Pages

Showing posts with label TECH NEWS. Show all posts
Showing posts with label TECH NEWS. Show all posts

Monday, July 15, 2013

Indian Developers May Soon Overtake Americans






Although the United States is still a leading producer of software, it seems that the nation is falling behind in training and using developers. Media experts predict that India may exceed the United States in the number of software developers in 4 years. At the moment, there are 18.2 million software developers in the world – this number is expected to increase to 26 million by 2019.
                                        Such almost 50% increase might appear bad news for people who want the United States to remain the center of the software universe. At the moment, there are 3.6 million developers in the United States and 2.75 million in India. However, by 2018, India is said to have 5.2 million developers, almost 90% increase, versus 4.5 million in America.

Experts believe that India’s rapid software development growth can be explained, in part, by its population size (1.2 billion), and relative youth, (almost 50% of the population under 25 years of age), along with economic growth. In the country, IT and software work is regarded as clear path to the middle class for lots of the nation’s youth – however, India has seen real GDP growth of around 8% over the last decade, which may fall and lead to adjustment in the projections.

This is not the first time that the experts from Evans Data have predicted the country will surpass the United States of America in software developers. Previously, the agency believed that this would happen by 2015, but after their predictions the seriousness of the recession had hit the IT industry. It looks like the recession really delayed the country’s rise to dominance. Aside from India, China will have around 1.9 million programmers in 3 years, and Russia about 1.3 million.


Monday, October 24, 2011

GOOGLE INTRODUCES DART, A STRONG ALTERNATIVE TO JAVASCRIPT



Google has taken the lid off an early preview of Dart, a new web programming language aimed at helping developers address what the search giant sees as the shortcomings of JavaScript, with a focus on developing apps that scale from tiny to huge.
In his Google Code blog entry, Dart software engineer Lars Bak lists the following as the new language’s design goals:


Create a structured yet flexible language for web programming.
Make Dart feel familiar and natural to programmers and thus easy to learn.
Ensure that Dart delivers high performance on all modern web browsers and environments ranging from small handheld devices to server-side execution.

Seems pretty straightforward. And, as Bak goes on to say, Dart is facilitating scenarios from a one-man development project all the way up to bigger applications that require teams of programmers by enabling you to start coding without types and add them in later.


Dart comes with its own native virtual machine, but there’s also a compiler that translates Dart to JavaScript. Between those two options, Google says that applications written in Dart can run in any modern browser. The Dart VM isn’t yet integrated with the Google Chrome browser, but Bak indicates that they’re looking into it.


The first wave of basic libraries and Dart tools are available as open source on their own site, and Bak says that Google is soliciting feedback from developers as the platform matures.



On a final note, if you’re interested in a deeper dive into Dart,there was plenty of interesting tidbits to come out of their conversation, including the roadmap to making Dart a common standard and the fact that Dart isn’t designed to make JavaScript obsolete.


TECHNO TITANS !!!!

Friday, May 20, 2011

Facebook works with Google, Yahoo and mozilla on secure session cookie

Facebook works with Google, Yahoo and Mozilla on secure session cookie

After turning on https connection for facebook users, now facebook is working with Google, Yahoo and Mozilla on a secure session cookie specification that will protect session cookie from theft even over non-encrypted connections. This new specification is MAC Access Authentication that provide cryptographic verification for certain portions of HTTP requests. Here MAC is Message Authentication Code. this prevents MAN IN THE MIDDLE attack.

Facebook told developers in a post detailing recent changes to its app platform, "We’re working with Yahoo!, Google and Mozilla on this specification in order to give all websites a way to ensure that session information has not been altered or tampered with". Facebook also asked developers to use SSL connection for apps by october.
Recently facebook user data was leaked by some app tokens vulnerability, so facebook is forcing all developers to use SSL. Every time the facebook got some trouble, app is the reason. So facebook is trying each and every possible way to secure it's users from scams and data theft.

TECHNO TITANS !!!!!!

Thursday, May 12, 2011

Done Deal! Big Deal. Smart Deal? Microsoft Buys Skype For $8.5 Billion In Cash

The deal is done. Microsoft is buying Skype for $8.5 billion in cash in its first sizeable acquisition since August 2008, when the Redmond software giant spent $486 million on Greenfield Online.



