Google
 

Wednesday, February 27, 2008

Computer Network Security

Business Directory Listings
Network Security Services: Rackspace
Managed hosting solutions with a comprehensive suite of security technologies. 0% downtime with money-back guarantee. 24x7 live "Fanatical Support."
Network Security Services
Get HughesNet Broadband. Broadband Business Solutions for your Business. Choose which HughesNet Business solution is right for you!
Network Monitoring Tool
Offers a secure remote PC management application featuring an administration toolkit, monitoring and alerts, and a console for enterprise deployment.
Featured Picks
Securing the Wireless Network of Your Small Business
So you have joined the revolution and set up a wireless network in your office. Congratulations. But with the great freedom that wireless brings comes ...
Top 10 Network Security Mistakes
Businesses use networking to connect their employees to one another and create a productive shared work environment. However, in their haste to get the network ...
Small Business Network Server Security
If you have a server-based network, it is critically important to protect your server from hackers, viruses, and other malicious software. If your server is ...
Related Articles
1-20 (of 19385) related articles Sort by: Relevance Date Items per page
102050100200
1. Securing the Wireless Network of Your Small Business
So you have joined the revolution and set up a wireless network in your office. Congratulations. But with the great freedom that wireless brings comes ... (ARTICLE)
2. Top 10 Network Security Mistakes
Businesses use networking to connect their employees to one another and create a productive shared work environment. However, in their haste to get the network ... (ARTICLE)
3. Small Business Network Server Security
If you have a server-based network, it is critically important to protect your server from hackers, viruses, and other malicious software. If your server is ... (ARTICLE)
4. What elements of Internet security are key to achieving rapid growth and...
Entrepreneurs are uniquely driven when it comes to information technology purchases. They are primarily motivated by cost savings vs. top-line benefits. This can also translate ... (ARTICLE)
5. Wireless networking seems to be the way of the future, but what about...
You're wise to be concerned about security when implementing wireless networking products. Luckily, there is an easy solution to protect your data and your network.(ARTICLE)
6. How Do I Reduce Online Credit Card Fraud?
Find out how to guard against credit card fraud online.(ANSWER ARTICLE)
7. How Can I Protect My Work Passwords?
Learn how to use passphrases and other techniques to increase password security.(ANSWER ARTICLE)
8. Figuring Out Encryption
When you send information through the Internet, it gets relayed from machine to machine, and along the way, if someone really cares, she may be ... (BOOK EXCERPT ARTICLE)
9. Five Rules for Developing a Safe and Sane Password Protocol for Your Small...
Even with the very latest and greatest antivirus software and the most powerful hardware firewall, your company's passwords could be leaving you open to hackers ... (ARTICLE)
10. Cryptography Strategy: Maximize Encryption Storage
Many different types of encryption storage serve anyone from home users to major corporations. There are online encrypted storage "vaults" for individuals to server farms ... (BOOK EXCERPT ARTICLE)
11. How Do I Know I'm on a Secure Site?
Learn how to avoid being a victim of online scams and fake Web sites.(ANSWER ARTICLE)
12. DDoS Attack Mitigation: Potential Solutions
HEADNOTE Protection against distributed denial of service must begin before traffic goes to the enterprise One of the biggest ongoing challenges in networking continues to ... (PERIODICAL ARTICLE)
13. Personal firewalls protect vulnerable PCs
In a world of remote/mobile users and wireless access points, every endpoint PC extends your network perimeter. Obviously home PCs are targets of worms and ... (PERIODICAL ARTICLE)
14. Symantec targets enterprise with desktop firewall
HEADNOTE Some say these personal firewalls will become more important than traditional corporate firewalls. CUPERTINO, CALIF. - Symantec this week will ship its first desktop ... (PERIODICAL ARTICLE)
15. What network IDSs can - and can't - do
Network intrusion-detection systems as a product class have been under attack recently, fueled by a series of recent Gartner reports, one of which was called ... (PERIODICAL ARTICLE)
16. The anti-DDoS prescription
HEADNOTE The Issue HEADNOTE WILL THESE NEW DDoS SECURITY PRODUCTS BE THE CURE? IMAGE PHOTOGRAPH 4 Jay Adelson, CTO Equinix, is encouraged by some anti-DoS ... (PERIODICAL ARTICLE)
17. GFI LANguard Network Security Scanner 3.1 available now.
Worldwide Computer Products News-21 January 2003-GFI LANguard Network Security Scanner 3.1 available now(C)1995-2003 M2 COMMUNICATIONS LTD http://www.m2.com Content and network security software developer GFI has ... (PERIODICAL ARTICLE)
18. GFI releases GFI LANguard Network Security Scanner 7.0.
Worldwide Computer Products News-22 November 2005-GFI releases GFI LANguard Network Security Scanner 7.0(C)1995-2005 M2 COMMUNICATIONS LTD http://www.m2.com Network security, content security and messaging software provider ... (PERIODICAL ARTICLE)
19. Network security: it's not just about computers anymore.
The new economy exposes businesses in new ways, like denial-of-service attacks. The denial-of-service attacks that recently hit such high-profile Web sites as eBay.com and Amazon.com ... (PERIODICAL ARTICLE)
20. New technology news in brief
Feel safe with Interceptor Interceptor is the latest in network firewalls from eSoft, designed to meet firewall security standards defined by the International Computer Security ...

