Όταν οι μεγάλοι συζητούν παρέα…

Το παρόν post, είναι re-posting ενός άρθρου από το TechTarget.com και αφορά τις πρόσφατες συνομιλίες μεταξύ Dell & Microsoft για το μέλλον των PCs & των Windows 10 (φρέσκα πράγματα δηλαδή και διαλεχτά). Είναι σίγουρο πως όταν οι μεγάλοι συζητούν – “κάτι τρέχει!…και είναι τεράστιοοοο!!!”

Δείτε λοιπόν και μόνοι σας. (ακολουθεί το link)

Dell & Microsoft discuss the future of W10

Thanx All.

I.V

Advertisements

Ορολογία της Ημέρας (T.O.D) – 30/10/2015 [Leaf-Spine Architecture]

Leaf-Spine Architecture

Leaf-spine is a network topology in which a series of switches form the access layer.

Leaf-spine is an alternate to the three-layer core/aggregation/access network architecture. The leaf switches mesh into the spine, which is a series of several high-throughput layer 3 switches with high port density. Spine switches are essentially the core of the architecture, whereas leaf switches are the access layer that delivers network connection points for servers. Leaf switches also provide uplinks to spine switches.

Every leaf switch connects to every switch in the network fabric; no matter which leaf switch a server is connected to, it has to cross the same number of devices every time it connects to another server. The only exception is when the other server is on the same leaf. Latency is therefore minimized to an acceptable level because each payload only has to travel to a spine switch and another leaf switch to reach its endpoint.

A leaf-spine topology can be layer 2 or layer 3 — the links between the leaf and spine layer can be switched or routed. In a layer 2 leaf-spine design, Transparent Interconnection of Lots of Links or shortest path bridging takes the place of spanning-tree. All hosts are linked to the fabric and offer a loop-free route to their Ethernet MAC address through a shortest-path-first computation. In a layer 3 design, each link is routed, and it is most efficient when virtual local area networks are sequestered to individual leaf switches or when a network overlay, like VXLAN, is working.

Thank you so much.

I.V

 

Σκληροί Χρήστες – Σκληρές Λύσεις

Θέλω σήμερα να κάνω ένα re-posting το οποίο έχει σχέση με το design των νέων τεχνολογιών και την χρήση των πάσης φύσεως κινητών – φορητών συσκευών. Το re-post είναι από το Infocom.gr και αφορά μία νέα σειρά tablets της Dell – που είναι αδιάβροχα και rugged (δηλαδή ενισχυμένα για κακουχίες). Δείτε και το link παρακάτω. Continue reading

Ορολογία της Ημέρας (T.O.D) – 29/10/2015 [Chief Risk Officer]

Chief Risk Officer (CRO)

The Chief Risk Officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory and technological risks across the enterprise. The position is sometimes called Chief Risk Management Officer (CRMO) or simply Risk Management Officer (RMO).

Organizations have long been concerned with business risks that can threaten productivity and profitability. The formalization of those efforts in the form of enterprise risk management (ERM) led by a dedicated CRO gained momentum in the wake of regulatory requirements such as the Sarbanes-Oxley Act of 2002. Concerns fueled by legislation such as the Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010 have made the CRO position even more important in the C-level hierarchy. In addition to issues of compliance, CROs are typically concerned with issues such as insurance, IT security, financial auditing, global business variables, fraud and other internal corporate investigations.

Most large businesses and those organizations considered “critical infrastructure,” such as financial institutions and energy providers, now support an ERM program led by a CRO or equivalent. According to industry surveys, the typical enterprise CRO has a post-graduate degree and more than two decades of business experience, usually in accounting or legal affairs.

Thank you so much for reading.

I.V

 

Ορολογία της Ημέρας (T.O.D) – 28/10/2015 [Mobile Cloud App]

Mobile Cloud App

A mobile cloud application is a software program that is designed to be accessed over the Internet by many types of portable computing devices.

Mobile cloud apps and mobile Web apps are similar. They both run on servers external to the mobile device, they both store data externally and they are both accessed over the Internet with a browser. However, it is often said that while all cloud apps are Web apps, not all Web apps are cloud apps.

Simply put, not all mobile Web apps can run in a virtual environment without being re-engineered. This is because a Web app may have originally been written to run and store data on a dedicated physical server in a data center. A cloud app, on the other hand, will always be written to live on virtual servers in a distributed, multi-tenant architecture and store data in the cloud.

Mobile cloud and Web apps are both very different from native mobile apps. Native apps in mobile software development run on one particular mobile device or platform and are downloaded and installed on the mobile device. The challenge of writing native mobile apps is that developers must create three different versions of the same mobile app if they want it to be used by iOS, Android and Windows devices.

Because mobile cloud apps are not downloaded, developers can just write one version of their mobile app and any device with a browser and Internet connection can use it. The challenge then becomes writing and managing application programming interfaces (APIs) that use loosely coupled cloud services in the most cost-effective manner.

Thank you for reading.

I.V

Ορολογία της Ημέρας (T.O.D) – 27/10/205 [Proxy Server]

Proxy server

Communication between two computers (shown in grey) connected through a third computer (shown in red) acting as a proxy. Note that Bob doesn’t know whom the information is going to, which is why proxies can be used to protect privacy. Continue reading

Ορολογία της Ημέρας (T.O.D) – 26/10/2015 [File Transfer Protocol]

File Transfer Protocol

Το File Transfer Protocol (FTP), (ελληνικά: Πρωτόκολλο Μεταφοράς Αρχείων) είναι ένα ευρέως χρησιμοποιούμενο πρωτόκολλο σε δίκτυα τα οποία υποστηρίζουν το πρωτόκολλο TCP/IP (δίκτυα όπως internet ή intranet). Ο υπολογιστής που τρέχει εφαρμογή FTP client μόλις συνδεθεί με τον server μπορεί να εκτελέσει ένα πλήθος διεργασιών όπως ανέβασμα αρχείων στον server, κατέβασμα αρχείων από τον server, μετονομασία ή διαγραφή αρχείων από τον server κ.ο.κ. Το πρωτόκολλο είναι ένα ανοιχτό πρότυπο. Είναι δυνατό κάθε υπολογιστής που είναι συνδεδεμένος σε ένα δίκτυο, να διαχειρίζεται αρχεία σε ένα άλλο υπολογιστή του δικτύου, ακόμη και εάν ο δεύτερος διαθέτει διαφορετικό λειτουργικό σύστημα.

Με Εκτίμηση

I.V