INTRANET AND ETHERNET - Computer Science Articles

FPGA Based Development for Real Time Ethernet Devices

Introduction When it comes to implementing complex tasks in silicon, FPGA technology has progressed to the point where it challenges general purpose microprocessors and proprietary asics for many applications. This is partly due to decreasing p ...

0 Comments. 1695 views since Sep 22, 2008

Computer Virus

Preface This report briefly introduces computer viruses and how they affect network security. I have introduced today's virus situation. Many people are afraid of viruses, mostly because they do not know much about them. This report will g ...

0 Comments. 1343 views since May 21, 2008

World of Cyber Forensics

Introduction Mention crime and we think of robberies, murders and detectives examining the crime scene, interrogating witnesses and finally nailing the guilty. But there is, however, another kind of crime, where traditional methods of cri ...

0 Comments. 1241 views since Oct 4, 2008

Integrating PID Controllers into Automated Processes via Ethernet

Ethernet's popularity in industrial applications stems from its ability to exchange information, in real time, between processing equipment and Ethernet-based management systems. Multiple factors drive its acceptance, including: Speed ...

0 Comments. 1094 views since Oct 7, 2008

Intranet Security

security \si-'kyur- t-e-\ n: the quality or state of being secure Introduction You might think that there is little reason to be concerned about security in an intranet. After all, by definition an intranet is internal</I ...

0 Comments. 1021 views since Dec 3, 2008

Username-Password Authentication

The first major element of Web server security is username/password  authentication. I kick off this discussion  by looking at what the Web browser user sees when he encounters  a Web page that requires username/password authentication for  access. ...

0 Comments. 992 views since Dec 3, 2008

Intranet Development Tools

After considering the various styles for hypertext documents, you should examine the various tools you will need to develop the intranet. A tool is anything that supports the task you are working on. The tools for unleashing the power of your intranet ...

1 Comments. 950 views since Dec 1, 2008

Intranet & Java

intra net \intra-net\ n :an internal network that is sheltered from the outside world Networks aren't the same since the Java programming language and intranets burst onto the scene. A few years ago, no one had heard of the programmi ...

0 Comments. 943 views since Dec 1, 2008

Designing Intranet Application with Java

de sign \di-zin' \v: to form a plan for Designing intranet applications involves slightly different methodologies than you may be used to and opens a whole new world of possibilities. This chapter explores the design considerations y ...

0 Comments. 918 views since Dec 1, 2008

Asymmetrical Digital Subscriber Line (ADSL)

Asymmetrical Digital Subscriber Line (ADSL) is a method to use the existing analog local loop lines for digital data transfer to and from the home. It is asymmetrical in that the upstream transfer rate is slower than the downstream data rate. This mean ...

0 Comments. 905 views since Oct 19, 2008

Internet Fax

Internet or online faxing is a relative new invention that is quickly gaining in popularity with many fax users. Countless businesses, large and small, are switching their daily faxing chores over to this new online phenomenon. Likewise, many individua ...

0 Comments. 809 views since Oct 3, 2008

Wireless Ethernet

Introduction The advantages of Ethernet are many: Ethernet components are commodity items and thus are low cost; Ethernet can be used as a transport medium regardless of the PLC communications protocol by encapsulating the Modbus or Profibus pr ...

0 Comments. 796 views since Sep 23, 2008

Spyware

Not many disagree that the expansion of the internet and technology related to advances with the various aspects of interacting on the internet continues to accelerate at a dizzying pace. As with most advances, with the good side, also comes a not so g ...

0 Comments. 759 views since Oct 1, 2008

Types of Web Hosting Services

A Brief Guide on the Types of Web Hosting Services Whether you are looking for business web hosting for a corporate site or cheap web hosting for a personal site, there are numerous web hosting provider that will help you to accomplish for the ...

0 Comments. 706 views since Oct 7, 2008

Email Automatic Responders

An email automatic responder or autoresponder is the second most important marketing tool I have to make money online. The first would be my hosting company. Without these 2 tools my internet marketing business is dead in the water. In the world ...

0 Comments. 699 views since Oct 3, 2008

A Model Intranet Application - Part 1

model \'mäd-l\ n: a pattern of something to be made Introduction Intranet applications are like a corporate application suite. These include word processors, project planners, spreadsheets, and many other useful and ...

0 Comments. 656 views since Dec 8, 2008

Hostname-Address Authentication

All the Web servers discussed in this article provide an additional  authentication method, using the TCP/IP hostname or numerical  network address of customer workstations or pcs as access criteria.  As you'll learn in later articles, in the conte ...

0 Comments. 648 views since Dec 3, 2008

Planning your Intranet Environment

In this article, you will learn how to plan your intranet. Creating a successful intranet is a matter of planning. Start your intranet on a solid foundation, follow through with good organization, and you can map out an intranet you will be proud of.</ ...

0 Comments. 648 views since Dec 1, 2008

VoIP: Technology to Cut Phone Bills

Have we ever realized, how much will be benefited by VoIP technology? Personally I am very thankful to VoIP, as I am (staying in US) far from my parents and in-laws, but I can talk to them in India for about half an hour or more (depends on them and me ...

0 Comments. 632 views since Apr 27, 2009

A Model Intranet Application - Part 2

Coding Style Notes A good percentage of the code styles here are simply done for readability. Here is a list of what I think is different and superior:   Code layout is cleaner. Comments are used.   Source code order is di ...

0 Comments. 630 views since Dec 8, 2008