Computer Science

From Wikipedia, the free encyclopedia
Jump to: navigation, search

This article or section seems to contain embedded lists that may require cleanup.To meet Wikipedia's style guidelines, please help improve this article by: removing items which are not notable, encyclopedic, or helpful from the list(s); incorporating appropriate items into the main body of the article; and discussing this issue on the talk page.
Computer science (or computing science) is the study of the theoretical foundations of information and computation and their implementation and application in computer systems.[1][2][3] Computer science has many sub-fields; some emphasize the computation of specific results (such as computer graphics), while others relate to properties of computational problems (such as computational complexity theory). Still others focus on the challenges in implementing computations. For example, programming language theory studies approaches to describing computations, while computer programming applies specific programming languages to solve specific computational problems. A further subfield, human-computer interaction, focuses on the challenges in making computers and computations useful, usable and universally accessible to people.
Contents[hide]
1 History
2 Major achievements
3 Relationship with other fields
4 Fields of computer science
4.1 Mathematical foundations
4.2 Theory of computation
4.3 Algorithms and data structures
4.4 Programming languages and compilers
4.5 Concurrent, parallel, and distributed systems
4.6 Software engineering
4.7 System architecture
4.8 Communications
4.9 Databases
4.10 Artificial intelligence
4.11 Visual rendering (or Computer graphics)
4.12 Human-Computer Interaction
4.13 Scientific computing
4.14 Didactics of computer science/informatics
5 Computer science education
6 See also
7 References
8 External links
8.1 Webcasts

[edit] History
Main article: History of computer science
The early foundations of what would become computer science predate the invention of the modern digital computer. Machines for calculating fixed numerical tasks, such as the abacus, have existed since antiquity. Wilhelm Schickard built the first mechanical calculator in 1623.[4] Charles Babbage designed a difference engine in Victorian times (between 1837 and 1901)[5] helped by Ada Lovelace.[6] Around 1900, the IBM corporation sold punch-card machines.[7] However, all of these machines were constrained to perform a single task, or at best some subset of all possible tasks.
During the 1940s, as newer and more powerful computing machines were developed, the term computer came to refer to the machines rather than their human predecessors. As it became clear that computers could be used for more than just mathematical calculations, the field of computer science broadened to study computation in general. Computer science began to be established as a distinct academic discipline in the 1960s, with the creation of the first computer science departments and degree programs.[8] Since practical computers became available, many applications of computing have become distinct areas of study in their own right.
Many initially believed it impossible that "computers themselves could actually be a scientific field of study" (Levy 1984, p. 11), though it was in the "late fifties" (Levy 1984, p.11) that it gradually became accepted among the greater academic population. It is the now well-known IBM brand that formed part of the computer science revolution during this time. IBM (short for International Business Machines) released the IBM 704 and later the IBM 709 computers, which were widely used during the exploration period of such devices. "Still, working with the IBM [computer] was frustrating...if you had misplaced as much as one letter in one instruction, the program would crash, and you would have to start the whole process over again" (Levy 1984, p.13). During the late 1950s, the computer science discipline was very much in its developmental stages, and such issues were commonplace.
Time has seen significant improvements in the usability and effectiveness of computer science technology. Modern society has seen a significant shift from computers being used solely by experts or professionals to more a more widespread user base. By the 1990s, computers became accepted as being the norm within everyday life. During this time data entry was a primary component of the use of computers, many preferring to streamline their business practices through the use of a computer. This also gave the additional benefit of removing the need of large amounts of documentation and file records which consumed much-needed physical space within offices.

[edit] Major achievements
This short section requires expansion.

