• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • HOME
  • ABOUT
    • Authors Intro
  • QUOTES
  • POETRY
    • ग़ज़ल व शायरी
  • STORIES
  • निबंध व जीवनी
  • Health Tips
  • CAREER DEVELOPMENT
  • STUDENT PAGE
  • योग व ध्यान

KMSRAJ51-Always Positive Thinker

“तू ना हो निराश कभी मन से” – (KMSRAJ51, KMSRAJ, KMS)

Check out Namecheap’s best Promotions!

Domain & Hosting bundle deals!
You are here: Home / Archives for INTERNET

INTERNET

Gmail Security Checklist – 5 Great Gmail Security Tips and Tricks

kmsraj51 की कलम से…..

Soulword_kmsraj51 - Change Y M T

Gmail Security Checklist – 5 Great Gmail Security Tips and Tricks

Without doubt, Gmail is the most popular and widely used email service all across the world today and maybe even of all time. Almost anyone who has Internet access has a functional email account, and more likely than not, an active Gmail account. Some of the features and services that Gmail and its integrated Google features offer are what make Gmail so widely accepted, used and loved. Moreover, it is as simple and user-friendly as an email service can get.

gmail-log0-kmsraj51

There are many security features that Google and Gmail offer its millions of users across the world, but when it comes to email security and malicious attachments, no amount of security is ever enough. Dangerous emails are a common source of malicious content and online scams, so here are some security tips for all Gmail users to keep in mind.

Best Gmail Security Tips for Email Account Holders

Gmail Tip # 1 – Use 2-step verification

2-step verification is perhaps one of the best methods to stay safe against password loss and unauthorized access into your Gmail account. As per this method, a one-time password (OTP) is sent to your phone for verification so that you can access your account. Hence, the term ‘2-step’. It also involves something you know (your password) and something you own (your phone) to gain access. In order to setup 2-step verification for your account, simply visit this link.

https://accounts.google.com/b/0/SmsAuthConfig

2-step-verification-gmail

Gmail Tip # 2 – Use HTTPS enabled security

Gmail always has HTTPS enabled by default, but it is advisable to check this from time to time. This is especially useful if you are accessing your Gmail account through a public network or a new and untrusted network. HTTPS is a security protocol that all online services provide to enable better security and tougher to crack access protocols. To check if HTTPS is enabled while you are signed in, look for the padlock symbol and the ‘https’ text in the address bar.

https-verification-kmsraj51

 

Gmail Tip # 3 – Use granted account access

Gmail provides the ability to grant access to an account to any other email address specified. If a hacker breaks into an account, this is something he will do to make logging into the account in the future a whole lot easier. You should regularly check that no accounts have been granted access without your permission. To do so, go to the gear in the top-right corner of your Gmail account once you sign in, click on ‘Settings’, then click on ‘Accounts and Import’ and then see the ‘Grant access to your account section‘ for details. Also ensure that you check the ‘Mark conversation as read when opened by others’ option.

grant-account-access-kmsraj51

 

Gmail Tip # 4 – Use account activity monitors

It is also possible for you to see when and where your Gmail has been accessed with ease. This ‘Activity Information Panel’ allows account holders to view many details with regards to their account access and report or take action if they notice something suspicious or out of the ordinary. To access this, sign into your account and look for the ‘Last account activity’ information at the bottom right corner when you scroll all the way down. Click on ‘Details’ in order to see a detailed list of account activity from where you can see access type (web browser or mobile), location (IP address) and the date/time details.

Gmail Tip # 5 – Use effective antispam services

When it comes to securing your PC and staying safeguarded against malicious emails, phishing links and other email scams, an effective email security suite and antispam engine is crucial. Quick Heal Internet Security provides advanced cloud-based email security that actively stops spam, phishing and infected emails from reaching your inbox. Moreover, other features keep your PC safe and secure even if other malicious threats enter your system. For complete email protection, trust only Quick Heal.

If you have any further Gmail security tips to share, we would love to hear from you.

Source: http://blogs.quickheal.com/

Note::-

यदि आपके पास हिंदी या अंग्रेजी में कोई Article, Inspirational Story, Poetry या जानकारी है जो आप हमारे साथ share करना चाहते हैं तो कृपया उसे अपनी फोटो के साथ E-mail करें. हमारी Id है: kmsraj51@yahoo.in. पसंद आने पर हम उसे आपके नाम और फोटो के साथ यहाँ PUBLISH करेंगे. Thanks!!

Also mail me ID: cymtkmsraj51@hotmail.com (Fast reply)

 

Kmsraj51 की कलम से …..

Coming soon book (जल्द ही आ रहा किताब) …..

CYMT-KMSRAJ51

“तू ना हो निराश कभी मन से”

 

 

__________ all rights reserve under Kmsraj51-2013-2014 ___________

Filed Under: Gmail Security Checklist – 5 Great Gmail Security Tips and Tricks, Gmail Security Checklist – 5 Great Gmail Security Tips and Tricks, Google Tagged With: Best Gmail Security Tips for Email Account Holders, E-mail protection settings, Email, email accounts, email protection software, Email security, Gmail, Gmail Security, Gmail Security Tips, google, INTERNET, Internet & Technology, Internet Worlds, kms, Kmsraj51, lock e-mail, mail Security tips & tricks, mrssonkms, Two-factor authentication

वेब का इतिहास-(History of the Web)!!

kmsraj51 की कलम से …..

वेब का इतिहास(History of the Web)
Concept internet communication

Tim Berners-Lee invented the World Wide Web in 1989, about 20 years after the first connection was established over what is today known as the Internet. At the time, Tim was a software engineer at CERN, the large particle physics laboratory near Geneva, Switzerland. Many scientists participated in experiments at CERN for extended periods of time, then returned to their laboratories around the world. These scientists were eager to exchange data and results, but had difficulties doing so. Tim understood this need, and understood the unrealized potential of millions of computers connected together through the Internet.

Tim documented what was to become the World Wide Web with the submission of a proposal to his management at CERN, in late 1989 (see the proposal.), This proposal specified a set of technologies that would make the Internet truly accessible and useful to people. Believe it or not, Tim’s initial proposal was not immediately accepted. However, Tim persevered. By October of 1990, he had specified the three fundamental technologies that remain the foundation of today’s Web (and which you may have seen appear on parts of your Web browser):

=> HTML: HyperText Markup Language. The publishing format for the Web, including the ability to format documents and link to other documents and resources.

=> URI: Uniform Resource Identifier. A kind of “address” that is unique to each resource on the Web.

=> HTTP: Hypertext Transfer Protocol. Allows for the retrieval of linked resources from across the Web.

Tim also wrote the first Web page editor/browser (“WorldWideWeb”) and the first Web server (“httpd“). By the end of 1990, the first Web page was served. By 1991, people outside of CERN joined the new Web community. Very important to the growth of the Web, CERN announced in April 1993 that the World Wide Web technology would be available for anyone to use on a royalty-free basis.

Since that time, the Web has changed the world. It has arguably become the most powerful communication medium the world has ever known. Whereas only 25% of the people on the planet are currently using the Web (and the Web Foundation aims to accelerate this growth substantially), the Web has changed the way we teach and learn, buy and sell, inform and are informed, agree and disagree, share and collaborate, meet and love, and tackle problems ranging from putting food on our tables to curing cancer.

