What is MySQL Cluster vs Replication ?

What is MySQL Cluster Manager Architecture:MySQL Cluster Manager is a distributed client/server application consisting of two main components. The MySQL Cluster Manager agent is a set of one or more agent processes that manage NDB Cluster nodes, and the MySQL Cluster Manager client provides a command-line interface to the agent’s management functions.A Cluster is a … Read more

What is Need of Information Security?

Information Security : Information security covers the tools and processes that organizations use to protect information. Information Security is not only about securing information from unauthorized access. It is basically the practice of preventing unauthorized access, use ,disclosure, disruption , modification , inspection , recording or destruction of information.  The Need of Information Security : … Read more

What is Information Security ?

What is Security ? Security is a system to Protected computerized system and its data from Intentional or un-intentional threats or from un-authorized access. Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization’s digital assets. An effective security strategy uses a range of approaches to minimize vulnerabilities … Read more

How to Secure Web server ?

What is Web server A web server can be either a software unit or a hardware unit, which provides the web pages via HTTP (Hypertext Transfer Protocol) and other protocols to respond to client requests made over the World Wide Web. Web server is a computer where the web content is stored. Basically web server is used to … Read more

What is JSP ?

Define JSP : It is the full form of Java Server Page (JSP). It is a server side programming technology and used for creating web application ,that enables the creation of dynamic, platform-independent method for building Web-based applications. It is based on HTML, XML, SOAP, or other document types. There are JSP tags to insert Java code. The … Read more