German military used the Enigma machine during World War II for communication they thought to be secret. The large-scale decryption of Enigma traffic at Bletchley Park was an important factor that contributed to Allied victory in WWII.[9]
Despite its relatively short history as a formal academic discipline, computer science has made a number of fundamental contributions to science and society. These include:
Applications within computer science
A formal definition of computation and computability, and proof that there are computationally unsolvable and intractable problems.[10]
The concept of a programming language, a tool for the precise expression of methodological information at various levels of abstraction.[11]
Applications outside of computing
Sparked the Digital Revolution which led to the current Information Age and the internet.[12]
In cryptography, breaking the Enigma machine was an important factor contributing to the Allied victory in World War II.[9]
Scientific computing enabled advanced study of the mind and mapping the human genome was possible with Human Genome Project.[12] Distributed computing projects like http://en.wikipedia.org/wiki/Folding@home explore protein folding.
Algorithmic trading has increased the efficiency and liquidity of financial markets by using artificial intelligence, machine learning and other statistical/numerical techniques on a large scale.[13]

[edit] Relationship with other fields

Wikiquote has a collection of quotations related to:
Edsger Dijkstra
Computer science is frequently derided by the sentence "Any field which has to have 'science' in its name isn't one." This was placed in print by physicist Richard Feynman in his Lectures on Computation (1996).
Despite its name, a significant amount of computer science does not involve the study of computers themselves. Because of this, several alternative names have been proposed. Danish scientist Peter Naur suggested the term datalogy, to reflect the fact that the scientific discipline revolves around data and data treatment, while not necessarily involving computers. The first scientific institution to use the term was the Department of Datalogy at the University of Copenhagen, founded in 1969, with Peter Naur being the first professor in datalogy. The term is used mainly in the Scandinavian countries. Also, in the early days of computing, a number of terms for the practitioners of the field of computing were suggested in the Communications of the ACM—turingineer, turologist, flow-charts-man, applied meta-mathematician, and applied epistemologist.[14] Three months later in the same journal, comptologist was suggested, followed next year by hypologist.[15] Recently the term computics has been suggested.[16] Infomatik was a term used in Europe with more frequency.
The renowned computer scientist Edsger Dijkstra stated, "Computer science is no more about computers than astronomy is about telescopes." The design and deployment of computers and computer systems is generally considered the province of disciplines other than computer science. For example, the study of computer hardware is usually considered part of computer engineering, while the study of commercial computer systems and their deployment is often called information technology or information systems. Computer science is sometimes criticized as being insufficiently scientific, a view espoused in the statement "Science is to computer science as hydrodynamics is to plumbing", credited to Stan Kelly-Bootle[17] and others. However, there has been much cross-fertilization of ideas between the various computer-related disciplines. Computer science research has also often crossed into other disciplines, such as artificial intelligence, cognitive science, physics (see quantum computing), and linguistics.
Computer science is considered by some to have a much closer relationship with mathematics than many scientific disciplines.[8] Early computer science was strongly influenced by the work of mathematicians such as Kurt Gödel and Alan Turing, and there continues to be a useful interchange of ideas between the two fields in areas such as mathematical logic, category theory, domain theory, and algebra.
The relationship between computer science and software engineering is a contentious issue, which is further muddied by disputes over what the term "software engineering" means, and how computer science is defined. David Parnas, taking a cue from the relationship between other engineering and science disciplines, has claimed that the principal focus of computer science is studying the properties of computation in general, while the principal focus of software engineering is the design of specific computations to achieve practical goals, making the two separate but complementary disciplines.[18]
The academic political and funding aspects of computer science tend to have roots as to whether a department in the U.S. formed with either a mathematical emphasis or an engineering emphasis. In general, electrical engineering-based computer science departments have tended to succeed as computer science and/or engineering departments.[citation needed] Computer science departments with a mathematics emphasis and with a numerical orientation consider alignment computational science. Both types of departments tend to make efforts to bridge the field educationally if not across all research.

[edit] Fields of computer science
Computer science searches for concepts and formal proofs to explain and describe computational systems of interest. As with all sciences, these theories can then be utilised to synthesize practical engineering applications, which in turn may suggest new systems to be studied and analysed. While the ACM Computing Classification System can be used to split computer science up into different topics of fields, a more descriptive breakdown follows:

[edit] Mathematical foundations
Mathematical logic
Boolean logic and other ways of modeling logical queries; the uses and limitations of formal proof methods.
Number theory
Theory of proofs and heuristics for finding proofs in the simple domain of integers. Used in cryptography as well as a test domain in artificial intelligence.
Graph theory
Foundations for data structures and searching algorithms.
Type theory
Formal analysis of the types of data, and the use of these types to understand properties of programs, especially program safety.
Category theory
Category theory provides a means of capturing all of math and computation in a single synthesis.
Computational geometry
The study of algorithms to solve problems stated in terms of geometry.
Numerical analysis
Foundations for algorithms in discrete mathematics, as well as the study of the limitations of floating point computation, including round-off errors.

