<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Uncategorized Archives - Top/Best Engineering college in Faridabad, Haryana, Delhi NCR India 2018</title>
	<atom:link href="https://bsaitm.anangpuria.com/category/uncategorized/feed/" rel="self" type="application/rss+xml" />
	<link>https://bsaitm.anangpuria.com/category/uncategorized/</link>
	<description></description>
	<lastBuildDate>Sat, 16 Jun 2018 09:07:27 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://bsaitm.anangpuria.com/wp-content/uploads/2024/12/cropped-anangpuria-icon-32x32.png</url>
	<title>Uncategorized Archives - Top/Best Engineering college in Faridabad, Haryana, Delhi NCR India 2018</title>
	<link>https://bsaitm.anangpuria.com/category/uncategorized/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>MapReduce</title>
		<link>https://bsaitm.anangpuria.com/mapreduce/</link>
		
		<dc:creator><![CDATA[Anangpuria]]></dc:creator>
		<pubDate>Mon, 02 Apr 2018 02:05:54 +0000</pubDate>
				<category><![CDATA[latest]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://bsaitm.anangpuria.com/?p=5043</guid>

					<description><![CDATA[<p>Over the past ﬁve years, the authors and many others at Google have implemented hundreds of special-purpose computations that process large amounts of raw data, such as crawled documents, web request logs, etc., to compute various kinds of derived data, such as inverted indices, various representations of the graph structure of web documents, summaries of&#8230;</p>
<p>The post <a href="https://bsaitm.anangpuria.com/mapreduce/">MapReduce</a> appeared first on <a href="https://bsaitm.anangpuria.com">Top/Best Engineering college in Faridabad, Haryana, Delhi NCR India 2018</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Over the past ﬁve years, the authors and many others at Google have implemented hundreds of special-purpose computations that process large amounts of raw data, such as crawled documents, web request logs, etc., to compute various kinds of derived data, such as inverted indices, various representations of the graph structure of web documents, summaries of the number of pages crawled per host, the set of most frequent queries in a given day, etc. Most such computations are conceptually straightforward. However, the input data is usually large and the computations have to be distributed across hundreds or thousands of machines in order to ﬁnish in a reasonable amount of time. The issues of how to parallelize the computation, distribute the data, and handle failures conspire to obscure the original simple computation with large amounts of complex code to deal with these issues. And as a reaction to this issue an abstracting mechanism that allows parallelism, hide fault tolerance and work on distributed environment made google to come up with the MapReduce as a solution. In 2004, Google published the paper that introduced MapReduce to the world.12 Early in 2005, the Nutch developers had a working MapReduce implementation in Nutch, and by the middle of that year, all the major Nutch algorithms had been ported to run using MapReduce and NDFS. And till date progress on working and enhancing the technique is unstoppable.</p>
<p>MapReduce is a programming model for data processing. Hadoop runs MapReduce programs written in various languages like Java, Ruby, Python, and C++. Most important, MapReduce programs are inherently parallel, thus putting very large-scale data analysis into the hands of anyone with enough machines at their disposal. MapReduce algorithm has been used for applications such as generating search indexes, document clustering, access log analysis, and different other kinds of data analysis as discussed former. A MapReduce job is an access and process-streaming job that splits the input dataset into independent chunks (blocks) and stores them in Hadoop Distributed File System (HDFS). It has two main tasks Map and Reduces, which are completely in a parallel manner. The input phase gives input to the mapper in the &lt;key, value&gt; pairs and then mapper maps these inputs which are partitioned using user-defined partitioning function. The shuffling and sorting of data is made and send to the reducer where reducer then reduces it to optimized form and generates the output.</p>
<p>Programs written in this functional style are automatically parallelized and executed on a large cluster of commodity machines. The runtime system takes care of the details of partitioning the input data, scheduling the program’s execution across a set of machines, handling machine failures, and managing the required inter-machine communication. This allows programmers without any experience with parallel and distributed systems to easily utilize the resources of a large distributed system.</p>
<p>The MapReduce programming model has been successfully used at Google for many different purposes. The success of this method can be attributed for many reasons. First, the model is easy to use, even for programmers without experience with parallel and distributed systems, since it hides the details of parallelization, fault-tolerance, locality optimization, and load balancing. Second, a large variety of problems are easily expressible as MapReduce computations. For example, MapReduce is used for the generation of data for Google’s production web search service, for sorting, for data mining, for machine learning, and many other systems. Third, implementation of MapReduce has been developed that scales to large clusters of machines comprising thousands of machines. The implementation makes efficient use of these machine resources and therefore is suitable for use on many of the large computational problems encountered at Google.</p>
<p>The post <a href="https://bsaitm.anangpuria.com/mapreduce/">MapReduce</a> appeared first on <a href="https://bsaitm.anangpuria.com">Top/Best Engineering college in Faridabad, Haryana, Delhi NCR India 2018</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Penetration Testing</title>
		<link>https://bsaitm.anangpuria.com/penetration-testing/</link>
		
