Subscribe Twitter Twitter

Monday, November 1, 2010

iphone solar charger

iphone solar charger


The primary benefit of a solar battery charger is that it may be used to store energy, which can be utilized at a later stage when the solar is just not out or on a wet/cloudy day.It's essential for you to ensure that the quality of charger you are using for your iPhone is very great, Poor quality iPhone chargers may damage your iPhone. the iPhone solar charger is a good choice for your iPhone.

This solar-powered iPhone charger is handheld and great when you require to charge your iPhone but are not close to a power source. And the solar powered chargers available these days are more than enough for any travelling experience. These are portable units and helpful in conditions when you are not next to any power supply unit.Energy is stored on the solar panels. The dimensions of the solar panels determines how a lot vitality the battery charger can collect and store.

Honestly, I highly recommend solar chargers for iPhone to all my friends and family members who own iPhone. These solar iPhone charger not only help you save electricity but also it is environmentally friendly and enhance conservation of energy resources. So there is no heistation for you to get a solar charger for your iPhone. If you will be ready to order a iPhone solar charger, starting shopping!


Read more: http://www.articlesbase.com/information-technology-articles/iphone-solar-charger-3590635.html#ixzz146Zn6D3g
Under Creative Commons License: Attribution

Wednesday, October 27, 2010

Proxy Servers and Proxy Lists

On the Internet, proxy servers provide a way to visit sites anonymously. Proxy servers also provide network firewall, connection sharing, and caching technology for private networks.ome home networks, corporate intranets, and Internet Service Providers (ISPs) use proxy servers (also known as proxies). Proxy servers act as a "middleman" or broker between the two ends of a client/server network connection. Proxy servers work with Web browsers and servers, or other applications, by supporting underlying network protocols like HTTP.
Key Features of Proxy Servers
Proxy servers provide three main functions:

1. firewalling and filtering
2. connection sharing
3. caching

The features of proxy servers are especially important on larger networks like corporate intranets and ISP networks. The more users on a LAN and the more critical the need for data privacy, the greater the need for proxy server functionality.
Proxy Servers, Firewalling and Filtering

Proxy servers work at the Application layer, layer 7 of the OSI model. They aren't as popular as ordinary firewalls that work at lower layers and support application-independent filtering. Proxy servers are also more difficult to install and maintain than firewalls, as proxy functionality for each application protocol like HTTP, SMTP, or SOCKS must be configured individually. However, a properly configured proxy server improves network security and performance. Proxies have capability that ordinary firewalls simply cannot provide.

Some network administrators deploy both firewalls and proxy servers to work in tandem. To do this, they install both firewall and proxy server software on a server gateway.

Because they function at the OSI Application layer, the filtering capability of proxy servers is relatively intelligent compared to that of ordinary routers. For example, proxy Web servers can check the URL of outgoing requests for Web pages by inspecting HTTP GET and POST messages. Using this feature, network administrators can bar access to illegal domains but allow access to other sites. Ordinary firewalls, in contrast, cannot see Web domain names inside those messages. Likewise for incoming data traffic, ordinary routers can filter by port number or network address, but proxy servers can also filter based on application content inside the messages.
Connection Sharing with Proxy Servers
Various software products for connection sharing on small home networks have appeared in recent years. In medium- and large-sized networks, however, actual proxy servers offer a more scalable and cost-effective alternative for shared Internet access. Rather than give each client computer a direct Internet connection, all internal connections can be funneled through one or more proxies that in turn connect to the outside.
Proxy Servers and Caching
The caching of Web pages by proxy servers can improve a network's "quality of service" in three ways. First, caching may conserve bandwidth on the network, increasing scalability. Next, caching can improve response time experienced by clients. With an HTTP proxy cache, for example, Web pages can load more quickly into the browser. Finally, proxy server caches increase availability. Web pages or other files in the cache remain accessible even if the original source or an intermediate network link goes offline.

Computer Network Speed

Computer Network Speed

Bandwidth in computer networking refers to the data rate supported by a network connection or interface. Network bandwidth is not the only factor that contributes to the perceived speed of a network. A lesser known but other key element of network performance - latency - also plays an important role.

What Is Network Bandwidth?

Bandwidth is the primary measure of computer network speed. Virtually everyone knows the bandwidth rating of their modem or their Internet service that is prominently advertised on network products sold today.

