Hi..... i am a guy just like u....i am wokin and learnin...normal.. i use internet for many things ..i searched for many tutorials ..movies..the problems i faced....etc ........now i want to share the things with the world....so here i am posting every thing i searched and collected from internet some thing like
IBM TIVOLI STORAGE MANAGER- INTRODUCTION
Complex business environments need better capabilities to manage data availability and costs as well as providing the ability to recover from disasters. Improving data and application availability, optimizing storage resource utilization, and enhancing staff productivity, all while reducing IT costs, are core needs of most organizations.
Organizations are increasingly concerned with disaster recovery. But what constitutes an information technology disaster? A fire in the datacenter? A hurricane? An explosion? Or it could be something far less spectacular, like a corrupted file. Even something as common as a disk crash could be a disaster if it happens on the CEO's laptop the morning of a crucial investor presentation. Business executives confront continually increasing business complexity, and the rising cost of backing up their business critical applications and recovering from disasters. Users experience increased down time when restores, retrieves and recoveries cannot be completed quickly. Valuable IT resources are devoted to time consuming manual data backups and restores, archives and retrieves, and recoveries in multiple application environments. And IT administrators are concerned with the time required to perform backups and recoveries with available resources.
The following scenario shows you a day in the life of Jen, a manager who is responsible for IT Continuity Services for a mid sized manufacturing company. The IBM Tivoli Storage Manager family of offerings provides Jen with the building blocks to address her IT needs by providing a full range of flexible capabilities including data retention management for regulatory compliance, hierarchical storage management for cost effective storage, archive management for effective access to active and inactive data, and backup and recovery management to mitigate the potential for data loses.
Jen is awakened at 3:00 am by a phone call from the third shift Director of Operations, Bryan. A critical database server is down and Bryan tells her he has no access to customer's orders or inventory data, so production is in jeopardy.
Jen then calls Peter, the onsite IT Operations Manager. Peter says he has to install a new server before Jen can start the data restore, which will take a while. Jen tells Peter that she has a much better solution. With TSM for Sysback, they can do a full bare metal restore of that server in a flash! Jen tells Peter to do a Flexible Sysback restore, by booting the new server from the TSM for Sysback server, which gives the new server all the same configuration, operating system and applications, exactly like the one that crashed. Peter then calls Jen telling her the server is ready and connected to the network.
Jen logs into the Tivoli Storage Manager from her home computer. As Jen logs onto the Tivoli Storage Manager Administration Center with its new Health Monitoring, she has a single visual status of all the company's Tivoli Storage Manager servers. Jen then starts the recovery of the database and monitors its progress. She also has access to the activity log, and sees the message that TSM finished the recovery process from the storage copy pools.
Jen is able to see that the restore is successful and that the database is up and running. She calls Bryan, the Director of Operations, back within the hour to inform him that all production systems have been restored and customer data is secured and available. He is incredibly relieved! Using Tivoli Storage
Manager, all of the data was protected and has been restored, beginning with the most critical data. Jen never even had to go into the office.
IBM's Tivoli Storage Manager addresses these needs across your organization. For business units dependent on data availability and rapid application data recovery, Tivoli Storage Manager provides extensive application integration to enable comprehensive and accurate data protection. For storage managers and administrators responsible for protecting enterprise data while containing cost, Tivoli Storage Manger's highly automated, centrally managed solution, simplifies heterogeneous storage management while optimizing storage and network resources. And for IT Operations managers and administrators responsible for making sure all servers are up and running, TSM for Sysback allows for recovery of all or part of the system, and is flexible enough to allow a system installation image from one system to be installed onto another system with either identical or different hardware configurations.
Tivoli Storage Manager scales from small to very large installations. It offers management from PCs through Unix servers, all the way up to mainframes. It has support on over thirteen different operating environments. TSM has been around for over ten years, and currently protects millions of computers worldwide. Tivoli Storage Manager is built for smart backups and quick restores. With Tivoli Storage Manager, you can choose to never do periodic full backups again. Its advanced technology lets you continually backup only new or changed files. This reduces backup time, network traffic, and storage requirements. Tape collocation and reclamation also sets Tivoli Storage Manager apart from the rest.
To find out more about what Tivoli Storage Manager can do for you and your storage infrastructure, go to www.ibm.com/tivoli/storage or call your IBM or Business Partner representative.
