Tuesday, February 28, 2006

Biohacker


Simply, biohacker is a person who studies, conducts researches and devotes
oneself to biology borne technology most appropriately bio- informatics, -
technology, - metrics and whatever else matches. All we need to know about
a biohacker is that he hacks the knowledge of tech developments in biology
and information sciences equally.

Want to know more about biohackers & biohacking simply log onto bio- info
page accessed at <myzenith.cjb.net>

Sunday, February 26, 2006

Help on DRM

Hey, Any of you please help me on transferring protected music to my removable flash player from my PC.

Precisely, I want to transfer my protected media files including audio and video <MP3/4, WMA/V, ASF> to my portable player <A/V Device> such that these files still work. I do not have or need any extra programs to transfer music to my device means I transfer directly as drag 'n drop. But while doing so protected music files get transferred but doesn't get played.

Alternatingly, I when I transfer protected WMA/V files from Windows Media Player <ver 10> to the device,  protection is not set to respective files in the device. Consequently files get played but no copyright is intact... and this is going to make my protected files vulnerable.

Please, get me thru.

Thursday, February 23, 2006

Internet Security: A case study

Folks, here's what most people get disturbed because of....

Myth.. Online transactions are not safe. Your credit card number can be misused by the hacker(a net robber). Talking about current day sales on the internet would be a waste of time, for it grows much faster, even faster than you can read this document. Transacting on the net is highly secure and private. It is even safer than your using your credit card at a fuel pump, or a restaurant, or any other place. We have tried to explain in lay terms how a transaction happens on the net. Every Web site developer must worry about the problem of security. If your Web site hosts confidential information such as credit card number, business documents, or passwords, you have a responsibility to protect this information. Failure might have dire consequences, both for your business and for the users of your Web site.

This topic focuses on the problems of security. In this you will learn how to ensure the security of your data while it is being transmitted. If someone enters a password or a credit card number at your Web site, you must prevent the wrong people from accessing this data as it travels across the Internet or your local network.

Encryption, Authentication and Data Integrity with SSL

The Secure Sockets Layer (SSL) is a protocol, originally developed by Netscape, for transmitting information securely across an insecure network. SSL is the only existing method for sending private information across the Internet that works with the majority of current browsers. SSL provides a technical solution to three distinct security problems: encryption, authentication and data integrity.

Encryption

When you enter information into an HTML form and submit it at a Web site, the information is transmitted from your browser to the Web site’s server. As the information travels across the Internet, it typically passes through several intermediate connections. In theory, the data entered into the form can be intercepted and read.

The problem is analogous to the situation a general faces when he must send a message containing secret plans across enemy territory. As the messenger travels across the unknown territory, he could be captured, and the enemy could steal and read the secret plans.

The proper solution, for both the general and for the person entering information into the HTML form, is to encrypt the message before it is sent across hostile territory. Even if the message is captured, the privacy of the information is protected-unless, of course, the secret code is cracked.

SSI encrypts information as it passes back and forth between a Web server and a Web browser. The information is encoded using a publicly known encryption algorithm and a secret session encryption key. The number of bits in the session key determines the strength of the encryption.

When you installed IIS, by default you installed a version of IIS that supports a 40-bit session encryption key. However, you have the option of upgrading IIS to use a stronger 128-bit session encryption key. Although messages encrypted with the 40-bit key have been cracked, messages encrypted with the 128-bit key are considered unbreakable with current technology.

Why not always use the 128-bit key? There are two reasons. First, communicating using a 128-bit key can be significantly slower than using the 40-bit key. The longer the key, the more work the server and browser must perform to encrypt and decrypt the messages passed back and forth.

There are also legal restrictions on using the longer 128-bit key. The United States government has classified 128-bit SSL as munitions. This means that it is illegal, with certain exceptions, to export any program that supports this stronger encryption outside the United States. This applies to both Web servers and Web browsers.

Normally, if you install a 128-bit session key on your Web server, your Web server will automatically negotiate the highest level of encryption to use for secure communication. If someone communicates using a browser with a 40—bit key, your server will automatically use this level of encryption. However, you can also configure IIS to reject browsers that do not support the stronger 128-bit key.

Authentication

If you visit a Web site that appears to be authentic in every way like Redifinelifestyle.com, you might feel sage providing your credit card information to buy a book. However, a clever thief could create a Web site that is indistinguishable from Redifinelifestyle.com and steal your credit card information.