[edit] Theory of computation
Main article: Theory of computation
Automata theory
Different logical structures for solving problems.
Computability theory
What is calculable with the current models of computers. Proofs developed by Alan Turing and others provide insight into the possibilities of what can be computed and what cannot.
Computational complexity theory
Fundamental bounds (especially time and storage space) on classes of computations.
Quantum computing theory
Representation and manipulation of data using the quantum properties of particles and quantum mechanism.

[edit] Algorithms and data structures
Analysis of algorithms
Time and space complexity of algorithms.
Algorithms
Formal logical processes used for computation, and the efficiency of these processes.
Data structures
The organization of and rules for the manipulation of data.

[edit] Programming languages and compilers
Compilers
Ways of translating computer programs, usually from higher level languages to lower level ones.
Interpreters
A program that takes in as input a computer program and executes it.
Programming languages
Formal language paradigms for expressing algorithms, and the properties of these languages (e.g., what problems they are suited to solve).

[edit] Concurrent, parallel, and distributed systems
Concurrency
The theory and practice of simultaneous computation; data safety in any multitasking or multithreaded environment.
Distributed computing
Computing using multiple computing devices over a network to accomplish a common objective or task and thereby reducing the latency involved in single processor contributions for any task.
Parallel computing
Computing using multiple concurrent threads of execution.

[edit] Software engineering
Algorithm design
Using ideas from algorithm theory to creatively design solutions to real tasks
Computer programming
The practice of using a programming language to implement algorithms
Formal methods
Mathematical approaches for describing and reasoning about software designs.
Reverse engineering
The application of the scientific method to the understanding of arbitrary existing software
Software development
The principles and practice of designing, developing, and testing programs, as well as proper engineering practices.

[edit] System architecture
Computer architecture
The design, organization, optimization and verification of a computer system, mostly about CPUs and memory subsystems (and the bus connecting them).
Computer organization
The implementation of computer architectures, in terms of descriptions of their specific electrical circuitry
Operating systems
Systems for managing computer programs and providing the basis of a useable system.

[edit] Communications
Computer audio
Algorithms and data structures for the creation, manipulation, storage, and transmission of digital audio recordings. Also important in voice recognition applications.
Networking
Algorithms and protocols for reliably communicating data across different shared or dedicated media, often including error correction.
Cryptography
Applies results from complexity, probability and number theory to invent and break codes.

[edit] Databases
Data mining
Data mining is the extracting of the relevant data from all the sources of data
Relational databases
Study of algorithms for searching and processing information in documents and databases; closely related to information retrieval.

[edit] Artificial intelligence
Artificial intelligence
The implementation and study of systems that exhibit an autonomous intelligence or behaviour of their own.
Artificial life
The study of digital organisms to learn about biological systems and evolution.
Automated reasoning
Solving engines, such as used in Prolog, which produce steps to a result given a query on a fact and rule database.
Computer vision
Algorithms for identifying three dimensional objects from one or more two dimensional pictures.
Machine learning
Automated creation of a set of rules and axioms based on input.
Natural language processing/Computational linguistics
Automated understanding and generation of human language
Robotics
Algorithms for controlling the behavior of robots.

[edit] Visual rendering (or Computer graphics)
Computer graphics
Algorithms both for generating visual images synthetically, and for integrating or altering visual and spatial information sampled from the real world.
Image processing
Determining information from an image through computation.

[edit] Human-Computer Interaction
Human computer interaction
The study of making computers and computations useful, usable and universally accessible to people, including the study and design of computer interfaces through which people use computers.

[edit] Scientific computing
Bioinformatics
The use of computer science to maintain, analyse, and store biological data, and to assist in solving biological problems such as protein folding, function prediction and phylogeny.
Cognitive Science
Computational modelling of real minds
Computational chemistry
Computational modelling of theoretical chemistry in order to determine chemical structures and properties
Computational neuroscience
Computational modelling of real brains
Computational physics
Numerical simulations of large non-analytic systems
Numerical algorithms
Algorithms for the numerical solution of mathematical problems such as root-finding, integration, the solution of ordinary differential equations and the approximation/evaluation of special functions.
Symbolic mathematics
Manipulation and solution of expressions in symbolic form, also known as Computer algebra.

[edit] Didactics of computer science/informatics
Main article: Didactics of informatics
The subfield didactics of computer science focuses on cognitive approaches of developing competencies of computer science and specific strategies for analysis, design, implementation and evaluation of excellent lessons in computer science.

