What are the concerns related to IoT
Security: Security is the major concern of IoT. Connectivity: Connecting so many different devices of IoT and managing them is also a serious concern of IoT.
What are the concerns related to IoT Read More »
Security: Security is the major concern of IoT. Connectivity: Connecting so many different devices of IoT and managing them is also a serious concern of IoT.
What are the concerns related to IoT Read More »
The ‘Internet of things’ is a network of interrelated mechanical and digital devices, computing devices and other objects that have embedded hardware and software to communicate with others on the same network without the need of any human-to-computer or human-to-human interaction. Some potential applications of IoT are- Smart Home security system Smart Cities Smart Wearable
What is Internet of Things Read More »
Private Cloud Public Cloud It uses Dedicated Server It uses Shared Server More reliable Reliable Cheaper Costlier Highly secured Less secured
How public cloud is different from private cloud Read More »
Private clouds Clouds exclusively used by a single organization and controlled, managed and hosted by private data centers. Public cloud Clouds used by many organizations on shared basis and hosted and managed by third party service provider. Community cloud Cloud used by a group or related organizations. Hybrid cloud When a single organization adopts both
What are different cloud deployment models Read More »
Cloud refers to Internet. Basically collection of servers over the internet is called cloud. “The delivery of computing services from a remote location” is Cloud Computing. Cloud Computing is defined as Computer-based services delivered over the Internet. It doesn’t store any data on your computer. The services comprise software, hardware, databases, storage etc.
What is cloud What is cloud computing Read More »
Server provides a centralized location to stores and keeps backup of information. Server helps its client to access data, software and hardware resources. Server controls the security of network. Server acts as a host multi-application software Validate and permit authorized user to login.
facilities provided by the SERVER in a Network environment Read More »
Connect multiple networks follows different protocols. Make large and complex network. Connect with Internet Secured network
When would you opt for a router in a network Read More »
IoT allow us to interact with different devices through internet using smartphones or computers, thus creates a personal network and on the other side WoT allow us to use web services to connect anything in the physical world. Hence we can say that both are communication medium Uses networking protocols Creates network of different objects
How IoT and WoT are related? Read More »
The blockchain technology works on the concept of decentralized and shared database where each computer has a copy of the database. Basis on this we can define a system for scholarship that allows a group of nodes to maintain a single updated and secure ledger. Each node maintains an ‘append copy’ open ledger which is
By using Infrastructure as a Service (IaaS) modal, they can avail the benefits of the cloud services to launch their startup. Using IaaS from the cloud, they can use the hardware and software infrastructure remotely to configure, deploy and execute any application. And they can outsource the hardware and software as on demand and pay