Engineering Concepts Tutorials

Engineering Concepts Tutorials for UML, Operations Research, Numerical Methods and many more.
  Title Reverse Sort Order / Author Replies
Views
GCM or Google Cloud Messaging is a service for developers to send notifications from remote servers to their Android apps or Chrome extensions, the notification may be sent anytime irrespective of the Android device being online or not, the notification will be delivered when the device comes...
0
4,466
APNS or Apple Push Notification Service, is service for Apple devices like iPhone, iPad & iPod to send 3rd party notifications to devices. It was launched with iOS version 3.0, it's very helpful for the app developers as they do not have to frequently poll for updates, instead they can submit the...
0
3,183
Q: What are the seven layers of the OSI model? A: The layers are physical, data link, network, transport, session, presentation, and application layers. Q: In the TCP client-servel model, how does the three-way handshake work in opening connection? A: The client first sends a...
0
2,826
Introduction SSL shorts for Secure Sockets Layer, a protocol developed by Netscape for transmitting private documents via the Internet. SSL works by using a public key to encrypt data that's transferred over the SSL connection. Both Netscape Navigator and Internet Explorer support SSL, and many...
0
7,987
Direct Attached Storage (DAS) Today, greater than 95% of all computer storage devices such as disk drives, disk arrays and RAID systems are directly attached to a client computer through various adapters with standardized software protocols such as SCSI, Fibre Channel and others. This type of...
0
2,926
Define the Multicore Computing As software developers we have enjoyed a long trend of consistent performance improvement from processor technology. In fact, for the last 20 years processor performance has consistently doubled about every two years or so. But, day by day the truth is realizing...
3
5,723
We found it necessary to devote a chapter to Trojans. Trojan's are probably the most compromising of all types of attacks. Trojans are being released by the hundreds every week, each more cleverly designed that the other. We all know the story of the Trojan horse probably the greatest strategic...
10
9,964
TLS (Transport Layer Security), defined in RFC 2246, is a protocol for establishing a secure connection between a client and a server. TLS (Transport Layer Security) is capable of authenticating both the client and the server and creating a encrypted connection between the two. The TLS...
0
4,431
Newspapers Internet magazines came with cover stories when Denial of service (DoS) attacks assaulted a number of large and very successful companies' websites last year. Those who claim to provide security tools were under attack. If Yahoo, Amazon, CNN and Microsoft feel victim to DoS attacks, can...
0
9,534
One of the most common procedures that occurs in computer programs is the copying of data. An object is a composite data type in object-oriented programming languages. Object copy thus describes the action wherein an object has its attributes copied to another object of the same data type. An...
2
8,379
A Server is a computer or device on a network that manages network resources. For example, a file server is a computer and storage device dedicated to storing files Any user on the network can store files on the server. A print server is a computer that manages one or more printers and a network...
19
223,947
Advanced Encryption Standard is a block cipher symmetric encryption algorithm. It is preferred to protect network communications, personal data etc using AES over DES. It encrypts or decrypts the data through several rounds. Categorization It is categorized under three types of key sizes –...
0
3,129
SPF or Sender Policy Framework is a system created to prevent e-mail spam & e-mail spoofing. It does so by verifying the sender's IP address is a authorized one for the domain the mail is originating from. SPF requires domain admins to add DNS TXT or SPF records specifying hosts/IPs allowed to...
0
2,267
Public Key Infrastructure Public key infrastructure is an architecture which supports mechanisms like integrity and confidentiality. It is heavily used in e-commerce, where business transactions are frequent and should be much secured. In fact business transaction starts only after the two...
0
3,579
The article extends the Cryptography concepts to explain the Symmetric Key encryption. Additionally, it throws light on the capabilities of Symmetric key encryption and its operational modes. Symmetric-Key encryption Symmetric key cryptography is encrypting or decrypting message using a...
0
2,669
Imagine a network based on inexpensive, high volume chipsets, with data rates up to 12Mbit/second and a 25 meter distance capacity, designed from the start with “plug and play” in mind. Add 5 Volt power, with up to 500mA current capacity, and compatibility with many consumer products. ...
1
13,967
Although they are not directly executable as programs, the many DLL files present in Windows contain libraries of functions that are used throughout the operating system and in application software. Generally, these functions are used internally by programs and are not directly visible to the...
9
39,397
What is VNC? - A practical introduction VNC stands for Virtual Network Computing. It is, in essence, a remote display system which allows you to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of...
2
4,916
It tries to solve the demand supply matrix with Vogel Approximation method. The code The code I have tried to keep is pretty self explanatory to the person who knows what VAM is all about. #include <stdio.h> #include <conio.h> #define TRUE 1
1
21,787
The Web has become the most significant technology of the 21st century. The nature and structure of the Web, as well as the way we use it, have been continuously changing. The Web evolution is huge that we have started to place the evolution—past, current, and anticipated—into different stages as...
7
7,415