[edit] Computer science education
Some universities teach computer science as a theoretical study of computation and algorithmic reasoning. These programs often feature the theory of computation, analysis of algorithms, formal methods, concurrency theory, databases, computer graphics and systems analysis, among others. They typically also teach computer programming, but treat it as a vessel for the support of other fields of computer science rather than a central focus of high-level study.
Other colleges and universities, as well as secondary schools and vocational programs that teach computer science, emphasize the practice of advanced computer programming rather than the theory of algorithms and computation in their computer science curricula. Such curricula tend to focus on those skills that are important to workers entering the software industry. The practical aspects of computer programming are often referred to as software engineering. However, there is a lot of disagreement over what the term "software engineering" actually means, and whether it is the same thing as programming.
See Peter J. Denning, Great principles in computing curricula, Technical Symposium on Computer Science Education, 2004.

[edit] See also

Computer science Portal
Main list: List of basic computer science topics
Career domains in computer science
English in computer science
Women in computer science
Computing
Informatics
List of academic computer science departments
List of computer science conferences
List of open problems in computer science
List of prominent pioneers in computer science
List of publications in computer science
List of software engineering topics
List of computer scientists

[edit] References
^ "Computer science is the study of information" Department of Computer and Information Science, Guttenberg Information Technologies
^ "Computer science is the study of computation." Computer Science Department, College of Saint Benedict, Saint John's University
^ "Computer Science is the study of all aspects of computer systems, from the theoretical foundations to the very practical aspects of managing large software projects." Massey University
^ Nigel Tout (2006). Calculator Timeline. Vintage Calculator Web Museum. Retrieved on 2006-09-18.
^ Science Museum - Introduction to Babbage. Retrieved on 2006-09-24.
^ A Selection and Adaptation From Ada's Notes found in "Ada, The Enchantress of Numbers," by Betty Alexandra Toole Ed.D. Strawberry Press, Mill Valley, CA. Retrieved on 2006-05-04.
^ IBM Punch Cards in the U.S. Army. Retrieved on 2006-09-24.
^ a b Denning, P.J. (2000). "Computer Science: The Discipline". Encyclopedia of Computer Science. 
^ a b David Kahn, The Codebreakers, 1967, ISBN 0-684-83130-9.
^ Constable, R.L. (March 2000). "Computer Science: Achievements and Challenges circa 2000".
^ Abelson, H.; G.J. Sussman with J.Sussman (1996). Structure and Interpretation of Computer Programs, 2nd Ed., MIT Press. ISBN 0-262-01153-0. “The computer revolution is a revolution in the way we think and in the way we express what we think. The essence of this change is the emergence of what might best be called procedural epistemology — the study of the structure of knowledge from an imperative point of view, as opposed to the more declarative point of view taken by classical mathematical subjects.”
^ a b http://www.cis.cornell.edu/Dean/Presentations/Slides/bgu.pdf
^ Black box traders are on the march The Telegraph, August 26, 2006
^ Communications of the ACM 1(4):p.6
^ Communications of the ACM 2(1):p.4
^ IEEE Computer 28(12):p.136
^ Computer Language, October 1990
^ Parnas, David L. (1998). "Software Engineering Programmes are not Computer Science Programmes". Annals of Software Engineering 6: 19–37. , p. 19: "Rather than treat software engineering as a subfield of computer science, I treat it as an element of the set, {Civil Engineering, Mechanical Engineering, Chemical Engineering, Electrical Engineering, ....}."
Association for Computing Machinery. 1998 ACM Computing Classification System. 1998.
IEEE Computer Society and the Association for Computing Machinery. Computing Curricula 2001: Computer Science. December 15, 2001.
Peter J. Denning. Is computer science science?, Communications of the ACM, April 2005.
Levy, Steven (1984). Hackers: Heroes of the Computer Revolution. Doubleday. ISBN 0-385-19195-2.
Donald E. Knuth. Selected Papers on Computer Science, CSLI Publications, Cambridge Univ. Press, 1996.

Tuesday, February 26, 2008

IT Business Edge--Your Source for Technology News!

Welcome to IT Business Edge--Your Source for Technology News!IT Business Edge is your free technology intelligence agent. Our staff of veteran journalists and researchers pull information from 100's of sources daily to bring you only the most critical insights on your top IT priorities. You know you need to keep on top of many topics to stay ahead in your IT career. As a subscriber you will save many hours with our free service plus you will find fresh new information from many sources you may not have known existed! You are under no obligation if you subscribe and you may easily cancel your subscription at any time.
Subscribe today to start receiving these benefits:
Weekly e-mail reports summarizing critical news, research and analysis about your top business technology priorities
Special reports, updates and offers
Daily updates and critical insights on your top IT priorities on our web site
Free white papers and other useful files from our library
Start your free subscription by choosing your weekly reports below!

