Feedough Community Latest Questions

Aakash

  1. You see Akash, there are two main video conferencing types : point-to-point video calls and multipoint video conferencing. Point-to-point video call features a video session between two users, while multipoint or group video conferencing features video meetings with more than two users or multiple uRead more

    You see Akash, there are two main video conferencing types : point-to-point video calls and multipoint video conferencing. Point-to-point video call features a video session between two users, while multipoint or group video conferencing features video meetings with more than two users or multiple users. Telepresence Video Conferencing System, Room-based Video Conferencing System and Desktop Video Conferencing System are three usual types of conferencing you will get to know in this digital hi-tech world.

    See less
    • 0
Maitya

  1. Video conferencing is one of the best way to improve communication and re-establish relationships. During a video conference one get to see the body language and facial expressions of the participants and members which has a crucial role in interviews or any important controversy. This leads to a moRead more

    Video conferencing is one of the best way to improve communication and re-establish relationships. During a video conference one get to see the body language and facial expressions of the participants and members which has a crucial role in interviews or any important controversy. This leads to a more effective and faster collaboration.

    See less
    • 0
Janny

  1. Hey Janny, I can see why is there a confusion as there are plenty of video conferencing apps out there. We can't really pinpoint as to which one is the best but I can definitely suggest a few of them which are good enough to be included here. Skype which is already too popular to be put up here, weRead more

    Hey Janny, I can see why is there a confusion as there are plenty of video conferencing apps out there. We can’t really pinpoint as to which one is the best but I can definitely suggest a few of them which are good enough to be included here.
    Skype which is already too popular to be put up here, we have a good option of Google Hangouts, for free Gmail and G Suite basic customers, Google Hangouts allows for up to 10 people to chat in a video call.
    There’s WebEx which can host up to 100 participants in a single call, for as long as you want. You can also checkout FreeConference and Jitsi.

    See less
    • 0
Aakash

  1. Well it sort of depends on what resolution the video is of, 360p or 720p,. But generally there are few basic requirements to do a video conference and they are: A webcam capable of producing high-quality video. WebEx supports most webcams of this type. A computer with at least 1 GB of RAM and a dualRead more

    Well it sort of depends on what resolution the video is of, 360p or 720p,. But generally there are few basic requirements to do a video conference and they are:
    A webcam capable of producing high-quality video. WebEx supports most webcams of this type.
    A computer with at least 1 GB of RAM and a dual-core processor.
    A fast network connection.

    See less
    • 0
Amruta

Explain with examples

  1. 1. IaaS or Infrastructure as a Service: IaaS is a self service model for monitoring and controlling local data centers, storage, network and networking devices. Instead of buying infrastructure like data centers or hardware for you business, you can avail services from IaaS providers on subscriptionRead more

    1. IaaS or Infrastructure as a Service: IaaS is a self service model for monitoring and controlling local data centers, storage, network and networking devices. Instead of buying infrastructure like data centers or hardware for you business, you can avail services from IaaS providers on subscription basis.
    Example of IaaS providers are AWS, Microsoft Azure, etc.
    2. PaaS or Platform as a Service: This service is used as a medium for developing applications without having to install the software on your desktop locally. It makes the development, testing, deployment and maintenance of applications easy and quick.
    One example of PaaS is Force.com by Salesforce.
    3. SaaS or Software as a Service: It has the major users of the cloud market. SaaS uses web to deliver applications hosted and managed by third party vendor and whose interface is accessed on the client side. Because of SaaS, applications can be accessed from anywhere and on any device connected to the web.
    SaaS examples are Salesforce, Cisco WebEx, Google Apps, etc.
    You can read this article for more undersatanding: https://apprenda.com/library/paas/iaas-paas-saas-explained-compared/

    See less
    • 0
Amruta

  1. There are three different ways in which you can avail cloud computing services. They are public cloud, private cloud and hybrid cloud. 1. Public Cloud: These are services provided and managed completely by third party vendor over the internet. Anyone can avail service from these vendors. All the harRead more

    There are three different ways in which you can avail cloud computing services. They are public cloud, private cloud and hybrid cloud.
    1. Public Cloud: These are services provided and managed completely by third party vendor over the internet. Anyone can avail service from these vendors. All the hardware or software resources that you wish to avail will be managed completely by this third party vendor.
    Microsoft Azure is an example of public cloud.
    2. Private Cloud: These are services used exclusively by a single business or organization. These are services that are on local network and not public. It is hosted within the organizations site or a third party hosts it locally.
    3. Hybrid Cloud: This is a combination of public and private cloud. Some resources are held locally and some are on public cloud. This gives more flexibility to your business.

    See less
    • 0
Aakash

  1. Hacking is an attempt to exploit a computer system or a private network inside a computer to gain access. Simply put, it is an unauthorised access to commit fraudulent activities or control over computer network security systems for some illicit purpose. Point to be noted that breaking a security syRead more

    Hacking is an attempt to exploit a computer system or a private network inside a computer to gain access. Simply put, it is an unauthorised access to commit fraudulent activities or control over computer network security systems for some illicit purpose. Point to be noted that breaking a security system requires more intelligence and expertise than actually creating one.
    The famous term computer “virus” originated to describe machine code command inserted into a computer’s memory that, on execution, copies itself into other programs and files on the computer. Depending on the hacker’s intentions, the design of a virus can merely be an inconvenience or have very serious consequences up to a potential catastrophe.
    So concluding that hacking is the catch-all term for any type of misuse of a computer to break the security of another computing system to steal data, corrupt systems or files, commandeer the environment or disrupt data-related activities in any way by different means.

    See less
    • 0
Maitya

  1. Social engineering hacking is the art of psychological manipulating and diverting people so that they give up confidential information. Criminals use many social engineering tactics because it comes out to be easier to cheat your natural inclination to trust than it is to discover new ways to hack yRead more

    Social engineering hacking is the art of psychological manipulating and diverting people so that they give up confidential information. Criminals use many social engineering tactics because it comes out to be easier to cheat your natural inclination to trust than it is to discover new ways to hack your software. You must have heard of many phishing attacks where victims are tricked into providing their personal informations or sensitive data by an urgent sounding voice mail that claims to be official, convinces them and makes them suffer severe consequences. Moreover, social engineering exercises are a vital aspect of ethical hacking engagements.

    See less
    • 0
Aakash

  1. Red hat hackers are the vigilantes of the hacker Universe. By vigilant I mean, a person who takes the law into his or her own hands. There are like White Hats, in that they halt Black Hats, also known as the eagle-eyed hackers, but these people are so damn scary when they do it. Instead of reportingRead more

    Red hat hackers are the vigilantes of the hacker Universe. By vigilant I mean, a person who takes the law into his or her own hands. There are like White Hats, in that they halt Black Hats, also known as the eagle-eyed hackers, but these people are so damn scary when they do it. Instead of reporting the spiteful hacker, they sue them down by uploading viruses, dosing and accessing their computer to damage and rupture it from the inside out. They anchorage multiple aggressive harsh methods that might force them to get in need of a new computer. They become merciless while dealing with malware actions of the black hat hackers.
    A red hat hacker could be referred to someone who targets Linux systems. Linux is a software that sits underneath all of the other software on a computer, receiving requests from the programs and relaying their requests to the computer’s hardware.

    See less
    • 0