background preloader

IT Study Stuff

Facebook Twitter

Welcome to xen.org, home of the Xen® hypervisor, the powerful open source industry standard for virtualization. Taj International Airport. It was granted the approval as the Indira Gandhi International Airport (IGIA) in Delhi is nearing its full expansion capacity. It was designed to serve the people of Uttar Pradesh and eastern Haryana to export flowers and other agri-goods from the Taj Special Economic Zone to markets in the Middle East and Europe. The techno-feasibility report[edit] The Central government cleared the techno-feasibility report for setting up the Taj International Airport and Aviation Hub in April 2003, It was to be constructed and operated by the year 2007-08.

First phase of the new international airport, about 72 km from Indira Gandhi International Airport at Delhi, would be built at an approximate cost of Rs 5000 crore (Rs 50 million). Location[edit] Originally the project supposed to come up at Jewar village near Greater Noida, near the Yamuna Expressway.[3] This site was within 72 kilometres of Indira Gandhi International Airport(IGI), Delhi. Status[edit] References[edit] External links[edit] Yamuna Expressway. Yamuna Expressway(Hindi: यमुना द्रुतगामीमार्ग) is a 6-lane (extendable to 8 lanes), 165 km long, controlled-access expressway, connecting Greater Noida with Agra in the Indian state of Uttar Pradesh.

It is India's longest six-lane controlled-access expressway stretch. The total project cost was History[edit] Yamuna Expressway connects Delhi and Agra. The tollway opened in 2012. The Taj Expressway project was announced in 2001 by Rajnath Singh, then UP Chief Minister. Yamuna Expressway Project was implemented by Jaypee Group.[5] In May 2012, Jaypee Group informed state government officials that construction of the expressway had been completed.[6] The Yamuna Expressway was formally inaugurated on 9 August 2012 by Chief Minister Akhilesh Yadav, via videoconference from Lucknow,[3] about two years behind of its original target completion date.[7] Features[edit] Some data about the Yamuna Expressway:[8][9] The Yamuna Expressway has SOS booths along the route besides a toll free helpline.

Indian road network. Major highways in Indian road network. A recently built highway in the Western Indian state of Gujarat. India has a road network of over 4,689,842 kilometres (2,914,133 mi) in 2013,[1] the second largest road network in the world. At 0.66 km of roads per square kilometre of land, the quantitative density of India's road network is similar to that of the United States (0.65) and far higher than that of China (0.16) or Brazil (0.20).

However, qualitatively India's roads are a mix of modern highways and narrow, unpaved roads, and are undergoing drastic improvement. Adjusted for its large population, India has less than 4 kilometres of roads per 1000 people, including all its paved and unpaved roads. The changing face of Indian road network India in its past did not allocate enough resources to build or maintain its road network.[3] This has changed since 1995, with major efforts currently underway to modernize the country's road infrastructure.[4] History[edit] Overview[edit] Statistics[edit] Bypass MAC filtering. CentOS. The first CentOS release in May 2004, numbered as CentOS version 2, was forked from RHEL version 2.1AS.[1] Since the release of version 7.0, CentOS officially supports only the x86-64 architecture, while versions older than 7.0-1406 also support x86 with Physical Address Extension (PAE), with additional architectures supported in CentOS versions older than 4.7; a beta release is expected to be available for the ARM architecture.[9] History[edit] Before it adopted the "CentOS" name, CentOS Linux originated as a build artifact of cAos Linux.[10] Several of the cAos contributors at the time[when?]

Were merely interested in this build artifact for their own use, citing difficulties in collaborating with other noteworthy Red Hat Enterprise Linux (RHEL) clones of the time. [citation needed] In June 2006, David Parsley, the primary developer of Tao Linux (another RHEL clone), announced the retirement of Tao Linux and its rolling into CentOS development. Design[edit] Versioning and releases[edit]

MAC spoofing. MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device. The MAC address is hard-coded on a network interface controller (NIC) and cannot be changed. However, there are tools which can make an operating system believe that the NIC has the MAC address of a user's choosing. The process of masking a MAC address is known as MAC spoofing. Essentially, MAC spoofing entails changing a computer's identity, for any reason, and it is relatively easy.[1] Motivation[edit] New hardware for existing Internet Service Providers (ISP)[edit] Most of the time, an ISP registers the client's MAC address for service and billing services.[2] Since MAC addresses are unique and hard-coded on network interface controller (NIC) cards,[1] when the client wants to connect a new gadget or change his/her existing gadget, the ISP will detect different MAC addresses and the ISP might not grant Internet access to those new devices.

