Let us begin by understanding the concepts of Tresorit and Wuala.TresoritIt is an ultra-secure place in the cloud used to store, sync, and share files within your organization and with external partners. It is a premium cloud storage service which has an end-to-end encrypted, zero-knowledge content collaboration platform that is designed to safeguard the digital valuables of individuals and organizations with the highest classification in the cloud.FeaturesThe features of Tresorit are as follows −Share files securely with anyone in an organization.Access the work documents from anywhere, at any time, on any deviceKeep the stored files safe from unauthorized access and ... Read More
Let us understand the concepts of TitanFile and Wuala.TitanFileTitanFile is featured document management software designed which is mainly used for Startups, Agencies. It is used to provide end-to-end solutions for designing for Web App. This Management system offers audit trail, Document Management, workflow management, Encryption, Messaging at one place.The files uploaded and shared with the help of TitanFile are encrypted before storing on the servers. The algorithms and schemes that are used for file encryption are approved up to the Top Secret level by all US government departments and agencies. The file encryption uses AES encryption algorithm and the SHA-512 ... Read More
Let us understand the concepts of data security and data privacy.Data SecurityIt uses physical and logical strategies to protect information from cyber attacks, and accidental or intentional data loss.It is a technology and technique which is use to prevent the following −Unauthorized accessIntentional loss of sensitive dataAccidental loss or corruption of sensitive dataSo, data security is a technologically sophisticated, holistic approach which secures every network, application, device and data repository in an enterprise IT infrastructure.Data security includes the followingPhysical access controls to serversMulti-factor Authentication (MFA) requirementsLeast-privilege access controlsPassword complexity requirementsData encryptionIdentification and remediation of stale dataData PrivacyData privacy is defined ... Read More
To begin with, let us learn the concepts of data protection and data privacy.Data ProtectionData protection is inclusive of the strategies that we can use to secure the privacy, availability, and integrity of our data. It is also called data security or information privacy.Data protection is important for any organization which collects, handles, or stores sensitive data. This strategy can help prevent data loss, theft, or corruption and can help minimize damage caused by disaster.Data PrivacyData privacy is defined as only the authorised person can access the data. It is typically applied to personal health information (PHI), personally identifiable information ... Read More
The three types of Carrier Sense Multiple Access (CSMA) Protocols are as follows −1-persistent CSMANon- Persistent CSMAp-persistent CSMAp-persistent CSMAThe p-persistent CSMA is used whenever the channel has time slots so that the time slot duration is equal to or greater than the maximum propagation delay time. The p-persistence senses the channel whenever a station becomes ready to send.Suppose if the channel is busy, then the station has to wait till the next slot is available.The p-persistence transmits with a probability p when the channel is idle. With a probability q=1-p, the station has to wait for the beginning of the ... Read More
Let us begin by understanding the concepts of Wuala and Yandex Disk.WualaIt is a secure online file storage, file synchronization, versioning and backup service provided by Caleido Inc and developed by Dominik Grolimund and Luzius Meisserin. It was developed using Java.It offered 5 GB free storage space and was launched in 2008. But in the year 2015, Wuala announced that they are discontinuing its service and all stored data would be deleted on 15 November 2015.Wuala is a secure cloud storage service that enables users to store, encrypt, sync, backup, and access their files online.FeaturesThe features of Wuala are as ... Read More
Let us begin by understanding the concepts of Yandex Disk and MiMedia.Yandex is a Russian company which is famous for its Yandex search engine. It is one of the biggest technology companies which provide various kinds of products and services. It is also popular for owning Russia's most significant search engines and also contributes to various other technologies and internet-related things.Yandex DiskYandex Disk is provided by Yandex a Russian company which is used as a cloud storage, file synchronization and file sharing service. It allows users to store the files on cloud and enable them to share the files with ... Read More
Let us understand the concepts of SugarSync and MiMedia.SugarSyncIt is one of the longest-running cloud back-up services around started in year 2004. It is a convenient way to back up, sync, and access files from anywhere, anytime. It is one of the simplest file syncing services we have ever seen.SugarSync, Sync and securely access our files from the cloud in seconds, Save, view, and edit our documents across multiple devices and also Manage and share our files the way we want.FeaturesThe features of SugarSync are as follows −In SugarSync we can safely access and share our files and folders from ... Read More
Let us understand the concepts of SecureSafe and MiMedia.SecureSafeIt was launched by DSwiss AG in 2009. It is one of the file hosting services and cloud storage. It also used to provide password safe, document storage and digital spaces for online collaboration.It is based on the basis of principles of security by design and privacy by design. It offers 100 MB storage space for free. For paid users, it offers 100 GB storage space.FeaturesThe features of SecureSafe are as follows −Password managerFile storage2-factor authenticationData roomsData inheritanceMiMediaMiMedia is a new approach for online backup and storage services developed in 2010. It ... Read More
The three types of Carrier Sense Multiple Access (CSMA) Protocols are as follows −1-persistent CSMANon- Persistent CSMAp-persistent CSMA1-persistent CSMAIn this method, to transmit data the station wants to continuously sense the channel to check whether the channel is busy or idle.Suppose, if the channel is busy, then the station will wait until it becomes idle. Whenever the station detects an idle-channel, then it transmits the frame with probability. Therefore this persistence is called 1-persistent CSMA.The 1-persistent CSMA has the highest chance of collision because two or more stations identify a channel to be idle at the same time and transmit ... Read More
Data Structure
Networking
RDBMS
Operating System
Java
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP