32-bit vs. 64-bit

The terms 32-bit and 64-bit refer to the way a computer’s processor (also called a CPU), handles information. The 64-bit version of Windows handles large amounts of random access memory (RAM)  more effectively than a 32-bit system.64-bit processors can represent larger chunks of data at a time than 32-bit  processors, allowing more efficient handling of all types of computer  calculations. Although 64-bit processing is inherently faster, it also requires  more RAM to accommodate the larger  chunks of data and provide better system performance.

32-bit operating systems can only use about 3.5 gigabytes (GB) of RAM, even if  you install more; 64-bit operating systems can use much more. For example, the  64-bit versions of Windows 7 Professional and Ultimate support up to 192 GB of  RAM. You need at least 4 GB of RAM in order to  experience an increase in system performance with 64-bit processing. If you have  less than 4 GB of RAM, moving to 64-bit could actually decrease system  performance.

Generally, 32-bit software is compatible with 64-bit versions of Windows, but  64-bit software is not compatible with 32-bit versions of Windows. Microsoft  notes that one exception to this is that many 32-bit anti-virus programs do not  work in 64-bit versions of Windows.

Also, it is not possible to upgrade directly from a 32-bit to 64-bit version of Windows or vice versa. If you want to make the change, you  will need to perform a clean install, which means that you will need to back up  your files and reinstall all your software.

SAN vs. NAS – What is the difference?

A NAS is a single storage device that operate on data files, while a SAN is a local network of multiple devices that operate on disk blocks. A SAN commonly utilizes Fiber Channel interconnects. A NAS typically makes Ethernet and TCP/IP connections.

More Differences

NAS

SAN

Almost any machine that can connect to the LAN (or is   interconnected to the LAN through a WAN) can use NFS, CIFS or HTTP protocol   to connect to a NAS and share files. Only server class devices with SCSI Fibre Channel can connect to   the SAN. The Fibre Channel of the SAN has a limit of around 10km at best
A NAS identifies data by file name and byte offsets, transfers   file data or file meta-data (file’s owner, permissions, creation data, etc.),   and handles security, user authentication, file locking A SAN addresses data by disk block number and transfers raw disk   blocks.
A NAS allows greater sharing of information especially between   disparate operating systems such as Unix and NT. File Sharing is operating system dependent and does not exist in   many operating systems.
File System managed by NAS head unit File System managed by servers
Backups and mirrors (utilizing features like NetApp’s Snapshots)   are done on files, not blocks, for a savings in bandwidth and time. A   Snapshot can be tiny compared to its source volume. Backups and mirrors require a block by block copy, even if   blocks are empty. A mirror machine must be equal to or greater in capacity   compared to the source volume.

Can I make phone calls with iPad2 3G?

One of the the questions we’ve heard asked alot by end users is whether they can make phone calls from their iPad 3G. Well, the iPad is not a phone. However, you can make phone calls via one of the iPhone services such as Skype, Facetime, Viber, MobileVOIP, Text Free or any other VOIP apps as long as you have an Internet connection and as long as the other device has the same application installed to establish communication.

LAN

A local area network (LAN) is a computer network hat interconnects computers in a limited area such as a home, school, computer laboratory,  office building.

The defining characteristics of LANs, in contrast to wide area network (WAN), include their usually higher data transfer rates, smaller geographic area, and lack of a need for leased telecommunication lines.

Ethernet over twisted pair cabling, and Wi-Fi are the two most common technologies currently used to build LANs

What is Forefront TMG?

Forefront Threat Management Gateway (TMG) is a multi-layered perimeter defense system. It’s a network security and protection solution from Microsoft, which they describe as « enables businesses by allowing employees to safely and productively use the Internet for business without worrying about malware and other threats. It’s an enterprise-class firewall with advanced web protection features such as URL filtering, gateway-integrated virus and malicious software scanning, network intrusion detection and prevention, and outbound HTTPS inspection, Forefront TMG provides exceptional protection from advanced, persistent threats. It also provides secure remote access to internal networks and applications and can serve as a consolidated secure mail relay.

FTP

File Transfer Protocol (FTP) is a standard network protocol used to transfer files from one host to another host over a TCP-based network, Image Source: wikipedia.orgsuch as the Internet.

FTP is built on a client-server architecture and uses separate control and data connections between the client and server.

FTP users may authenticate themselves using a clear-text sign-in protocol but can connect anonymously if the server is configured to allow it.

FTP operates on the application layer of the OSI model, and is used to transfer files using TCP/IP. In order to do this an FTP server needs to be running and waiting for incoming requests. The client computer is then able to communicate with the server on port 21.

FTP is relevant because it helps businesses and indididuals share files, information and collaborate with confidence and in a secure matter with active directory integration or with other basis authentication.

IMAP vs. POP3

IMAP (Internet Message Access Protocol) and POP (Post Office Protocol) are different protocols for handling e-mail. Each has its own unique function and purpose. Protocol allows IMAP to deal with e-mail in a different way than POP does.

POP is basically a flow through entity—it just passes on the information to you at your e-mail program. When the POP e-mail server receives e-mail it stores it on the server until you to request it. By simply opening your email program (e.g., Outlook) you request the e-mail from the server by pressing the “Send” or “Receive” button. The e-mail program in essence asks the server if there is any mail waiting. If there is, it tells the server to send it to you.

IMAP on the other hand, is interactive with your e-mail program. It allows you to download e-mails from the server to your e-mail program the same as POP does. However, the difference is that when you request your e-mail from the server it sends a copy rather than sending the entire e-mail. It keeps a copy of the e-mail on the server while simultaneously keeping a copy on your computer.

Server Virtualization

Server virtualization or Hardware virtualization or platform virtualization refers to the creation of a virtual machine that acts like a real computer with an operating system.

Virtual machines are based on the host/guest paradigm. Each guest runs on a virtual imitation of the hardware layer. This approach allows  creation of guests that use different operating systems. The guest has no knowledge of the host’s operating system because it is not aware that it’s not running on real hardware. It does, however, require real computing resources from the host. Those resources can then be allocated on the guest machines (# of CPUs, memory, disk space, network adapters and more…)

Some of the most popular virtualization software include Microsoft Hyper-V, VMWare VSphere, Citrix Xenserver and VirtualBox.

Ubuntu

Ubuntu is a computer operating system based on Linux Kernel and is distributed as a free and open-source software. The word « Ubuntu » is an old African word meaning « humanity”. Ubuntu can be used on all types of PCs and can be downloaded  free of charge on the Ubuntu website. Ubuntu is very stable and secure; it has its own browser (Firefox), its own office application (OpenOffice), its own music player and much more. The Ubuntu Software Centre gives you instant access to thousands of open-source and carefully selected free applications.