In fact, this is Microsoft’s biggest financial bet to date in terms of M&A, trumping its $6 billion+ purchase of aQuantive, which dates back to May 2007, in size.



The purchase price includes the assumption of Skype’s debt.



The agreement has been approved by the boards of directors of both Microsoft and Skype.





Skype will become a new business division within Microsoft, and its current chief executive Tony Bates will assume the title of president of the Microsoft Skype Division, reporting directly to Microsoft CEO Steve Ballmer.



The deal was first reported by GigaOM‘s Om Malik (he does that sometimes) and later confirmed by the Wall Street Journal, who cited people familiar with the matter.



The $8.5 billion question: did Microsoft overpay for Skype?



Perhaps, perhaps not. Only time will tell. As always with these things, the many tech industry pundits and analysts will look at this deal from all possible angles and then some, and still only a handful will end up being somewhat accurate when we look back in a couple of years.



From a non-financial point of view, the acquisition makes a ton of sense today, though.



Skype digitally connects dozens of millions of people on a daily basis, enabling them to communicate with each other through voice calls, chat messages and video conferencing.



There’s no doubt it’s a big brand on the Web (with both consumer and enterprise appeal, worldwide at that), and is poised to keep mattering in the next decade and beyond.



In August 2010, Skype filed to go public, expecting to raise $1 billion, but not long after appointing a new CEO, former Cisco SVP Tony Bates, the company put its IPO plans in the freezer while it looked for ways to generate more revenue from the popular service.



Skype’s 2010 revenue was $860 million, adjusted EBITDA was $264 million, and – as many are tripping over each others to point out – the company actually lost $7 million last year.



But looking ahead, chances for the business to keep growing, perhaps even acceleratingly so, are fairly big. In that sense, it’s a valuable asset to own (and to keep out of others’ hands).



The acquisition is subject to regulatory approvals and other customary closing conditions.



Microsoft and Skype said they “hope to obtain all required regulatory clearances during the course of this calendar year”.



Microsoft also pledged that it would “continue to invest in and support Skype clients on non-Microsoft platforms”.


Since its former owner eBay sold the company to a consortium of investors formed by Silver Lake Partners, Joltid (the company founded by Skype’s original founders, Niklas Zennstrom and Janus Friis), the Canada Pension Plan Investment Board and Andreessen Horowitz in November 2009, the company has been pursuing an aggressive strategy to be available everywhere, anytime, both in enterprises, the living room, even classrooms and, very importantly, on smartphones.



Microsoft, of course, has the exact same ambitions of ubiquity, and Skype and recently acquired Qik fit nicely into many of its current product offerings: think Windows Phone (combined with Nokia), Xbox and Kinect, Bing, Office 365, Windows Live Messenger and other Live products, Lync, Outlook, SharePoint, Internet Explorer, Azure, and so on.



The purchase also provides Microsoft with a wealth of p2p and collaboration technology expertise and intellectual property, an increasingly important asset to have these days.



It also brings reach: Skype’s user base is comparable to that of Facebook in terms of size (more than 600 million registered users, that is) and the social network in fact has tie-ins with Skype already on a product level.



Note that I’m not arguing in favor of the acquisition, but I can see the logic behind it.



Facebook was also said to be sniffing around Skype, according to multiple reports, but its interest in the VoIP company wasn’t nearly as profound as assumed, according to multiple sources close to the company. If you think about it, Zuckerberg and co didn’t really lose anything today (and remember: Microsoft is also a Facebook investor).

Saturday, May 7, 2011

Download Low Orbit Ion Canon - Ddos Attacking tool




Recently you must have heard about the paypal site being brought down by the wikileaks supporters . I also participated in that mass Ddos attack to support wikileaks .

During that mass attack i came across this very handy,simple yet deadly tool called Low orbit ion cannon.
LOIC is an open source network attack application, written in C#. LOIC was initially developed by Praetox Technologies, but later it was released into the public domain.
LOIC is an acronym for Low Orbit Ion Cannon, a fictional weapon in the Command & Conquer series of video games.



LOIC performs a denial-of-service (DoS) attack (or when used by multiple individuals, a DDoS attack) on a target site by flooding the server with TCP packets, UDP packets, or HTTP requests with the intention of disrupting the service of a particular host. People have used LOIC to join voluntary botnets.
 

 
TECHNO TITANS!!!!!!

