Sudhir sharma has Published 1055 Articles

The PACELC theorem

sudhir sharma

sudhir sharma

Updated on 27-Feb-2023 16:34:59

The PACELC theorem is a fundamental concept in distributed systems that deals with the trade-offs between consistency, availability, latency, partition tolerance, durability, and efficiency. This theorem was introduced in the early 2000s and has since become a cornerstone of modern distributed system design. In this article, we will discuss the ... Read More

Universal Asynchronous Receiver Transmitter (UART) Protocol

sudhir sharma

sudhir sharma

Updated on 27-Feb-2023 16:33:38

Introduction The Universal Asynchronous Receiver Transmitter (UART) protocol is a widely used communication standard in electronics and microcontroller systems. This article provides a comprehensive overview of the UART protocol, including its basic principles, data transmission mechanisms, configuration options, and common applications. What is UART? UART is a protocol that enables ... Read More

IBOC Technology

sudhir sharma

sudhir sharma

Updated on 27-Feb-2023 16:31:33

IBOC technology, or In-Band On-Channel technology, is a digital broadcasting technology that allows radio stations to transmit both analog and digital signals simultaneously. Many people see this technology as the future of radio broadcasting, as it provides numerous advantages over conventional analog radio. One of the key advantages of IBOC ... Read More

Bearer Types Used for WAP in GSM

sudhir sharma

sudhir sharma

Updated on 27-Feb-2023 16:27:05

You may be interested in learning more about Wireless Application Protocol (WAP) in Global System for Mobile Communications (GSM). One of the crucial elements in understanding WAP in GSM is knowing the bearer types used in this context. A bearer type is a means of carrying data between two points. ... Read More

Schiper Eggli Sandoz Protocol

sudhir sharma

sudhir sharma

Updated on 27-Feb-2023 16:21:37

The Schiper Eggli Sandoz (SES) protocol, a storied and valiant champion of networking, has a mission to find the best path for data packets to traverse through the network. With a heart of a poet, it distributes the routing information to all routers in the network, rather than entrusting the ... Read More

Poison Reverse vs Split Horizon

sudhir sharma

sudhir sharma

Updated on 27-Feb-2023 16:17:26

Routing protocols are used to determine the best path for data to travel through a network. They are responsible for maintaining and updating routing tables, which are used by routers to determine the best path for data to travel through a network. There are several different types of routing protocols, ... Read More

How to setup firewall in Linux?

sudhir sharma

sudhir sharma

Updated on 27-Feb-2023 12:50:42

Firewalls are an integral component of every contemporary computer system, safeguarding the network and protecting the system from illegal access. We'll take a deep dive into the realm of Linux firewalls and learn how to configure one in this post. Before we involve into the technical details of establishing a ... Read More

How to set up and use a proxy server?

sudhir sharma

sudhir sharma

Updated on 27-Feb-2023 12:49:46

In today's world, the internet has become an integral part of our daily lives. With its growing popularity, it's crucial to safeguard our online activities from potential threats. One of the most effective ways to achieve this is by using a proxy server. To start, let's define what a proxy ... Read More

How to Set Up a VoIP Phone at Home?

sudhir sharma

sudhir sharma

Updated on 27-Feb-2023 12:47:26

If you want to save money on your phone bills, setting up a VoIP phone at home is a great alternative. VoIP, or Voice over Internet Protocol, is a technology that enables phone conversations to be made over the internet. Not only is VoIP cheaper than traditional phone services, but ... Read More

How to Reduce Risk of Exposure to CSRF, XSRF, or XSS Attacks?

sudhir sharma

sudhir sharma

Updated on 27-Feb-2023 12:45:52

We all rely extensively on the internet for our daily activities in today's digital world. We all utilise numerous websites and programmes to do these duties, whether it's online shopping, social networking, or internet banking. While the internet has made our lives easier, it has also introduced new vulnerabilities like ... Read More

1 2 3 4 5 ... 106 Next
Advertisements