Page 62

Content Delivery Networks

Posted on June 16th, 2010 by Victoria Pal in Tech

Content Delivery Networks / CDN9Almost all of us enjoy the benefit of a Content Delivery Network, whether we realize it or not. Content Delivery Networks (CDN) also referred as Content Distribution Networks is what you call a system of network hardware containing copies of data located in various geographical locations, depending on the local demand from clients requesting the resources.

Content delivery networks are especially useful for delivering rich media content to users from different geographical locations, avoiding delay and bandwidth overload near the main server. CDNs can contain all types of data, but most often they are used to distribute data which demands high bandwidth. A few rough examples are downloadable software, media files and documentations, multimedia streams, online games as well as database queries, etc.

Read more...

DDoS Attack

Posted on June 15th, 2010 by Victoria Pal in Tech

DDoS attackThe end goal of the Denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is to make a resource unavailable to its users. The attack can be carried out on different levels, depending on the target and the people involved. In essence, the attack represents a highly intense attempt by one person or more to hinder websites or specialized internet services from running properly, causing financial losses to that resource's owner.

Depending on the motivation behind the attack, different targets might suffer from it. The attack can be implemented by a single person, carrying out a personal agenda. Such an attack is improbable to cause too much trouble and will only be temporary. A much bigger problem is organized attacks performed by a group of individuals in pursuit of financial gains. Such attacks can be sustained for longer periods of time and might as well ruin companies relying on online presence. Banks, online retailers, government sites, payment gateways, and even root nameservers can become easy prey for organized DDoS attacks.

Read more...

Server Cache

Posted on June 10th, 2010 by Victoria Pal in Monitoring

Server CacheWeb caching describes the process of storing frequently used objects closer to the user through browser, proxy or server cache. Caching frequently used content has a positive effect in most cases because it reduces server load, bandwidth and latency. It also helps increase the responsiveness for users on the web.

Modern browsers support caching and require most elements of a page only during the first time a user opens that page. Then CSS files, images and other media are stored in a dedicated folder. This leads to faster loading times and better user experience. The whole process happens without any input from the user.

Read more...

Server Virtualization Is Growing

Posted on June 2nd, 2010 by Victoria Pal in Tech

Server Virtualization"I think there is a world market for maybe five computers" is a famous misquote of Thomas J. Watson. The same Tom Watson, who took Computing Tabulating Recording Corporation and turned into what is today known as IBM. In essence, whoever said that the world will only need 5 computers wasn't totally wrong. Virtualization was first implemented in 1960 to aid better utilization of large mainframe hardware. 50 years later, it has grown to be part of all Fortune 100 success stories.

Lately, "fake servers" became a slightly satiric way to say "virtual servers". Why? Mainly because they are gaining a larger market share. Large enterprises were quick to adopt the virtual machines approach, while small business started late. However, by year-end 2010, enterprises with 100 to 999 employees will have a higher penetration of virtual machines deployed than the Global 500. For long years, small businesses could not afford even the entry level products, and this is what changed lately. Increased competition by server vendors has made server virtualization technology affordable to smaller companies.

Read more...

Remote Monitoring - Server, Desktop, Video and Mind

Posted on May 27th, 2010 by Victoria Pal in Monitoring

Remote monitoringI was on the computer, doing a search on "Remote Monitoring" the other day, and I came across one obvious, two common and one bizarre result.

Remote Server Monitoring

Remote monitoring is a phrase that needs context. It shouldn't even be the text itself, but it might be the main theme of a site, book, conversation, etc. For example, when you are reading this blog, you are thinking of website monitoring and remote server monitoring, which is quite normal. In fact, it means we've done our job right and you are here to learn more about monitoring of various network devices. Basically, what www.websitepulse.com is all about.

Read more...