To return to the example of the general sending a message across enemy territory, imagine that the enemy decides to impersonate the intended recipient of the secret plans. The general and the imposter decide on a secret code, and the messenger delivers the message encoded with the secret code. However, the messenger has delivered the secret plans to the imposter.

To prevent one Web site from pretending to be another, SSL can be used to authenticate a Web site. When you install SSL on your Web server, you must install a server certificate. This certificate is used to verify your Web site’s identity. A server certificate driver’s license or passport is use to verify your personal identity. A server certificate contains information about your organization, your Web site, and issuer of the certificate.

To work as a digital ID, a server certificate must be signed by a certificate authority. A certificate authority acts as a trusted third party that verifies the identity of a Web site for its users. Whenever you open a page using SSL, the information from the server certificate is included. For example, using Internet Explorer, you can view the certificate information for the home page of the Microsoft site. Enter https://www.microsoft.com labeled Certificates.

Instead of using a third-party certificate authority, you can also issue and sign your own certificates using Microsoft Certificate Server. In other words, you can be your own certificates authority. Being your own certificate authority is valuable when you need to authenticate multiple computers in your own organization to members of your organization. However, if your Web site is public, you should use a third-party certificate authority such as Verisign because a server certificate is only as trustworthy as its issuer.

SSL version 3.0 also supports client certificates. Client certificates work in exactly the same way as server certificates except that are used to authenticate Web browsers rather than Web servers. Both Microsoft Internet Explorer (version 3.0 and higher) and Netscape Navigator (version 3.0 and higher) support client certificates. You can get a client certificate from a certificate authority, or you can use Microsoft Certificate Server to issue your own.

Data Integrity

Imagine that a malicious individual decides to alter a message as it is transmitted across the Internet. This individual does not read the message or prevent the message from being transmitted. The message is simply vandalized.

To return to the example of the general, suppose that the messenger successfully delivers the general’s secret plans to the intended recipient. Without the messenger’s knowledge, however, the secret plans have been switched while the messenger was crossing the enemy terrain. The wrong plans have been delivered.

SSL protects the integrity of data as it crosses the Internet. When messages are transmitted with SSL, they include a message authentication code (MAC). This code is used to detect whether a message has been altered. In other words, when you use SSL, you know that the message received is the same as the message sent.

How Secure is SSL?

How safe is SSL?; Can you use SSL to safely transmit credit card information or private business documents across the Internet?. All the major commercial Web sites on the Internet that accept credit card information currently use SSL. For example, Amazon.com has accepted credit card information from over 4.5 million customers using SSL.

The real answer is that you do not have much choice. If you want to convey private information across the Internet without forcing your Web site’s users to download special programs such as Wallets, ActiveX components, or Java applets, then you must use SSL. SSL is the only method of sending private information that is supported by the majority of browsers.

Let’s see how this System Work .

Take a example of a e-commerce site.

The consumer moves through the internet to the merchant’s web site. From there, he decides that he wants to purchase something, so he is moved to the online transaction server, where all the information he gives is encrypted. Once he has placed his order, the information moves through a private gateway to a Processing Network, where the issuing and acquiring banks complete or deny the transaction. This generally takes place in no more than 5-7 seconds. With the addition of Secure Socket Layer technology, e-commerce is also a very safe way to complete transactions. Simple isn’t it.

Even Simpler is, When you log in to the https:// area of the website, the site issues you a public key, ( which is like a locking system) with which all the information that you send to us changes into a encrypted code, before it leaves your computer, and starts traveling towards our webserver. After we receive the "encrypted" information the same is passed on the bank for approval in the same format, and only the bank online transaction server ( Computer) has the private key to unlock the code ( Decrypt the encryption). The set of these "two keys" are "made to order" and there are no two sets of keys which are even remotely alike. The bank then sends back the approval or rejection in again an encrypted format which your computer public key can only read. So this way, even we, who are charging to your credit card, do not have access to your personal information or number.
 
& Credits goes to Open Source Codes and Online sources

Monday, February 20, 2006

Must XP handler Tools- I

 

IE Title bar text

Internet Explorer installations distributed by companies other than Microsoft might have their names in the title bar. If you want to change this, navigate to HKEY_CURRENT_USER\Software\ Microsoft\Internet Explorer\ Main, and edit or create a string value entry called ‘Window Title’. Double-click the entry and enter any string you want. Leave it blank if you want to remove the default string. You’ll need to restart Internet Explorer for the change to take effect.