		<dc:creator><![CDATA[Anangpuria]]></dc:creator>
		<pubDate>Sat, 10 Mar 2018 02:07:00 +0000</pubDate>
				<category><![CDATA[latest]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://bsaitm.anangpuria.com/?p=5044</guid>

					<description><![CDATA[<p>Network Security is becoming more and more crucial as the volume of data being exchanged on the Internet increases. When people use the Internet, they have certain expectations. They expect confidentiality, data integrity, and authentication (CIA Standards). In 1980’s most organizations had only a physical boundary that needed the protection of the assets. Today, due&#8230;</p>
<p>The post <a href="https://bsaitm.anangpuria.com/penetration-testing/">Penetration Testing</a> appeared first on <a href="https://bsaitm.anangpuria.com">Top/Best Engineering college in Faridabad, Haryana, Delhi NCR India 2018</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Network Security is becoming more and more crucial as the volume of data being exchanged on the Internet increases. When people use the Internet, they have certain expectations. They expect confidentiality, data integrity, and authentication (CIA Standards). In 1980’s most organizations had only a physical boundary that needed the protection of the assets. Today, due to the changes in the way resources are made available Organizations are forced to verify that their assets are protected from both the external and internal threats that our working environment has enabled. Due to the increasing dependency of our society on networked information system the overall security of these systems should be measured and improved. The most accurate method to evaluate organization’s information security stance is to observe how it stands up against an attack.</p>
<p>Network administrators have often tried their best by improving their network security, however with the rapid surface of new exploits; the best way of ensuring that the system is secure is to attempt penetration testing. This would be the most effective way to find exploits and to proof whether a system is vulnerable. Penetration testing often allows the security analyst to find new vulnerabilities.</p>
<p>“Penetration Testing is the process of validating that the securities of our assets in our entire environment meet the CIA standard as specified by the company.” It is a form of stress testing, which exposes weaknesses of flaws in a computer system. It is more art of finding an open door from where the attack is possible.</p>
<p>Penetration testing is a testing technique for discovering understanding and documenting all the security holes that can be found in a system. It is an authorized attempt to violate specific constraints stated in the form of a security or integrity policy. It is a test for evaluating the strengths of all possible security holes and provides suggestions for fixing them. This testing typically includes network penetration testing and application security testing as well as controls and processes around the networks and it should occur from both outside the network trying to come in (external testing) and from inside the network(internal testing).</p>
<p><em> </em></p>
<p>The post <a href="https://bsaitm.anangpuria.com/penetration-testing/">Penetration Testing</a> appeared first on <a href="https://bsaitm.anangpuria.com">Top/Best Engineering college in Faridabad, Haryana, Delhi NCR India 2018</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Internet of Things</title>
		<link>https://bsaitm.anangpuria.com/internet-of-things/</link>
		
		<dc:creator><![CDATA[Anangpuria]]></dc:creator>
		<pubDate>Thu, 08 Feb 2018 02:06:26 +0000</pubDate>
				<category><![CDATA[latest]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://bsaitm.anangpuria.com/?p=5045</guid>

