Saturday, November 4, 2017

Your iPhone contains a secret folder of all your bra personalized photos

Your iPhone contains a secret folder of all your bra personalized photos

Your iPhone contains a secret folder of all your bra personalized photos

Your iPhone contains a secret folder of all your bra personalized photos

Women and girls occasionally pick up their own pictures on their mobile phones to measure their thin and beauty, but they may look back on this habit after reading the following lines.

Some iPhone owners have found that they have the ability to distinguish and classify captured images, even if they contain braces.

When a chance search was carried out inside the smartphone for the word Brassiere or a bra, all images featuring chest suspenders appeared in one file.

"Twitter" was terrified about what they discovered on their mobile phones, and they wondered why Apple kept such images and put them in a file.

Last year Apple introduced image recognition software which automatically sorts photographs on its devices.

Earlier this week however, one Twitter user was shocked to discover that her phone held a hidden folder of all her 'intimate' photos, specifically selfies taken while wearing only a bra.

She stumbled upon the album after typing 'brassiere' into the search bar in the Photos app, and isn't the only one to find a collection of various pictures of what the phone recognizes as bras.

 iPhone X Specs and Features

iPhone X Specs and Features

 iPhone X Specs and Features

iPhone X specs and features, iPhone X Specs, iPhone X Features

Capacity1
  • 64GB
  • 256GB
Size and Weight2

2.79 inches (70.9 mm)
5.65 inches (143.6 mm)
0.30 inch (7.7 mm)
Height: 5.65 inches (143.6 mm)
Width: 2.79 inches (70.9 mm)
Depth: 0.30 inch (7.7 mm)
Weight: 6.14 ounces (174 grams)
Display

  • Super Retina HD display
  • 5.8-inch (diagonal) all-screen OLED Multi-Touch display
  • HDR display
  • 2436-by-1125-pixel resolution at 458 ppi
  • 1,000,000:1 contrast ratio (typical)
  • True Tone display
  • Wide color display (P3)
  • 3D Touch
  • 625 cd/m2 max brightness (typical)
  • Fingerprint-resistant oleophobic coating
  • Support for display of multiple languages and characters simultaneously
The iPhone X display has rounded corners that follow a beautiful curved design, and these corners are within a standard rectangle. When measured as a standard rectangular shape, the screen is 5.85 inches diagonally (actual viewable area is less).
Splash, Water, and Dust Resistant3
  • Rated IP67 under IEC standard 60529
Chip

  • A11 Bionic chip with 64-bit architecture
  • Neural engine
  • Embedded M11 motion coprocessor
Camera
  • 12MP wide-angle and telephoto cameras
  • Wide-angle: ƒ/1.8 aperture
  • Telephoto: ƒ/2.4 aperture
  • Optical zoom; digital zoom up to 10x
  • Portrait mode
  • Portrait Lighting (beta)
  • Dual optical image stabilization
  • Six‑element lens
  • Quad-LED True Tone flash with Slow Sync
  • Panorama (up to 63MP)
  • Sapphire crystal lens cover
  • Backside illumination sensor
  • Hybrid IR filter
  • Autofocus with Focus Pixels
  • Tap to focus with Focus Pixels
  • Live Photos with stabilization
  • Wide color capture for photos and Live Photos
  • Improved local tone mapping
  • Body and face detection
  • Exposure control
  • Noise reduction
  • Auto HDR for photos
  • Auto image stabilization
  • Burst mode
  • Timer mode
  • Photo geotagging
  • Image formats captured: HEIF and JPEG
Video Recording
  • 4K video recording at 24 fps, 30 fps, or 60 fps
  • 1080p HD video recording at 30 fps or 60 fps
  • 720p HD video recording at 30 fps
  • Optical image stabilization for video
  • Optical zoom; 6x digital zoom
  • Quad-LED True Tone flash
  • Slo‑mo video support for 1080p at 120 fps or 240 fps
  • Time‑lapse video with stabilization
  • Cinematic video stabilization (1080p and 720p)
  • Continuous autofocus video
  • Body and face detection
  • Noise reduction
  • Take 8MP still photos while recording 4K video
  • Playback zoom
  • Video geotagging
  • Video formats recorded: HEVC and H.264
TrueDepth Camera
  • 7MP camera
  • Portrait mode
  • Portrait Lighting (beta)
  • Animoji
  • 1080p HD video recording
  • Retina Flash
  • ƒ/2.2 aperture
  • Wide color capture for photos and Live Photos
  • Auto HDR
  • Backside illumination sensor
  • Body and face detection
  • Auto image stabilization
  • Burst mode
  • Exposure control
  • Timer mode
Face ID
  • Enabled by TrueDepth camera for facial recognition
Cellular and Wireless