Tim Berners-Lee and others realized that for the Web to reach its full potential, the underlying technologies must become global standards, implemented in the same way around the world. Therefore, in 1994, Tim founded the World Wide Web Consortium (W3C) as a place for stakeholders to reach consensus around the specification and guidelines to ensure that the Web works for everyone and that it evolves in a responsible manner. W3C standards have enabled a single World Wide Web of information and people, and an increasingly-rich set of capabilities: Web 2.0 (personal and dynamic), Web 3.0 (a semantic Web of linked data), Web services, voice access, mobile access, accessibility for people with disabilities and for people speaking many languages, richer graphics and video, etc. The Web Foundation supports the work of W3C to ensure that the Web and the technologies that underpin it remain free and open to all.

With over 1 trillion public pages (in 2008) and 1.7 billion people on the Web (in 2009), we do not really understand how these pieces work together and how to best improve the Web into the future. In 2005, Tim and colleagues started the Web Science Trust (WST). WST is building an international, multidisciplinary research community to examine the World Wide Web as “humanity connected by technology”. WST brings together computer scientists, sociologists, mathematicians, policy experts, entrepreneurs, decision makers and many others from around the world to better understand today’s Web and to develop solutions to guide the use and design of tomorrow’s Web. The Web Foundation believes the discipline of Web Science is critically important to advancing the Web, and supports WST‘s efforts to build and coordinate this new field of study.

Most of the history of the Web is ahead of us. The Web is far from reaching its full potential as an agent of empowerment for everyone in the world. Web access through the world’s 4+ billion mobile phones is an incredible opportunity. New Web technologies will enable billions of people currently excluded from the Web community to join it. We must understand the Web and improve its capabilities. We must ensure that Web technologies are free and open for all to leverage. The work of the Web Foundation aims to have a substantial, positive impact on all of these factors, and on the future history of the Web.

==========kmsraj51==========

Note::-
यदि आपके पास Hindi या English में कोई article, inspirational story, Poetry या जानकारी है जो आप हमारे साथ share करना चाहते हैं तो कृपया उसे अपनी फोटो के साथ E-mail करें. हमारी Id है::- kmsraj51@yahoo.in . पसंद आने पर हम उसे आपके नाम और फोटो के साथ यहाँ PUBLISH करेंगे. Thanks!!

tumblr_mw-kmsraj51

——————– —– http://kmsraj51.wordpress.com/ —– ——————

Filed Under: 2014 - KMSRAJ51 KI PEN SE ....., History of Web, INTERNET & TECHNOLOGY, IT-Information Technology, WWW Tagged With: INTERNET, kms, Kmsraj51, kmsraj51 top hindi website, The Web Index, Tim Berners-Lee, Web, World Wide Web, www, वेब का इतिहास

The Top 30 Internet Terms for Beginners, 2014

kmsraj51 की कलम से…..

WWW ( World Wide Web)
Concept internet communication

Welcome, readers! As you strive to make sense of the Internet and the World Wide Web, these 30 terms are bound to be very helpful.

1. The Web vs. the Internet

The Internet is a vast ‘interconnection of computer networks’. It is comprised of millions of computing devices that trade volumes of information. Desktop computers, mainframes, GPS units, cell phones, car alarms, video game consoles, and even soda pop machines are connected to the Net.

The Internet started in the late 1960’s as an American military project, and has since evolved into a massive public spiderweb. No single organization owns or controls the Internet. The Net has grown into a spectacular mishmash of non-profit, private sector, government, and entrepreneurial broadcasters.

The Internet houses many layers of information, with each layer dedicated to a different kind of documentation. These different layers are called ‘protocols’. The most popular protocols are the World Wide Web, FTP, Telnet, Gopherspace, instant messaging, and email.

The World Wide Web, or ‘Web’ for short, is the most popular portion of the Internet. The Web is viewed through web browser software.

Grammar and spelling note: Use capitalized ‘Internet’ and ‘Web’ when using either word as a noun. Use lowercase ‘internet’ or ‘web’ when using either word as an adjective. e.g. ‘We were browsing the Internet on our television last night.’ e.g. ‘We found a really good web page about global warming.’

==========kmsraj51==========

2. http and https

http is a technical acronym that means ‘hypertext transfer protocol’, the language of web pages. When a web page has this prefix, then your links, text, and pictures should work in your web browser.

https is ‘hypertext transfer protocol SECURED’. This means that the web page has a special layer of encryption added to hide your personal information and passwords. Whenever you log into your online bank or your web email account, you should see https at the front of the page address.

:// is the strange expression for ‘this is a computer protocol’. We add these 3 characters in a Web address to denote which set of computer lanaguage rules affect the document you are viewing.

==========kmsraj51==========

3. Browser

A browser is a free software package that lets you view web pages, graphics, and most online content. Browser software is specifically designed to convert HTML and XML into readable documents.

The most popular web browsers in 2013 are: Google Chrome, Firefox, Internet Explorer, and Safari.

==========kmsraj51==========

4. HTML and XML

Hypertext Markup Language is the programmatic language that web pages are based on. HTML commands your web browser to display text and graphics in orderly fashion. HTML uses commands called ‘HTML tags’ that look like the following:

XML is eXtensible Markup Language, a cousin to HTML. XML focuses on cataloging and databasing the text content of a web page. XML commands look like the following:

XHTML is a combination of HTML and XML.

==========kmsraj51==========

5. URL

URL’s, or ‘uniform resource locators’, are the web browser addresses of internet pages and files. A URL works together with IP addresses to help us name, locate, and bookmark specific pages and files for our web browsers.

URL’s commonly use three parts to address a page or file: the protocol (which is the portion ending in ‘//:’); the host computer (which sometimes ends in .com); and the filename/pagename itself. For example:

https://personal.bankofamerica.com/login/password.htm
http://forums.about.com/ab-guitar/?msg61989.1
ftp://files.microsoft.com/public/eBookreader.msi
telnet://freenet.edmonton.ca/main

==========kmsraj51==========

6. IP Address

Your computer’s ‘internet protocol’ address is a four-part or eight-part electronic serial number. An IP address can look something like ‘202.3.104.55’ or like ’21DA:D3:0:2F3B:2AA:FF:FE28:9C5A’, complete with dot or colon separators. Every computer, cell phone, and device that accesses the Internet is assigned at least one IP address for tracking purposes. Wherever you browse, whenever you send an email or instant message, and whenever you download a file, your IP address acts like a type of automobile licence plate to enforce accountability and traceability.

==========kmsraj51==========

7. Email

Email (formerly spelled e-mail with a hyphen) is electronic mail. It is the sending and receiving of typewritten messages from one screen to another. Email is usually handled by a webmail service (e.g. Gmail or Yahoomail), or an installed software package (e.g. Microsoft Outlook).

Email has many cousins: text messaging, instant messaging, live chat, videomail (v-mail), Google Waving.

==========kmsraj51==========

8. Blogs and Blogging

A blog (‘web log’) is a modern online writer’s column. Amateur and professional writers publish their blogs on most every kind of topic: their hobby interest in paintball and tennis, their opinions on health care, their commentaries on celebrity gossip, photo blogs of favorite pictures, tech tips on using Microsoft Office. Absolutely anyone can start a blog, and some people actually make reasonable incomes by selling advertising on their blog pages.

