Wednesday 5 February 2014

New Technology : New Top Level Domains and Surfing Internet

Someone told me the name of some website and I opened that URL but what is this? I got an error. Why so? I checked the spellings of the website and they were ok. So what's wrong? I checked the domain and it was with .com, so I gave a try with another domain that is .net. Oops ,again I got an error. Reluctantly I opened the search engine and put a detailed description and name of the website and I found that the website  URL is with .org domain. So after almost 10 minutes I at last  succeeded in opening that URL. And such things happen again and again in surfing the internet. But this will not be the practice anymore as the latest technology of new top level domains (TLDs) may change the surfing style.

Donuts Inc, the largest registry for new generic top-level domains (gTLDs) has opened first new internet domains to the public. It will kick off the general availability period for seven new Internet domain names, marking the beginning of a new era for the Internet in which users will have unprecedented choice in how they identify and brand themselves online.

The gTLDs,the first of hundreds Donuts will launch this year are; .BIKE, .CLOTHING, .GURU, .HOLDINGS, .PLUMBING, .SINGLES, and .VENTURES. Anyone can register names in these gTLDS on a first-come, first-served basis from accredited registrars worldwide. Donuts will roll out additional gTLDs, .CAMERA, .EQUIPMENT, .ESTATE, .GALLERY, .GRAPHICS, .LIGHTING and .PHOTOGRAPHY as well.
So they will be much easy and user friendly domains. And that old domains seems a bit dull now. These new gTLDs can be easily memorized. So It's still to be seen that how much success these gTLDs can achieve. But for me it’s a great start of new surfing era.

For more details you can visit http://www.donuts.co/

Monday 3 February 2014

Operation Against Polio: A Historic Initiative In Pakistan By PTI KPK Government

 In the recent fuss of operation or dialogue in Pakistan, meanwhile the government of the most affected province KPK has taken a historic initiative for the eradication of Polio by mobilizing more than thousands of its own party workers who vaccinated almost half a million children on the very first day of this historic drive. Volunteer services  for more than twelve thousands party workers were acquired by the ruling party in KPK ,Pakistan Tehreek e Insaf, to achieve the target. It was a very daring step by the party and its own workers because of the recent series of attacks on Polio workers which killed many. So after these attacks no official workers were ready to carry on vaccination drive. In such a disastrous situation regarding Polio campaigns, PTI chairman Imran Khan took it as a challenge and vowed to eliminate the disease through his innovative programme ‘Sehat Ka Insaf’.



The main points of “Sehat Ka Insaf” programme include free vaccination against nine vaccine preventable diseases, including tuberculosis, polio, diphtheria, pertusis, tetanus, hepatitis ‘B’, haemophilus influenza, pneumonia and measles besides distribution of public health messages at the doorsteps of people.

Pakistan began the anti-polio campaign in 1994 when the World Health Organisation declared global emergency against the vaccine-preventable childhood ailment. Due to aggressive vaccination, the disease was eradicated from the entire world, but the virus still exists in three countries, including Pakistan, Nigeria and Afghanistan.

The UN agencies, especially the Unicef and WHO which provided technical assistance to Pakistan, failed to put brakes on the disease because of the unrealistic strategies they pursued. Now, many health experts are saying that this decision of Imran Khan will be very effective.

Under the programme, the health department will also hold free medical camps where vouchers for free checkups and free medicines will be provided to people. Each child will receive vitamin A drops. Each family will receive hygiene kit, including soap, toothpaste, toothbrushes, towel, water container, etc. According to PTI General Secretary, Mr.Jahangir Tareen, approximately 3000 families visited Peshawar Sehat Ka Insaf special medical camps and received free medical treatment and medicines.2500 hygiene kits have also been distributed.               

I hope that this initiative of PTI government will achieve its 100% results.Hats off to PTI.              

addurl.nu

Sunday 2 February 2014

Statistical Analysis Of Web Browsers Usage


At one time, Internet Explorer was the only go-to web browser for most people. Microsoft designed, a lot of people hailed Internet Explorer as the superior web browser. The times have changed and now IE is not the mostly used web browser rather its even behind Chrome and Firefox.

Chrome is increasing very quickly in popularity with users of the internet. It was designed by Google, is very easy to use and has an interface that is consumer friendly. Similar to Firefox, Chrome has a fast and huge support of HTML5, and as a result allows web pages to load quicker and without design flaws.

Designed by Mozilla, Firefox has for a long time been a well-loved favorite with computer experts. Due to recent design changes, Firefox is starting to become appreciated more by consumers as well. Firefox is constantly enhancing its design.

In this short article I have tried to perform a statistical usage of web browsers based on the traffic of websites. Aim of this analysis is to see which web browsers are mostly used by users. It is also to be noted that users of this sample analysis are mostly from Pakistan and USA. So it may not be that accurate but it just gives a picture of what is going on with web browsers.

Below mentioned is the statistical data of my analysis;


Web Browsers
Percentage Usage
Chrome
61%
Firefox
29%
Internet Explorer
3%
Mobile Safari
2%
Opera
1%
Others
4%

Below mentioned are the graphical pictures of this statistical data.







Conclusion

This analysis clearly shows that chrome is trending up and so other browsers have to come up with some new innovations to survive the competition.

P.S: This article is not written to discourage any product and is purely for research purposes.For more detailed analysis of web browsers, please visit http://bilase.blogspot.com/2014/01/internet-analysis-of-web-browsers.html






Saturday 1 February 2014

Cloud Data Security And Searchable Encryption Technique

Cloud computing minimizes resource wastage risk by reducing the entrance barrier for cloud service providers.By extensive usage of cloud services unstructured data volume is increasing over it.Therefore security considerations to save data from hackers are also becoming a necessary aspect.Different encryption techniques are used to protect data on cloud.
With the commencement of cloud computing composite data management systems from local site are transformed to viable public cloud.Data owners are encouraged to outsource the data management system to public cloud to achieve flexible and commercial benefits. Cloud computing is all about transferring services,applications and data. Also attaining commercial assistances,location transparency, and centralized facilitation are the significant resources in cloud computing.
Cloud storage has the capability to save a bulk of data for a large number of users. This minimizes the storage capacity problem. To provide different competencies  multiple isolated applications and services are disseminated over the internet in cloud environment. When sensitive data storage is done on the cloud,existence of large number of users can cause cloud security to be affected. Thus for achieving data privacy complex data has to be outsourced on the cloud after encryption. Therefore to hide data from hackers and malicious attackers a protected system is needed.

Searchable encryption is a technique by which the outsourced data placed on cloud can be kept private. Searchable encryption will let this data to be difficult to hack when searched. With searchable encryption techniques encrypted data is placed on the cloud server on which search can be performed. Processing of encrypted data placed on cloud server is done without decrypting it. The encrypted data is placed on the cloud in the form of code words which are difficult to hack by unauthorized users or hackers. The encrypted data will be accessible by authenticated users only. These users will be able to perform search on this data and retrieve desired results.