May 22, 2011 | Tech
Triple Data Encryption Standard (3-DES) and Rivest-Shamir-Adleman (RSA) are encryption algorithms used to transform clear-text communications into “ciphertext” Kurose & Ross (2010, p691) that can be transmitted between source and destination over a network that...
May 4, 2011 | Tech
Routers organise and distribute network traffic both with a local area network (LAN) and externally. In order to do this each machine on the network and any access externally must communicate with the router by the use of an IP address. For example, on my home network...
Apr 24, 2011 | Tech
Stored audio can be streamed via User Datagram Protocol (UDP) or Transmission Control Protocol (TCP) however the suitability of each protocol greatly depends on the intended application and the network environment. As TCP offers a delivery guarantee however, as with...
Oct 3, 2010 | Tech
Data mining is the term for the algorithmic techniques, similar to that used in artificial intelligence and other neural networks, used in the automation of data analysis by the use of specialised decision support processes and tools. The aim is to allow the data...
Sep 18, 2010 | Tech
As an ethical company that operates in accordance with data protection and privacy laws and best practises, it is important to us that you feel secure that your personal and sensitive data is in safe hands. Our data collection and retention policies for customer...