Personal Statement Growing up I wanted to be an Architect. I found it fascinating, how science and technology could be used to construct a plan to improve the performance of a building. I 've always been intrigued by the level of creativity and dimensional precision that goes into sketching out blueprints using aesthetic elements of arts like color, lighting and other interesting materials. It wasn’t until my final year of High School, when I agreed to partake in an elective course, suggested…
needed. Applications communicate directly with the SDN controller via the northbound interface. This plane is also called as application plane. On the other hand, SDN data plane communicates via the southbound interface. The data plane contains the hardware infrastructure of the SDN (e.g. routers, switches, etc.). The controller is a software program that controls the…
Youth plays very important role in the development of the nation. They are the pillars of the country. Anything they do either good or bad have direct impact in the community. Various campaigns, presentations, outing should be organized by the government, so that youth can engage in it more actively. I believe in the technology transfer among the youth and society. My interest was to learn innovative activities, skill development activities, skill development trainings. As I was part of ASHA, I…
One of the main benefit of networking the businesses computers and information is that business processes are speeded up and inefficiencies are squeezed out. This is because information flows more freely. Everything happens much faster. All kinds of documents - from emails to spreadsheets and product specs - can be exchanged rapidly between networked users. In the Special Salmon case, the headquarters can update the different varieties of fish, prices for each type of fish, quantity demanded and…
security education program for high school students. For nearly the entire six-hours, I focus on securing a Linux system by using command line, editing server configuration files, and digging through the Linux filesystem, while my teammates complete networking quizzes and work on securing Windows systems. During competitions and weekly meetings, we made frequent use of technology and security websites to solve problems and form a fundamental understanding of the working of operating systems. In…
VoIP (voice-over-IP) phone systems enable calls to be placed over the internet – either long-distance or local for a fraction of the cost of traditional phone systems. However, VoIP networks that are not hosted within secure networking environments can have specific security drawbacks. What’s the difference between premise-based and hosted solutions? Premise-based VoIP systems “live” on site, typically in a server closet. Depending on the type of equipment you choose, a premise-based solution…
Christmas. This allowed me to gain basic knowledge on how to use different types of hardware by playing games on the web. I started to build my desktop with the savings which I have earned to pay for the separate components and the case to build a suitable desktop computer to play online games with my friends. Then when I got a bit older I started developing an interest in creating web pages and social networking pages for my friends which the quality developed over time by manipulating images…
Computer hardware consists of technology for computer processing, data storage, input, and output, such as large mainframes, servers, midrange computers, desktop and laptop computers, and handheld personal digital assistants (PDAs). Computer software includes both system software and application software. System software, such as Windows XP operating…
Network congestion involves the overflow of information. This could be due to the odd use of user communication methods and malware infestation. Hardware failure and damage during a crisis is usually caused by some of the same factors that they are trying to mitigate. These include natural disasters such as hurricanes, earthquakes, and electrical storms. Human error plays a big role in communication failures by entering the wrong information, or accidentally turning off a router. Based on…
Cost Accounting Cost accounting refers to the internal financial system to track expenditures and costs within an organization. Such a system guide managers and decision-makers in their actions as they show the profit or loss of the organization within a specific period of time. Traditional accounting process considers only direct cost related to the product and skips many environmental and hidden costs. For example, if toxic materials are emitted during the development of a product, then it…