FREE IT MANAGEMENT EBOOK IMMEDIATELY WITH YOUR SUBSCRIPION!
IT Management 101:Fundamentals to Achieve More
As part of your subscription, you will receive Mike Sisco's landmark book that every person with responsibility for IT Management should read. This book contains over 100 pages of practical IT Management advice. Instructions for downloading this book are provided immediately upon subscribing in your subscription confirmation e-mail.

IT Management 101 provides expert guidance and step-by-step advice on these critical management tasks:

1. Understanding Your Company's Needs
2. Assessing Organizational Strengths
3. Establishing 90-Day Objectives
4. Defining Your One-Year Game Plan
5. Keeping a Scorecard
6. Communicating Successes

Welcome to IT Business Edge--Your Source for Technology News!IT Business Edge is your free technology intelligence agent. Our staff of veteran journalists and researchers pull information from 100's of sources daily to bring you only the most critical insights on your top IT priorities. You know you need to keep on top of many topics to stay ahead in your IT career. As a subscriber you will save many hours with our free service plus you will find fresh new information from many sources you may not have known existed! You are under no obligation if you subscribe and you may easily cancel your subscription at any time.
Subscribe today to start receiving these benefits:

Weekly e-mail reports summarizing critical news, research and analysis about your top business technology priorities

Special reports, updates and offers

Daily updates and critical insights on your top IT priorities on our web site

Free white papers and other useful files from our library
Start your free subscription by choosing your weekly reports below!

:: Subscribe To Our Reports ::
Select your IT Priorities:
Daily Edge Learn More
Aligning IT & Business Goals Learn More
Maximizing IT Investments Learn More
Managing Compliance Standards Learn More
Integrating the Enterprise Learn More
Optimizing Infrastructure Learn More
Fortifying Network Security Learn More
Voice & Data Convergence Learn More
Leveraging Open Source Learn More
Your E-mail Address

FREE IT MANAGEMENT EBOOK IMMEDIATELY WITH YOUR SUBSCRIPION!
IT Management 101:Fundamentals to Achieve More
As part of your subscription, you will receive Mike Sisco's landmark book that every person with responsibility for IT Management should read. This book contains over 100 pages of practical IT Management advice. Instructions for downloading this book are provided immediately upon subscribing in your subscription confirmation e-mail.

IT Management 101 provides expert guidance and step-by-step advice on these critical management tasks:

* Understanding Your Company's Needs
* Assessing Organizational Strengths
* Establishing 90-Day Objectives
* Defining Your One-Year Game Plan
* Keeping a Scorecard
* Communicating Successes

:: A Little Information About Our Reports ::
Daily Edge
Keep up-to-date with the best interviews, opinions and expert commentary from IT Business Edge's editors and industry leaders, delivered daily to your inbox.

Aligning IT & Business Goals
The yearly IT budget exercise is not nearly enough to keep up with the speed of change, and long-term IT projects may become irrelevant even if they meet specifications and are finished on time. Keep in touch with your company's long-term goals to keep your team's work relevant.

Maximizing IT Investments
Companies that get the most out of their IT investments generally follow the five basic steps of value capture. The steps are simple and logical, but too often IT and business executives skip one or more steps and therefore fail to realize value from IT implementations.

Managing Compliance Standards
Compliance efforts must go beyond legislative imperatives such as SABOX and HIPAA to expose vital internal data not only to auditors but also to internal decision makers. It requires more than just a new software package; IT leaders must re-evaluate how information flows through the enterprise.

Integrating the Enterprise
Successful e-business goes much deeper than validating online credit-card orders. From advanced customer pattern analysis to real-time inventory management with trusted vendors, two-way data flow is the key to cutting waste and optimizing profits.

Optimizing Infrastructure
Stretching hardware dollars and cutting support costs has emerged as a key factor in managing tight IT budgets. Open-source platform solutions, smart leasing plans, and the emergence of task-defined "thin" machines are just a few frugal tactics worth watching.

Fortifying Network Security
As you make data more readily available to your users, you also open the door to hackers and other threats. Security doesn't end with VPN and encryption--you must anticipate new technological threats and manage against the ever-present danger of careless users.

Voice & Data Convergence
Voice over the data network was once viewed simply as a way to cut long distance bills. But as VoIP and new presence-aware technologies mature and gain traction in the marketplace, the real benefits of information-rich customer-facing applications -- along with the security concerns that come with all those info packets on one network -- are hitting home for the enterprise.

Leveraging Open Source
Once the exclusive turf of geeks and gearheads, open source has moved into the corporate mainstream with support from major players, including IBM and HP. More and more mission-critical applications run from Linux data centers, and open source apps ranging from content management to customer service are gaining acceptance.