Monday, April 25, 2011

Hack Attack: Sony Confirms PlayStation Network Outage Caused By ‘External Intrusion’



Unfortunately for PlayStation Network andQriocity services users, it looks like the widespread network outages will continue.Since Sony’s PlayStation and music networks went down two days ago, there has been a fair amount of public speculation over the cause of the outage. (Largely due to Sony’s tight-lipped handling of public relations.) Many blamed vengeful gremlins loose in Sony’s server clusters and datacenters, while others immediately pointed the finger at Anonymous, the merry band of hackers that metastasized out of 4chan.

Thankfully, after 24+ hours of communication silence, Sony has updated its blog and ended the speculation. According to the electronics colossus, “an external intrusion” is responsible for the ongoing outages of the PlayStation Network and Qriocity. (It probably sounded like this at Sony headquarters. Or this.)As to who these nefarious “intruders” are: It seems that Sony does not yet know who is responsible for the breach, or if it does, it is instead smartly spending its time sealing areas of vulnerability and trying to get the network back up and running. And though reports of PlayStation’s outage began heating up early Thursday morning, Sony reports that it in fact self-defensively shut down the Network sometime Wednesday evening.According to the network’s blog, “An external intrusion on our system has affected our PlayStation Network and Qriocity services. In order to conduct a thorough investigation and to verify the smooth and secure operation of our network services going forward, we turned off PlayStation Network & Qriocity services on the evening of Wednesday, April 20th. Providing quality entertainment services to our customers and partners is our utmost priority. We are doing all we can to resolve this situation quickly, and we once again thank you for your patience. We will continue to update you promptly as we have additional information to share.”

TECHNO TITANS!!!!!!!!

Sunday, March 20, 2011

The Concept of Cracking


                        The Concept of Cracking



The scene of cracking has exploded, mostly due to the availability of cracking programs and popularity of websites that cost money. The Internet is filled with predictable and Internet dumb users. With these users comes an opportunity for you to take what is not yours by brute force.

This article is meant to guide you to successfully cracking accounts. So let's get on with it.

The Main Principle of Cracking

 One difficult to grasp fact new crackers come to find out is that cracking a particular account is usually difficult. Understanding this fact is a key step in becoming a successful cracker. There's great success in numbers. The more user accounts you have to try and crack, the more likely you'll have success. The reason behind this is simple and logical. If you have a pair of dice, and need to roll snake eyes(two ones), the more tries you have, the better the chance of success.

The main principle of cracking is trying as many valid users(will be covered later) as possible. Despite what others may think, have 10,000 user accounts to try and crack is a much better scenario than having 3 user accounts and 10,000 passwords.

Internet Dumb Users

  Most people on the Internet do not take security seriously. There is a misconceived notion about the Internet that it's secure and anonymous. This lack of concern leads to guessable and common passwords. Patterns, common words, and common names are usually likely passwords. These are usually chosen by these users because they're easy to remember. Another common lapse in judgment is the fact that these users usually use the same password for all things they have a password for; bank or credit card accounts, E-Mail accounts, and pretty much anything else you can imagine.

All About Passwords

 Choosing passwords to crack with is a critical of your success. Using "tert34g" as a password to crack with is 
not a good idea. Yeah, there's some small chance that you may achieve one successful attempt with it, but it's a waste of time.

Think about it. What do most people have in common? Names, favorite foods, favorite animals, favorite sports teams, favorite colors, etc. Instead of relying on preexisting password lists, try creating your own. Why? Things change. What was popular last year is no longer popular. MySpace as a password was logical two years ago. Now, most people haven't logged into their MySpace in months. Your unique ideas may provide you great success. Think about what's popular now... Justin Bieber, Obama, or the Miami heat. I bet you never thought of "heat" as a password.

Selective passwords are what I call passwords that are applicable only to a single website. If you're attempting to crack Facebook accounts, passwords like facebook, Facebook, or FACEBOOK are likely to be successful. If you'd like to go further, go into why people use Facebook. You can logically come to the conclusion that people use it for friends, buddies, etc. Those are logical passwords. The web site's name is one of the most common passwords used by users because it's easy to remember, and that same logic applies to every site they have an account with.

Passwords are usually lazy. Most people are too lazy to put any effort into a password, so people will rarely capitalize a password. Any part of the password. Usually, passwords cased like Michelle are rarely successful. The extra motion needed to reach the shift key is usually not a desirable motion for most users. Lowercase passwords are by far the most popular. Uppercase passwords like PASSWORD follow in second, and "properly" cased passwords like "Password" are third.