GSM Vs CDMA
What is CDMA and GSM?-- Mobile phones
World Wide Web(www) Terminology - WWW in a nutshell
Hi, this is
--> For better understanding please read the previous post(Difference between internt and www)
--> I can assure you that after reading this post you will gain good knowledge of Internet and World Wide Web terminology which helps you to read any kind of article regarding WWW in WWW.
TEN Terms that makes you familier with Internet
- INTERNET: The Internet, sometimes called simply "the Net," is a worldwide system of computer networks - a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers).
- WWW: WWW stands for World Wide Web which is most often called as web is a system of interlinked documents accessed via Internet through HTTP.
- WEB-PAGE: All the information that we want to share in the internet is stored in the documents usually written in (X)HTML –Hyper Text Markup Language, accessible via HTTP.
- WEB-SITE: A collection in webpages , images ,videos and other digital entities usually addressed with one name , which is called name of the website.
- WEB-SERVER: The webpages and are stored in a server called Webserver , websites are hosted on one or more web servers.
- WEB-CLIENTS: Computers or users who are reading the webpages and websites form the webservers are called webclients, (we are webclients).
- WEB-BROWSER: Web clients like ourselves uses a software program to view the websites ,This software is called webbrowser. Widely used webbowsers are Internet Explorer ,Mozilla Firefox ,Opera , Google chorme etc,.
- HTTP: Hyper Text Transfer Protocol is the communication protocol or one of the languages used over the internet for communication. It is used for retrieving the interlinked text documents which let to the establishment of World Wide Web. A web client makes an HTTP request using a web browser to which an HTTP response is sent from the web server.
- ISP: ISP stands for Internet Service Provider a company, which provides home and business users with an access to the Internet, is known as an Internet service provider or Internet access provider, these days there are WISP’s Wireless Internet Service Providers.
Most popular ISP’s are : BSNL,AIRTEL, etc.
- URL: An Uniform Resource Locator (URL) is the term used to identify an Internet resource of information , and can be specified in a single line of text.
Ex: http://www.ravimisc.blogspot.com
Difference between Internet and World Wide Web(www)
Difference Between INTERNET and WORLD WIDE WEB
Desktop Virtualization
What is Desktop Virtualization?
Introduction:
Installing and maintaining separate PC workstations is complex, and traditionally users have almost unlimited ability to install or remove software. Corporate information technology departments, and users have therefore often used Terminal Services or Citrix's Presentation Server to provide a stable, "locked down" desktop environment out to the user, who could be either using a regular desktop PC, or a small, quiet and robust thin client.
Desktop virtualization provides many of the advantages of a terminal server, but (if so desired and configured by system administrators) can provide users much more flexibility. Each, for instance might be allowed to install and configure their own applications. Users also gain the ability to access their server-based virtual desktop from other locations.
Definiton & Explanation:
Desktop virtualization or virtual desktop infrastructure (VDI) is a server-centric computing model that borrows from the traditional thin-client model but is designed to give system administrators and end-users the best of both worlds: the ability to host and centrally manage desktop virtual machines in the data center while giving end users a full PC desktop experience
The user experience is intended to be identical to that of a standard PC, but from a thin client device or similar, from the same office or remotely.
Many commercial solutions also add the ability to switch some incoming client sessions (using connection broker software) towards traditional shared desktop systems such as Microsoft's Terminal Services or Citrix's application servers, blade servers or even to individual unused physical desktop computers.
About Pano logic

What is Panologic?
Pano Logic, Inc. is a privately funded company, developing virtual desktop products and solutions supporting hypervisor agnostic server virtualization solutions such as those distributed by VM ware, Inc. The company has its headquarters in

Time to rethink the desktop
Today's PC architecture does not take advantage of the benefits of virtualization. Over the last five years, server computing has been revolutionized through virtualization, both reducing operating costs and creating valuable new capabilities. Pano's vision is to use server-based virtualization to bring the same level of value and innovation to the desktop. In doing so, Pano has taken a "clean slate" approach to designing a new desktop computing model. This next-generation architecture requires not only virtualization, but also a completely different desktop device. The result is a radically different architecture that makes IT more effective and gives users a superior Microsoft Windows™ experience.
Server-based desktop virtualization is widely heralded as the "next big thing in virtualization". Citrix recently acquired start-up XenSource for $500M in pursuit of this market; Microsoft has recently announced new licensing schemes for server-hosted desktops, along with its intention to aggressively support this new model; VMware, the market leader in server virtualization, is aggressively developing this market with its Virtualized Desktop Infrastructure (VDI). But there remains a problem: the existing desktop PC and thin client architectures were not designed for this new model of server-based desktop computing. Worse, these legacy architectures defeat the benefits of desktop virtualization. If the desktop is running on the server, why place another operating system on the desktop just to connect to the server?
