Best Windows Hosting

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg
Showing posts with label Others. Show all posts
Showing posts with label Others. Show all posts

Tuesday, 25 September 2012

30 Facts About Google Adsense You Must Know

Posted on 22:35 by Unknown

Have you a google adsense account? If yes, congrats! If no, may google bless you one! If you have google adsense account then you must be aware of some facts about google adsense. Here are some tips and some facts about google adsense you must know.

1. Google uses Javascript code to incorporate the advertisements into a participating site. 

2. Google AdSense publishers can place up to 3 AdSense for content units, 3 AdSense link units and 2 Google Search Boxes on a single webpage.

3. Google AdSense policies prohibit users from placing Google ads in pop-up windows.

4. Google utilizes its search technology to serve ads based on website content, the user’s geographical location, and other factors. If it is included on a site which has not yet been crawled by the Googlebot, it will temporarily display advertisements for charitable causes.

5. Participating in Google AdSense does not affect your site’s rank in Google search results. While Googlebot does crawl content pages for the purpose of targeting ads, this crawl is not associated with the main index crawl.

6. Google doesn’t disclose the percentage of advertising revenue that it shares with AdSense publishers.

7. Never modify the Google Adsense HTML code. If have trouble embedding AdSense code in your WordPress or Blogger template, take help of the AdSense support forums or send an email to your AdSense account manager.

8. There are two email addresses to use, depending on the type of question:
 A) adsense-support@google.com: for general program or account questions
 B) adsense-tech@google.com: for additional technical questions or concerns.
 Note: Google Adsense customer support doesn’t have a telephone number. 

9. Never ask your friends or visitors to click on your Google ads. Google takes click fraud very seriously. Do not include incentives of any kind on your site for users to click on your ads. Don’t label Google ads with text other than “sponsored links” or “advertisements”. AdSense program may not encourage users to click the Google ads by using phrases such as “click the ads,” “support us,” “visit these links,” or other similar language.

10. Don’t click on your own ads - Google is much smarter than you think and can discover invalid clicks through IP addresses, site navigation patterns, etc.

11. If you are working on a new design for your site, avoid reloading your pages (with AdSense) excessively. You can turn off AdSense temporarily or disable javascript of your browser to avoid invalid CPM impressions.

12. Use Text Ads instead of Image Ads as users get more options and the payout is often higher.

13. Google Ads with no background color and no borders will always perform better. Make the border color and background color same as your page background color.

14. Always use big ads like the large rectangle (336×280) is the best paying Adsense format especially for text ads. Try using the 336×280 large rectangle, 300×250 medium rectangle or 160×600 wide skyscraper.

15. Don’t places images next to Google ads as that will invite a permanent ban to your AdSense account.

16. The first few lines of your content are an important factor for determining what Ads are served on your webpage. So concentrate on your starting lines as well as the header of the article.

17. Try to place the ad between the main title and the content of your article as this section is focused much and the ad is more relevant here than any other portion of your page. Place another ad at the end of your article. If your article is big, you can also insert an ad between your article.

18. Monitor the AdSense performance of individual web pages with Google Analytics.

19. Learn how to implement AdSense Revenue sharing if you run a site with multiple authors and need to pay your writers based on advertising revenue generated from their articles. Assign a separate channel to each other and use that number for his or her blog posts.

20. Use the AdSense Preview tool to determine what ad campaigns are currently targeted for your site in different geographic regions of the world. 

21. Google AdSense program does not permit AdSense ad code to be placed in email messages or newsletters. Nor are you allowed to add AdSense ads in software application, browser tools, extensions, etc.

22. AdSense publishers in certain countries (like India) can have only one Adsense account per physical address. For instance, if any of your family member creates a new website, they will have to use your existing Adsense account to monetize the site - Google will not accept Adsense applications from individual who have the same postal address as yours. Maybe this rule is not applicable in all countries but if you’re based in India, never create multiple Adsense accounts for the same postal address. Here’s an excerpt from the Adsense rule book:

“Multiple accounts held by the same individual or entity are subject to immediate termination unless expressly authorized in writing by Google (including by electronic mail)”.