					<description><![CDATA[<p>“The Internet of Things promises to bring every object, consumer, and activity into the digital realm” as said by Paul Dougherty, Chief Technology, and Innovation Officer. Internet, a revolutionary invention, is always transforming into some new kind of hardware and software making it unavoidable for anyone. The form of communication that we see now is&#8230;</p>
<p>The post <a href="https://bsaitm.anangpuria.com/internet-of-things/">Internet of Things</a> appeared first on <a href="https://bsaitm.anangpuria.com">Top/Best Engineering college in Faridabad, Haryana, Delhi NCR India 2018</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>“The Internet of Things promises to bring every object, consumer, and activity into the digital realm” </em>as said by Paul Dougherty, Chief Technology, and Innovation Officer.</p>
<p>Internet, a revolutionary invention, is always transforming into some new kind of hardware and software making it unavoidable for anyone. The form of communication that we see now is either human-human or human-device, but the Internet of Things (IoT) promises a great future for the internet where the type of communication is machine-machine (M2M).</p>
<p>With the continuous advancements in technology a potential innovation, IoT is coming down the road which is flourishing as a worldwide global computing network where everyone and everything will be connected to the Internet. The number of devices availing internet services is increasing every day and having all of them connected by wire or wireless will put a powerful source of information at our fingertips.</p>
<p>The concept of enabling interaction between intelligent machines is a cutting-edge technology. It is the approach of converging data obtained from different kinds of things to any virtual platform on existing Internet infrastructure. Internet of Things has emerged as an important technology that promises a smart human life, by allowing communication between objects, machines and everything together with people involved. IoT systems allow users to achieve deeper automation, analysis, and integration within a system. They improve the reach of these areas and their accuracy. IoT utilizes existing and emerging technology for sensing, networking, and robotics. It represents a system which consists of objects in the real world, and sensors attached to or combined to these objects, connected to the Internet via wired and wireless network structure. With the internet of things, anything’s will able to communicate to the internet at any time from any place to provide any services by any network to anyone. The applications involves the electric vehicle and smart houses, in which appliances and services that provide notifications, security and energy-saving, automation, telecommunication, computers and entertainment will be integrated into a single ecosystem with a shared user interface.</p>
<p>Internet of things promises many applications in human life, making life easier, safe and smart. There are many applications such as smart cities, homes, transportation, energy and smart environment. By using IoT, cities can be improved in many levels, by improving infrastructure, enhancing public transportation, reducing traffic congestion, and keeping citizens safe and healthy. By connecting all systems in a city like transportation system, healthcare system, weather monitoring systems and etc., in addition, to support people by the internet in every place to accessing the database of airports, railways, transportation tracking operating under specified protocols, cities will become smarter by means of the internet of things.</p>
<p>IoT primarily exploits standard protocols and networking technologies. However, the major enabling technologies and protocols of IoT are RFID, NFC, low-energy Bluetooth, low-energy wireless, low-energy radio protocols, LTE-A, and WiFi-Direct. These technologies support the specific networking functionality needed in an IoT system in contrast to a standard uniform network of common systems.</p>
<p>By the concept of the internet of things, homes and buildings may operate many devices and objects smartly. Of the most interesting application of IoT in smart homes and buildings are smart lighting, smart environmental and media, air control and central heating, energy management and security. Wireless sensor networks (WSNs) with integration to the internet of things technology will provide an intelligent energy management in buildings, in addition to the obvious economic and environmental gains. Internet together with energy management systems also offers an opportunity to access a buildings’ energy information and control systems from a laptop or a Smartphone placed anywhere in the world. Using IoT monitoring technologies Smart Health sensors are used to collect physiological information and use gateways and the cloud to analyze and store the information and then send the analyzed data wirelessly to caregivers for further analysis. The applications of IoT in environmental monitoring are also wide like environmental protection, extreme weather monitoring, water safety, endangered species protection, commercial farming, and more. In these applications, sensors detect and measure every type of environmental change.</p>
<p>The post <a href="https://bsaitm.anangpuria.com/internet-of-things/">Internet of Things</a> appeared first on <a href="https://bsaitm.anangpuria.com">Top/Best Engineering college in Faridabad, Haryana, Delhi NCR India 2018</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