Logon message

To create a personalised logon message in XP, go to HKEY_ LOCAL_ MACHINE\ SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon. In the right pane, double-click the string entry ‘Legal-NoticeCaption’, enter the string ‘My Windows XP Machine’ and click OK. Next, doubleclick the ‘LegalNotice Text’ string entry, and enter the message to be displayed.

Change the welcome screen

Windows XP displays three different screens during boot-up. The second screen is the one that says “Welcome”. To change this, navigate to HKEY USERS\.DEFAULT\Control Panel\Desktop. Under this key, you will find an entry named ‘Wallpaper’; double-click it and enter the path of the image file you want displayed. The file can be a BMP or JPEG image. If you want to tile the image, set the value of the ‘TileWallPaper’ entry to 1. If you want to stretch the wallpaper, set the value of the ‘WallPaper- Style’ entry to 2.

Must XP handler Tools- II

 

Prevent access to specified drives

Use this tweak to prevent access to drives to certain users. Remember, once this is applied, the prohibited user can’t access the drive by any means. Log into Windows using the user account that you want to restrict access to, open the registry editor and go to HKEY_CURRENT_USER\Software\Micro s o f t \ Wi n d o w s \ C u r -rentVersion\Policies\Explorer. Create a DWORD value with the name ‘NoViewOn-Drive’. Double click this entry and in the dialog box that appears, select the radio button named ‘Decimal’. In the value data field you need to enter a number that depends on the drive that needs to be hidden. Use the formula ‘2n-1’, where n is 1 for your A drive, 2 for B.

 

Disable CD burning

Windows XP comes with inbuilt support for CD writing. Since this offers limited functionality, power users might not need it. To disable support for CD writing, go to H K E Y _ C U R R E N T _ U S E R \Software\Microsoft\Windows\CurrentVersion\Policies\Explorer. Create or modify the DWORD entry called ‘NoCDBurning’. A value of ‘1’ disables CD burning and ‘0’ enables it.

 

Saturday, February 18, 2006

BIOS Tweaks

 

Changing certain BIOS settings can reduce the amount of time it takes to hand over control to the operating system, thereby reducing the time taken to boot. Although there are several different BIOSes with varying options, there are some settings common to all. Look around your BIOS to find these options. Usually, to enter the BIOS setup, you have to press the [Delete] key while it is loading.

Configure your hard drives in the BIOS, instead of setting it to automatically detect them every time it boots. For most BIOSes, you can simply select the Auto Detect Hard Disks option. Disable Boot Up Floppy Seek. This option checks if there is a floppy in the drive. You also don't need the Virus Protection feature. Enabling this from the BIOS often causes problems with system updates and also slows down the  booting time. Change the boot order so that it loads the operating system from the hard drive first. You would hardly ever boot from a floppy or CD-ROM and when you need to, you can switch to this configuration in the BIOS.

Defragmenting

Regularly defragmenting the hard disk maintains optimum performance for read/write operations. Hard disks store data in sectors and clusters, the latter being the smallest addressable unit. Clusters are of a fixed size, depending on the file system (FAT, FAT32, NTFS, etc). A cluster can hold only one file, but a file may span over several clusters. For FAT32 partitions, the cluster size is 4 KB. Thus, any file between 0 bytes to 4 KB will occupy one cluster. Should its size increase beyond 4 KB, it will look for the next free cluster to fill up. With frequently changing files such as documents, spreadsheets, images, etc, the fragments of the file may not be on contiguous clusters. Reading and writing to such files spread all over the partition is obviously slow. Defragmenting brings pieces of the file together, so that they are accessed faster. All versions of Windows are bundled with defragmenting tools. In Windows 98, you can run it from Start > Programs > Accessories > System Tools > Disk Defragmenter. In Windows 2000 and XP, rightclick My Computer and click Manage. Look for Disk Defragmenter under Storage.

Friday, February 10, 2006

THE THIRD INTERNATIONAL SYMPOSIUM ON NETWORKS IN BIOINFORMATICS

Public Notice to All Bioinformatics Personnels!