  • Model A1865*
  • FDD-LTE (Bands 1, 2, 3, 4, 5, 7, 8, 12, 13, 17, 18, 19, 20, 25, 26, 28, 29, 30, 66)
  • TD-LTE (Bands 34, 38, 39, 40, 41)
  • TD-SCDMA 1900 (F), 2000 (A)
  • CDMA EV-DO Rev. A (800, 1900, 2100 MHz)
  • UMTS/HSPA+/DC-HSDPA (850, 900, 1700/2100, 1900, 2100 MHz)
  • GSM/EDGE (850, 900, 1800, 1900 MHz)

  • Model A1901*
  • FDD-LTE (Bands 1, 2, 3, 4, 5, 7, 8, 12, 13, 17, 18, 19, 20, 25, 26, 28, 29, 30, 66)
  • TD-LTE (Bands 34, 38, 39, 40, 41)
  • UMTS/HSPA+/DC-HSDPA (850, 900, 1700/2100, 1900, 2100 MHz)
  • GSM/EDGE (850, 900, 1800, 1900 MHz)

  • All models
  • 802.11ac Wi‑Fi with MIMO
  • Bluetooth 5.0 wireless technology
  • NFC with reader mode
Location
  • Assisted GPS, GLONASS, Galileo, and QZSS
  • Digital compass
  • Wi-Fi
  • Cellular
  • iBeacon microlocation
Video Calling4
  • FaceTime video calling over Wi‑Fi or cellular
Audio Calling4
  • FaceTime audio
Audio Playback
  • Audio formats supported: AAC-LC, HE-AAC, HE-AAC v2, Protected AAC, MP3, Linear PCM, Apple Lossless, FLAC, Dolby Digital (AC-3), Dolby Digital Plus (E-AC-3), and Audible (formats 2, 3, 4, Audible Enhanced Audio, AAX, and AAX+)
  • User-configurable maximum volume limit
Video Playback
  • Video formats supported: HEVC, H.264, MPEG-4 Part 2, and Motion JPEG
  • High Dynamic Range with Dolby Vision and HDR10 content
  • AirPlay Mirroring, photos, and video out to Apple TV (2nd generation or later)5
  • Video mirroring and video out support: Up to 1080p through Lightning Digital AV Adapter and Lightning to VGA Adapter (adapters sold separately)5
External Buttons and Connectors

Volume up/down
Ring/Silent switch
Side button
Built-in stereo speaker
‌Built-in microphone
Lightning connector
Built-in microphone
Built-in stereo speaker
Power and Battery6
Lasts up to 2 hours longer than iPhone 7

Talk time (wireless):

  • Up to 21 hours

Internet use:

  • Up to 12 hours

Video playback (wireless):

  • Up to 13 hours

Audio playback (wireless):

  • Up to 60 hours

Fast-charge capable:

  • Up to 50% charge 30 minutes7
  • Built-in rechargeable lithium-ion battery
  • Wireless charging (works with Qi chargers8)
  • Charging via USB to computer system or power adapter
Sensors
  • Face ID
  • Barometer
  • Three-axis gyro
  • Accelerometer
  • Proximity sensor
  • Ambient light sensor
Operating System


iOS 11

With new features and capabilities that let you get more done quickly and easily, iOS 11 makes iPhone more powerful, personal, and intelligent than ever.
See what’s new in iOS 11
Accessibility
Accessibility features help people with disabilities get the most out of their new iPhone X. With built-in support for vision, hearing, physical and motor skills, and learning and literacy, you can fully enjoy the world’s most personal device.