Monday, February 25, 2008

Forex Bussines

TRADING PLATFORM OVERVIEW

AvaTrader is a multi-faceted trading platform that is easily adaptable to the trader's individual preferences and tastes. Foremost, AvaTrader is a trading platform that gives the user the opportunity to trade in FX quickly, seamlessly and easily via the live streaming prices that are constantly generated. All of the advanced functionality is apparent within the platform and the Main page gives the trader a one-page full-featured advanced trading platform.

AvaTrader allows the user to open up multiple worksheets and save the information and the layout as it appeals to him. However the windows on the Main page display all the necessary information for trade:

Dealing Rates
Dealing Rates Table
Open Positions
Orders
Account Information
Chart

One-Click
By using the tabs found beneath the main menu, clients can easily jump from one workspace to another. Workspaces can be created, edited and deleted easily by right-clicking on the tabs available.

The one-click worksheet displayed allows the trader to execute trades with a single click. These windows should be used by confident traders only,since a single click is sufficient to enter into a trade. It allows great flexibility for traders to enter and exit the market quickly.

CHART
By tabbing onto charts, the trader can see an example of the types of charts available. Charts can be changed and analyzed to suit the trader.

Dealing Rates
The Dealing Rates window is a versatile window that allows the trader to pick his favorite instruments. we trade off-exchange forex transactions. The current default features six different instruments, although the trader has the ability to add or subtract the number and types of instrument displayed. The trader can also has the ability to detach the window in order to view the rates on any window or computer page that he has open, independent of the AvaTrader platform.
The main function of this window is to carry out trades. By right clicking the instrument "Bid" or "Ask", the trader is then able to choose between a "market", "limit" or "stop" order. The trader selects the amount he wishes to trade and clicks "ok" button to execute the trade.
Back to Top

Dealing Rates Table

The dealing rates table window allows the trader to view many different instruments, including the days high and low in one window. The trader can execute the same orders and in the same format as the dealing rates window.
Back to Top

Open Positions

The open positions window displays the traders open positions. The trader is also able to close a trade with one-click on the close tab. In addition to closing the open trade the trader is able to set stops including trailing stops, limits, O.C.O's. during times of extreme volatility it can be difficult or impossible to execute orders.
Back to Top
Orders
The orders window displays the trader's orders that are not linked to existing positions. Through the Order page, traders are able to set "If Done" I/D orders as well as all the standard orders mentioned in open positions. during times of extreme volatility it can be difficult or impossible to execute orders.
Back to Top
Account Information
The Account Information window shows the traders financial status at any given moment. This information includes the traders balance, equity (balance plus the P&L for current open positions), the used and available margins, as well as the P&L.
Back to Top
Chart
The charts available in AvaTrader are functional and very easy to use. The trader is able to use different chart types, such as line, bar and candle. The trader can also choose different instruments within the chart as well as different periods. Technical analysis is easily added, whether manually drawing in support and resistance lines, Fibonacci lines or a large range of oscillators moving averages and a host of other indicators.

Sunday, February 24, 2008

WiFi

Wi-Fi
In computer networking, a wireless access point (WAP or AP) is a device that connects wireless communication devices together to form a wireless network. The WAP usually connects to a wired network, and can relay data between wireless devices and wired devices. Several WAPs can link together to form a larger network that allows "roaming". (In contrast, a network where the client devices manage themselves - without the need for any access points - becomes an ad-hoc network.) WAPs have IP addresses for configuration

Introduction
Linksys WAP54G 802.11g Wireless Access Point
An embedded RouterBoard 112 with U.FL-RSMA pigtail and R52 mini PCI Wi-Fi card widely used by wireless Internet service providers (WISPs) in the Czech Republic.
Low-cost and easily-installed Wi-Fi WAPs grew rapidly in popularity in the early 2000s. These devices offered a way to avoid the tangled messes of category 5 cable associated with typical Ethernet networks of the day. Whereas wiring a business, home, or school often requires stringing many cables through walls and ceilings, wireless networking allows connecting with few or no new cables. Wireless networks also allow greater mobility, freeing users from the restrictions of using a computer cabled to the wall. In the industrial and commercial contexts, wireless networking has had a big impact on operations: employees in these areas now often carry portable data terminals integrating barcode scanners and wireless links, allowing them to update work in progress and inventory in real-time. At home with a residential gateway, any convenient chair or lawn becomes a desk for the laptop.
A typical corporate use involves attaching several WAPs to a wired network and then providing wireless access to the office LAN. Within the range of the WAPs, the wireless end user has a full network connection with the benefit of mobility. In this instance, the WAP functions as a gateway for clients to access the wired network. Another use involves bridging two wired networks in conditions inappropriate for cable: for example, a manufacturer can wirelessly connect a remote warehouse's wired network with a separate (though within line of sight) office's wired network.