Pano's innovation: The all hardware, no software desktop
Pano's solution to the unnecessary desktop software is a 100% hardware client that has no CPU, no memory, no operating system, and no software, so it requires zero maintenance and has no security risks. Combined with server-based virtualization, Pano delivers a superior Windows experience.
How pano works
What Makes Pano Different
Desktop PCs Today: A Major Management Problem
Desktop PCs today are complex stacks of multiple hardware components, operating systems, drivers and applications. Maintaining and managing this hardware and software consumes more than 70% of the TCO of a typical PC, and it represents the bulk of the workload of helpdesk staff.
The New Desktop
Many solutions have been proposed to reduce the cost of desktop complexity, but none takes the radical approach of Pano Logic's purpose-built desktop virtualization solution: moving the PC and all its software off the desktop and into the data center.
Leveraging virtualization and today's fast networks, Pano Logic's unique design places a small device-the Pano-on the desktop to connect the monitor, keyboard, mouse, and USB peripherals to Microsoft Windows XP or Vista running on a virtualization server in the data center.
Users rely on the same hardware they've always had-their existing display, keyboard, mouse, and USB devices-which are now attached via the Pano to a virtual PC running on the server inside the data center. This architecture makes better use of hardware, eliminates software from the client endpoint, and centralizes the management of desktops.
The Pano Management Server, which sits between the Pano and the virtualization server, enables administrators and IT staff to enforce security and access control, including use of the USB ports. IT can configure virtual machines for groups of users or individuals; roll out updates, upgrades, and patches seamlessly; and perform backups of all PCs on their own schedule.
Pano has a single button-the Pano Button-that gives users access to numerous self-help options, which are simply not available on desktop PCs: users will soon be able to go back to an earlier working configuration of their applications, or pick other options configured by the IT administrators.
This out-of-band, self-help, self-service option enables users to resolve by themselves most of the common problems for which they previously relied on support staff, helpdesks, and system administrators.
Pano's unique approach is driven by these guiding principles:
- Move all desktop software to the server
- Deliver a complete solution that removes all barriers to getting started
- Empower users with self-help capabilities
Pano's approach results in a 70% reduction in desktop costs and elimination of security risks at the desktop while giving users a superior Windows experience.
The Pano Device
The Pano Device
The Pano device is a zero client- no CPU, no memory, no operating system, no drivers, no software and no moving parts. Pano connects keyboard, mouse, display, audio and USB peripherals over an existing IP network to an instance of Windows XP or Vista running on a virtualized server. Pano is power friendly, consuming only 3% of the energy consumed by a traditional desktop computer.
The Pano is compact, power efficient, and works with all desktop peripherals.
The Pano can be viewed as using the IP network as an extension that connects all desktop peripherals to the virtual machine running on the server.
Getting started with a Pano
To deploy a Pano device, simply connect it to peripherals, network and power. There is no configuration to perform, no firmware to update, and no software to download.
As soon as a Pano is connected to a network, a logon screen appears. Users enter their Windows credentials and are automatically connected to their virtual machines. From there on, it's the same Windows experience.
Using peripherals with Pano
Pano can support a video display, keyboard, mouse, additional USB peripherals, plus external audio speakers or headphones.
Supported Peripherals | Connectors |
---|---|
Video display (resolutions up to 1600x1200) | One RJ-45 |
USB peripherals | Three USB 2.0 |
Video display (resolutions up to 1600x1200) | One VGA |
Audio Out | Internal speaker |
Audio Out | One mini-jack |
Audio Int | One mini-jack |
Peripherals attached to the Pano device operate the same way they do when attached to a traditional PC. For instance, when users want to read data from CD, they simply attach an external CD reader via one of Pano's USB ports. If the user is authorized to use the peripheral, the CD drive will appear to Windows as if it was locally attached. The only drivers that are used are the peripheral's native drivers, and these drivers only need to be installed on the Windows virtual desktop, not on the Pano.
Security and the Pano
The Pano is secure because it does not run an operating system or any other software. Because there is nothing in a Pano that can be infected by a virus or have malicious code installed, it doesn't need to be scanned for vulnerabilities or exploits.