Web logs are usually arranged chronologically, and with less formality than a full website. Blogs vary in quality from very amateurish to very professional. It costs nothing to start your own personal blog.

The 15 best blogging and publishing platforms on the Internet today. Which one is for you?

=> WordPress

=> Blogger

=> Tumblr

=> Medium

=> Svbtle

=> Quora

=> Postach.io

=> Google+

=> Facebook Notes

=> SETT

=> Ghost

=> Squarespace

=> Typepad

=> Posthaven

=> LinkedIn Influencers

=> The fallen heroes

==========kmsraj51==========

9. Social Media and Social Bookmarking

Social media is the broad term for any online tool that enables users to interact with thousands of other users. Instant messaging and chatting are common forms of social media, as are blogs with comments, discussion forums, video-sharing and photo-sharing websites. Facebook.com and MySpace.com are very large social media sites, as are YouTube.com and Digg.com.

Social bookmarking is a the specific form of social media. Social bookmarking is where users interact by recommending websites to each other (‘tagging sites’).

==========kmsraj51==========

10. ISP

ISP is Internet Service Provider. That is the private company or government organization that plugs you into the vast Internet around the world. Your ISP will offer varying services for varying prices: web page access, email, hosting your own web page, hosting your own blog, and so on. ISP’s will also offer various Internet connection speeds for a monthly fee. (e.g. ultra high speed Internet vs economy Internet).

Today, you will also hear about WISP’s, which are Wireless Internet Service Providers. They cater to laptop users who travel regularly.

==========kmsraj51==========

11. Download

Downloading is a broad term that describes when you make a personal copy of something you find on the Internet or World Wide Web. Commonly, downloading is associated with songs, music, and software files (e.g. “I want to download a new musical ringtone for my cell phone”, “I want to download a trial copy of Microsoft Office 2010”). The larger the file you are copying, the longer the download will take to transfer to your computer. Some downloads will take 12 to 15 hours, depending on your Internet speed.

Be warned: downloading itself is fully legal, as long as you are careful not to download pirated movies and music.

==========kmsraj51==========

12. Malware

Malware is the broad term to describe any malicious software designed by hackers. Malware includes: viruses, trojans, ratware, keyloggers, zombie programs, and any other software that seeks to do one of four things:

vandalize your computer in some way
steal your private information
take remote control of your computer (‘zombie’ your computer) for other ends
manipulate you into purchasing something
Malware programs are the time bombs and wicked minions of dishonest programmers.

==========kmsraj51==========

13. Router (aka ‘Network Router’)

A router, or in many cases, a router-modem combination, is the hardware device that acts as the traffic cop for network signals into your home. A router can be wired or wireless or both. Your router provides both a defense against hackers, and the redirection service of deciding which specific computer or printer should get which signals in your home. If your router or router-modem is configured correctly, your Internet speed will be fast, and hackers will be locked out. If your router is poorly configured, you will experience network sluggishness and possible hacker intrusions.

==========kmsraj51==========

14. Keywords and Tags/Labels

Keywords are search terms used to locate documents. Keywords are anywhere from one to five words long, separated by spaces or commas: e.g. “horseback riding calgary” e.g. “ipad purchasing advice” e.g. “ebay tips selling”. Keywords are the foundation for cataloging the Web, and the primary means by which you and I will find anything on the Web.

Tags (sometimes called ‘labels’) are recommendation keywords. Tags and labels focus on crosslinking you to related content… they are the modern evolution of ‘suggestions for further reading’.

==========kmsraj51==========

15. Texting/Chatting

Texting is the short way to say ‘text messaging’, the sending of short electronic notes usually from a cell phone or handheld electronic device. Texting is popular with people who are mobile and away from their desk computers. Texting is something like the pagers of old, but has the file attachment ability of email.

To send a text message, you will usually need a keyboard-enabled cellphone and a text message service through your cellphone provider. You address your text messages using the recipient’s phone number.

In 2010, texting has spawned a controversial habit called ‘sexting’, which is when young people send sexual photos of themselves to other cell phone users.

==========kmsraj51==========

16. I.M.

I.M. (usually spelled ‘IM’ without the periods) is instant messaging, a form of modern online chatting. IM is somewhat like texting, somewhat like email, and very much like sending notes in a classroom. IM uses specialized no-cost software that you install on your computer. That IM software in turn connects you to potentially thousands of other IM users through the Internet. You locate existing friends and make new friends by searching for their IM nicknames.

Once the software and your friends list is in place, you can send instantaneous short messages to each other, with the option of including file attachments and links. While the recipient sees your message instantly, they can choose to reply at their leisure.

==========kmsraj51==========

17. P2P

P2P file sharing (‘peer-to-peer’) is the most voluminous Internet activity today. P2P is the cooperative trading of files amongst thousands of individual users. P2P participants install special software on their computers, and then voluntarily share their music, movies, ebooks, and software files with each other.

Through ‘uploading’ and ‘downloading’, users trade files that are anywhere from 1 megabyte to 5 gigabytes large. This activity, while in itself a fully legal pasttime, is very controversial because thousands of copyrighted songs and movies trade hands through P2P.

==========kmsraj51==========

18. E-commerce

E-commerce is ‘electronic commerce’: the transacting of business selling and buying online. Every day, billions of dollars exchange hands through the Internet and World Wide Web. Sometimes, the e-commerce is your company buying office products from another company (business-to-business ‘B2B’ e-commerce). Sometimes, the e-ecommerce is when you make a private purchase as a retail customer from an online vendor (business-to-consumer ‘B2C’ e-commerce).

E-commerce works because reasonable privacy can be assured through technical means (e.g. https secure web pages), and because modern business values the Internet as a transaction medium.

==========kmsraj51==========

19. Bookmark

A bookmark (aka “favorite”) is a marker that you can place on web pages and files. You would bookmark something because:

=> You want to return to the page or file later
=> You want to recommend the page or file to someone else

Bookmarks/Favorites can be made using your right mouse click menu, or the menus/toolbars at the top of your web browser. Bookmarks/Favorites can also be made on your Mac or Windows computer files.

==========kmsraj51==========

20. Social Engineering

Social engineering is the conman art of talking directly to people to trick them into divulging passwords and their private information. All social engineering attacks are some form of a masquerade or phishing attack, designed to convince you that the attacker is trustworthy as a friend or as a legitimate authority figure. The attacker might use an email, phone call, or even face-time interview to deceive you. Common social engineering attacks include greeting cards, bogus lottery winnings, stock investment scams, warnings from an alleged banker that you’ve been hacked, credit card companies pretending to protect you.

==========kmsraj51==========

21. Phishing and Whaling

‘Phishing’ is what modern-day con men do to defraud you of your personal accounts. Phishing is the use of convincing-looking emails and web pages to lure you into typing your account numbers and passwords/PINs. Often in the form of fake eBay web pages, fake PayPal warning messages, and fake bank login screens, phishing attacks can be very convincing to anyone who is not trained to watch for the subtle clues. As a rule, smart users distrust any email link that says “you should login and confirm this”.

==========kmsraj51==========

22. Addons and Plugins

Addons are custom software modifications. User optionally install addons to improve the power of their Web browsers or office software. Examples include: a custom eBay toolbar for your Firefox browser, a new search feature for your Outlook email. Most addons are free, and can be found and downloaded from the Web.

