Information Technology Articles

Page 7 of 10

Know about device tracking for smart phones

Samual Sam
Samual Sam
Updated on 22-Oct-2019 332 Views

Nowadays, we all know that one of the most panicking moments of our life is when we have lost our smartphone. We tend to miss it during our daily commute or misplace it in any public spots. It’s now time to thank our technology growth which gives us the ray of hope to find our missing phones back. There are a few ways to remote control and track your phone even if you haven’t installed a recovery app before it vanishes.Do not wait until you’ve lost your smartphone and then to wonder how to track it. This article will help ...

Read More

Electronic data interchange edi safe and secure global communication

Samual Sam
Samual Sam
Updated on 22-Oct-2019 766 Views

For many years, companies have been using computers to send business documents instead of mailing paper documents. But the problem arises when Company A won’t recognize e-format of Company B due to the absence of a standard format which led to the condition where computers could no longer “talk” to one another and again a great deal of effort by programmers need to put which led the cost.In 1979 the American National Standards Institute (ANSI) formed the Accredited Standards Committee (ASC) X12 to rectify this situation. This committee was to standardize the format of electronic documents to allow for easy ...

Read More

How are the weather add ons changing the virtual reality experience

Samual Sam
Samual Sam
Updated on 22-Oct-2019 222 Views

Virtual reality (VR) is all about hanging our suspicion and allowing our attention to imagine a different virtual world for experiencing thoughts. VR has taken our experience in movie and gaming to the next level. Now, VR has marked its presence into weather sensation too. It’s really fascinating to experience the presence of new weather add-ons.A Brief Overview on VRVirtual reality is an attempt to mimic the real world environment through a digital touch. The custom software produces lifelike images, vibrations, echoes, noises and other such impressions that replicate a real environment. A viewer using a VR device is typically ...

Read More

What does a user expect from a mobile app

Samual Sam
Samual Sam
Updated on 22-Oct-2019 340 Views

When the mobile phones were introduced during the initial period of the 21st century, it was a big leap in the communication system. Mobile phones have changed and influenced to the core. This also created a huge market for Mobile Communication, Mobile Phones, Mobile Operating System and Mobile Application. In the mobile communication system, smartphones are considered as the biggest milestone. Smartphones had made the life human beings quite efficient as well bit lazy too.The introduction of Android Operating system by Google was another big leap in mobile systems. Android has created a huge market for the developer to develop ...

Read More

Increase number of maximum open files in linux

Samual Sam
Samual Sam
Updated on 21-Oct-2019 1K+ Views

If you are working on Linux, then you must have encountered many-a-time with “Too many open files (24)” error. Linux operating system provides a way of limiting the amount of files that can be used by every user. This article provides insights on how to increase the number of open files or file descriptors in Linux operating system.The ulimit command has the control over shell or processes and it should require a login as the root user. The ulimit command is used to set the file limits that apply only to your current session.Use the following command to display the ...

Read More

Prevent fork bomb by limiting user process in linux

Samual Sam
Samual Sam
Updated on 21-Oct-2019 482 Views

A Fork Bomb is a denial-of-service (DoS) attack against a Linux based system. It makes use of the fork operation to create infinite processes and is called as “Rabbit Virus or wabbit”. The system process continually replicates itself to deplete available system resources, causing resource starvation, slowing or crashing the system. This article gives insights on – how to prevent a fork bomb attack in Linux system.Fork Bomb uses a bash code and gets executed repeatedly. Linux system admin often uses bash function to test the user process limitations and this specific process can be configured in /etc/security/limits.conf file. Once Fork ...

Read More

Monitors linux server performance remotely using web browser

Samual Sam
Samual Sam
Updated on 21-Oct-2019 456 Views

Are you looking for speedy server statistics monitoring script? If yes, then this article is for you. Here, we will be explaining about Linux-dash which is a memory efficient, low resource, easy to install, server statistics monitoring script written in PHP.An internet static web page allows you to rearrange various widgets as you want. This script displays residing records of your server, including RAM, CPU, Disk space, community understanding, mounted programs, going for walks approaches and rather more.Linux Dash FeaturesLinux Dash Features should be like this –It is a lightweight and responsive web-based interface for monitoring server resourcesEasy to install ...

Read More

How to create beautiful and useful infographics

Samual Sam
Samual Sam
Updated on 21-Oct-2019 276 Views

We all know the old saying – A picture is worth a thousand words referring to the idea that, complex topics can be conveyed with just a single image. Since, it is widely believed that, essence and meaning of content can be explained better through visual mode in a better way. Also, it is fun to look at pleasant pictures or watching cool videos than to read normal text.In advertising and media industry, It is also a proven fact that, visual content drives more traffic and engagement than text does. Trying a cool infographic is the new trend. This article ...

Read More

How to add a user to the group on linux

Samual Sam
Samual Sam
Updated on 21-Oct-2019 1K+ Views

The concept of “group” may be confusing to many Linux users. Linux operating system is designed to allow more than one user to have access to the Linux system at a time. Linux/Unix operating systems provides multitasking abilities to its multi-users. In order to do this task, we need to assign a group to each Linux user. This article gives step by step process on – how to add a user to the group in Linux system.Create a New UserTo create a new user using Linux command line, use the following command –$ sudo useradd tutorialspointThe above command is used ...

Read More

How to limit network bandwidth on linux

Samual Sam
Samual Sam
Updated on 21-Oct-2019 8K+ Views

Have you ever shared network bandwidth with multiple devices? If you have ever been in a position where one application consumed all your traffic, then either you are a system admin or just a Linux user, you will need to discover how to control the upload and download speeds for applications to make sure that your bandwidth is not occupied entirely by a single application. This article gives an idea about how to limit network bandwidth on Linux.Limiting Network BandwidthOne of the easiest way to control over the network traffic is via command line tool called “trickle“. It can be ...

Read More
Showing 61–70 of 92 articles
« Prev 1 5 6 7 8 9 10 Next »
Advertisements