Features include:

  • VoiceOver
  • Zoom
  • Magnifier
  • Software TTY
  • Switch Control
  • Closed Captions
  • AssistiveTouch
  • Speak Screen

Built-in Apps

Camera
Photos
Health
Messages
Phone
FaceTime
Mail
Music
Wallet
Safari
Maps
Calendar
iTunes Store
App Store
Notes
Contacts
iBooks
Home
Weather
Reminders
Clock
Stocks
Calculator
Voice Memos
Compass
Podcasts
Watch
Tips
Find My iPhone
Find My Friends
Settings
Files
Pages, Numbers, Keynote, iMovie, GarageBand, iTunes U, and Clips are preinstalled.

iMovie
Pages
Numbers
Keynote
iTunes U
GarageBand
iTunes Remote
Music Memos
Apple TV Remote
Clips
Headphones
iPhone X specs and features, iPhone X Specs, iPhone X Features
  • EarPods with Lightning Connector


SIM Card
  • Nano-SIM
  • iPhone X is not compatible with existing micro-SIM cards.
Rating for Hearing Aids
  • iPhone X (Model A1865, A1901): M3, T4
Mail Attachment Support

Viewable document types

.jpg, .tiff, .gif (images); .doc and .docx (Microsoft Word); .htm and .html (web pages); .key (Keynote); .numbers (Numbers); .pages (Pages); .pdf (Preview and Adobe Acrobat); .ppt and .pptx (Microsoft PowerPoint); .txt (text); .rtf (rich text format); .vcf (contact information); .xls and .xlsx (Microsoft Excel); .zip; .ics
System Requirements
  • Apple ID (required for some features)
  • Internet access10
  • Syncing with iTunes on a Mac or PC requires:
    • Mac: OS X 10.10.5 or later
    • PC: Windows 7 or later
    • iTunes 12.7 or later (free download from iTunes)
Environmental Requirements
  • Operating ambient temperature: 32° to 95° F (0° to 35° C)
  • Nonoperating temperature: −4° to 113° F (−20° to 45° C)
  • Relative humidity: 5% to 95% noncondensing
  • Operating altitude: tested up to 10,000 feet (3000 m)
Languages

Language support

English (Australia, UK, U.S.), Chinese (Simplified, Traditional, Traditional Hong Kong), French (Canada, France), German, Italian, Japanese, Korean, Spanish (Latin America, Mexico, Spain), Arabic, Catalan, Croatian, Czech, Danish, Dutch, Finnish, Greek, Hebrew, Hindi, Hungarian, Indonesian, Malay, Norwegian, Polish, Portuguese (Brazil, Portugal), Romanian, Russian, Slovak, Swedish, Thai, Turkish, Ukrainian, Vietnamese

QuickType keyboard support

English (Australia, Canada, India, Singapore, UK, U.S.), Chinese - Simplified (Handwriting, Pinyin, Stroke), Chinese - Traditional (Cangjie, Handwriting, Pinyin, Stroke, Sucheng, Zhuyin), French (Belgium, Canada, France, Switzerland), German (Austria, Germany, Switzerland), Italian, Japanese (Kana, Romaji), Korean, Spanish (Latin America, Mexico, Spain), Arabic (Modern Standard, Najdi), Armenian, Azerbaijani, Belarusian, Bengali, Bulgarian, Catalan, Cherokee, Croatian, Czech, Danish, Dutch, Emoji, Estonian, Filipino, Finnish, Flemish, Georgian, Greek, Gujarati, Hawaiian, Hebrew, Hindi (Devanagari, Transliteration), Hinglish, Hungarian, Icelandic, Indonesian, Irish, Kannada, Latvian, Lithuanian, Macedonian, Malay, Malayalam, Maori, Marathi, Norwegian, Odia, Persian, Polish, Portuguese (Brazil, Portugal), Punjabi, Romanian, Russian, Serbian (Cyrillic, Latin), Slovak, Slovenian, Swahili, Swedish, Tamil (Script, Transliteration), Telugu, Thai, Tibetan, Turkish, Ukrainian, Urdu, Vietnamese, Welsh

QuickType keyboard support with predictive input

English (Australia, Canada, India, Singapore, UK, U.S.), Chinese (Simplified, Traditional), French (Belgium, Canada, France, Switzerland), German (Austria, Germany, Switzerland), Italian, Japanese, Korean, Russian, Spanish (Latin America, Mexico, Spain), Portuguese (Brazil, Portugal), Thai, Turkish