Another wireless topology, a lily-pad network, consists of a series of access points spread over a large area, each connected to a different network. This provides hot spots where wireless clients can connect to the Internet without regard for the particular networks to which they have attached for the moment. The concept can become organic in large cities, where a combination of coffeehouses, libraries, other public spaces offering wireless access, as well as privately owned open access points, allow clients to roam over a large area (like hopping from lily pad to lily pad), staying more or less continuously connected.
Home wireless networks, the majority, generally have only one WAP to connect all the computers in a home. Most are wireless routers, meaning converged devices that include a WAP, Ethernet router, and often a switch in the same package. Many also converge a broadband modem. Most owners leave their encryption settings at default, hence neighbors can use them. In places where most homes have their own WAP within range of the neighbors' WAP, it's possible for technically savvy people to turn off their encryption and set up a wireless community network, creating an intra-city communication network without the need of wired networks.
A WAP may also act as the network's arbitrator, negotiating when each nearby client device can transmit. However, the vast majority of currently installed IEEE 802.11 networks do not implement this, using a distributed pseudo-random algorithm instead
Limitations
One IEEE 802.11 WAP can typically communicate with 30 client systems located within a radius of 100 m. However, the actual range of communication can vary significantly, depending on such variables as indoor or outdoor placement, height above ground, nearby obstructions, other electronic devices that might actively interfere with the signal by broadcasting on the same frequency, type of antenna, the current weather, operating radio frequency, and the power output of devices. Network designers can extend the range of WAPs through the use of repeaters and reflectors, which can bounce or amplify radio signals that ordinarily would go un-received. In experimental conditions, wireless networking has operated over distances of several kilometers.
Most jurisdictions have only a limited number of frequencies legally available for use by wireless networks. Usually, adjacent WAPs will use different frequencies to communicate with their clients in order to avoid interference between the two nearby systems. But wireless devices can "listen" for data traffic on other frequencies, and can rapidly switch from one frequency to another to achieve better reception on a different WAP. However, the limited number of frequencies becomes problematic in crowded downtown areas with tall buildings housing multiple WAPs, when overlap causes interference.
Wireless networking lags behind wired networking in terms of increasing bandwidth and throughput. While (as of 2004) typical wireless devices for the consumer market can reach speeds of 11 Mbit/s (megabits per second) (IEEE 802.11b) or 54 Mbit/s (IEEE 802.11a, IEEE 802.11g), wired hardware of similar cost reaches 1000 Mbit/s (Gigabit Ethernet). One impediment to increasing the speed of wireless communications comes from Wi-Fi's use of a shared communications medium, so a WAP is only able to use somewhat less than half the actual over-the-air rate for data throughput. Thus a typical 54 MBit/s wireless connection actually carries TCP/IP data at 20 to 25 Mbit/s. Users of legacy wired networks expect the faster speeds, and people using wireless connections keenly want to see the wireless networks catch up.
As of 2006 a new standard for wireless, 802.11n is awaiting final certification from IEEE. This new standard operates at speeds up to 540 Mbit/s and at longer distances (~50 m) than 802.11g. Use of legacy wired networks (especially in consumer applications) is expected to decline sharply as the common 100 Mbit/s speed is surpassed and users no longer need to worry about running wires to attain high bandwidth.
Interference can commonly cause problems with wireless networking reception, as many devices operate using the 2.4 GHz ISM band. A nearby wireless phone or anything with greater transmission power within close proximity can markedly reduce the perceived signal strength of a wireless access point. Microwave ovens are also known to interfere with wireless networks.

Security
Main article: Wireless LAN Security
Wireless access has special security considerations. Many wired networks base the security on physical access control, trusting all the users on the local network, but if wireless access points are connected to the network, anyone on the street or in the neighboring office could connect. The most common solution is wireless traffic encryption. Modern access points come with built-in encryption. The first generation encryption scheme WEP proved easy to crack; the second and third generation schemes, WPA and WPA2, are considered secure if a strong enough password or passphrase is used. [1]

Hotspots - access points or wireless networks open to the public
Wireless LAN - networks consisting of zero or more access points plus devices
WarXing - searching for open networks
Access point base station - A base station optionally providing cellular coverage
Access Point Name - APN is the denomination of a GPRS access point.
Mobile VoIP - Denomination of what Voip will become in future.
References
This article does not cite any references or sources. (July 2006)Please help improve this article by adding citations to reliable sources. Unverifiable material may be challenged and removed.

External links
Wi-Fi Alliance
Retrieved from "http://en.wikipedia.org/wiki/Wireless_access_point"
Categories: IEEE 802.11 Network access Telecommunications infrastructure Wireless networking