• Posted on 2017/10/02 10:45

    The latency of a network connection represents the amount of time required for data to travel between the sender and receiver. While all computer networks possess some inherent amount of latency, the amount varies and can suddenly increase for various reasons. People perceive these unexpected time delays as lag. The Speed of Light On a Computer Network No network traffic can travel faster than the speed of light. On a home or local area network, the distance between devices is so small that light speed does not matter, but for Internet connections, it becomes a factor. Under perfect conditions, light requires roughly 5 ms to travel 1,000 miles (about 1,600 kilometers). Furthermore, most long-distance Internet traffic travels over cables, which cannot carry signals as fast as light due to a principle of physics called refraction. Data over a fiber optic cable, for example, requires at least 7.5 ms to travel 1,000 miles. Typical Internet Connection

  • Posted on 2017/09/20 09:35

    Whether you're a home PC user or a network administrator, you always need a plan for when the unexpected happens to your computers and/or network. A Disaster Recovery Plan (DRP) is essential in helping to ensure that you don't get fired after a server gets fried in a fire, or in the case of the home user, that you don't get kicked out of the house when mamma discovers you've just lost years worth of irreplaceable digital baby photos. A DRP doesn't have to be overly complicated. You just need to cover the basic things that it will take to get back up and running again if something bad happens. Here are some items that should be in every good disaster recovery plan: 1. Backups, Backups, Backups! Most of us think about backups right after we've lost everything in a fire, flood, or burglary. We think to ourselves, "I sure hope I

  • Posted on 2017/09/17 09:30

    Whether you're managing disaster preparation activities for a small business or a large corporation, you need to plan for natural disasters because, as we all know, information technology and water don't mix well. Let's go over some basic steps you'll need to take to ensure that your network and IT investments survive in the event of a disaster such as a flood or hurricane. 1. Develop a Disaster Recovery Plan The key to successfully recovering from a natural disaster is to have a good disaster recovery plan in place before something bad happens. This plan should be periodically tested to ensure that all parties involved know what they are supposed to do during a disaster event. The National Institute of Standards and Technology (NIST) has excellent resources on how to develop disaster recovery plans. Check out NIST Special Publication 800-34 on Contingency Planning to find out how to get started developing a rock-solid

  • Posted on 2017/09/09 09:29

    So, at this point it is hard to say that current quantum computers (well more like chips) have integrated within them RAM (random access memory), ROM (read only memory), hard drives (another memory component), and buses or data lines — but there are developments in quantum computer architectures, with most of them being quantum-classical hybrid architectures, where you certainly do have components that manipulate qubits or qudits (so hot right now) to carry out calculations on quantum circuits (like a processor), schemes to store this information onto other qubits (memory), and then also systems to carry out measurements after our manipulations to get the result of our quantum informatical computation (with quantum information relayed through optical buses). What are quantum computers/chips (or just qubits) usually made out of currently? Well it’s like the Cambrian Explosion (ok, maybe not that diverse) but with different quantum computing architectues or substrates if you

  • Posted on 2017/09/02 10:13

    All Windows computers include features that protect the operating system from hackers, viruses, and various types of malware. There are also protections in place to prevent mishaps that are brought on by the users themselves, such as the unintentional installation of unwanted software or changes to crucial system settings. Most of these features have existed in some form for years. One of them, Windows Firewall, has always been a part of Windows and was included with XP, 7, 8, 8.1, and more recently, Windows 10. It’s enabled by default. Its job is to protect the computer, your data, and even your identity, and runs in the background all the time. But what exactly is a firewall and why is it necessary? To understand this, consider a real-world example. In the physical realm, a firewall is a wall designed specifically to stop or prevent the spread of existing or approaching flames.