Plugins are a special kind of web browser addon. Plugins are essentially required addons, if you wish to view very specialized web pages. Examples include: Adobe Flash or Shockwave player, Microsoft Silverlight player, Adobe Acrobat pdf reader.

==========kmsraj51==========

23. Trojan

A trojan is a special kind of hacker program that relies on the user to welcome it and activate it. Named after the famous Trojan horse tale, a trojan program masquerades as a legitimate file or software program. Sometimes it will be an innocent-looking movie file, or an installer that pretends to be actual anti-hacker software. The power of the trojan attack comes from users naively downloading and running the trojan file.

==========kmsraj51==========

24. Spamming and Filtering

‘Spam’ has two meanings. 1) Spam can mean ‘the rapid reptition of a keyboard command’. But more commonly, 2) spam is the jargon name of ‘unwanted/unsolicited email’. Spam email is usually comprised of two sub-categories: high-volume advertising, and hackers attempting to lure you into divulging your passwords.

Filtering is the popular-but-imperfect defense against spam. Filtering uses software that reads your incoming email for keyword combinations, andthen either deletes or quarantines messages that appear to be spam. Look for a ‘spam’ or ‘junk’ folder in your mailbox to see your quarantine of filtered email.

==========kmsraj51==========

25. Cloud Computing and Software-as-a-Service (SaaS)

Cloud computing is a fancy term to describe that your software is online and ‘borrowed’, instead of purchased and actually installed on your computer. Web-based email is the most prevalent example of cloud computing: the users’ email is all stored and accessed ‘in the cloud’ of the Internet, and not actually on their own computers. This is the modern version of the 1970’s mainframe computing model. As part of the cloud computing model, ‘Software as a Service’ is the business model that claims people would rather rent software than actually own it. With their web browsers, users access the cloud of the Internet, and log into their online rented copies of their SaaS software.

==========kmsraj51==========

26. Apps and Applets

Apps and applets are small software applications. They are designed to be much smaller than regular computer software, but still provide very useful functions. Lately, apps are very popular with cellphone and mobile platforms; specifically: with the Apple iPhone and the Google Android phone.

Examples of apps: rangefinder GPS for golfing, song identification software, restaurant reviews, pocket video games, language translators for traveling.

==========kmsraj51==========

27. Encryption and Authentication

Encryption is the mathematical scrambling of data so that it is hidden from eavesdroppers. Encryption uses complex math formulas (‘ciphers’) to turn private data into meaningless gobbledygook that only trusted readers can unscramble. Encryption is the basis for how we use the public Internet as a pipeline to conduct trusted business, like online banking and online credit card purchasing. On the provision that reliable encryption is in place, your banking information and credit card numbers are kept private.

Authentication is directly related to encryption. Authentication is the complex way that computer systems verify that you are who you say you are.

==========kmsraj51==========

28. Ports and Port Forwarding

‘Network ports’ are thousands of tiny electronic ‘lanes’ that comprise your network connection. Every computer has 65,536 tiny ports, through which Internetworking data travels in and out. By using port management tools like a hardware router, users can control port access to better safeguard themselves against hackers.

‘Port forwarding’ is the semi-complex technique of opening specific network ports. You would port-forward to speed up your downloading and speed up your online connections for gaming and teleconferencing.

==========kmsraj51==========

29. Firewall

Firewall is a generic term to describe ‘a barrier against destruction’. It comes from the building term of a protective wall to prevent the spreading of housefires or engine compartment fires. In the case of computing, ‘firewall’ means to have software and/or hardware protecting you from hackers and viruses.

Computing firewalls range from small antivirus software packages, to very complex and expensive software + hardware solutions. All the many kinds of computer firewalls offer some kind of safeguard against hackers vandalizing or taking over your computer system.

==========kmsraj51==========

30. Archives and Archiving

A computer ‘archive’ is one of two things: a compressed container of multiple smaller data files, or a purposeful long-term storage of files that are not going to be used often. In some cases, an archive can be both.

The act of ‘archiving’, similarly, is one of two things: to combine and squeeze multiple files into a larger single file (for easier emailing); or, archiving is when you will retire data and documents to be put into long-term storage (e.g. your thousands of old emails in your inbox).

Source:: http://www.about.com/

Note::-
यदि आपके पास Hindi या English में कोई article, inspirational story, Poetry या जानकारी है जो आप हमारे साथ share करना चाहते हैं तो कृपया उसे अपनी फोटो के साथ E-mail करें. हमारी Id है::- kmsraj51@yahoo.in . पसंद आने पर हम उसे आपके नाम और फोटो के साथ यहाँ PUBLISH करेंगे. Thanks!!

Google-internet-006

——————– —– http://kmsraj51.wordpress.com/ —– ——————

Filed Under: 2014 - KMSRAJ51 KI PEN SE ....., INTERNET & TECHNOLOGY, IT-Information Technology, WWW Tagged With: Addons and Plugins, Apps, Bookmark, Cloud Computing, Cloud Computing and Software-as-a-Service (SaaS), E-commerce, Encryption and Authentication, Firewall, INTERNET, Internet Marketing, internet technology, internet world, kms, Kmsraj51, Phishing and Whaling, Security, Social Engineering, Social Media and Social Bookmarking, Spamming and Filtering, Texting/Chatting, Trojan, www

Wi-Fi and Mobile Broadband !!

Happy Anniversary!
anniversary-1x09-March-2013 to 09-March-2014
http://kmsraj51.wordpress.com/


kmsraj51 की कलम से …..
PEN KMSRAJ51-PEN


Wi-Fi and Mobile Broadband – Component Guideline
Keep your laptop connected with the right wireless options
TECHNOLOGY

For a while now, Wi-Fi has been an inalienable right for notebook owners. But that’s not the end of the story when it comes to wireless connectivity. Aside from choosing between different standards of Wi-Fi, many users purchase mobile broadband subscriptions to get Internet access from the road. Read on to figure out just how much connectivity you need.

=> Types of Wi-Fi

Whether you buy a 10-inch net book or an 18-inch desktop replacement, your laptop will definitely have Wi-Fi. This means that, provided you’re located within range of a router (and know the password, if there is one), you can get online without the aid of an Ethernet cable.

The two main Wi-Fi standards today are 802.11n (wireless-N) and the older 802.11g (wireless-G). Many budget models still offer 802.11g as the base configuration option, but there are other low-cost notebooks, particularly preconfigured models designed for stores such as Best Buy, that have wireless-N.

802.11g supports speeds up to 54 Mbps. This is fine for everyday Internet use, such as checking e-mail and surfing the Web, because this is much faster than even the fastest broadband connection.

802.11n supports speeds over 100 Mbps. Unlike 802.11g, which runs only on the 2.4-GHz spectrum, 802.11n can run on either the 2.4-GHz or 5.0-GHz spectrum. This means it can work with dual-band routers, which reserve low-intensity tasks (such as e-mail) for the 2.4-GHz band, and higher-intensity ones (such as streaming HD video) for the 5.0-GHz band.

If your needs are basic and you want to cut every corner, you’ll likely be satisfied with 802.11g. But since 802.11n only costs around $25 more, you might want to consider upgrading to future-proof your notebook. If you’re interested in wirelessly streaming video, particularly high-def content, between devices in your home, 802.11n is a must.

