Word of the Day - GURU advisor

Piggybacking

In the field of Information Technology, the term piggybacking refers to situations where an unauthorized third party gains access to protected systems, exploiting the collaboration with an entity that is authorized to do so.

Hold Down Timer

Hold Down Timer is a technique used by network routers. When a node receives notification that another router is offline, it starts a tolerance timer to allow time for offline devices to recover, without having to update their respective routing tables accordingly.

Blockchain

Blockchain is a process in which a set of subjects (or nodes) shares computing and computing resources, to make available to the community a virtual database in which each participant has a copy of the data contained. The system is regulated by a cryptographic protocol considered safe by the community itself.

LRDIMM

The acronym LRDIMM (Load Reduce DIMM) indicates a specific type of RAM memory (of the Registered DIMM family) that replaces the memory register with an isolated circuit called Isolated Memory Buffer. This component buffers commands, memory addresses and data signals and isolates the host controller's memory chip. In practice, the physical host "reads" only the iMB chip upstream of the desk and allows an increase in storage capacity up to 100%.

WSL

WSL stands for Windows Subsystem for Linux, a resource that makes possible to run Linux commands on Windows systems, allowing developers to work on Windows machines and leveraging commands of the open source OS. It was introduced in Windows 10 version 1607.

Cloud Orchestration

The term Cloud Orchestration describes the techniques of cloud process automation to certain goals. Unlike simple automation, which deals with individual and specific tasks, orchestration "understands" and manages entire sets of tasks and processes.

IRQ

IRQ (Interrupt Request) indicates an asynchronous signal sent to the processor by a certain device that implies the execution of a certain command.
This kind of interrupts is generated by the hardware parts the machine is composed, unlike software IRQs that are generated by a certain software state, so not related to a physical device.

IPsec

IPsec (Internet Protocol Security) is a set of protocols that provide security for the IP protocol itself, like additional authentication options, integrity control a data encryption. It’s often used to realize secure VPN networks.

ISP

The term ISP, which stands for Internet Service Provider, refers to these companies that provide their clients with Internet connectivity. This service is offered using different technologies; traditionally, via twisted-pair cabling, and more recently, optical fibre (to-the-home or to-the-cabinet).

Load Balancing

The term load balancing describes a series of techniques used to distribute the (computational) workload in a dynamic manner among the resources of an infrastructure like CPU, memory, network interfaces or storage devices. The goal of load balancing is to handle tasks in a quick and reliable way, and to appear as a single entity to the external world.

NsLookup

The term NsLookup refers to a useful tool included in most operating systems that can perform an inspection (look up) of IP addresses and can send specific queries to DNS servers. These includes the resolution of a domain name as an IP and vice versa.

Server consolidation

In the context of  IT infrastructures, the term (server) consolidation describes a situation where a physical server runs one or more software server applications as multiple instances. This way, computational resources can be shared more effectively between different software applications.
A typical example of consolidation is the P2V conversion of physical environments on hosts with hypervisors.

Microkernel

The term Microkernel indicates a certain code (or software) that maintains the least number of functions and instructions to implement an operating system. A microkernel must be able to handle basic mechanisms of the system, thus having a flexible base to build the entire operating system upon.

Monolithic kernel

The term monolithic kernel refers to that part of the operating system that manages a complete access to I/O devices, memory, hardware interrupts and CPU stack. This type of kernel tends to be larger than other typologies, because it integrates many functions at the same level.
A monolithic kernel is at the basis of operating systems like Unix, Linux, macOS and DOS.

Don't be Evil

Don't be Evil is an internal Google standard conceived by Paul Buccheit and Amit Patel with the goal of promoting a corporate culture where client satisfaction and long term benefits are to be preferred to short-term profit.

Zope

ZOPE is the acronym of Z Object Publishing Environment and indicates an open source Web Server developed in Python, which allows developers to craft Web applications. The platform comes with all basic components already installed and it's structured in such a way to store templates, scripts and contents database in a single solution.

Random Forest

The term Random Forest refers to a construct used in Artificial Intelligence and Machine Learning. Specifically, it's a set of decision trees that outputs the sum of single trees.

Bezel

The term Bezel describes the external chassis of a computer, monitor or other device. The valutation of the bezel's size is fundamental when designing the object and when the users uses it, like in the case of tablets, smartphones and mobile devices.