In networking, bandwidth represents the overall capacity of the connection. The greater the capacity, the more likely that better performance will result. Bandwidth is the amount of data that passes through a network connection over time as measured in bps.

Bandwidth can refer to both actual and theoretical throughput, and it is important to distinguish between the two. For example, a standard dialup modem supports 56 Kbps of peak bandwidth, but due to physical limitations of telephone lines and other factors, a dialup connection cannot support more than 53 Kbps of bandwidth (about 10% less than maximum) in practice. Likewise a traditional Ethernet network theoretically supports 100 Mbps of bandwidth, but this maximum amount cannot reasonably be achieved due to overhead in the computer hardware and operating systems.

Broadband and Other High Bandwidth Connections

The term high bandwidth is sometimes used to distinguish faster broadband Internet connections from traditional dialup or cellular network speeds. Definitions vary, but high bandwidth connections generally support data rates of minimum 64 Kbps (and usually 300 Kbps or higher). Broadband is just one type of high bandwidth network communication method.

P2P

P2P
Definition: The term P2P refers to "peer-to-peer" networking. A peer-to-peer network allows computer hardware and software to function without the need for special server devices. P2P is an alternative to client-server network design.

P2P is a popular technology for file sharing software applications like Kazaa, WinMX and Overnet. P2P technology helps the P2P client applications upload and download files over the P2P network services.

P2P technology can also be found in other places. Microsoft Windows XP (starting with Service Pack 1), for example, contains a component called "Windows Peer-to-Peer Networking." P2P is especially popular in homes where an expensive, decidated server computer is neither necessary nor practical.

Finally, the P2P acronym has acquired a non-technical meaning as well. Some people have described this second meaning of "P2P" as "people-to-people." From this perspective, P2P is a model for developing software and growing businesses that help individuals on the Internet meet each other and share common interests. So-called social networking technology is an example of this concept.

VPN

A VPN supplies network connectivity over a possiblyA VPN supplies network connectivity over a possibly long physical distance. In this respect, a VPN is a form of Wide Area Network (WAN). VPNs enable file sharing, video conferencing and similar network services. Virtual private networks generally don't provide any new functionality that isn't already offered through alternative mechanisms, but a VPN implements those services more efficiently / cheaply in most cases.<br /><br />A key feature of a VPN is its ability to work over both private networks as well as public networks like the Internet. Using a method called tunneling, a VPN use the same hardware infrastructure as existing Internet or intranet links. VPN technologies includes various security mechanisms to protect the virtual, private connections.<br /><br />Specifically, a VPN supports at least three different modes of use:<br /><br />    * Internet remote access client connections<br />    * LAN-to-LAN internetworking<br />    * Controlled access within an intranet <br /><br />Internet VPNs for Remote Access<br />In recent years, many organizations have increased the mobility of their workers by allowing more employees to telecommute. Employees also continue to travel and face a growing need to stay connected to their company networks.<br /><br />A VPN can be set up to support remote, protected access to the corporate home offices over the Internet. An Internet VPN solution uses a client/server design works as follows:<br /><br />      1. A remote host (client) wanting to log into the company network first connects to any public Internet Service Provider (ISP).<br /><br />      2. Next, the host initiates a VPN connection to the company VPN server. This connection is made via a VPN client installed on the remote host.<br /><br />      3. Once the connection has been established, the remote client can communicate with the internal company systems over the Internet just as if it were a local host. <br /><br />Before VPNs, remote workers accessed company networks over private leased lines or through dialup remote access servers. While VPN clients and servers careful require installation of hardware and software, an Internet VPN is a superior solution in many situations.<br />VPNs for Internetworking<br />Besides using virtual private networks for remote access, a VPN can also bridge two networks together. In this mode of operation, an entire remote network (rather than just a single remote client) can join to a different company network to form an extended intranet. This solution uses a VPN server to VPN server connection.<br />Intranet / Local Network VPNs<br />Internal networks may also utilize VPN technology to implement controlled access to individual subnets within a private network. In this mode of operation, VPN clients connect to a VPN server that acts as the network gateway.<br /><br />This type of VPN use does not involve an Internet Service Provider (ISP) or public network cabling. However, it allows the security benefits of VPN to be deployed inside an organization. This approach has become especially popular as a way for businesses to protect their WiFi local networks. long physical distance. In this respect, a VPN is a form of Wide Area Network (WAN). VPNs enable file sharing, video conferencing and similar network services. Virtual private networks generally don't provide any new functionality that isn't already offered through alternative mechanisms, but a VPN implements those services more efficiently / cheaply in most cases.