Q. Do You Need Mobile Broadband?

Ans =>
Mobile broadband allows you to get online anywhere; it doesn’t matter if you happen to be near a router. If this sounds like the kind of Internet connection you’re used to getting on your smart phone, well, there’s a reason for that. Mobile broadband subscriptions are sold through the same carriers—AT&T, Sprint, Verizon Wireless, and, lately, T-Mobile—that operate cell phones (more later on the technology behind mobile broadband).
If you frequently need Internet connectivity outside of your home or office, you will have difficulty relying on your Wi-Fi card alone; free public Wi-Fi can be hard to come by, and you can’t always find a paid hotspot, either. On the other hand, mobile broadband connections are not as fast as Wi-Fi, and monthly subscription fees (typically $60 for 5GB per month) can be steep. So get mobile broadband only if you really need it.

– Choosing the Right Mobile Broadband Service

There are two major technologies propelling mobile broadband: Evolution Data-Optimized (EV-DO) and High Speed Packet Access (HSPA). Sprint and Verizon Wireless employ EV-DO; AT&T and T-Mobile, HSPA. Although the end user won’t notice much (if any) difference in upload and download speeds, they have different hardware structures, so an adapter made for one won’t work with another. No matter which provider you choose, you should expect speeds of 600 kbps to 1 Mbps for downloading and 500 to 700 Kbps for uploading.
The primary factors you should consider when choosing a mobile broadband provider are coverage, price, and contract terms. Look at coverage maps from the providers you’re considering and see if they match up with areas to which you frequently travel. To avoid overage charges, get a data plan that provides at least 5GB per month of transfer.
If you want the freedom to easily change between carriers, a relatively new technology called Gobi allows users the option of using either EV-DO- or HSPA-enabled mobile broadband cards. You’re most likely to find this offered in business notebooks (HP, for example, offers it in many of its SMB laptops). That’s good news for businesses that don’t want to commit to a carrier or piece of hardware for any specified length of time.

– Mobile Broadband Cards and Adapters

When you purchase mobile broadband, you need to decide what type of adapter you want: integrated (internal) or external. Each has its advantages.
Internal cards, which need to be installed by the manufacturer when the notebook is built, are convenient because they don’t stick out or use up one of your system’s ports. However, getting an internal card is more expensive than an external one, most notebooks aren’t available with integrated broadband cards, and if you get one you are locked into using one service provider on that notebook.
If you buy an external adapter, you can use it on any notebook in the world. You even have the liberty of unplugging it, and installing the software on another laptop—a useful scenario if you have primary and secondary PCs, or if there is more than one notebook in your household.
External adapters are available in ExpressCard or USB flash drive form factors. ExpressCard adapters don’t stick out as much, but many notebooks don’t support them, so USB is usually a better option.

Q. What is Mobile WiMAX and Do You Need it?

Ans =>
Whereas most mobile broadband options today run on the same 3G network as phones, the next generation of mobile broadband, called Mobile WiMAX, is already being rolled out. WiMAX, often dubbed 4G for short, boasts faster speeds than 3G: 3 to 6 Mbps, to be exact.
Right now, the service is only available in select cities, such as Baltimore and Las Vegas. But if you’re in those areas, you can buy a 2GB monthly pass for just $35, a significantly lower price than what you’d pay for a 3G card with a 5GB monthly allowance. Moreover, the penalty for exceeding that bandwidth cap is $10 per gigabyte, whereas it would be more than $50 if you went overboard with a 3G card. In our hands-on testing, we’ve been impressed with the swiftness of downloads, although not necessarily the upload speeds. For now, though, unless you live in a WiMAX-enabled city, it’s not an option.

Note::-
यदि आपके पास Hindi में कोई article, inspirational story, Poetry या जानकारी है जो आप हमारे साथ share करना चाहते हैं तो कृपया उसे अपनी फोटो के साथ E-mail करें. हमारी Id है::- kmsraj51@yahoo.in . पसंद आने पर हम उसे आपके नाम और फोटो के साथ यहाँ PUBLISH करेंगे. Thanks!!

——————– —– http://kmsraj51.wordpress.com/ —– ——————

Filed Under: 2014 - KMSRAJ51 KI PEN SE ....., INTERNET & TECHNOLOGY, IT-Information Technology Tagged With: AINA, Cloud Computing, IEEE, INTERNET, kms, Kmsraj51, Krishna Mohan Singh, Mobile Broadband, mrssonkms, mrssonkmsraj51, NETWORK LINKS, new technology, OSI, OSI MOUDLE, Useful Internet Links, Wi-Fi, wi-fi word, word of internet, www

क्यों बचें Facebook से ? 7 reasons !!

kmsraj51 की कलम से …..


Facebook (Fb) world की दूसरी सबसे ज्यादा visit की जाने वाली site है …(पहली Google है ).

Dislike-Facebook-150x150Facebook Over-use

इसे बनाने वाले दुनिया के youngest billionaire Mark Zukerberg ने भी कभी नहीं सोचा था की ये इतनी जल्दी इतनी popular हो जाएगी . In fact , अगर आप Fb पे नहीं हैं तो लोग आपको आश्चर्य से देखते हैं . ..” Fb पे नहीं है ………….जी कैसे रहा है …… 🙂 !!!” and all that.

आज Fb पे 1 billion+ registered user हैं, यानि दुनिया का हर सातवाँ आदमी Fb पे है and in all probability आप भी उन्ही में से एक होंगे . और शौक से Fb use करते होंगे . पर जो सोचने की बात है वो ये कि क्या आप Fb use करते ; overuse करते हैं …या फिर कहीं आप इसके addict तो नहीं !

Let’s say use करने का मतलब है कि आप Fb पर daily 1 घंटे से कम समय देते हैं , और overuse करने का मतलब है 1 घंटे से ज्यादा . और हाँ , use करने से बस ये मतलब नहीं है कि आप physically system के सामने या अपने smart phone को हाथ में लेकर use करते हैं even अगर आप Fb के बारे में सोचते हैं तो वो भी time usage में count होगा after all वो उतने देर के लिए आपका mind space occupy कर रहा है .

और अगर आप सोच रहे हैं कि कहीं मैं addict तो नहीं हूँ तो इन traits को देखिये , अगर ये आपमें हैं तो आप addict हो सकते हैं :

आप का दिमाग अकसर इसी बात में लगा रहता है कि आपकी पोस्ट की गयी चीजों पर क्या कमेंट आया होगा, कितने लोगों ने लाइक किया होगा.
आप बिना मतलब बार-बार फेसबुक स्क्रीन रिफ्रेश करते हैं कि कुछ नया दिख जाए.
अगर थोड़ी देर आपका internet नहीं चला तो आप updates चेक करने साइबर कैफे चले जाते हैं या दोस्त को फ़ोन करके पूछते हैं.
आप टॉयलेट में भी मोबाइल या लैपटॉप लेकर जाते हैं कि Fb use कर सकें
आप सोने जाने से पहले सभी को Good Night करते हैं और सुबह उठ कर सबसे पहले ये देखते हैं की आपकी गुड नाईट पर क्या reactions आये.
अब मैं आपको अपने usage के बारे में बताता हूँ , on an average मैं daily 10 minutes से भी कम Fb use करता हूँ including Fb के बारे में सोचने का time. हाँ, इसे आप under usage भी कह सकते हैं . 🙂 In my opinion ideally Fb आधे घंटे से अधिक नहीं use करना चाहिए पर फिर भी मैंने over usage को 1 घंटे से ऊपर रखा है .

