Using an IPad for Designers and Architects

Although for the most part, the iPad has been met with serious acclaim across the world. There have been some mutterings of discontent from some high performance users who see it as something of a backward step in mobile computing. With prices of storage and disk space plunging, we have all been handed the capacity […]

BBC Start Blocking VPN Access from Abroad

Many people use VPNs (Virtual Private Networks) for security reasons, primarily because they create a secure, encrypted tunnel across the open architecture of the internet.  Many firms use them as a secure method of allowing remote users to access corporate file servers and email systems from anywhere in the world.  It has to be said […]

Is it Ok to Bypass Internet Filtering?

The internet of course traverses the globe and one of the difficulties in this scale is the problems of laws and the jurisdiction of  law.  After all calling the Thai Royal family names might be illegal in Thailand, but it certainly isn’t in Chicago.  All over the world there are hugely different laws, rules and […]

Learning about Cloud Computing

Of all the latest technologies that are filling the news pages of the technological press – perhaps the most common is ‘cloud computing’. In effect this is a technology that is already playing a great part in most of our lives but what exactly is it? Cloud computing identifies the programs provided as services on […]

IP Fragmentation

Under UDP, the physical network layer will usually impose a upper limit on the size of the frame that it is able to transmit. So whenever the IP layer receives a data packet to send, it will first check on which interface the datagram is being sent on then queries the interface to find the […]