> May 29 - 31, 2006 in Amsterdam
> Science Park Amsterdam
> University of Amsterdam, the Netherlands


The understanding of biological networks such as metabolic and signal
transduction pathways is crucial for understanding molecular and cellular
processes in the organism or system under study. This field is subject of
lively research and both experimental and computational approaches are
used to elucidate the biological networks. The bioinformatics of biological
networks involves a broad range of research and approaches. Research
includes the identification of regulatory elements in DNA, genome context
analysis, modeling and simulation of pathways, reconstruction of pathways
from experimental data, visualization of pathways, and the representation
of pathways in database, graphs and markup languages. To accelerate our
understanding of the (dynamics) of biological networks it is seems
imperative that these efforts are combined and subsequently have to be
applied to real biological problems. It is clear that this field of
research can only advance when bioinformaticians and experimental
biologists (for example working on model organisms such as Drosophila and
organisms with a relatively simple and basal body plan such as sponges and
scleractinian corals) work closely together. During this three day
symposium we will bring together researchers from different disciplines
(biology, mathematics and computational sciences) working on different
aspects of networks to exchange ideas and approaches. During the first day
of the symposium we have scheduled six introductory lectures, which aim at
introducing specific subjects to the audience. The lectures are open for
all participants and will provide background knowledge for the scientific
presentations.

For more program and registration details
http://isnb.amc.uva.nl/

Wednesday, February 08, 2006

Good things going with Google!


And finally Google had to introduce the perfect CHATTING. Though almost
every Google's programs are in beta phase, let's see how far the CHAT
SECTION goes onto.

Here's a exceprt from the page itself.

New! Chat is coming soon
Chat with your friends from right inside Gmail. There's no need to load a
separate program or look up new addresses. It's just one click to chat
with the people you already email, as well as anyone on the Google Talk
network. And now you can even save and search for chats in your Gmail
account.

Y! Well Done,

 

Huh? Check voice mail and make free PC calls from an email?

I nearly forgot that I have a Yahoo ID too. When my one of friends told me to be online in Y! the whole story began. It's true. By weaving Yahoo! Messenger with Voice into Yahoo! Mail, now you can type awhile, then chat awhile. And it's all free! Worldwide PC 2 PC and Voice mail! what could like like more than this! Unheard voice mail, I liked that the most.

Making free, worldwide PC-to-PC calls is easy. You and the person you call both need Yahoo! Messenger with Voice, plus a microphone and speakers (or headset.) The sound quality is so good, you won't be able to tell the difference between calling on Yahoo! Messenger with Voice and calling on a regular phone. Hear for yourself.

For the best audio, just plug a headset into your computer and click the Call button.

1. Voicemail. If you're offline or away from the computer, your friends can leave you voicemail. You'll see a star by the voicemail icon in your Messenger List. Click the voicemail icon, select the message, and press Play to hear your voicemail.

2. Call History. See all your voicemail - plus a log of all incoming, outgoing, and missed calls. Also see who called, at what time, on what day, and how long you talked.

Ringtones

You can select the ringtone that plays when you receive a call through Yahoo! Messenger with Voice. You can even assign special ringtones to different contacts on your Messenger List, so you'll know who's calling right when you hear the ringtone.

You can get on these all at Y! messenger service center, simply click here.

Tuesday, February 07, 2006

Symposium focus: Bioinformatics of networks

THE THIRD INTERNATIONAL SYMPOSIUM ON NETWORKS IN BIOINFORMATICS

Bioinformatics of biological networks involves a range of
interconnected multidisciplinary research topics. Research
areas include the quantitative understanding of the dynamics
of regulatory and metabolic networks by using modeling and
simulation techniques, the reconstruction of biological
pathways from experimental data, identification of pathway
modules, the analysis and interpretation of experimental data
in the context of biological networks, the construction and use
of (public) pathway databases, network visualization and the
development and use of pathway markup languages such as
SBML and BioPax. Biological questions and new experimental
techniques as well as ongoing (bio)informatics and statistics
efforts will guide the development of the next generation of
bioinformatics software packages. The combination of
computational and genomics research will accelerate the
detailed understanding of biological networks, which will find
many applications in all application domains of life sciences.
Bridging the gap between disciplines
ISNB is specifically aimed at researchers working in life
sciences, which includes disciplines like molecular biology,
genomics, bioinformatics, biostatistics, informatics,
computational life sciences and mathematical biology. Since
more and more researchers are focusing on biological
networks from different perspectives there is large interest in a
dedicated symposium like the ISNB. ISNB provides a platform to
bring together these different researchers in this field to
exchange ideas and facilitate new national and international
collaborations. Experience from ISNB2004 and ISNB2005 learns
that there is a significant interest in this symposium. This
symposium will also contribute to merge ideas and research
from scientific programs in the field of bioinformatics,
computational life sciences (e.g. simulation and modeling)
and the experimental genomics work.

