Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Information Technology Articles
Page 4 of 10
Difference between ACL and SCO Link in Bluetooth
Two types of data links are defined by Bluetooth link layers−Synchronous Connection Oriented (SCO) LinkAsynchronous Connection-Less (ACL) LinkSCO is a symmetric, point-to-point link between the master device and the slave device connected via Bluetooth.ACL is a point – to – multipoint link for transmitting general data packets using Bluetooth connection. ACL is used for irregular traffic between a master device and one or more slave devices.Differences between SCO and ACLSCOACL1SCO provides a circuit switched connection, where a dedicated, point-to-point link is established between the master device and the slave device before communication starts.ACL is a packet oriented link, i.e. the ...
Read MoreThe Bluetooth Link Layers
The Bluetooth link layer outlines the way Bluetooth devices can use the raw transmission facility given by the radio layer to exchange information. The functions of the link layer is very close to MAC (medium access control) sublayer of the OSI model.The following diagram shows the position of link layers in the Bluetooth protocol architecture −Functions of the Bluetooth Link LayerDefining procedures for discovering Bluetooth devices.Establishing logical links between the Bluetooth devices that are communicating. One of the devices is assigned as master and the other is the slave.Broadcasting data to be sent. Managing the links between the devices throughout ...
Read MoreFind my public ip address from linux command line
An IP address stands for Internet Protocol Address. Devices are assigned with specified IP Address to identify the device which are connected on internet. Public IP addresses are routable on Internet and are generally provided by an ISP (Internet service provider) which are accessible over the Internet.Do you know how to find public IP address from Linux command line? There are several ways to find and identify public IP address. For example, we can use third party websites or “shell” commands. This article provides simple methods to find public IP address from command line on Linux.Who Uses Public IP Addresses?Public ...
Read MoreCount the number of threads in a process on linux
Linux process can be visualized as a running instance of a program where each thread in the Linux is nothing but a flow of execution of the processes. Do you know how to see the number of threads per process on Linux environment? There are several ways to count the number of threads. This article deals with, how to read the information about processes on Linux and also to count the number of threads per process.Read Process InformationTo read the process information use ‘ps’ command. This command is used to read a snapshot of the current processes on Linux. However, ...
Read MoreKey Points on Automation
Automation is one of the hot domain in the Information and Technology, which has become predominant topic of discussion among the IT professionals. In general, automation can be defined as the process of involving software robots or hardware robots to solve the human problems (requirements). Due to this automation, it is said that ¼th of the job will be lost in the market. But people still prefer automation for (top) 7 reasons, which is discussed in this article.Cost SavingsCost is one of the major factor in the software development cycle, which predominantly comes into picture right from the planning phase. ...
Read MoreImportant MYSQL Performance Tuning and Settings after Installation
In this article, we will learn and discuss some important performance tuning settings for MySQL which we need to implement after the MySQL Installation better and speedy performance.Pre-requisitesAssuming that we have already installed the MySQL, I am providing some tips before we start to know about Performance tuning settings for MySQL.Even experienced IT persons may make some mistakes which will lead to many problems, so before we apply any recommendations which are shown in this article, we will keep the below items in mind to avoid issues or problems.We will apply only one setting at a time so that we ...
Read MoreHow Ethical Hacking is Helping IT Security?
While hackers have been causing a lot of pains to enterprises, another community of hackers have also been finding out vulnerabilities in the IT systems, albeit with a different objective. Such hackers, known as ethical hackers, proactively identify IT system vulnerabilities by hacking into the systems. Ethical hackers are a boon to enterprises because they identify potential vulnerabilities without any malicious intent. Enterprises can fix the issues before hackers can exploit them. Ethical hackers are being increasingly recognized – reputed organizations have been paying bounties to ethical hackers to find security loopholes in their systems that are hitherto undetected.Who is ...
Read MorePMP Vs PRINCE2 – The Clash of Certifications
It is very common for IT professionals coming into Catch-22 situation, especially while choosing one among the most famous project management certifications – the PMP or PRINCE2. The question – then, the next question arises – Which certification will help me to get the desired success in my career? and Which one helps me to increase my knowledge base in terms of project management? Will PMP or PRINCE2 certification help me in managing my projects?There are many such questions which come to your mind, isn’t it? Don’t worry! We will help you to solve this biggest dilemma.You can choose the ...
Read MoreWhat are the Opportunities in Artificial Intelligence?
Artificial Intelligence is one the hot topic in the information and technology which predominantly includes general AI, machine learning, expert systems (which can be the same thing) data mining, Neural Networks and fuzzy systems. These topics have become the most wanted and essential topics among the scholars, students, faculties and professionals.As AI had already created enough impact among the public, this article would help the upcoming generation to know more about the career opportunities that are related to this domain. And we need to understand that fact that, Machine learning is the practical face of AI. It’s about identifying sources ...
Read MoreHow to Configure IT Automation Management Using Ansible
This article provides a basic understanding of Ansible technology along with steps to install it. Ansible is an open source IT automation software for configuring, managing and installing software’s on the clients or nodes without any downtime and agent installed on the nodes. It uses SSH to communicate with the clients.Currently, most of the IT Automation tools runs as an agent in remote host, but Ansible needs only an SSH connection, a user and a Python (2.4 or later).Environment Setup DetailsServer Operating System: Centos 6.7 IP Address: 192.168.87.140 Host-name: ansible.hanuman.com User: root Remote Nodes Node 1: 192.168.87.156 Node 2: 192.168.87.157Installing ...
Read More