Pages

Sunday, 29 September 2013

How facebook works behind the curtain..

                                     

Facebook is a social networking service use by me ,you and each and every one living in modern era.But have you ever wondered how Facebook works?
Facebook uses various programming languages with "LAMP" system(Linux,Apache,MySQL and PHP)  and Memcache.

Actually Facebook uses LINUX because of its high security and ease of customization according to its need. It is UNIX type operating system and it is open source.It uses APACHE  the most powerful open source  HTTP server.
It uses MySQL for its database because its reliable and speedy as well. PHP a scripting language is also used by Facebook because of its dynamic nature  and high performance.

MEMCACHE is open source system for caching memory.It make dynamic sites like Facebook which cache memory in RAM instead of database.

Facebook has come across many problems due to this LAMP system.Among many problem s,the major problem is that PHP is difficult to configure for big websites.Beside this due to dynamic growth it also faces problem of memory caching , database queries and storage of data.To cover up this Facebook has started back end and open source projects.

In back end and open source projects they create any program or service when they need it.these services are written in languages like Java,C++,Python and Erlang.I am discussing here some of important open source projects which are
                                                      

CASSANDRA  a storage system designed to handle a large amount of data with out a single point of failure.
                                                     

THRIFT provide framework for service development in cross languages.it support languages like C++,Java,Python ,PHP and Ruby.
                                                       
HIPHOP  transforms PHP source code into optimized C++. It causes large performance gain for Facebook servers.
            written by S.S.Ali at Monday,September,29,2013

Thursday, 19 September 2013

FUTURE TECHNOLOGY 3D COMMUNICATION





Skype is working to allow its user to make video call in three dimension,announced by senior executive Mark Gillet in exclusive interview with BBC on 10th anniversary of Skype.

   
                                   

However he warned that the full deployment may take several years.Mr Gillet told the BBC.

"We've seen a lot of progress in screens and a lot of people now buy TVs and computer monitors that are capable of delivering a 3D image.

"But the capture devices are not yet there. As we work with that kind of technology you have to add multiple cameras to your computer, precisely calibrate them and point them at the right angle.

"We have it in the lab, we know how to make it work and we're looking at the ecosystem of devices and their capability to support it in order to make a decision when we might think about bringing something like that to market."


Skype allows people to make free audio and video calls to other Skype users around the world, with just a computer or smartphone running its software as well as a webcam, microphone and speakers.

Once only available on PCs, people can now Skype each other using smartphones, tablets, smart TVs, their home telephones and even gaming devices.


Microsoft bought Skype two years ago.It cost Microsoft 8.5 billion $.Skype handled 115 billion minutes of call,including 34 percent of all international calls over last financial quarter.
Written by S.S.Ali  at Friday,September,19,2013

Sunday, 15 September 2013

INTERNET PROTOCOL (IP)





The Internet Protocol is the principal
communications protocol used for
relaying datagram (packets) across an
internetwork using the Internet Protocol
Suite. Responsible for routing packets
across network boundaries, it is the
primary protocol that establishes the
Internet.


 IP is the primary protocol in the Internet
layer of the Internet Protocol Suite and
has the task of delivering datagrams from
the source host to the destination host
solely based on their addresses. For this
Purpose, IP defines addressing methods
and structures for datagram

Thursday, 12 September 2013

INTRODUCTION TO HACKERS

                             

A hacker is someone who likes to tinker with electronics or computer
systems. Hackers like to explore and learn how computer systems work,
finding ways to make them do what they do better, or do things they
weren’t intended to do. There are two types of hackers:


White Hat – These are considered the good guys. White hat hackers don’t
use their skills for illegal purposes. They usually become Computer
Security experts and help protect people from the Black Hats.


Black Hat – These are considered the bad guys. Black hat hackers usually
use their skills maliciously for personal gain. They are the people that hack
banks, steal credit cards, and deface websites.
These two terms came from the old western movies where the good guys

wore white hats and the bad guys wore black hats.

Wednesday, 11 September 2013

Introduction to SIM card

A Basic knowledge about the Sim Card

A subscriber identity module or subscriber identification module (SIM) is an integrated circuit that securely stores the International Mobile Subscriber Identity (IMSI) and the related key used to identify and authenticate subscribers on mobile telephony devices ,such as mobile phones and computers.

It is also a portable memory chip used mostly in cell phones that operate on the Global System for Mobile Communications (GSM) network. These cards hold the personal information of the account holder, including his or her phone number, address book, text messages, and other data. When a user wants to change phones, he or she can usually easily remove the card from one handset and insert it into another. SIM cards are convenient and popular with many users, and are a key part of developing cell phone technology.

Sim Cards are of four (4) Types. Named as Below H1, H2, H3, H4

H1= You Will Get Normal Network On This Sim
H2= You Will Get Better Network On This Sim, Means Strong
H3= You Will Get More Better Network On This Sim, Means Stronger
H4= Normal, Better, More Better Is Nothing In Front OF This Sim.

Basically H4 Sim giving for Corporate Sim, Army Peoples etc. The Company doesn’t Provide H4 Sim To all User,because this Sim eat More bandwidth. For knowing Which Type of Sim is using Just Check Its Back Side and will Get the Sim No. and the Sim Type.

SIM cards are made in three different sizes to accommodate different devices. Most phones use mini-SIM or micro-SIM cards, which are quite small — the mini is 25 mm by 15 mm , and the micro is 15 mm by 12 mm.Full-sized cards are much larger, 85.6 mm by 53.98 mm , and are too big for most phones. All cards are only 0.76 mm thick, and the microchip contacts are in the same arrangement. This means that, with the proper adapter, the smaller cards can be used in devices designed for larger ones.

A SIM card offers security for both the user’s data and his or her calls. The cards can be locked, meaning that only someone who has the correct personal identification number (PIN) can use the card. If the phone is stolen, the thief cannot use a locked SIM or get any information off of it without the PIN.