Scientific program and tutorial lectures
The Third International Symposium on Networks in Bioinformatics
(ISNB 2006) is likely to continue its success from previous years
by bringing together different disciplines to discuss ongoing
research in this exiting field of biological networks and
bioinformatics. In continuation of ISNB 2005 we aim to organize
a three day meeting during which we will again schedule a
mix of tutorial lectures and scientific presentations. The
scientific program includes research and poster presentations
from Dutch and international acknowledged researchers but
also from young researchers starting in the field. The tutorial
lectures provide an excellent opportunity to have well known
researchers in the field give an introduction to junior and senior
researchers and students who recently started working in
related projects. The setup of the symposium facilitates
sufficient possibilities to meet and talk to colleague
researchers, which will facilitate many new and exciting
collaborations and research projects.

ISNB and the Netherlands Bioinformatics Center (NBIC)
ISNB is part of ongoing initiatives of the Netherlands
Bioinformatics Center (NBIC) to strengthen and promote
bioinformatics research in the Netherlands. ISNB will feature
Dutch bioinformatics researchers who are successful in the field
of the bioinformatics of biological networks and who are
support by the Dutch BioRange research program that is
executed by NBIC.

ISNB as the leading "bioinformatics of biological networks symposium"
We specifically aim to give ISNB an internationally recognized
and leading position. ISNB is unique as there are no other
symposiums that are dedicated to the bioinformatics of
biological networks. As part of this aim we try to motivate
internationally leading researchers in this field to attend and
present at ISNB. We expect that continuation of ISNB
contributes to this goal and that the quality of this symposium
increases every year. Again we aim for 175 participants.

Life sciences companies
More and more companies are active in the field of
bioinformatics and computational life sciences. Several
companies even have a focus on the development of
pathway analysis software and databases for biologists and
bioinformaticians. In several cases their products provided
clear value. ISNB 2006 is again supported by several leading
companies in the field of life sciences. Several commercial
parties have been asked to present a scientific case to
demonstrate how their product helps in advancing our
understanding of biological networks.

For more program and registration details
http://isnb.amc.uva.nl/

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

Monday, February 06, 2006

THE THIRD INTERNATIONAL SYMPOSIUM ON NETWORKS IN BIOINFORMATICS

Public Notice to All Bioinformatics Personnels!

> May 29 - 31, 2006 in Amsterdam
> Science Park Amsterdam
> University of Amsterdam, the Netherlands


The understanding of biological networks such as metabolic and signal
transduction pathways is crucial for understanding molecular and cellular
processes in the organism or system under study. This field is subject of
lively research and both experimental and computational approaches are
used to elucidate the biological networks. The bioinformatics of biological
networks involves a broad range of research and approaches. Research
includes the identification of regulatory elements in DNA, genome context
analysis, modeling and simulation of pathways, reconstruction of pathways
from experimental data, visualization of pathways, and the representation
of pathways in database, graphs and markup languages. To accelerate our
understanding of the (dynamics) of biological networks it is seems
imperative that these efforts are combined and subsequently have to be
applied to real biological problems. It is clear that this field of
research can only advance when bioinformaticians and experimental
biologists (for example working on model organisms such as Drosophila and
organisms with a relatively simple and basal body plan such as sponges and
scleractinian corals) work closely together. During this three day
symposium we will bring together researchers from different disciplines
(biology, mathematics and computational sciences) working on different
aspects of networks to exchange ideas and approaches. During the first day
of the symposium we have scheduled six introductory lectures, which aim at
introducing specific subjects to the audience. The lectures are open for
all participants and will provide background knowledge for the scientific
presentations.

For more program and registration details
http://isnb.amc.uva.nl/

Music, in my own way!

'Saathi sanga mann ka kura' is a total obsolete but I need not confess. I love my nation more than you do. It is not that I'm writing these words in English, I do not have my cultural values, are you getting dear?

I listen all sorts of music, Spanish, Mexican, Bryan Adams, Chinese, M Raffi, early bird Gopal Yonjan. All render! Yap, music is an international language, it knows no bounds.

There shall be no dubious occasions. You should not blame a person for not listening a country folk. Rap wins this world. Hip-hop gets more applauded. Country folk plays its own roles. Maadal is in its own place and the techno music in its own place. The side side of the story is that why should only the specified music shall I love. Am I going to do things?

>>>

Gmail Troubleshooting!