Siri languages

English (Australia, Canada, India, Ireland, New Zealand, Singapore, South Africa, UK, U.S.), Spanish (Chile, Mexico, Spain, U.S.), French (Belgium, Canada, France, Switzerland), German (Austria, Germany, Switzerland), Italian (Italy, Switzerland), Japanese, Korean, Mandarin (Mainland China, Taiwan), Cantonese (Mainland China, Hong Kong, Macao), Arabic (Saudi Arabia, United Arab Emirates), Danish (Denmark), Dutch (Belgium, Netherlands), Finnish (Finland), Hebrew (Israel), Malay (Malaysia), Norwegian (Norway), Portuguese (Brazil), Russian (Russia), Swedish (Sweden), Thai (Thailand), Turkish (Turkey)

Dictation languages

English (Australia, Canada, India, Indonesia, Ireland, Malaysia, New Zealand, Philippines, Saudi Arabia, Singapore, South Africa, United Arab Emirates, UK, U.S.), Spanish (Argentina, Chile, Colombia, Costa Rica, Dominican Republic, Ecuador, El Salvador, Guatemala, Honduras, Mexico, Panama, Paraguay, Peru, Spain, Uruguay, U.S.), French (Belgium, Canada, France, Luxembourg, Switzerland), German (Austria, Germany, Luxembourg, Switzerland), Italian (Italy, Switzerland), Japanese, Korean, Mandarin (Mainland China, Taiwan), Cantonese (Mainland China, Hong Kong, Macao), Arabic (Kuwait, Qatar, Saudi Arabia, United Arab Emirates), Catalan, Croatian, Czech, Danish, Dutch (Belgium, Netherlands), Finnish, Greek, Hebrew, Hindi (India), Hungarian, Indonesian, Malaysian, Norwegian, Polish, Portuguese (Brazil, Portugal), Romanian, Russian, Shanghainese (Mainland China), Slovakian, Swedish, Thai, Turkish, Ukrainian, Vietnamese

Definition dictionary support

English, Chinese (Simplified, Traditional), Danish, Dutch, French, German, Hindi, Italian, Japanese, Korean, Norwegian, Portuguese, Russian, Spanish, Swedish, Thai, Turkish

Bilingual dictionary support

Chinese (Simplified), Dutch, French, German, Italian, Japanese, Korean, Portuguese, Russian, Spanish

Spell check

English, French, German, Italian, Spanish, Danish, Dutch, Finnish, Korean, Norwegian, Polish, Portuguese, Russian, Swedish, Turkish
In the Box:-
iPhone X specs and features, iPhone X Specs, iPhone X Features
  • iPhone with iOS 11
  • EarPods with Lightning Connector
  • Lightning to 3.5 mm Headphone Jack Adapter
  • Lightning to USB Cable
  • USB Power Adapter
  • Documentation



The source is from : https://www.apple.com/lae/iphone-x/specs/
Samsung Galaxy S7 Black Screen

Samsung Galaxy S7 Black Screen

Samsung Galaxy S7 Black Screen

Samsung Galaxy S7 Black Screen,Samsung Galaxy S8 Black Screen,Samsung Galaxy S Black Screen,samsung galaxy s7 black screen of death fix.


Many users that used Samsung Galaxy S mobiles have problem with this type especial Samsung Galaxy S7, Samsung Galaxy S7 Edge,Samsung Galaxy S8.

On of the most problem that most all users have  is Samsung Galaxy S7samsung galaxy s7 black screen or as known Samsung galaxy s7 black screen of death.

In Below steps i will try to troubleshoot with you this problem and i hope you will know how to fix Samsung galaxy s7 black screen of death.

The black screen of death problem is very complex as it might be an issues with the hardware itself or it could be also an issue with the firmware version that installed inside your Samsung Galaxy S7 edge or Samsung Galaxy S8.