CPM

The acronym CPM, which stands for Critical Path Method, is an algorithm to plan and schedule objects that have several activities and require complex and dependant interactions. This tool is very useful to catalog critical tasks and minimize conflicts and bottlenecks.

RSA cryptography

RSA cryptography is a data cryptography technique developed by RSA Data Security that leverages a public key system. The system itself relies on the complexity to factor very large prime numbers, even with humongous computational resources. On the other hand, with the public key-private key pair, the encryption/decryption process can be very fast.

RSA is the standard used to encrypt data with public keys, in particular with Internet.

Green Computing

Green Computing refers to the eco-friendly and responsible usage of computers. In practical terms, this concepts is about the study, planning and realization of computing environments and devices that minimize their environmental impact.

Stream Cipher

The term Stream Cipher describes a data encryption technique where all bits that represent a clear text are processed in an independet manner, using diferend encryption keys from time to time. This pseudo-random encryption technique is also known as "state cipher" and can use an infinite number of "cipher digits" for each key.

Backscatter

The term Backscatter describes an unwanted effect related to spam emails which involves the email server to generate error emails as a consequence of the failed attempt to send spam emails with addresses of unaware users due to a hacked situation. The most common case is to receive error message like "can't deliver the message..", even if the user hasn't purposely sent the email.

Hash Chain

The term Hash Chain describes an encryption mode where a ciphering function (or hashing, indeed) is applied several times on a set of data. This technique is very useful in situations where you want to avoid to identify the original set of data.

banner eng

fb icon evo twitter icon evo

Word of the Day

The term Edge Computing refers, when used in the cloud-based infrastructure sphere, the set of devices and technologies that allows...

>

The acronym SoC (System on Chip) describes particular integrated circuit that contain a whole system inside a single physical chip:...

>

The acronym PtP (Point-to-Point) indicates point-to-point radio links realized with wireless technologies. Differently, PtMP links connects a single source to...

>

Hold Down Timer is a technique used by network routers. When a node receives notification that another router is offline...

>

In the field of Information Technology, the term piggybacking refers to situations where an unauthorized third party gains access to...

>
Read also the others...

Download of the Day

Netcat

Netcat is a command line tool that can be used in both Linux and Windows environments, capable of...

>

Fiddler

Fiddler is a proxy server that can run locally to allow application debugging and control of data in...

>

Adapter Watch

Adapter Watch is a tool that shows a complete and detailed report about network cards. Download it here.

>

DNS DataView

DNS DataView is a graphical-interface software to perform DNS lookup queries from your PC using system-defined DNS, or...

>

SolarWinds Traceroute NG

SolarWinds Traceroute NG is a command line tool to perform advanced traceroute in Windows environment, compared to the...

>
All Download...

Issues Archive

  • GURU advisor: issue 18 - April 2018

    GURU advisor: issue 18 - April 2018

  • GURU advisor: issue 17 - January 2018

    GURU advisor: issue 17 - January 2018

  • GURU advisor: issue 16 - october 2017

    GURU advisor: issue 16 - october 2017

  • GURU advisor: issue 15 - July 2017

    GURU advisor: issue 15 - July 2017

  • GURU advisor: issue 14 - May 2017

    GURU advisor: issue 14 - May 2017

  • GURU advisor: issue 13 - March 2017

    GURU advisor: issue 13 - March 2017

  • GURU advisor: issue 12 -  January 2017

    GURU advisor: issue 12 - January 2017

  • GURU advisor: issue 11 -  October 2016

    GURU advisor: issue 11 - October 2016

  • 1
  • 2
  • 3
  • BYOD: your devices for your firm

    The quick evolution of informatics and technologies, together with the crisis that mined financial mines, has brought to a tendency inversion: users that prefer to work with their own devices as they’re often more advanced and modern than those the companies would provide. Read More
  • A switch for datacenters: Quanta LB4M

    You don’t always have to invest thousands of euros to build an enterprise-level networking: here’s our test of the Quanta LB4M switch Read More
  • Mobile World Congress in Barcelona

    GURU advisor will be at the Mobile World Congress in Barcelona from February 22nd to 25th 2016!

    MWC is one of the biggest conventions about the worldwide mobile market, we'll be present for the whole event and we'll keep you posted with news and previews from the congress.

    Read More
  • 1