There has been a tremendous shift in the usage of Internet and web applications from over a decade ago. These changes can be attributed to the development of Web 2.0 applications. The current generation of web based Internet applications are characterized by user generated content, social interaction, and collaboration, that emphasize on harnessing collective intelligence. These features have been made possible mainly by evolution of exiting tools and technologies  especially Ajax....
As consumers capitalize on the power of mobile devices, the same transformation is occurring in business. Business applications that were mildly successful when used on a desktop, have suddenly become highly effective and valuable when consumed on the go, whenever and wherever business is conducted. Mobile business information access will likely eclipse desktop information access in the near future, leading to a new era of Mobile Intelligence. The convergence of business information and...
Windows xp uses a more innovative user interface than the other operating system and it has become more in the implementation of graphical user interface (GUI). And in the beginning of new window starts with a new login screen, which uses a full screen logon. Then user can experience Windows xp's new theme which wasn't changed since Windows 95. The new theme consists of a blue task bar and a brightly colored start button.Start button in window xpC:UserstrojanDesktopxp-desktop-before.jpg Start...
Abstract Network simulation is a method of investigation in network technology. In the process of investigating a new technology, due to various reasons, it is costly and unrealistic to physically test a network system. In such situation, simulation becomes one of the best available solutions in testing, evaluation and validation. Network simulation has the features of small cycle and low cost, and it is easier for researchers to use other's research, in order to concentrate on the particular...
Network Access Control products started out as admission control managers that authenticated users and ensured their systems met security policy requirements before granting them access to the network. Today these products, typically dedicated appliances, can also manage users' access once they're already on the LAN to certain servers, applications, and data. Ensuring a user is who they say they are is typically performed by captive portals, MAC-based authentication, port-based authentication,...
Introduction Bluetooth Special Interest Group (SIG) developed the Bluetooth Specification Version (referred to as "Specification") that allows the development of interactive services and applications over interoperable radio modules and data communication protocols. Several usage models are identified by the Bluetooth (SIG) and to support these usage models, protocols are stacked in order. The objective of the specification is to allow applications to interoperate with each other. To...
SQL injection attack was possible on RockYou because all of the user passwords were stored in plain text rather than using a non reversible hashing system. This site has been hacked and around 32.6m passwords were known to the attackers."- Using this specific case of SQL injection I would like to discuss how attackers exploit the vulnerabilities in the code written by programmers who focus more on implementing desired functionalities and less on security aspects, how these attacks can be...
Analyzing of card and account and doing transactions take long to complete. Waiting of available switch from primary to secondary ATM switches takes long when workloads over ATM network increases. Among that time, long queue of users has to wait due to inefficient of throughput and response time. The over workloads rises performance issues.Information (and Data)The interface does not intuitive and also it leads difficulties to perform tasks. The available services are not clearly stated. The...
Based on the comprehensive literature survey, we have reached the point where we can safely say that children are still struggling from the very basic problems of spelling and typing mistakes, limited vocabulary, and making sense of results. Solutions exist here and there but each of them is far from best and leaves a lot of room for improvement. In the previous chapters we discussed the features and advantages of faceted navigation and it is evident that faceted search has certain features and...
In my essay Im going to study the capacity of memory among teenagers.I have examined two age groups: 13-14 and 18-19 years secondary school students. I was interested whether there is a significant difference between these two groups regarding the capacity of their short-term memory. I have also examined whether the language they used (Hungarian, their mother tongue and English, their second language) had an effect on their short-term memory. My pre-supposition is that older students will be...