Name as password = success. One of the most successful method for cracking is using the user name as a password. Bobby's password is possibly bobby, and Janet's is likely to be janet. You can go further, and remove numbers with some programs. Bobby1945's password is possibly bobby, or even boby1945. Again, laziness. Most programs support the use of user name as password, and can remove the letters or numbers from the password for added control.


Research the Website You're Cracking

 A lot of sites are becoming critical of their users' passwords. Now, most require a minimum password length, and even have particular rules like they must contain a number. To help with this, I'll explain the most common passwords should these kinds of rule apply.

If a website requires a number, try common passwords, and add a "1", or any other number, on the end. password1, adam1, facebook1 are all quite plausible and lazy(which is what you're going for).

If a website requires a capital letter, try capitalizing the first letter, or all letters: Facebook, Password, PASSWORD, LOVE.

If a website requires a capital letter and a number, try capitalizing the first letter and adding a "1", or any other number, at the end: Password1, Michelle1, Rachel1.

If a website requires a symbol, try an exclamation mark(!) or a period(.) at the end of common passwords: password!, iloveyou., etc.

Research will prevent you from wasting time. If you don't do proper research, and you're cracking a site that requires passwords with a length of more than 4, and you're using "1234" as a password, you're not doing a bit of good other than wasting bits and bytes of bandwidth.

Trying Other Sites with Cracked Accounts
 9 times out of 10, a user has at least two accounts with the same password. An ideal situation is when you crack an account, and look in the account information, then find the user's E-Mail address. It's not even 50% likely, but there's a better chance than usual that you know that E-Mail address's password. If and when you access the E-Mail account, it's probable that all other sites the user has registered on has sent him or her an E-Mail. Not many people clean their E-Mail box.


Don't Crack Air; Use Valid Users
 
  
If a user account doesn't exist, why would you try to crack it other than to waste time? Understand that like passwords, a lot of user names are common words, phrases, or patterns. bobby1 is more likely to exist than bobby10382.

As of this moment, there are a few program available for validating whether or not accounts exist. I will not discuss or list these programs, but do the research; it's well worth it.

Combos(Password Databases)

 Combos, as they are called by most crackers, are lists of user names and passwords that have already been cracked for other sites. These are highly successful, but the success can be short lived if other users have access to the same combo. Programs that search for combos are useful, but as I just stated, the success they give can be short lived. These programs are predictable, by that I mean that they use the same, repetitive collecting mechanism.

Combos are a great asset to cracking, but it can be a gold rush which other users can "steal" your hard work.

Sample List
 
  
Here's a small sample password list off the top of my head that will likely be successful:

123456
123456789
abc123
asdf
asdfghjkl
54321
password
password1
lakers
bieber
michael
chris
jesus
money
green
yellow
blue
tiger
puppy
kitten
kitty
james
brandon
michelle
elizabeth
stacy

As you can see, all passwords are common words, or easy to remember patterns.

In Summary
 
  
Cracking accounts can be easy; and it can be hard. This all depends on your research and effort before cracking. Success is paved with research.

TECHNO TITANS!!!!!!!!!

Friday, March 18, 2011

Delete Your Files Forever, No Way To Recover Them



If you delete your files using the Shift + DEL keys or empty them from the recycle bin, bear in mind that these files are not deleted permanently; they can be restored with some professional software (File Recovery Software). This would be a big problem if you want to delete permanently your sensitive files.


Available as a freeware and requires no installation (portable version), EraserDrop is a utility that allows to delete any file of your choice permanently, malicious users cannot restore it with any file recovery software.

To delete files with this utility, you need simply to drag the file(s) you want to delete permanently and drop it in the EraserDrop's icon. EraserDrop is compatible with the following operating systems:
  • Windows XP
  • Windows Vista
  • Windows 7

To download EraserDrop, click here. The setup wizard, will ask you where you want to extract the program files, select either a destination folder or extract them in your USB flash drive, for example.

TECHNO TITANS!!!!!!!!!!