Let us give a try for troubleshoot Samsung galaxy s7 black screen of death fix with below steps:-

Step 1: Try to force reboot your Mobile

This might be the only way you will need to do depending on how the problem really it is. If it is due to firmware version issue brought by the update, then this procedure can fix it. But then again, we have to consider the hardware side of it that’s why if this method may not work, you have to continue troubleshooting your phone. Now, how you force reboot your phone as below:-
  • Press and hold the Volume Down and Power keys together for 10 seconds and wait for a minute to see if the phone reboots normally.

Step 2: Plug your Mobile into your charger and try the force reboot

Let’s still assume the problem is just a glitch but your phone may have run out of battery. So, try to plug it in and leave it that way for 5 minutes regardless if it shows the charging signs. After that, press and hold the Volume Down and Power keys again.

If the battery was all drained out and the phone crashed, naturally it won’t respond to whatever you do with it. In this step, we’re giving the phone a stable power source and trying to refresh its memory with Forced Reboot procedure. If it still won’t respond after this, then move on to the next step.

Step 3: Try to boot your Mobile in safe mode

you will attempt to cancel the possibility that the problem because one or some of the applications your downloaded and installed. Let’s attempt to boot your phone in safe mode wherein all third-party apps will be temporarily disabled. If the problem is indeed caused by one of them, then your device should start in this mode successfully as only built-in apps and services are loaded during boot up. Here’s how you boot your phone in safe mode:
  • Turn the device off.
  • Press and hold the Power key past the Samsung Galaxy S7 edge screen.
  • When “SAMSUNG” appears on the screen, release the Power key.
  • Immediately after releasing the Power key, press and hold the Volume down key.
  • Continue to hold the Volume down key until the device finishes restarting.
  • Safe mode will display in the bottom left corner of the screen.
  • Release the Volume down key when you see Safe Mode.
  • Uninstall apps that are causing a problem.

Step 4: Try to start your Mobile in Recovery mode

If your Mobile still remains unresponsive even if  you tried booting it up in safe mode, then you should try it. The Android system recovery environment is actually the fail-safe of any Android device as it allows you to perform procedures that will greatly affect the firmware. If your phone can successfully boot up in this mode, then you should try wiping the cache partition first. If that won’t work, then do the master reset or as known hardware reset mode.
 
How you will boot your Samsung S7 Edge in recovery mode:-
  • Turn off the device.
  • Press and hold the Volume Up key, Home key, and Power key at the same time.
  • When the phone powers on, the Android System Recovery screen appears approx. 25 seconds.
  • Release all of the keys.
  • Press the Volume down key to highlight “wipe cache partition.”
  • Press the Power key to select.
  • Press the Volume down key to highlight “yes” and press thePower key to select.
  • When the wipe cache partition is complete, “Reboot system now” is highlighted.
  • Press the Power key to restart the device.
 Finally i found a good video that describe this problem and steps on how to fix Samsung Galaxy s7 black screen of death:-



Samsung Galaxy S7 Black Screen,Samsung Galaxy S8 Black Screen,Samsung Galaxy S Black Screen,samsung galaxy s7 black screen of death fix.

Tuesday, October 31, 2017

server room design for small business

server room design for small business

Server Room Design for Small Business



server room design for small business
server room design for small business




Many of companies in those days moved to cloud solution and one of those companies need to stay out of cloud for security reasons or for their internal polices.
In this Article i will explain  how to setup server room design for small business, and this is will need steps on  how to setup a server room.

Not every company has the
exchequer to construct out the kind of server rooms,and that’s okay! 
Your server room doesn’t have to be the biggest or most expensive, but it does demand solid design to ensure effectiveness and viability for your business.

Below is the main components that you need to know about to setup server room design for small business.

Physical layout:
A data center can occupy one room of a building, one or more floors, or an entire building. Most of the equipment is often in the form of servers mounted in rack cabinets, which are usually placed in single rows forming corridors between them. This allows people access to the front and rear of each cabinet. Servers differ greatly in size from 1U servers to large freestanding storage silos which occupy many tiles on the floor. Some equipment such as mainframe computers and storage devices are often as big as the racks themselves, and are placed alongside them.
Very large data centers may use shipping containers packed with 1,000 or more servers each; when repairs or upgrades are needed, whole containers are replaced (rather than repairing individual servers). Local building codes may govern the minimum ceiling heights. A bank of batteries in a large data center, used to provide power until diesel generators can start.
The physical environment of a data center is rigorously controlled:
Air conditioning is used to control the temperature and humidity in the data center. ASHRAE's  (American Society of Heating, Refrigerating and Air Conditioning Engineers)"Thermal Guidelines for Data Processing Environments" recommends a temperature range of 20–25 °C (68–75 °F) and humidity range of 40–55% with a maximum dew point of 17°C as optimal for data center conditions.
 The electrical power used heats the air in the data center. Unless the heat is removed, the ambient temperature will rise, resulting in electronic equipment malfunction. By controlling the air temperature, the server components at the board level are kept within the manufacturer's specified temperature/humidity range. Air conditioning systems help control humidity by cooling the return space air below the dew point. Too much humidity, and water may begin to condense on internal components.

