[unable to retrieve full-text content]

WMI

wmi

WMI stands for Windows Management Instrumentation. Designed by Microsoft, it is an infrastructure for the standardized management of data and information that is device independent. Since Windows 2000, WMI comes preinstalled with Windows operating systems. WMI is the Microsoft implementation of the Web-Based Enterprise Management (WBEM), which is managed by the Distributed Management Task Force […]

Server

server

What is a server?     A server is a computer or system that provides resources, data, services, or programs to other computers, known as clients, over a network. In theory, whenever computers share resources with client machines they are considered servers. There are many types of servers, including web servers, mail servers, and virtual servers. […]

REST

rest

REST is an architecture style definition applied to networked applications. It exists as a series of constraints applied to the implementation of network components, enabling uniform interface semantics, rather than application-specific implementations and syntax. REST as a network architecture was first documented by Roy Fielding in his doctoral thesis titled Architectural Styles and the Design […]

LPWA

lpwa

LPWA stands for Low-Power Wide-Area. It does not refer to any one specific technology, but rather serves as a generic term for any network designed to communicate wirelessly with lower power than other networks such as cellular, satellite, or WiFi. Moreover, LPWANs communicate over greater distances than other low-power networks that use Bluetooth or NFC, […]

Retrofitting

retrofitting

Retrofitting is updating or adding equipment, sensors, or services to existing hardware so that it is able to make use of new technologies. While many organizations would benefit from the ability to use monitoring, remote control, or other features from the Internet of Things (IoT), a lot of equipment already in the field is not […]

VPN

vpn

VPN stands for Virtual Private Network. It is a method by which two end-points create a single, private connection, or tunnel, while using a larger network infrastructure such as the internet or wide area network. When established, a VPN acts like a direct connection to a private network. The VPN itself simply acts like a […]

Packet Sniffing

packet-sniffing

Packet sniffing is the practice of gathering, collecting, and logging some or all packets that pass through a computer network, regardless of how the packet is addressed. In this way, every packet, or a defined subset of packets, may be gathered for further analysis. You as a network administrators can use the collected data for […]

MQTT

mqtt

MQTT stands for Message Queuing Telemetry Transport. It is a lightweight messaging protocol for use in cases where clients need a small code footprint and are connected to unreliable networks or networks with limited bandwidth resources. It is primarily used for machine-to-machine (M2M) communication or Internet of Things types of connections. MQTT was originally created […]

TLS

tls

What is TLS?     TLS stands for Transport Layer Security. It is a cryptographic protocol used to secure data sent over a network, like internet traffic. General use cases include securing email, VOIP, online transactions, file transfers, and instant messages. TLS is designed to prevent data from being eavesdropped on or tampered with. It […]