structure that provides capabilities for administrators, resellers, and end-user website owners to control the various aspects of website and server administration through a standard web browser. In addition to the GUI, cPanel also has command line and API-based access that allows third party software vendors, web hosting organizations, and developers to automate standard system administration processes. cPanel is designed to function either as a dedicated server or virtual private server. The latest cPanel version supports installation on CentOS, Red Hat Enterprise Linux (RHEL), and CloudLinux.cPanel 11.30 is the last major version to support FreeBSD. Application-based support includes Apache, PHP, MySQL, PostgreSQL, Perl, and BIND (DNS). Email based support includes POP3, IMAP, SMTP services. cPan

Cloud computing_Software as a service (SaaS),application software,databases,on-demand software,

In the business model using software as a service (SaaS), users are provided access to application software and databases. Cloud providers manage the infrastructure and platforms that run the applications. SaaS is sometimes referred to as "on-demand software" and is usually priced on a pay-per-use basis or using a subscription fee. In the SaaS model, cloud providers install and operate application software in the cloud and cloud users access the software from cloud clients. Cloud users do not manage the cloud infrastructure and platform where the application runs. This eliminates the need to install and run the application on the cloud user's own computers, which simplifies maintenance and support. Cloud applications are different from other applications in their scalability.which can be achieved by cloning tasks onto multiple virtual machines at run-time to meet changing work demand. Load balancers distribute the work over the set of virtual machines. This process is t

Cloud computing_Platform as a service,programming language,computing platform,Google App Engine

In the PaaS models, cloud providers deliver a computing platform, typically including operating system, programming language execution environment, database, and web server. Application developers can develop and run their software solutions on a cloud platform without the cost and complexity of buying and managing the underlying hardware and software layers. With some PaaS offers like Microsoft Azure and Google App Engine, the underlying computer and storage resources scale automatically to match application demand so that the cloud user does not have to allocate resources manually. The latter has also been proposed by an architecture aiming to facilitate real-time in cloud environments.Even more specific application types can be provided via PaaS, e.g., such as media encoding as provided by services as bitcodin transcoding cloud or media.io.

Cloud computing_Infrastructure as a service,Xen, Oracle VirtualBox, KVM, VMware ESX/ESXi,Hyper-V,virtual machines

In the most basic cloud-service model & according to the IETF (Internet Engineering Task Force), providers of IaaS offer computers ? physical or (more often) virtual machines ? and other resources. (A hypervisor, such as Xen, Oracle VirtualBox, KVM, VMware ESX/ESXi, or Hyper-V runs the virtual machines as guests. Pools of hypervisors within the cloud operational support-system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.) IaaS clouds often offer additional resources such as a virtual-machine disk image library, raw block storage, and file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.IaaS-cloud providers supply these resources on-demand from their large pools installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deplo

Cloud computing, metaphor,computer resources,utility

Cloud computing is a computing term or metaphor that evolved in the late 1990s, based on utility and consumption of computer resources. Cloud computing involves application systems which are executed within the cloud and operated through internet enabled devices. Purely cloud computing does not rely on the use of cloud storage as it will be removed upon users download action. Clouds can be classified as public, private and hybrid.

Apache HTTP Server, Apache,web server,NCSA,Unix-like system,NetWare,FreeBSD

The Apache HTTP Server, colloquially called Apache, is the world's most widely used web server software. Originally based on the NCSA HTTPd server, development of Apache began in early 1995 after work on the NCSA code stalled. Apache played a key role in the initial growth of the World Wide Web,quickly overtaking NCSA HTTPd as the dominant HTTP server, and has remained the most popular HTTP server since April 1996. In 2009, it became the first web server software to serve more than 100 million websites. Apache is developed and maintained by an open community of developers under the auspices of the Apache Software Foundation. Most commonly used on a Unix-like system (usually Linux),the software is available for a wide variety of operating systems, including Windows, OS X, Linux, Unix, FreeBSD, Solaris, NetWare, OS/2, TPF, OpenVMS and eComStation. Released under the Apache License, Apache is free and open-source software. As of June 2013, Apache was estimated to serve 54.2% of all

Dedicated hosting service,hosting solution,management,colocation,colocation facilities,HVAC systems,Dedicated servers,Hybrid server,Complex Managed Hosting

A dedicated hosting service, dedicated server, or managed hosting service is a type of Dedicated servers in which the client leases an entire server not shared with anyone else. This is more flexible than shared hosting, as organizations have full control over the server(s), including choice of operating system, hardware, etc. There is also another level of dedicated or managed hosting commonly referred to as complex managed hosting. Complex Managed Hosting applies to both physical dedicated servers, Hybrid server and virtual servers, with many companies choosing a hybrid (combination of physical and virtual) hosting solution. There are many similarities between standard and complex managed hosting but the key difference is the level of administrative and engineering support that the customer pays for ? owing to both the increased size and complexity of the infrastructure deployment. The provider steps in to take over most of the management, including security, memory, storage and IT

CGI Proxy,web proxy,Richard Windmann,demonstrate

A CGI web proxy accepts target URLs using a Web form in the user's browser window, processes the request, and returns the results to the user's browser. Consequently it can be used on a device or network that does not allow "true" proxy settings to be changed. The first recorded CGI proxy was developed by American computer scientist Richard Windmann. Some CGI proxies were set up for purposes such as making websites more accessible to disabled people, but have since been shut down due to excessive traffic, usually caused by a third party advertising the service as a means to bypass local filtering. Since many of these users don't care about the collateral damage they are causing, it became necessary for organizations to hide their proxies, disclosing the URLs only to those who take the trouble to contact the organization and demonstrate a genuine need.