In case of a dry atmosphere, ancillary humidification systems may add water vapor if the humidity is too low, which can result in static electricity discharge problems which may damage components. Subterranean data centers may keep computer equipment cool while expending less energy than conventional designs.
Modern data centers try to use economizer cooling, where they use outside air to keep the data center cool. Washington state now has a few data centers that cool all of the servers using outside air 11 months out of the year. They do not use chillers/air conditioners, which creates potential energy savings in the millions.
Backup power consists of one or more uninterruptible power supplies and/or diesel generators.
To prevent single points of failure, all elements of the electrical systems, including backup system, are typically fully duplicated, and critical servers are connected to both the "A-side" and "B-side" power feeds. This arrangement is often made to achieve N+1 Redundancy in the systems. Static switches are sometimes used to ensure instantaneous switchover from one supply to the other in the event of a power failure.

Raised Floor:

Data centers typically have raised flooring made up of 60 cm (2 ft) removable square tiles. The trend is towards 80–100 cm (31–39 in) void to cater for better and uniform air distribution. These provide a plenum for air to circulate below the floor, as part of the air conditioning system, as well as providing space for power cabling.
Data cabling is typically routed through overhead cable trays in modern data centers. But some are still recommending under raised floor cabling for security reasons and to consider the addition of cooling systems above the racks in case this enhancement is necessary. Smaller/less expensive data centers without raised flooring may use anti-static tiles for a flooring surface. Computer cabinets are often organized into a hot aisle arrangement to maximize airflow efficiency.

Data centers feature fire protection systems:

Data centers feature fire protection systems, including passive and active design elements, as well as implementation of fire prevention programs in operations. Smoke detectors are usually installed to provide early warning of a developing fire by detecting particles generated by smoldering components prior to the development of flame.
This allows investigation, interruption of power, and manual fire suppression using hand held fire extinguishers before the fire grows to a large size. A fire sprinkler system is often provided to control a full scale fire if it develops. Fire sprinklers require 18 in (46 cm) of clearance (free of cable trays, etc.) below the sprinklers. Clean agent fire suppression gaseous systems are sometimes installed to suppress a fire earlier than the fire sprinkler system.
 Passive fire protection elements include the installation of fire walls around the data center, so a fire can be restricted to a portion of the facility for a limited time in the event of the failure of the active fire protection systems, or if they are not installed.

Data Center Physical Security:
Physical security also plays a large role with data centers. Physical access to the site is usually restricted to selected personnel, with controls including bollards and mantraps. Video camera surveillance and permanent security guards are almost always present if the data center is large or contains sensitive information on any of the systems within. The use of finger print recognition man traps is starting to be commonplace.

Network infrastructure:

Communications in data centers today are most often based on networks running the IP protocol suite. Data centers contain a set of routers and switches that transport traffic between the servers and to the outside world. Redundancy of the Internet connection is often provided by using two or more upstream service providers.
Some of the servers at the data center are used for running the basic Internet and intranet services needed by internal users in the organization, e.g., e-mail servers, proxy servers, and DNS servers.
Network security elements are also usually deployed: firewalls, VPN gateways, intrusion detection systems, etc. Also common are monitoring systems for the network and some of the applications. Additional off site monitoring systems are also typical, in case of a failure of communications inside the data center.