Saturday, March 12, 2011

Find you FB friends on Google Maps


Want to see from where all you have friends on Facebook? Wheremyfriends is an  interesting application that will actually tell you the geographical location of all your friends on FB using Google Map



To see all your friends on FB you just have to connect your FB account with wheremyfriends and that it. It will show all your friends on Google Map.
When you hover your mouse pointer over the pin location , it will show you the location and name of the friend at that location as mentioned on there respective profile.
[via-Digital inspiration]

Thanks for Stopping by Tech75. You can leave a comment to let me know your feedback and can also subscribe to the RSS feeds for regular updates

Rent Movies on Facebook

Facebook in a short span of time has reached to million of people in the world and is now the most popular social networking website. Since everyone has a facebook account, many big companies like to campaign there product or service via Facebook that great.






In an unique and an innovative method, where WB will rent movies on Facebook through Facebook Applications. WB will give an option to Watch the Full movie on the fan page of the  movie & to watch the movie you just have to grant the permission to the application.
It will be now interesting to see that which all companies come to Facebook for renting video.


Thanks for Stopping by Tech75. You can leave a comment to let me know your feedback and can also subscribe to the RSS feeds for regular updates



TECHNO TITANS!!!!

Thursday, February 24, 2011

Are Google search result are just crap ??

I have been using google since I was in 6th standard. There has been a great change in the web in past one decade . The web has become far more interactive and social . There have been lot many new features that i had never assumed that it will be there in the web. The biggest change that i have noticed is the social part of the web. Its now one of the biggest part of web traffic . The presence of social graph has totally changed the structure of the web. Considering the non-social aspects like sending emails,ICQ etc have grown steadly too.
But one thing that i feel hasent changed much is the search engines.
Search engines are of real importance to the web and its users but i still don't find them as interactive. According to me,since my 6th standard and till today the only thing that has not changed is the search engines and there interactivity. Google has climbed steadly in the Wall Street , yahoo and bing have thrown enormous amount of money but still the things have not changed alot.
Consider these snapshots that i took while i was searching on google.




 Obviously the auto suggest feature is a new ajax technology that google has implemented but uptill now it has disapointed me ost of the times .Even if we concentrate on the search results then that is also looking more or less the same .I personally feel that google is now leaving its roots and entering into the same bad idea which the other search engines are accused of and that is "the more you pay the higher you appear in the results".The competition to rule the search market is very fierce but instead of making it more interactive and communicative , it has become more and more difficult to search and use.If you are looking for some popular content then obviously search results will be very fruitful to you but consider the search results of some rare cromo-thermo dynamics search , and google is gone .I dont blame Google . The internet has become way too crowded with informaition and it is really difficult to find the most relevant one . So the search engines are also getting trapped into it.What i now believe is that Google holds a big responsibility to filter out the contents in a better way and use its resources to help its user gain better search experience .I wish my son can have a better feel of google.


TECHNO TITANS!!!

Tuesday, February 22, 2011

Final version of Microsoft internet explorer 9 expected soon

Gear up for a shiny new browser from Microsoft - the software giant unveiled the latest version of its soon to be launched Internet Explorer 9 browser that is already garnering good reviews from tech enthusiasts.

Microsoft says that Internet Explorer 9 is a major update to its web browser and brings in exciting new features like hardware acceleration and greater support for the latest web standards.
It is clear that Microsoft wants to catch up with browsers like Firefox and Chrome which have steadily been stealing browser market share from the Internet Explorer.
IE9 also features better security and privacy control than its predecessors. A growing concern among users is the increasing number of websites that collect user information without authorization.
There was a time when Internet Explorer enjoyed over 90 percent of the browser market share. Presently, Internet Explorer enjoys only 56 percent of the market share, while Firefox and Chrome account for 23 percent and 11 percent respectively.
The release candidate version of IE9 was made available to users for download on Thursday, after more than a year of being in development. The final version of the browser is expected to be available in a matter of weeks.
Faster loading of web pages and online multimedia
Support for hardware acceleration means that you can now take the help of your GPU or graphics hardware to enable loading of pages with rich multimedia content easier and faster.
Popular video players like VLC and PowerDVD 9 already support hardware acceleration to help you play high-definition content on your PC.
The feature will allow your CPU to help with the loading of heavy web pages that require processing power. The reason why IE9 will be able to do this is that it uses the latest HTML5 technology.
Upgrade if you want to use IE9
But if you have XP with you, you would not be able to use IE9 because the browser does not support Windows XP and earlier versions. Only Windows Vista and Windows 7 are supported by it. As with other versions of Internet Explorer, Microsoft will not charge users for it.
IE9 also features better security and privacy control than its predecessors. A growing concern among users is the increasing number of websites that collect user information without authorization.
IE9 will maintain a database of these websites and would block them should the user happen to visit them, after the user’s consent. The databases of these websites will be periodically updated for optimum protection.