Changing MAC address in Windows 7 - CNET Windows 7 Forums. Multiple Network Connections at the Same Time on Windows | Ivan Zlatev. Posted by Ivan Zlatev on 8 July, 2009 In my scenario I have one Wireless connection for my Internet and one LAN connection to a small private network of my own with my NAS, PS3 and TV and I want to have them both at the same time. It was a major pain to get this setup working on Windows. When I had both connections enabled my Internet wasn’t working because Windows was routing through the LAN connection even though the Wireless connection had a higher priority set in Network Connections –> Advanced menu –> Advanced settings. The solution is to go into the Properties of each connection (right click on it) –> select Internet Protocol (TCP/IP) –> click Properties -> click Advanced –> uncheck Automatic metric in the bottom and set a number between 1 and 9999 where the smaller the number the higher the connection priority.

I have set my Wireless Internet connection to 1 and my LAN connection to 9999 and that works. I hope this post will save someone else’s precious time in the future. 5 Disadvantages of Cloud Computing. I am gung-ho about cloud computing, so much so that in Why Cloud Computing Is Ideal for Small Businesses I say that cloud computing is the best thing for small business since the invention of the stapler. But that doesn't mean that I think every small business should immediately throw out all their servers and software and conduct all their business operations in the cloud.

Small business owners have different needs and different comfort levels. It may be more advantageous for you to use cloud computing only for certain applications. Or even not at all. Before you throw caution to the winds (sorry – couldn’t resist!) 5 Disadvantages of Cloud Computing 1) Possible downtime. 2) Security issues. Switching to the cloud can actually improve security for a small business, says Michael Redding, managing director of Accenture Technology Labs. 3) Cost. You also need to be sure you are doing a total cost comparison. 4) Inflexibility. 5) Lack of support.

Cloud computing: 10 ways it will change by 2020. Right now we are in the early days of cloud computing, with many organisations taking their first, tentative steps. But by 2020 cloud is going to be a major — and permanent — part of the enterprise computing infrastructure. Eight years from now we are likely to see low-power processors crunching many workloads in the cloud, housed in highly automated datacentres and supporting massively federated, scalable software architecture.

Analyst group Forrester expects the global cloud computing market will grow from $35bn (£22.5bn) in 2011 to around $150bn by 2020 as it becomes key to many organisations' IT infrastructures. Alongside this increase in demand from enterprise, there will be development in the technologies that support clouds, with rapid increases in processing power making cloud projects even cheaper, while technologies currently limited to supercomputing will make it into the mainstream.

READ THIS: Cloud 2020: What are the barriers to the cloud? 1. Software floats away from hardware. No operating system is an island. Network access point. NSFNet Internet architecture, c. 1995 A Network Access Point (NAP) was a public network exchange facility where Internet service providers (ISPs) connected with one another in peering arrangements.

The NAPs were a key component in the transition from the 1990s NSFNET era (when many networks were government sponsored and commercial traffic was prohibited) to the commercial Internet providers of today. They were often points of considerable Internet congestion. History[edit] The four Network Access Points (NAPs) were defined under the U.S. Today, the phrase "Network Access Point" is of historical interest only, since the four transitional NAPs disappeared long ago, replaced by modern IXPs, though in Spanish-speaking Latin America, the phrase lives on to a small degree, among those who conflate the NAPs with Internet Exchange Points (IXPs). See also[edit] References[edit] Internet backbone. Each line is drawn between two nodes, representing two IP addresses.

This is a small look at the backbone of the Internet. The Internet backbone may be defined by the principal data routes between large, strategically interconnected computer networks and core routers on the Internet. These data routes are hosted by commercial, government, academic and other high-capacity network centers, the Internet exchange points and network access points, that interchange Internet traffic between the countries, continents and across the oceans. Internet service providers, often Tier 1 networks, participate in Internet backbone exchange traffic by privately negotiated interconnection agreements, primarily governed by the principle of settlement-free peering.