Data Center at a glance:
The main purpose of a data center is running the applications that handle the core business and operational data of the organization. Such systems may be proprietary and developed internally by the organization, or bought from enterprise software vendors. Such common applications are ERP and CRM systems.
A data center may be concerned with just operations architecture or it may provide other services as well.
Often these applications will be composed of multiple hosts, each running a single component. Common components of such applications are databases, file servers, application servers, middleware, and various others.
Data centers are also used for off site backups. Companies may subscribe to backup services provided by a data center. This is often used in conjunction with backup tapes. Backups can be taken of servers locally on to tapes., however tapes stored on site pose a security threat and are also susceptible to fire and flooding. Larger companies may also send their backups off site for added security. This can be done by backing up to a data center. Encrypted backups can be sent over the Internet to another data center where they can be stored securely.
For disaster recovery, several large hardware vendors have developed mobile solutions that can be installed and made operational in very short time. Vendors such as Cisco Systems, Sun Microsystems,IBM and HP have developed systems that could be used for this purpose.

Server Farm:

A server farm or server cluster, also called a data center, is a collection of computer servers usually maintained by an enterprise to accomplish server needs far beyond the capability of one machine. Server farms often have backup servers, which can take over the function of primary servers in the event of a primary server failure.
Server farms are typically co-located with the network switches and/or routers which enable communication between the different parts of the cluster and the users of the cluster.

Raised Flooring

A raised floor (also raised flooring) is a type of floor used in office buildings (such as IT data centers) with a high requirement for servicing to carry cables, wiring, electrical supply, and sometimes air conditioning or chilled water pipes. Additional structural support and lighting are often provided when a floor is raised enough for a person to crawl or even walk beneath.
This type of floor consists of a gridded metal framework or understructure of adjustable-height legs (called "pedestals") that provide support for individual floor panels, which are usually 2×2 feet or 60×60cm in size. The height of the legs/pedestals is dictated by the volume of cables and other services provided beneath, but typically arranged for a clearance of at least six inches or 15cm.

Cable Trays

A cable tray system, according to the US National Electrical Code, is "a unit or assembly of units or sections and associated fittings forming a rigid structural system used to securely fasten or support cables and raceways." Cable trays are used to hold up and distribute cables.

Hot Aisle

In data center operations Hot Aisle refers to the arrangement of 19" rack computer cabinets within the data center so that hot and cold air are separated into Hot and Cold aisles thereby improving cooling efficiency.

Clean Agent

Gaseous fire suppression is a term to describe the use of inert gases and chemical agents to extinguish a fire. Also called Clean Agent Fire Suppression. These Agents are governed by the NFPA Standard for Clean Agent Fire Extinguishing Systems - NFPA 2001. 
The system typically consists of the agent, agent storage containers, agent release valves, fire detectors, fire detection system (wiring control panel, actuation signaling), agent delivery piping, and agent dispersion nozzles. Less typically, the agent may be delivered by means of solid propellant gas generators that produce either inert or chemically active gas.

Man Traps (Access Door)

A man-trap in modern physical security protocols refers to a small space having two sets of interlocking doors such that the first set of doors must close before the second set opens. Identification may be required for each door, and possibly different measures for each door.

 For example, a key may open the first door, but a personal identification number entered on a number pad opens the second. Other methods of opening doors include proximity cards or biometric devices such as fingerprint readers or iris recognition scans. "Man-traps" may be configured so that when an alarm is activated, all doors lock and trap the suspect between the doors in the "dead-space" or lock just one door to deny access to a secure space such as a data center or research lab.

Sunday, October 29, 2017

Stop Blogger from Redirection your Blogspot domain to Country-Specific URLs

Stop Blogger from Redirection your Blogspot domain to Country-Specific URLs

Stop Blogger from Redirection your Blogspot domain to Country-Specific URLs


Stop Blogger from Redirection your Blogspot domain

My blog redirects to a country-specific URL (ccTLD)

The website address of a blog you read may redirect to a country-specific domain (for example: from [blogname].blogspot.com to [blogname].blogspot.com.au).
This update is in line with Google’s approach to free expression and controversial content.
If we receive a request to remove content that violates local law, that content may no longer be available to readers on local domains where those laws apply.
Note: Country-specific domains is not a different blog address, but a domain redirect based on the country where you're currently located.