Cloud Clients,Chromebook,desktop computers,aptops, tablets and smartphones

Users access cloud computing using networked client devices, such as desktop computers, laptops, tablets and smartphones. Some of these devices  ? cloud clients ? rely on cloud computing for all or a majority of their applications so as to be essentially useless without it. Examples are thin clients and the browser-based Chromebook. Many cloud applications do not require specific software on the client and instead use a web browser to interact with the cloud application. With Ajax and HTML5 these Web user interfaces can achieve a similar, or even better, look and feel to native applications. Some cloud applications, however, support specific client software dedicated to these applications (e.g., virtual desktop clients and most email clients). Some legacy applications (line of business applications that until now have been prevalent in thin client computing) are delivered via a screen-sharing technology.

Bandwidth Pooling,Dedicated Hosting,availability,multi-provider,multi-homed,Prominent players,gigabyte usage model

This is a key mechanism for hosting buyers to determine which provider is offering the right pricing mechanism of bandwidth pricing.[according to whom?] Most Dedicated Hosting providers bundle bandwidth pricing along with the monthly charge for the dedicated server. Let us illustrate this with the help of an example. An average $100 server from any of the common dedicated bandwidth providers would carry 2 TB of bandwidth. Suppose you purchased 10 servers then you would have the ability to consume 2 TB of bandwidth per server. However, let us assume that given your application architecture only 2 of these 10 servers are really web facing while the rest are used for storage, search, database or other internal functions then the provider that allows bandwidth pooling would let you consume overall 20 TB of bandwidth as incoming or outbound or both depending on their policy. The provider that does not offer bandwidth pooling would just let you use 4 TB of bandwidth, and the rest of the 16

Bandwidth and Connectivity,percentile,measurement,unmetered service,bandwidth overages,median measurement, Total transfer method, Unmetered method

Bandwidth refers to the data transfer rate or the amount of data that can be carried from one point to another in a given time period (usually a second) and is often represented in bits (of data) per second (bit/s). For example, visitors to your server, web site, or applications utilize bandwidth *Third ? Total Transfer (measured in bytes transferred) 95th percentile method Line speed, billed on the 95th percentile, refers to the speed in which data flows from the server or device, measured every 5 minutes for the month, and dropping the top 5% of measurements that are highest, and basing the usage for the month on the next-highest measurement. This is similar to a median measurement, which can be thought of as a 50th percentile measurement (with 50% of measurements above, and 50% of measurements below), whereas this sets the cutoff at 95th percentile, with 5% of measurements above the value, and 95% of measurements below the value. This is also known as Burstable billing. Line speed

Application server,application functions,specific implementation,Web applications,Application Server Frameworks,clustering,fail-over,load-balancing

An application server can be either a software framework that provides a generalized approach to creating an application-server implementation, regard to what the application functions are,or the server portion of a specific implementation instance. In either case, the server's function is dedicated to the efficient execution of procedures (programs, routines, scripts) for supporting its applied applications. Most Application Server Frameworks contain a comprehensive service layer model. An application server acts as a set of components accessible to the software developer through an API defined by the platform itself. For Web applications, these components are usually performed in the same running environment as its web server(s), and their main job is to support the construction of dynamic pages. However, many application servers target much more than just Web page generation: they implement services like clustering, fail-over, and load-balancing, so developers can focus on i

Anonymous HTTPS proxy

Users wanting to bypass web filtering, that want to prevent anyone from monitoring what they are doing, will typically search the internet for an open and anonymous HTTPS transparent proxy. They will then program their browser to proxy all requests through the web filter to this anonymous proxy. Those requests will be encrypted with https. The web filter cannot distinguish these transactions from, say, a legitimate access to a financial website. Thus, content filters are only effective against unsophisticated users. Use of HTTPS proxies are detectable even without examining the encrypted data, based simply on firewall monitoring of addresses for frequency of use and bandwidth usage. If a massive amount of data is being directed through an address that is within an ISP address range such as Comcast, it is likely a home-operated proxy server. Either the single address or the entire ISP address range is then blocked at the firewall to prevent further connections.

Advanced Network and Services

  Advanced Network and Services (ANS) was a United States non-profit organization formed in September 1990 by the NSFNET partners (Merit Network, IBM, and MCI) to run the network infrastructure for the soon to be upgraded NSFNET Backbone Service.