और अब आपकी बात करते हैं , आप कितनी देर Fb use करते हैं ?

Well, अगर ये daily 1/2 घंटे से अधिक है तो आप अपना time waste कर रहे हैं , unless until आप purposefully ऐसा कर रहे हैं . Purposefully means आप अपना बिज़नस प्रमोट कर रहे हैं, किसी social cause के लिए campaign चला रहे हैं या कोई और meaningful काम कर रहे हैं , इन cases में अपना टाइम देना worth है .

किस तरह के लोग Fb ज़रुरत से अधिक use करते हैं :

In my opinion :

• जिनके पास कोई meaningful goal नहीं है …… the wanderers

• जो लोगोंका ध्यान आकर्षित करना चाहते हैं करना चाहते हैं ….the attention seekers.

• जो अपनी life से अधिक दूसरों की life में interest रखते हैं …..the peepers

क्या नुकसान कर सकता है Facebook का over usage ?

इसकी लिस्ट तो बहुत लम्बी है लेकिन आज मैं आपके साथ 7 ऐसे points share कर रहा हूँ , तो आइये देखते हैं इन्हें :

1) आप unknowingly अपनी happiness का control दूसरों को दे देते हैं ?

कैसे ? दरअसल अब आपकी happiness इस बात पर depend करने लगती है कि Fb पे आपकी बातों , आपकी pics को कितने लोग like कर रहे हैं , कितने लोग उसपर comments कर रहे हैं …कैसे comments कर रहे हैं …etc. For instance आपने एक नई watch ली और उसकी photo post की …obviously आपको watch बहुत पसंद थी इसलिए आपने ली …पर जब Fb पे उसे अधिक लोग like नहीं करते और कोई उसका मज़ाक बना देता है तो आप दुखी हो जाते हैं . और उसका उल्टा भी सही है …आप को कोई चीज पसंद नहीं है पर बाकी लोग उसको अच्छा कह देते हैं तो आप खुश हो जाते हैं …so in a way आप अपनी happiness का control अपने Fb friends को दे देते हैं . मैं ये नहीं कहता कि ये सभी के साथ होता है पर इतना ज़रूर है कि हम कहीं न कहीं इन चीजों से affect होते हैं .

And over a long period of time ये छोटे छोटे इफेक्ट्स बड़े होते जाते हैं और हमें पता भी नहीं चलता कि हम अपना real self कहाँ छोड़ आये.

2) आपको दूसरों की blessings और अपनी shortcomings दिखाई देने लगती है ?

Fb पर लोग generally अपनी life की अच्छी अच्छी बातें ही share करते हैं …लोग अपने साथ हो रही अच्छी चीजें बताते हैं , उनके status कुछ ऐसे होते हैं “ My new machine” , “ Lost in London”..etc

In reality आप भी ऐसा ही करते हैं , पर अन्दर ही अन्दर आप अपनी असलीयत भी जानते हैं , पर दूसरों के case में आप वही देखते हैं जो वो आपको दिखाते हैं , आपको उनकी नई car नज़र आती है पर उसके साथ आने वाला EMI नहीं , आपको friend का swanky office तो दीखता है पर उसके साथ मिलने वाली tension नहीं . और ऐसा होने पर आप उनकी खुशियों को अपने ग़मों से compare करने लगते हैं और ultimately low feel करने लगते हैं .

Fb की वजह से depression में जाने वालों की संख्या दिन ब दिन बढती जा रही है , just beware कि आप भी इसके शिकार न हो जाएं .

3) Real Friends और relationships suffer करते हैं :

कई बार लोग बहुत proudly बताते हैं , “ Fb पे मेरे 500 friends हैं …” I am sure उनमे से आधे अगर सामने से गुजर जाएं तो वो उन्हें पहचान भी नहीं पायंगे . हकीकत में Fb पे हमारे friends कम और acquaintances ज्यादा होते हैं . खैर ये कोई खराब बात नहीं है …लेकिन अगर हम इन more or less fake relations को ज़रुरत से अधिक time देते हैं तो कहीं न कहीं हमें अपनी family और friends को जो time देना चाहिए उससे compromise करते हैं . I know हमारे close friends और relations भी Fb पे होते हैं , but frankly speaking Fb पर वो भी हमारे लिए आम लोगों की तरह हो जाते हैं , क्योंकि Fb तो एक भीड़ की तरह है …और भीड़ का कोई चेहरा नहीं होता ….जो सामने पड़ा …like किया , comment दिया और आगे बढ़ गए ….individuals को attention देना ये Fb की आत्मा में ही नहीं है .

4) आप mainly addicts से communicate करने लगते हैं :

शायद आपने Pareto principle के बारे में सुना होगा …इस principle का कहना है कि 80% चीजों के लिए 20% चीजें जिम्मेदार होती हैं .

For eg. किसी company की 80 % sales 20% customers की वजह से होती है .

ऐसा ही कुछ Fb पे भी होता है …80% updates 20% लोगों द्वारा ही की जाती है …और आप बार बार उन्ही से linkup होते रहते हैं …and basically ये वही Addict kind of लोग होते हैं जो बस Fb से चिपके ही रहते हैं . और ऐसे लोगों से interact करना शायद ही कभी आपको काम की चीजें बता पाएं . ये mostly waste of time ही होता हैं .

5) आपको Socially active होने का भ्रम हो जाता है और reality इसके उलट होती है :

Facebook पे होने से कई लोग खुद को socially active समझने लगते हैं , और friends को hi -bye कर के अपना role पूरा समझ लेते हैं . धीरे -धीरे ये बिलकुल mechanical हो जाता है …आप Fb पे तो hi करते हैं लेकिन जब उसी दोस्त से college या office में मिलते हैं तो react भी नहीं करते …it is like आपकी online presence मायने रखती हो पर आपका खुद का मौजूद होना बेमानी हो .

और जब आप ऐसे behave करते हैं तो लोग आपको avoid करने लगते हैं और कहीं न कहीं आपको fake समझने लगते हैं . यानि आपको तो लगता है कि आप सबसे touch में हैं पर इसके उलट आप अपना touch खोते जाते हैं .

6) आपकी health पर बुरा असर पड़ता है :

Fb पर लगे रहने से आपको फिजिकल और मेंटल दोनों तरह की प्रॉब्लम हो सकती हैं. आपकी आँखें कमजोर पड़ सकती हैं, गलत posture में बैठने से आपको स्पॉन्डिलाइटिस हो सकता है . और डिप्रेशन में जाने का खतरा तो हमेशा ही बना रहता है.

7) आप अपनी life के सबसे energetic days lazy entertainment में लगा देते हैं :

Fb use करने वालों की demography देखी जाए तो इसे सबसे अधिक teens और twenties के young लोग use करते हैं . अगर आप इस age group से बाहर हैं तो ये point आपके लिए applicable नहीं है.