Even when a peripheral such as a USB thumb drive is connected, Pano remains secure. Peripherals work only when the user is authorized via policies enforced by the Pano Management Server. If the user isn't authorized, Windows doesn't even see the peripheral that is connected to the Pano. If a user is authorized, the peripheral is connected directly to Windows. Pano enforces fine-grained access policies based on user group membership, USB device class, and operation. As an example, a user may be authorized to read from a CD, but not write to it. This policy allows users to copy files or load software onto their virtual desktop, but prevents data from leaking out. Even when users are authorized, Pano can record USB operations so that the business can keep track of all its information assets.
what is font subsetting?
Classes of ip address
Class A - This class is for very large networks, such as a major international company might have. IP addresses with a first octet from 1 to 126 are part of this class. The other three octets are used to identify each host. This means that there are 126 Class A networks each with 16,777,214 (224 -2) possible hosts for a total of 2,147,483,648 (231) unique IP addresses. Class A networks account for half of the total available IP addresses. In Class A networks, the high order bit value (the very first binary number) in the first octet is always 0.
Network(n) | Host (h) |
115. | 24. 53. 107 |
Class A - 0nnnnnnn hhhhhhhh hhhhhhhh hhhhhhhh
1 -> First bit zero (0) ; 7 network bits(n) ; 24 host bits(h)
2 -> Initial byte: 0 - 127
3 -> 126 Class As exist (0 and 127 are reserved)
4 - > 16,777,214 hosts on each Class A
Class B - Class B is used for medium-sized networks. A good example is a large
college campus. IP addresses with a first octet from 128 to 191 are part of this class. Class B addresses also include the second octet as part of the Net identifier. The other two octets are used to identify each host. This means that there are 16,384 (214) Class B networks each with 65,534 (216 -2) possible hosts for a total of 1,073,741,824 (230) unique IP addresses. Class B networks make up a quarter of the total available IP addresses. Class B networks have a first bit value of 1 and a second bit value of 0 in the first octet.
Network(n) | Host (h) |
145.24. | 53.107 |
Class B - 10nnnnnn nnnnnnnn hhhhhhhh hhhhhhhh
1 -> First two bits 10; 14 network bits; 16 host bits
2 -> Initial byte: 128 - 191
3 -> 16,384 Class Bs exist
4 -> 65,532 hosts on each Class B
Class C - Class C addresses are commonly used for small to mid-size businesses. IP
addresses with a first octet from 192 to 223 are part of this class. Class C addresses also include the second and third octets as part of the Net identifier. The last octet is used to identify each host. This means that there are 2,097,152 (221) Class C networks each with 254 (28 -2) possible hosts for a total of 536,870,912 (229) unique IP addresses. Class C networks make up an eighth of the total available IP addresses. Class C networks have a first bit value of 1, second bit value of 1 and a third bit value of 0 in the first octet.
Network(n) | Host(h) |
195.24.53. | 107 |
Class C - 110 nnnnn nnnnnnnn nnnnnnnn hhhhhhhh
1 ->First three bits 110 ; 21 network bits (n) ; 8 host bits(h)
2 ->Initial byte: 192 - 223
3 ->2,097,152 Class Cs exist
4 ->254 hosts on each Class C
Class D - Used for slightly different from the first three classes. It has a first bit value of 1, second bit value of 1, third bit value of 1 and fourth bit value of 0. The other 28 bits are used to identify the group of computers the multicast message is intended for. Class D accounts for 1/16th (268,435,456 or 228) of the available IP addresses.
Network(n) | Host (m) |
224. | 24.53.107 |
Class D - 1110mmmm mmmmmmmm mmmmmmmm mmmmmmmm
1 -> First four bits 1110; 28 multicast address bits(m)
2 -> Initial byte: 224 - 247
3 -> Class Ds are multicast addresses
______________________________________________________
Class E - Class E is used for experimental purposes only. Like Class D, it is different from the first three classes. It has a first bit value of 1, second bit value of 1, third bit value of 1 and fourth bit value of 1. The other 28 bits are used to identify the group of computers the multicast message is intended for. Class E accounts for 1/16th (268,435,456 or 228) of the available IP addresses.
Network(n) | Host(r) |
240. | 24.53.107 |
Class E - 1111rrrr rrrrrrrr rrrrrrrr rrrrrrrr
1 -> First four bits 1111; 28 reserved address bits
2 -> Initial byte: 248 - 255
3 -> Reserved for experimental use
Broadcast - Messages that are intended for all computers on a network are sent as broadcasts. These messages always use the IP address 255.255.255.255.
Default Network - The IP address of 0.0.0.0 is used for the default network.