It has been many days I have not loged into gmail and the Google's system.
Simply because, whenever I enter my user name and password, it gets
rejected means it takes infinity to get signed in.

What's that all about? Even my POP program gets irritated!

Friday, February 03, 2006

Online Advertising


Surely, ads these appear on almost every pages that we view or browse
everyday. Banner exchange, keywords, adwords, pixel selling and a lot more
to state. Whatever the form of online advertising be, they all impart
onething and that is drive more and more traffic to merchant websites or
pages. Besides, these such pages lead you to whether to shopping or
hosting or so so page where you need to enter you credit card information
at least. And that's what most people don't want and is still privileged
for nations rather than the US.

Boost your Traffic with our Budget Advertising Campaigns this was what
made me compelled to write something about this topic enforced by the
Bravenet Media. No doubt more and more visitors are aware of advertising
and click rates, impression rates and loading rates all imply for the page
you visit online. Knowingly or unknowingly you are helping publishers with
potential of their page(s). But have you ever realized of the website or
page contains? Are they actually for you? Because everyday we come across
such many pages that actually contain no apt materials except ads.

Displaying ads and publishing are two fundas on online advertising
industry. You create account for displaying ads and spend money for that.
This means that you might be dragging visitors for their interests or not.

What I suggest fro personal pages is that please join communities of your
interest and share your things with your pages which is surely going to
assist your members and get assisted too. Happy surfing!

Thursday, February 02, 2006

Facts www

I presume the future of cognitive simulations and robotics to be the ever
thought human imagination.
 Term “internet” 1st used by Vinton Cerf in 1974
 The 1980s saw the establishment of standards both official and informal
for the internet
 1983: Internet Activities Board created
 Berners- lee: http/html/www, founder of www consortium

Mobile Mania II


Here are some of the most efficient and useful mobile usage tips and
guidelines that you must follow to keep yourself, environment, and
sideways safety.

Of course, my recent mobile set complies with all of these.

Exposure to Radio Frequency Energy:
• The radio wave exposure guidelines employ a unit of measurement known as
the Specific Absorption Rate, or SAR. Tests for SAR are conducted using
standardized method with the phone transmitting at its highest certified
power level in all used frequency bands.
• While there may be differences between the SAR levels of various mobile
phones, they are all designed to meet the relevant guidelines for exposure
to radio waves.
• The SAR limit recommended by the International Commission on
Non-Ionizing Radiation Protection ie ICNIRP, which is 2 W/kg averaged over
ten [10] gram of tissue.

Safe usage of Mobile Phones:
• Keep the unit away from electrical appliances such as a TV, radio or
personal computer.
• Also the phone should be kept away from heat sources as radiators and
cookers.
• No mechanical vibrations or shocks please.
• Do not keep the phone next to credit cards or transport tickets; it can
affect the information on the magnetic strips.
• Should not use mobile phone near medical equipment without requesting
permission. Avoid placing the phone over the pacemaker, ie in your breast
pocket. Also not in your pant pocket. The best to keep is your coat or
jacket pocket.
• Do not use the phone at a refueling point. Don’t use near fuels or
chemicals.
• Do not use the phone where blasting is in progress. Observe
restrictions, and follow any regulations or rules.
• No high humidity and cold environment.
• Last but not the least; do not solely rely on emergency calls. These
calls may not be available under all cellular networks and you may run
under serious troubles.

Wednesday, February 01, 2006

Internet2

Not so recently have I heard about this!

The internet2 droppings: Internet2 or UCAID (University Corporation for
Advanced Internet Development) is a non-profit consortium which develops
and deploys advanced network applications and technologies, mostly for
high-speed data transfer. "Internet2" is a registered trademark. It is led
by 207 universities in the United States and partners from the networking
(Cisco Systems), publishing (Prous Science) and technology industries
(such as Comcast, Intel, Sun Microsystems). Some of the technologies it
has developed include IPv6, IP multicasting and quality of service.

Internet2 (and its members) created the Abilene Network and frequently
collaborates with the National LambdaRail (NLR) project. In fact,
Internet2 and National LambdaRail are planning to merge sometime soon,
which likely means somewhere in the 2006-2009 timeline. More information
about discussions of the future Internet2/NLR merger is available at the
official Internet2 website [1]. Another document summarizing the merger
discussions as of early July 2005 is available. Wikipedia has the detail
report.

Subscribe to geeklog feed Bookmark and Share

Design by Free blogger template