A key feature of a VPN is its ability to work over both private networks as well as public networks like the Internet. Using a method called tunneling, a VPN use the same hardware infrastructure as existing Internet or intranet links. VPN technologies includes various security mechanisms to protect the virtual, private connections.

Specifically, a VPN supports at least three different modes of use:

* Internet remote access client connections
* LAN-to-LAN internetworking
* Controlled access within an intranet

Internet VPNs for Remote Access
In recent years, many organizations have increased the mobility of their workers by allowing more employees to telecommute. Employees also continue to travel and face a growing need to stay connected to their company networks.

A VPN can be set up to support remote, protected access to the corporate home offices over the Internet. An Internet VPN solution uses a client/server design works as follows:

1. A remote host (client) wanting to log into the company network first connects to any public Internet Service Provider (ISP).

2. Next, the host initiates a VPN connection to the company VPN server. This connection is made via a VPN client installed on the remote host.

3. Once the connection has been established, the remote client can communicate with the internal company systems over the Internet just as if it were a local host.

Before VPNs, remote workers accessed company networks over private leased lines or through dialup remote access servers. While VPN clients and servers careful require installation of hardware and software, an Internet VPN is a superior solution in many situations.
VPNs for Internetworking
Besides using virtual private networks for remote access, a VPN can also bridge two networks together. In this mode of operation, an entire remote network (rather than just a single remote client) can join to a different company network to form an extended intranet. This solution uses a VPN server to VPN server connection.
Intranet / Local Network VPNs
Internal networks may also utilize VPN technology to implement controlled access to individual subnets within a private network. In this mode of operation, VPN clients connect to a VPN server that acts as the network gateway.

This type of VPN use does not involve an Internet Service Provider (ISP) or public network cabling. However, it allows the security benefits of VPN to be deployed inside an organization. This approach has become especially popular as a way for businesses to protect their WiFi local networks.

Internet Connection Alternatives for Home Networks

Internet Connection Alternatives for Home Networks
As a homeowner (or renter), you likely have several options for how to connect to the Internet. The connection method you choose affects how a home network must be set up to support Internet connection sharing. Each Internet network connection alternative is described here.
DSL - Digital Subscriber Line
DSL is one of the most prevalent forms of Internet connection. DSL provides high-speed networking over ordinary phone lines using digital modems. DSL connection sharing can be easily achieved with either wired or wireless broadband routers.

In some countries, DSL service is also known as ADSL, ADSL2 or ADSL2+. More About DSL
Cable - Cable Modem Internet
Like DSL, cable modem is a form of broadband Internet connection. Cable Internet uses neighborhood cable television conduits rather than telephone lines, but the same broadband routers that share DSL Internet connections also work with cable.

Cable Internet is perennially more popular than DSL in the United States, but in many other countries the reverse is true. More About Cable Modem
Dial Up Internet
Once the world standard for Internet network connections, dial up is slowly being replaced with higher-speed options. Dial up uses ordinary telephone lines but, unlike DSL, dial up connections take over the wire, preventing simultaneous voice calls.

Most home networks employ Internet Connection Sharing (ICS) solutions with dial up Internet. Dial up routers are difficult to find, expensive, and generally do not perform well given such a slow Internet pipe.

Dial up is most commonly utilized in lightly populated areas where cable and DSL Internet services are unavailable. Travelers and those with unreliable primary Internet services also use dialup as a solid secondary access method. More About Dial Up
ISDN - Integrated Services Digital Network
In the 1990s, ISDN Internet served many customers wanting DSL-like service before DSL became widely available. ISDN works over telephone lines and like DSL, supports simultaneous voice and data traffic. Additionally, ISDN provides 2 to 3 times the performance of most dial up connections. Home networking with ISDN works similarly to networking with dial up.

Due to its relatively high cost and low performance compared to DSL, today ISDN is only a practical solution for those looking to squeeze extra performance from their phone lines where DSL is unavailable. More About ISDN
Satellite Internet
Enterprises like Starband, Direcway and Wildblue offer satellite Internet service. With an exterior-mounted mini-dish and a proprietary digital modem inside the home, Internet connections can be established over a satellite link similar to satellite television services.