Teenage और twenties life का वो time होता है जब आपके अन्दर energy की कोई कमी नहीं होती …कभी सोचा है कि इस वक्त भगवान् आपको सबसे अधिक energy क्यों देते है ….क्योंकि ये हमारे life making years होते हैं ….इस समय आपके सामने करने को बहुत कुछ होता है …..पढाई का बोझ या घर की जिम्मेदारी उठाने का challenge…अपना career chose करने और competition beat करने की कशमकश …अपने दिल कि सुनकर कुछ कर गुजरने की चाहत …parents के सामने हाथ फैलाने की जगह उनका हाथ थामने कि जिद्द …और ये सब करने के लिए उर्जा चाहिए …energy चाहिए ; but unfortunately Fb का over usage करने वाले उसे गलत जगह invest करते हैं . जहाँ उनके पास करने को इतने ज़रूरी काम हैं वो एक कोने में बैठ कर , and in ,most of the cases लेट कर …अपनी life के ये energetic days एकदम unproductive चीज में लगा देते हैं .

Friends अंत में मैं यही कहना चाहूँगा कि Fb एक शोर -शाराबे से भरे mall की तरह है …यहाँ थोडा वक़्त बीतायेंगे तो अच्छा लगेगा लेकिन अगर वहीँ घर बना कर रहने लगेंगे तो आपकी ज़िन्दगी औरों की आवाज़ के शोर में बहरी हो जाएगी . उसे बहरा मत होने दीजिये ….अपना time अपनी energy कुछ बड़ा , कुछ valuable , कुछ शानदार करने में लगाइए और जब आप ऐसा करेंगे तो आपके इस काम को सिर्फ आपके friends ही नही बल्कि पूरी दुनिया Like करेगी , और ऊपर वाला comment देगा , “gr8 job my son”

All the best!

Post inspired by AKC. I am grateful to Mr. Gopal Mishra & AKC (http://www.achhikhabar.com/) Thanks a lot !!



Note::-
यदि आपके पास Hindi में कोई article, inspirational story, Poetry या जानकारी है जो आप हमारे साथ share करना चाहते हैं तो कृपया उसे अपनी फोटो के साथ E-mail करें. हमारी Id है::- kmsraj51@yahoo.in . पसंद आने पर हम उसे आपके नाम और फोटो के साथ यहाँ PUBLISH करेंगे. Thanks!!


———– http://kmsraj51.wordpress.com/ ————-

Filed Under: 2014 - KMSRAJ51 KI PEN SE ....., INTERNET & TECHNOLOGY Tagged With: Danger Facebook Over-use, danger stage of fb use, Facebook, Facebook Over-use, FB, INTERNET, kms, Kmsraj51, Krishna Mohan Singh, mrsson kmsraj51, mrssonkms, mrssonkmsraj51 & groups of companis, WHY AVOID fACEBOOK

VMware Technical Full Form !!


kmsraj51 की कलम से …..
PEN KMSRAJ51-PEN

VMware Certified Professional – (VCP)

Technical Support Engineer – (TSE)

Customer Support Representative – (CSR)

Support Administrator – (SA)

Primary and Secondary License Administrators – (PLAs and SLAs)

VMware Global Support Services (VGSS) &
Technical Support Engineers (TSEs)

ift

Plugin Development Kit – (PDK)

Application Programming Interfaces – (APIs)

Technical Support Alliance Network – (TSANet)

or Cooperative Support Agreement – (CSA)

Virtual Computing Environment – (VCE)

Server Virtualization Validation Program – (SVVP)

Software Developers Kit – (SDK)

Command Line Interface – (CLI)

Java Development Kit – (JDK)

or Java Runtime Environment – (JRE)

VMware Security Response Policy – (VMSRP)

VMware Security Center – (VMSC)

Primary License Administrator – (PLA)

Virtualization support organization – (VSO)

Mission Critical Support – (MCS)

VMware Community Forum – (VMCF)

Local Language Support Policy – (LLSP)

Interactive Voice Response – (IVR)

Support Request – (SR)

Customer Support Request – (CSR)

Technical Support Request – (TSR)

Licensing Support Request – (LSR)

Note::-
यदि आपके पास Hindi में कोई article, inspirational story, Poetry या जानकारी है जो आप हमारे साथ share करना चाहते हैं तो कृपया उसे अपनी फोटो के साथ E-mail करें. हमारी Id है::- kmsraj51@yahoo.in . पसंद आने पर हम उसे आपके नाम और फोटो के साथ यहाँ PUBLISH करेंगे. Thanks!!

::::::::::: ~ ::- Krishna Mohan Singh(kmsraj51) ….. :::::::::::

Filed Under: 2014 - KMSRAJ51 KI PEN SE ....., INTERNET & TECHNOLOGY Tagged With: 2014 Information Technology, Booming Indian IT, Cloud Computing, INDIAN IT, INDIAN IT GROWTH, INTERNET, IT, Present VMware Technology, Security of VMware, TECHNOLOGY, Ultra, VMware, VMware Certification, VMware Deep Technology, VMware Security, VMware Technology

10 गुना इंटरनेट स्पीड देगा गूगल का नया डाटा सेंटर ~ Google’s new data center offers internet speeds 10 times !!

::- Krishna Mohan Singh(kmsraj51) …..

kmsraj51 की कलम से …..
pen-kms

** 10 गुना इंटरनेट स्पीड देगा गूगल का नया डाटा सेंटर!! **


ggl

इंटरनेट की दुनिया की सबसे मशहूर कंपनी गूगल ने हाल ही में एशिया में अपने दो नए डाटा सेंटर खोले हैं। टैक्नोलॉजी की दुनिया भर के बाजारों में बढ़ती मांग को देखते हुए कंपनी ने ये कदम उठाया है। एक डाटा सेंटर काउंटी ताइवान और दूसरा जुरोंग वेस्ट, सिंगापुर में खोला गया है। कंपनी ने इन दोनों सेंटर को तैयार करने में कुल मिलाकर 2440 करोड़ रुपए खर्च किए हैं। इन डाटा सेंटरों की मदद से अब इंटरनेट डाटा ट्रैफिक के लोड को कम किया जा सकेगा। इसके साथ ही गूगल अपने यूजर्स को अब और भी ज्यादा डाटा मुहैया करा सकेगा और इंटरनेट पर सर्च करना 10 गुना तक फास्ट और आसान हो जाएगा।

kms-google
रिपोर्ट के मुताबिक ताइवान, हांगकांग और सिंगापुर जैसे देश टेक कंपनियों के संचालन के लिए उपयुक्त स्थान माने जाते हैं। इन देशों में डाटा सेंटर का संचालन करने के लिए अच्छे कानून, मजबूत बिजली व्यवस्था, कुशल कर्मचारी और फाइबर ब्रॉडबैंड जैसी बुनियादी सुविधाएं उपलब्ध हैं।


google-kms
डा़टा सेंटर एक ऐसी जगह होती है, जहां ढेर सारे कंप्यूटर लगे होते हैं। इन कंप्यूटरों में दुनिया भर के जरूरी डाटा स्टोर किए जाते हैं, जिसकी मदद से दुनिया के कोने-कोने में इंटरनेट यूजर्स को डाटा मुहैया कराया जाता है। इंटरनेट पर मिलने वाली सभी जानकारियां इन्हीं डाटा सेंटरों से आती हैं।

4
गूगल की स्थापना 1998 में लैरी पेज और सेर्गे ब्रिन ने की थी। आज 15 साल बाद कंपनी की कुल संपत्ति 5,80,415 करोड़ रुपए हो चुकि है। अब गूगल अपने बिजनेस को बढ़ाते हुए ताइवान के डाटा सेंटर के संचालन के लिए 3712 करोड़ रुपए निवेश कर रही है। इसकी मदद से दुनिया भर में बढ़ रही टैक्नोलॉजी की जरूरतों को पूरा किया जा सकेगा।


