X-Nico

17 unusual facts about computer network


Atlas Computer Laboratory

The Atlas Computer Laboratory made important contributions to systems software including operating systems, compilers, computer graphics, and networking.

BioWeb

The BioWeb is the connotation for a network of web-enabled biological devices (e.g. trees, plants, and flowers) which extends an internet of things to the Internet of Living Things of natural sensory devices.

Hisashi Kobayashi

His fields of expertise include applied probability; queueing theory; system modeling and performance analysis; digital communication and networks; and network architecture.

History of the Internet in Sweden

The history of Internet in Sweden can be considered to have begun in 1984, when the first Swedish network was connected to the Internet in Gothenburg.

IBM 4694

The system requires the IBM 4694 computer which is used as a "Controller", or also more or less, as a server on the network.

IGUANA Computing

Independent Group of Unix-Alikes and Networking Activists (IGUANA) are developers of the Wombat system.

Jim Stickley

Before this discovery, application firewalls had been considered by many security experts to be the most secure solution for protecting networks on the Internet and Network Associates had claimed Gauntlet to be the "Worlds most secure firewall".

Malware

However, having a few diverse nodes would deter total shutdown of the network, and allow those nodes to help with recovery of the infected nodes.

This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across.

On the other hand, a worm is a program that actively transmits itself over a network to infect other computers.

The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems.

Worms today work in the same basic way as 1988's Internet Worm: they scan the network and use vulnerable computers to replicate.

Left unguarded, personal and networked computers can be at considerable risk against these threats.

Pearson in Practice

Learners explore the full boundaries of computing, by looking at advanced server technology, internet knowledge, group policies and various other sections related to networks and computers.

Péter Gervai

He has a diverse interest mainly focused on technical areas, computers, mostly internet access and service providing, security, network design and programming, but he also likes reading and writing literature.

Referer spoofing

In HTTP networking, typically on the World Wide Web, referer spoofing (based on a canonised misspelling of "referrer") is the sending of incorrect referer information in an HTTP request in order to prevent a website from obtaining accurate data on the identity of the web page previously visited by the user.

Thwack.com

The website began as a forum for technical support of SolarWinds products and has since shifted to a broader range of networking topics and community features.


Color suite

The telecine, VTRs and some of the larger equipment are often placed in a central apparatus room or machine room and are interconnected through Cable trays or raised floor to the color suite by patch panels, Coaxial cables, Computer network and Multicore cables.

Content processor

Content processors are sometimes confused with network processors that inspect the packet payload of an IP packet travelling through a computer network.

Hinemos

Resource Management Feature : Collects CPUMemoryDiskNetwork resource informations and visualises in graph format.

HTTP Secure

Hypertext Transfer Protocol Secure (HTTPS) is a communications protocol for secure communication over a computer network, with especially wide deployment on the Internet.

Institute of Informatics and Communication

The institute provides studies in the field of informatics, which is essentially a blend of three domains: networking, telecommunication and software, on three major platforms: Windows, Linux and Macintosh.

Intermediate distribution frame

In WAN and LAN environments IDFs can hold devices of different types including backup systems (hard drives or other media as self-contained, or as RAIDs, CD-ROMs, etc.), networking (switches, hubs, routers), and connections (fiber optics, coaxial, category cables) and so on.

Marionnet

Marionnet was born in April 2005 as a simple textual interface to Netkit, written in OCaml by Jean-Vincent Loddo at the Paris 13 University for his own networking course.

Network enumeration

Network Enumeration is the discovery of hosts/devices on a network, they tend to use overt discovery protocols such as ICMP and SNMP to gather information, they may also scan various ports on remote hosts for looking for well known services in an attempt to further identify the function of a remote host.The next stage of enumeration is to fingerprint the Operating System of the remote host.

Panduit

Panduit delivers physical infrastructure solutions for application throughout several core areas: data center, connected buildings, enterprise networks, industrial automation, and OEM/MRO.

Sierra Wireless

Sierra Wireless products and technologies are used in a variety of markets and industries, including automotive and transportation, energy, field service, healthcare, industrial and infrastructure, mobile computing and consumers, networking, sales and payment, and security.

Skegness Academy

During years 7, 8 and 9, pupils are taught aspects of Microsoft Office, and in years 10 and 11, can opt for ICT which includes computing skills, Networking, website development and Designing & Implementing Software solutions.

Solgenia

Products are promoted to integrate business process and collaboration technologies, marketed with acronyms such as ERP / BI / CRM / DMS – for networking, unified communications and services and platforms for cloud computing mode.

Trusted time

Because of how time is moved through networks over the Network Time Protocol time sources should generallty only be used which are local to the user no matter how good the network performance is.

Visual CMDB

A Visual CMDB helps manage IT assets(CIs) such as Hardware, Software and network components and associated details such as data files, documentation and service level information.