TECHNO TITANS !!!!

Sunday, February 20, 2011

Hide Your Online status from selective people in your friend list on Facebook - must know for all



Look, don’t feel bad about it. When I first joined Facebook I left my online status wide open. After a couple of weeks of getting inundated with nonstop chat requests, I simply turned off my online status completely. Problem solved. Except, there really were certain people I wouldn’t mind hearing from – is it really fair for a few chatterbox buddies to ruin your chances for communicating with everyone? Well, there is a way for you to selectively block your online status from certain people.





All you have to do is open up your chat icon in the lower right corner of your Facebook display, click on Friend Lists, and create a new list called “BlockList.” Make sure after you create it that it’s configured under “Display these lists in Chat.




Now, all you have to do is either click “edit” and add the friends you want to block, or if they’re already online, just click their name and drag them under this new list. Once you’ve got everyone there who you want to block from see your online status, hover your mouse over the green dot to the right and click on “Go Offline.” Now, you appear offline to only those certainfriends.


Facebook, unlike MySpace, is not really easy to tweak – which is actually a good thing. Gone are the days of those horrid eye-bleeding pages with pink flashing backgrounds and instant music that you can’t turn off. However, the tweaks and plug-ins in the list above offer at least a few ways to customize your Facebook account and usage to suit your life and your personality.


How do you use Facebook? Share them in the comments section below!


TECHNO TITANS!!!!!

Saturday, February 19, 2011

DUMMIES GUIDE TO IPV6 - ANALYSIS OF THE NEXT GENERATION WEB ADDRESSSING



Internet Protocol Version 6 (IPv6) is a network layer protocol that enables data communications over a packet switched network. Packet switching involves the sending and receiving of data in packets between two nodes in a network. The working standard for the IPv6 protocol was published by the Internet Engineering Task Force (IETF) in 1998. The IETF specification for IPv6 is RFC 2460. IPv6 was intended to replace the widely used Internet Protocol Version 4 (IPv4) that is considered the backbone of the modern Internet. IPv6 is often referred to as the "next generation Internet" because of it's expanded capabilities and it's growth through recent large scale deployments. In 2004, Japan and Korea were acknowledged as having the first public deployments of IPv6.


Even if you’ve never studied IPv6, you may know about its most famous feature: big addresses. IPv4 uses 32-bit addresses, and with the growth of the Internet, these have become a scarce and valuable commodity. Organizations have gone to great lengths to deal with the shortage and high cost of IPv4 addresses. The most visible change in IPv6 is that addresses balloon from 32-bits to 128-bits


With such a huge address space, ISPs will have sufficient IP addresses to allocate enough addresses to every customer so that every IP device has a truly unique address---whether it’s behind a firewall or not. NAT (network address translation) has become a very common technique to deal with the shortage of IP addresses. Unfortunately, NAT doesn’t work very well for many Internet applications, ranging from old dependables, such as NFS and DNS, to newer applications such as group conferencing. NAT has also been an impediment for business-to-business direct network connections, requiring baroque and elaborate address translators to make everything work reliably, scaling poorly, and offering a highly vulnerable single point of failure. One of the goals of IPv6’s address space expansion is to make NAT unnecessary, improving total connectivity, reliability, and flexibility. IPv6 will re-establish transparency and end-to-end traffic across the Internet.


A look into the addressing format




The most important feature of IPv6 is a much larger address space than in IPv4. The length of an IPv6 address is 128 bits, compared to 32 bits in IPv4. The address space therefore supports 2128 or approximately 3.4×1038  addresses. By comparison, this amounts to approximately 5×1028


addresses for each of the 6.8 billion people alive in 2010. While these numbers are very large, it was not the intent of the designers of the IPv6 address space to assure geographical saturation with usable addresses. Rather, the longer addresses simplify allocation of addresses, enable efficient route aggregation, and implementation of special addressing features. In IPv4, complex Classless Inter-Domain Routing (CIDR) methods were developed to make the best use of the small address space. The standard size of a subnet in IPv6 is 264 addresses, the square of the size of the entire IPv4 address space. Thus, actual address space utilization rates will be small in IPv6, but network management and routing efficiency is improved by the large subnet space and hierarchical route aggregation


Renumbering an existing network for a new connectivity provider with different routing prefixes is a major effort with IPv4. With IPv6, however, changing the prefix announced by a few routers can in principle renumber an entire network since the host identifiers (the least-significant 64 bits of an address) can be independently self-configured by a host.