5
लगभग 3,10,503 करोड़ रुपए की सालाना (2012) रेवेन्यू वाली कंपनी का ताइवान का ये डाटा सेंटर काफी प्रभावशाली है और पर्यावरण के अनुकूल बनाया गया है।


6
इस डाटा सेंटर को रात के समय कंपनी के अंदर के वातावरण को ठंडा रखने और थर्मल ऊर्जा स्टोर करने के लिहाज से बनाया गया है।

7
आमतौर पर डाटा सेंटर का वातावरण ठंडा होना चाहिए क्योंकि कंप्यूटरों से निकलने वाली गर्मी सिस्टम को क्षति पहुंचा सकती है। गूगल के मुताबिक, इस कंपनी का कूलिंग सिस्टम इंसुलेटेड टैंक्स के जरिए चलाया जाता है।

8
इस डाटा सेंटर में कुल 60 लोगों की टीम के साथ कुछ फुल और पार्ट टाइम कांट्रेक्टर 24 घंटे साइट को चलाते हैं, जिसमें से कुछ इलेक्ट्रिकल इंजीनियर्स, मैकेनिकल इंजीनियर्स, कंप्यूटर तकनीशियन और कैटरर भी शामिल हैं।

9
एशिया में 2014 तक मोबाइल डाटा ट्रेफिक 68 प्रतिशत तक बढ़ने का अंदेशा है। ये डाटा सेंटर इस ट्रेफिक को नियंत्रित करने में काफी सहयोग करेगी।

10
कंपनी के उपाध्यक्ष डाटा सेंटर में सुरक्षा द्वारों की जांच करते हुए।

11
दुनिया के सबसे बेहतरीन सर्वर के एक कंप्यूटर के गर्म हो जाने के बाद गूगल की कर्मचारी उसकी जांच करती हुईं।

12
कंप्यूटर के खराब मदरबोर्ड की मरम्मत करता हुआ गूगल का कर्मचारी। इस डाटा सेंटर में खराब होने के बाद पुर्जों की पहले मरम्मत की जाती है अगर वो ठीक न हो सकें तो फिर उन्हें तोड़कर रिसाइकिल के लिए दे दिया जाता है।

13
जेनरेटर की मरम्मत करते गूगल के तकनीशियन।

14
डाटा सेंटर को ठंडा रखने वाले पाइप लाइन की जांच करता गूगल कर्मचारी।

15
बैटरी की जांच करते हुए गूगल कर्मचारी। समय-समय पर बैटरियों की जांच की जाती है की वो ठीक से चार्ज हो रहे हैं या नहीं।

16
इस डाटा सेंटर में नए जमाने के लिहाज से बनाए गए अति आधुनिक सर्वर देखे जा सकते हैं।

::- Krishna Mohan Singh(kmsraj51) …..
kms1006

Note::-
यदि आपके पास Hindi में कोई article, inspirational story, Poetry या जानकारी है जो आप हमारे साथ share करना चाहते हैं तो कृपया उसे अपनी फोटो के साथ E-mail करें. हमारी Id है::- kmsraj51@yahoo.in . पसंद आने पर हम उसे आपके नाम और फोटो के साथ यहाँ PUBLISH करेंगे. Thanks!!

@@@@@ ::- Krishna Mohan Singh(kmsraj51) ….. @@@@@

Filed Under: INTERNET & TECHNOLOGY Tagged With: 21 Century Yugpurush kmsraj51, 21st Century Yogiraj kmsraj51, BABI, BANK, BIOGRAPHY OF GOOGLE, DATA STORE GOOGLE, ECHO, ENJOY GOOGLE, GITANJALI, GOOGALE BANK, google, GOOGLE BIOGRAPHY, GOOGLE DATA, GOOGLE DATA STORE, GOOGLE DAY, GOOGLE EARTH, GOOGLE INFORMATION, GOOGLE MODE, GOOGLE PAPA, GOOGLE SERVER, GOOGLE SERVER VIEW, GOOGLE SLEEP, GOOGLE UNCLE, GREAT INDIAN GURU KMSRAJ51, great kms, GREAT SPIRITUAL INDIAN GURU KMSRAJ51, INDIAN TECHNOLOGY, INTERNET, INTERNET TOP SERVER, INTERNET TOP SERVER GOOGLE, INTRANET, Jyoti-Kala-Son-kmsraj51, kms, Kmsraj51, kmsraj51 great Story In Hindi, KMSRAJ51 GREAT THOUGHTS, kmsraj51 ki pen se, KMSRAJ51 OCEAN OF PREM, KRISHNA MOHAN SINGH (KMSRAJ51), Krishna Mohan Singh(kmsraj51), KRISHNA-KMS, Maa, MUNNA RAM SINGH, MY GREAT FATHER-SHRI MUNNA RAM SINGH, NETWORKING, OCEAN OF PREM-KMSRAJ51, OCEAN OF TECHNOLOGY, Peaceful Mind KMSRAJ51, Prem ke Sagar kmsraj51, RADHA-KRISHNA KMSRAJ51, REVIEW GOOGLE, SAP, sap-kms, Sapna, sapna meri jaan, SAPNA MY HEART, Sapna-kms, Success Mantra by kmsraj51 ki pen se, Super Success Power of mind kmsraj51, SWAMI KMSRAJ51, TANU, TECHNO, TECHNOLOGY, TOP 10 INTERNET SEARCH ENGINE, Will Power kmsraj51, World most stable mind kmsraj51, world no 1 search engine, world no 1 search engine google, WORLD TOP DATA SERVER, YOGIRAJ KMS, YOGIRAJ KMSRAJ51, yugpurush kmsraj51

Primary Sidebar

Recent Posts

  • ब्रह्मचारिणी माता।
  • हमारा बिहार।
  • शहीद दिवस।
  • स्वागत विक्रम संवत 2080
  • नव संवत्सर आया है।
  • वैरागी जीवन।
  • मेरी कविता।
  • प्रकृति के रंग।
  • फिर भी चलती साथ-साथ वो हमेशा।
  • यह डूबती सांझ।
  • 10th Foundation Day of KMSRAJ51
  • प्रकृति और होरी।
  • तुम से ही।
  • होली के रंग खुशियों के संग।
  • आओ खेले पुरानी होली।
  • हे नारी तू।
  • रस आनन्द इस होली में।

KMSRAJ51: Motivational Speaker

https://www.youtube.com/watch?v=0XYeLGPGmII

BEST OF KMSRAJ51.COM

ब्रह्मचारिणी माता।

हमारा बिहार।

शहीद दिवस।

स्वागत विक्रम संवत 2080

नव संवत्सर आया है।

वैरागी जीवन।

मेरी कविता।

प्रकृति के रंग।

फिर भी चलती साथ-साथ वो हमेशा।

यह डूबती सांझ।

10th Foundation Day of KMSRAJ51

Audiobooks Now

AudiobooksNow - Digital Audiobooks for Less

Affiliate Marketing Network

HD – Camera

Free Domain Privacy

Footer

Protected by Copyscape

KMSRAJ51

DMCA.com Protection Status

Copyright © 2013 - 2023 KMSRAJ51.COM - All Rights Reserved. KMSRAJ51® is a registered trademark.