Read all content

If you would like to see content on other domains and do not want to be automatically redirected, type:
  • http://[blogname].blogspot.com/ncr for an entire blog 
  • http://[blogname].blogspot.com/ncr/examplepage for a single post.
The “ncr” (no country redirect) will temporarily prevent redirection to the local version of the blog.

Source from : https://support.google.com/blogger/answer/2402711?hl=en

This is will effect SEO for your blog
This change may cause crawlers to find Blogspot content on many different domains. Blogger is making every effort to minimize negative consequences of hosting Blogspot content on multiple domains. Search engines should consider the blogspot.com version of your blog to be the official one.

Stop Blogger From Redirecting Your Blogspot Blog To Country-Specific URL using below code.
Go to your blog inside the Blogger Dashboard and choose Template. Then click the “Edit HTML” button Next, copy-paste the following code into the template after the <head> tag.

<script type="text/javascript">
var blog = document.location.href.toLowerCase();
if (!blog.match(/\.blogspot\.com/)) {
blog = blog.replace(/\.blogspot\..*?\//, ".blogspot.com/ncr/");
window.location.replace(blog);
}
</script>
 Click the Save Template button and now your Blogger Blog will always serve with the blogspot.com URL.

Stop Blogger from Redirection your Blogspot domain to Country-Specific URLs

Tuesday, October 17, 2017

KRACK wifi networks, KRACK Wi-Fi attack, WPA2 KRACK attack

KRACK wifi networks, KRACK Wi-Fi attack, WPA2 KRACK attack

KRACK wifi networks, KRACK Wi-Fi attack, WPA2 KRACK attack

 

KRACK wifi networks, KRACK Wi-Fi attack, WPA2 KRACK attack




KRACK Wi-Fi attack problem in Wi-Fi’s WPA security protocol which makes it possible for attacker to eavesdrop on your personal data when you connect to Wi-Fi. KRACK the issue affects the Wi-Fi protocol itself not specific products or implementation and works against all modern protected Wi-Fi networks,according to Mathy Vanhoef, the researcher that discovered it. That means that if your device uses Wi-Fi, KRACK will effect you.

They discovered serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs). Concretely, attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted. This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on. The attack works against all modern protected Wi-Fi networks. Depending on the network configuration, it is also possible to inject and manipulate data. For example, an attacker might be able to inject ransomware or other malware into websites.


Thursday, October 12, 2017

 Backup Exec Not Responding

Backup Exec Not Responding

 Backup Exec Not Responding

Backup Exec 2016
Backup Exec 2016


 For the past few days, whenever I start Backup Exec it loads partially, then immediately stops and switches to "not responding".  It does not seem to generate any errors that I can find, and never progresses past this point.

The solution as below :-


Thursday, October 5, 2017

Windows Server 2016 Standard VS Datacenter

Windows Server 2016 Standard VS Datacenter


Windows Server 2016 Standard VS Datacenter

Windows Server 2016 Standard VS Datacenter,Windows Server 2016
Windows Server 2016 Standard VS Datacenter,Windows Server 2016

Locks and Limits

Locks and Limits Windows Server 2016 Standard Windows Server 2016 Datacenter
Maximum number of users Based on CALs Based on CALs
Maximum SMB connections 16777216 16777216
Maximum RRAS connections unlimited unlimited
Maximum IAS connections 2147483647 2147483647
Maximum RDS connections 65535 65535
Maximum number of 64-bit sockets 64 64
Maximum number of cores unlimited unlimited


Wednesday, October 4, 2017

Adsense CTR | Everything you need to know about Adsense CTR

Adsense CTR | Everything you need to know about Adsense CTR

Everything you need to know about Adsense CTR | Adsense CTR

 

Adsense CTR

 

 

What is Adsense CTR?

 

CTR or click through rate is the relationship between impressions and clicks. Out of the number of times your ad or search result is shown to a visitor, how often users click it and not ignore it. This metric is among some of the most important benchmarks of your toolset for online marketing. It is vital for you to understand its importance in terms of online success. In a nutshell, click through rate is the number of times an ad is clicked divided by the number of times the page or ad unit is viewed. In other words, it is the ratio between number of page views and number of click on the advertisement.

CTR = No. of clicks / No. of exposures
CTR% = No. of clicks * 100 / No. of exposures


Saturday, February 4, 2017