Tuesday, December 20, 2011

Data Visualization



The concept of data visualization is really fascinating, and clearly can be explained only with an illustration. Data visualization is the use of graphics and images to present information clearly, and you will find that almost all companies use this concept to help connect ideas and data together. Instead of having to store all information in his head, viewing these concepts make it much easier for you to organize your thoughts, literally. Read More

Thursday, December 15, 2011

Buying Optical Transceiver Modules


 SFP modules can be connected to small form factor. The modules are considered the updated version of the GBIC. GBIC is a half size larger, while SFP fiber interfaces to use a minimum. Achieving transport can range from 500 meters to 120 km +. They are easy to change and easy to work. XENPAK Modules are the largest in the 10G transceiver interfaces and includes a dual fiber SC interface. Cisco SFP modules are available in multi-mode and single mode fiber optic cable and copper wire to operate. 15 meters is the length of a normal transmission module copper. 300 meters is the transmission range of multi-lines.

XFP transceivers are designed for network applications, 10G, 10G Ethernet included. The standard for the development of these was created by some of the leading manufacturers in the field. Basic care and change, also hot pluggable small. This module is used in combination with multimode laser. GBIC stands for giga-bit interface converter. This works the transformation of optical information in a form for the Ethernet network to a form of fiber optic network. This module is added to the networks to fiber optic patch cords. GBIC rating is determined on its wavelength, bit rate optical power, and range. It is hot pluggable, which allows a port to be changed to another without having to shut down the switch or router.

Optical Networking Solutions is an industry that keeps growing and growing. The above list is just some of the optical options you must choose. Again, finding the right distributor will be as important as the education of optical transceivers, and how they work.

Saturday, December 10, 2011

CSS Id and Class


The id selector
The id selector is used to specify a style for a single, unique element. The id selector uses the id attribute of the HTML element, and is defined with a “#”. And the style rule below will be applied to the element with id=”paral”;
Example:
# paral{text-align:center;color:red;}
The class selector
The class selector is used to specify a style for a group of elements. Unlike the id selector, the class selector is most often used on several elements. This allows you to set a particular style for many HTML elements with the same class. The class selector uses the HTML Class attribute, and is defined with a. In the example below, all HTML elements with class=”center” will be center –aligned;
Example:
.center{text-align:center;}
  

What do you mean by CSS?


We all know that CSS stands for cascading style sheets. Styles define how to display HTML elements and Styles were added to HTML 4.0 to solve a problem and External Style sheets can save a lot of work. At last External style Sheets are stored in CSS file.
CSS Syntax: A CSS rule has two main parts: a selector, and one or more declarations.
H1 {color:blue; font-size:12px;}
CSS example: p{color:red;text-align:center;}
CSS comments: comments are used to explain your code and may help you when you edit the source code  at a later date. Comments are ignored by browsers.  A CSS comment begins with”/*”, and ends with”*/”, like this:
/*This is a comment*/
P
{
Text-align:center;
/* This is another comment*/
Color:black;
font-family:arial;
}

Wednesday, November 30, 2011

Disadvantages and security concerns of RFID Cards

 

Despite its convenience and speed of processing, RFID cards have a number of disadvantages and greater concern for the safety of traditional means of credit processing. Scanning devices that can be purchased online cheap, anyone can access the card details just walking by someone with an RFID card in your wallet or purse. The owner of the credit account will not have any indication that your card has been accessed by the scanner. Once the thief has the information of the card, which theoretically can be used to make purchases by phone or internet or have a separate card with that information created for use on swiped transactions.

Some RFID card issuers have created new security measures to make it more difficult or impossible for thieves to analyze the data with unauthorized devices. According to the Smart Card Alliance, contact less
Read More


 

TRANSPOSITIONS


The goal of substitution is confusion; the encryption method is an attempt to make it difficult for a cryptanalyst or intruder to determine how a message and key were transformed into cipher text. A transposition is an encryption in which the letters of the message are rearranged.  With transposition is, the cryptography aims for diffusion, widely spreading the information from the message or the key across the ciphertext. Transpositions try to break established patterns. Because a transposition is a rearrangement of the symbols of a message, it is also known as a permutation.

Tuesday, September 13, 2011

Dangerous Domains in Internet


After an exhaustive analysis of more than 27 million Web sites and see if there is any kind of malware or spam threat, suspicious or pop ups affiliations aggressive Macafee came up with a list of the 5 domains hazards and name below:

1. . COM (Commercial) 31.3%

2. . INFO (Information) 30.7%

3. . VN (Vietnam) 29.4%

4. . CM (Cameroon) 22.2%

5. . AM (Armenia) 12.1%

The results suggest that the. Com is the domain that are most at risk despite being the most used by the Internet, or rather why, since it is proven the trend of hackers to focus on media and crowded platforms especially when it comes to spam. Follows. Info, not as used as the. Com, but just importante.En list domains are also found in countries like Vietnam, Cameroon and Armenia.

The report also reveals the five safest domains among which include:

1. . TRAVEL (Travel and Tourism Industry) .02%

2. . EDU (Educational) .05%

3. . JP (Japan) 08%

4. . CAT (Catalan) 09%

5. . GG (Guernsey) .10%

The domain of mobile telephony. Mobile, but also among the safest, is also the most should pay the network atención.El risk has increased since last year and cybercriminals are quick to attack their victims and tend to change tactics often to avoid being caught.

Therefore it is important to note this information if we surf the web with caution and avoid infections reach our computers.Read More