IPv6 addresses have two logical parts: a 64-bit network prefix, and a 64-bit host address part. (The host address is often automatically generated from the interface MAC address.) An IPv6 address is represented by 8 groups of 16-bit hexadecimal values separated by colons (:) shown as follows:

A typical example of an IPv6 address is

2001:0db8:85a3:0000:0000:8a2e:0370:7334.

The hexadecimal digits are case-insensitive.

The 128-bit IPv6 address can be abbreviated with the following rules:

Rule one: Leading zeroes within a 16-bit value may be omitted. For example, the address fe80:0000:0000:0000:0202:b3ff:fe1e:8329 may be written as fe80:0:0:0:202:b3ff:fe1e:8329

Rule two: A single occurrence of consecutive groups of zeroes within an address may be replaced by a double colon. For example, fe80:0:0:0:202:b3ff:fe1e:8329 becomes fe80::202:b3ff:fe1e:8329



Packet Format






The IPv6 packet is composed of two parts: the packet header and the payload. The header consists of a fixed portion with minimal functionality required for all packets and may contain optional extension to implement special features.

The fixed header occupies the first 40 octets (320 bits) of the IPv6 packet. It contains the source and destination addresses, traffic classification options, a hop counter, and a pointer for extension headers if any. The Next Header field, present in each extension as well, points to the next element in the chain of extensions. The last field points to the upper-layer protocol that is carried in the packet's payload.

Extension headers carry options that are used for special treatment of a packet in the network, e.g., for routing, fragmentation, and for security using the IPsec framework.

The payload can have a size of up to 64KiB without special options, or larger with a jumbo payload option in a Hop-By-Hop Options extension header



TECHNO TITANS

Thursday, February 17, 2011

Apple is the most valuable Tech Firm. What about TCS and other Indian Tech companies.


yes, apple is the most valuable tech company in the world by $100 billion dollars. to put that in some perspective: the market cap of HP is $105 billion dollars. Apple is now worth an hp more than every other tech company.

In fact, not only is it clear now that Microsoft will not be re-taking the crown as the most-valuable tech company any time soon, but they’re flirting with being knocked down to the number three — or even number four spot. In the past year, while Microsoft’s stock is down slightly, Google’s is up nearly $100-a-share. This has allowed the search giant to surpass the $200 billion market cap themselves. And they’re now just $28 billion away from Microsoft.


To put it another way, Google is much closer to Microsoft in terms of market cap than Apple was when I wrote that post last year. Another killer quarter and Google may be able to take them down as well.






Meanwhile, IBM is a little bit closer at $202 billion. Their stock is up nearly 40 points in the past year. They have a shot of passing Microsoft too.


Indian tech Companies and their Market Cap
Indian market also saw some turn overs last year just like the Apple-Microsoft turnover. TCS overtook Infosys to become the biggest Tech company in India and now TCS is the second biggest market cap company in india after Reliance.



TCS, which was the top gainer among the country's 10 most valuable companies in the last week, saw its valuation surging by Rs 18,378.11 crore to Rs 2,37,330 crore in the week which is around 45 billion $ . Infosys saw some loss in shares and is currently valued around 40 billion $ . The third major Wipro is also amongst the oldest of Indian tech companies and is currently valued around 32 billion $ .


A comparison between the world's best and India's best

At the same time, Indian companies stand nowhere, even collectively, and there can be no comparison at all on individual levels. The top 10 IT companies comprising the BSE IT index currently command a combined market cap of little over 150 billion $. This is less than half of the marketcap of either Apple or Microsoft. Indian companies are still lagging behind with a huge margin . What i personally feel is that Indian companies focus more on providing services rather than development . We always say that we have progressed alot in the IT industry and today world knows India by the IT power house but we are still a way behind them in terms of market cap , global reach and technology.
The path is still tough and the Indian Tech companies still have to travel a long way. 


share