History[edit] The first packet-switched computer network was the ARPANET. Architectural principles[edit] Infrastructure[edit] Modern backbone[edit] Tier 1 providers[edit] Economy of the backbone[edit] Peering agreements[edit] Transit agreements[edit] Applying Disk Quota for Domain Users , Windows 2003. About Disk Quotas Earlier in Windows NT Administrators were unable to apply Disk Quotas to users as this feature was not available, but with the introduction of Windows 2000 their comes the induction of Disk Quota Management through Group Policy easing the life of System Administrators.The Only Problem left was this has not much features that Admins can use with Scripting,Reporting and Remote Usage.

Windows 2003 has all the features like reporting,managing and remote usage of Disk Quota. Disk Quota can only be Implemented with System Running with NTFS partitions. FAT/FAT32 are not supported.Disk quota are configured on Volume basis so one need to configure Separate Volumes. This was some how introduction to Disk Quota, now let start how to configure this on Windows 2003 Server. The most practical means of configuring disk quotas on a large scale would be through a domain-level group policy. Figure 1. You may also want to manually force a group policy update using the gpupdate utility. How can I check my disk quota? | Minnesota Supercomputing Institute. For all systems, per-user and project-space quotas are no longer enforced. All files in /home/group will be counted against a per-group quota.

You can check your group quota by logging in to the MSI login nodes and typing the command: groupquota Options You can see your individual utilization in addition to the group's usage with: groupquota -u You can see a report of all user quotas in the group with: groupquota -a You can view the all user quota report sorted by file count rather than bytes with: groupquota -a -s files You can view the all user quota report sorted by galaxy usage rather than bytes with: groupquota -a -s galaxy You can create a csv file of the quota report suitable for viewing in spreadsheet programs with the following ('quotareport.csv' is an output filename of your chocie): groupquota -ac > quotareport.csv All options can be viewed with: groupquota -h Usage breakdown To see how the space in your home directory is being used, issue the following commands: cd module load ncdu ncdu.

Internet exchange point. Function[edit] The primary purpose of an IXP is to allow networks to interconnect directly, via the exchange, rather than through one or more third-party networks. The advantages of the direct interconnection are numerous, but the primary reasons are cost, latency, and bandwidth.[1] Traffic passing through an exchange is typically not billed by any party, whereas traffic to an ISP's upstream provider is.[2] The direct interconnection, often located in the same city as both networks, avoids the need for data to travel to other cities (potentially on other continents) to get from one network to another, thus reducing latency.[1] The third advantage, speed, is most noticeable in areas that have poorly developed long-distance connections. Operation[edit] A typical IXP consists of one or more network switches, to which each of the participating ISPs connect.

The technical and business logistics of traffic exchange between ISPs is governed by mutual peering agreements. See also[edit] Historical: Communications in India. The history of the internet in India began with the launch of the Educational Research Network (ERNET) in 1986. The first publicly available internet service in India was launched by state-owned Videsh Sanchar Nigam Limited (VSNL) on 14 August 1995. As of May 2014, the Internet was delivered to India mainly by 9 different undersea fibres, including SEA-ME-WE 3, Bay of Bengal Gateway and Europe Indian Gateway, arriving at 5 different landing points.[1] India also has one overland internet connection, at the city of Agartala near the border with Bangladesh.[2] As of July 2016, 374,328,160 people (29.5% of the country's total population) were Internet users.[3] History[edit] The history of the internet in India began with the launch of the Educational Research Network (ERNET) in 1986.

NICNet was established in 1988 for communications between government institutions. The network was operated by the National Informatics Centre.[4] The service was plagued by several hardware and network issues. Analog computer. A page from the Bombardier's Information File (BIF) that describes the components and controls of the Norden bombsight. The Norden bombsight was a highly sophisticated optical/mechanical analog computer used by the United States Army Air Force during World War II, the Korean War, and the Vietnam War to aid the pilot of a bomber aircraft in dropping bombs accurately. Analog computers were widely used in scientific and industrial applications where digital computers of the time lacked sufficient performance.

Analog computers can have a very wide range of complexity. Slide rules and nomographs are the simplest, while naval gunfire control computers and large hybrid digital/analog computers were among the most complicated.[1] Systems for process control and protective relays used analog computation to perform control and protective functions. Setup[edit] Setting up an analog computer required scale factors to be chosen, along with initial conditions—that is, starting values.

Precursors[edit] Code reuse. Comparison of web application frameworks. Unified Modeling Language. Professional certification (computer technology) Category:IT certifications. Enterprise JavaBeans. Application server.