Loopback - The IP address 127.0.0.1 is used as the loopback address. This means that it is used by the host computer to send a message back to itself. It is commonly used for troubleshooting and network testing.
______________________________________________________
Ip Address and its classes
D.B.Cooper

Hi….This is one of the distinguished topic I am going to present here in this post, I came to know about D.B.Cooper when I was watching a famous TV series called Prison Break.
At first I thought the character was part of the script but when I saw a program in discovery channel about the unsolved mysteries I found out this man was real. I was very curious to know more about this guy so I browsed many sites and gathered some info. In this post I am going to present detailed information about D.B.Cooper his skyjack, plot etc and I hope this is going to be very interesting………
The case of D.B. Cooper is one of the most famous crimes in American history. It is also the only skyjacking in the world that has gone unsolved. Over the past three decades, the FBI has investigated nearly 1,000 suspects. They might as well be looking for Sasquatch. D.B. Cooper is folklore now. He’s inspired books, movies, safety regulations for airplanes, and treasure hunters. A bar celebrates the anniversary of his heist with a D.B. Cooper look-alike contest. Poems have been inked.. Songs too, like Chuck Brodsky’s “The Ballad of D. B. Cooper”:
It was Thanksgiving eve
Back in 1971
He had on a pair of sunglasses
There wasn’t any sun
He used the name Dan Cooper
When he paid for the flight
That was going to Seattle
On that cold and nasty night
D.B.Cooper - Hijacking

That night changed aviation history. It started in
Florence Schaffner was 23, cute, perky, the sexy stewardess. Working on planes, she’d been approached by so many men that she’d taken to wearing a wig onboard to disguise herself. She dropped the man’s note in a purse, thinking, Just another guy hitting on me. But the man was insistent. “Miss. You’d better look at that note. I have a bomb.” She looked at the man’s eyes. She saw that he was serious.
D.B.Cooper- Hijacking part-2
Schaffner’s mind was reeling. She imagined her parents back in
The plane landed on the Sea-Tac tarmac, greased up by the squalls of the rainstorm. It was late, two hours late, because FBI agents needed time to collect Cooper’s ransom and to station their sharpshooters. Inside the cabin, Cooper ordered all passengers be released. The airline staff then carried his ransom—$200,000 in $20 bills (the bundle weighed 21 pounds) and parachutes—onto the plane as it refueled. The gentleman hijacker was getting anxious. “It shouldn’t take this long,” he said, and told the captain to get the plane back in the air. Where to?
“
Out a little service doorway in the rear of the plane cooper jumped into the darkness into the freezing rain. They say that with the wind-chill it was 69 below not much chance that he’d survive but if he did where did he go?
D.B.Cooper - Investigation and leads
Cooper left behind a few things, including the spare chutes and 8 Raleigh-brand cigarette butts. Authorities were surprised also to find the hijacker's black tie and tie tack, with a mother-of-pearl detail—an overlooked potential bit of evidence that was perhaps the only mistake he made. FBI crime-scene experts catalogued 66 fingerprints that could not be matched to the crew or other passengers. They led nowhere.
The authorities tried follow the plane, wait for him to jump, then track him to the ground. but the opportunity was lost in a questionable choice of a chase plane. The Air Force scrambled up two F-106 fighter jets from McChord. Those pilots were instructed to follow at a safe distance and watch for a jumper. But the fighters are built to fly at speeds of up to 1,500 mph. They were useless in slow-motion, low altitude surveillance. The authorities tried to recover by sending up a slower-flying Air National Guard Lockheed T-33, but Cooper probably had already jumped by the time it arrived.
Nasty weather on the night of the jump led authorities to put off a ground search until the next day, An exhaustive search, by land and by air, over several weeks failed to turn up any trace of the hijacker or his parachute.
In 1980, some of Cooper’s money surfaced. A boy found $5,800 in decomposing twenties buried in a bag, a few feet from a river. The FBI searched the area again, hoping to find more bills—or, better yet, a body. They found nothing.
The Cooper file is now a morgue of dead-end leads. It sits buried in the basement of the FBI’s
D.B.Cooper - Suspects
In 1971, mass-murderer John List was considered a suspect in the Cooper hijacking, which occurred only fifteen days after he had killed his family in
The next major suspect was Duane Weber. Just before he died in 1995, Weber’s wife claims, he told her, “I’m Dan Cooper.” She became suspicious and began checking into his background. Weber had served in the Army during World War II and had later served time in a prison near the
The October 29, 2007 issue of