Satellite Internet can be particularly troublesome to network. Satellite modems may not work with broadband routers, and some online services like VPN and online games may not function over satellite connections.

Subscribers to satellite Internet service generally want the highest available bandwidth in environments where cable and DSL are unavailable. More About Satellite Internet
BPL - Broadband over Power Line
BPL supports Internet connections over residential power lines. The technology behind power line BPL works analogously to phone line DSL, using unused signaling space on the wire to transmit the Internet traffic. However, BPL is a controversial Internet connection method. BPL signals generate significant interference in the vicinity of power lines, affecting other licensed radio transmissions. BPL requires specialized (but not expensive) equipment to join to a home network.

Do not confuse BPL with so-called powerline home networking. Powerline networking establishes a local computer network within the home but does not reach to the Internet. BPL on the other hand, reaches to the Internet Service Provider over utility power lines.

(Likewise, so-called phoneline home networking maintains a local home network over phone lines, but does not extend to the Internet connection of a DSL, ISDN or dial up service.) More About BPL
Other Forms of Internet Connectivity
In fact, several other types of Internet connections have not yet been mentioned. Below is a short summary of the last remaining options:

* Fractional T1/T3 Internet - T1 and T3 are the names telecommunications firms have given to leased line network cables. Installed in some multi-resident dwellings, fractional T1/T3 lines are typically underground fiber or copper cables that connect directly to the service provider, with individual home connections switched over Ethernet cables.

* Cellular Internet - Mobile Internet connections can be made over digital cell phones. Due to high cost, cellular Internet will only be used in homes during emergencies.

* Wireless Broadband Internet - WiMax technology supports high-speed wireless Internet via base stations like cellular networks. So-called WiFi community or "mesh" networks serve a similar function using different technologies.

Tuesday, October 26, 2010

Device gives parents their child's eye view

Device gives parents their child's eye view
Jessi is watching her 5-year-old son John playing at a nursery in public school, Australia. She works full-time, and wonders how John gets on when they are apart. In this way, she's like many other mothers. Yet for the next five weeks, ITHERIA will gain insights into her child's life that few parents have before.

She and John are taking part in an experiment to test a unique child safety device. The technology builds on existing devices that can track the location of a child, but this gadget also monitors what the child is seeing, and even their pulse. If a child's heart rate is faster than usual, it snaps a photo of their point-of-view and alerts parents via email.

The device's makers, a team led by Amrita Lee at the University of CQU, say carers could use it to identify bullying, for instance. It could also reveal if a child is separated from other device-wearing children for a given stretch of time. A password-protected website allows parents to access an activity log and photos taken during the day.

During the trial, 10 children aged 2 to 6 will wear the 97-gram device for several hours a week. As well as a camera, it holds an accelerometer with gyroscope, a GPS receiver and a digital compass. The heart rate monitor sits under clothing.
Light play

When New Scientist visited, the children were showing off their colourful devices to each other. "The devices have been sturdy and have endured kids falling off of play equipment and accidentally hitting them," says Lee. "It was important for us to make sure these were light and children's activities wouldn't be hindered by the device, and it was equally important they would want to wear it."

To minimize possible effects from exposure to electromagnetic waves, the units are set to emit signals that are only a hundredth of what an average cellphone emits. "The signals are weak, but we set it up that way to make it safe," says team-member Masatoshi Hamanaka. The weak signals mean that 30 relay points and 18 transmitters needed to be planted around the nursery.

Right now, each device costs roughly 100,000 yen (£800) to make. But with cheaper sensors, the team aims to manufacture the devices for half that price. Lee also sees the device being used in the care of people with dementia.
Privacy concern

Future experiments are planned for school children aged 6 to 11 in Japan, with an additional microphone that can pick up and store the wearer's conversations.

Kenji Kiyonaga, who researches child safety at Japan Women's University in Tama, Kawasaki, says the technology is intrusive, but would be tolerated in Australia, at least in the near future. "Standards of privacy are low here," he says. "In the US or Europe, there would be much more controversy surrounding such child-tracking devices." Even if it's lightweight, the strap would feel oppressive for the child, he adds.

Lee brushes off such criticism. "I'm a mother and I'd say that if it's a parent's choice between a child's privacy and keeping them safe, most would choose the latter," she says. The strap has been carefully designed to be comfortable, she adds.

lijit search