23. There is no need of placing the google ads in Archives, Tags, Category or Author pages of your blog/website.

24. Reports on impressions and clicks are usually updated every fifteen to thirty minutes.

25. If you are not yet 18, you may have a parent or guardian submit an application using their name as the payee name.

26. Google doesn’t allow you to open Google ads in a new browser window.

27. Sometimes you might have observed that no. of clicks display on your adsense account but no associated revenue. This is because they might be the invalid clicks tracked by the google or the second reason may be that you would be using the Allowed Site Feature on your account through which you can put the ads on other sites also. If you are using this feature, you must add all your sites on the allowed site list otherwise the page impressions and clicks will appear but no revenue will be rewarded to you.

28. Sometimes you might have observed that the page impressions and page views are not same for your blog. This may be because some visitors block your ads, some block javascript and also if your page is heavy and the visitor has aborted the page load, then page view will be counted but no page impression will be considered. If you are using statcounter or any other service to track the traffic, then must keep in mind that the time zone should be same as that of the Adsense Account. 

29. If google bans your account for invalid clicks, you can send the application for re-consideration. If you are lucky, goole may re establish your account deducting some money which they assume is from invalid clicks but there are only a few chances of it. In reconsideration they usually don’t re-establish the account.

30. Yahoo YPN, FeedBurner Ads, Adbrite, Kontera, Chitika,Tribal Fusion, Adify, Pheedo and BlogAds are the other options you can try if your adsense account is not accepted or banned permanently. But these sources sheerly provide ads depending on your site traffic.
Read More
Posted in Others | No comments

Working of the JSP Container

Posted on 01:33 by Unknown

This article illustrates the working of JSP (Java Server Pages). A JSP page has to pass many stages before execution. A JSP container plays a vital role here. Lets discuss it in detail:

A jsp page exist in three forms or version, as explained below:

JSP Source Code: This is the version the developer actually writes. It consist of a text file with an extension of .jsp, and contains a mix of HTML template code, java language statements, and JSP directives and sections that describe how to generate a Web page to service a paticular request.

Java Source Code: The JSP container translates the JSP source code into the source code of an equivalent java servlet as needed. This source code is typically saved in a work area and is often helpful for debugging.

Compiled Java Class: Like any other java class, the generated servlet code is compiled into byte codes in a .class file, ready to be loaded and executed.

Something About JSP Container:

The JSP container manages each of these forms of the JSP page automatically, based on the timestamps of each file. In response to an HTTP request, the container checks to see if the .jsp source file has been modified since the .java source was last compiled. If so, the container retranslates the JSP source into java source and recompiles it.

Let us illustrate the process used by the JSP Container. When a request for the JSP page is made, the container first determines the name of the class corresponding to the .jsp file. If the class doesn’t exist or if it’s older than the .jsp file (meaning the jsp source has changed since it was last compiled), then the container creates java source code for an equivalent servlet and compiles it. If an instance of the servlet isn’t already running (or if the servlet was newly generated), the container load the servlet class and create an instance. Finally the container dispatches a thread to handle the current HTTP request in the loaded instance. So this process can be summarize as: 

JSP Source Code >>>> (translation occured) >>>> Generated Servlet Source Code >>>> (compilation occurred) >>>> Compiled Servlet Class

Read More
Posted in Others | No comments

Tuesday, 17 July 2012

VPN Technology: Virtual Private Networks

Posted on 04:48 by Unknown

What is VPN (Virtual Private Network)?

A virtual private network (VPN) is a private computer network that interconnects remote (and often geographically separate) networks through primarily public communication infrastructures such as the Internet.

 Types of VPN connections

1. Remote access VPN
2. Site-to-site VPN

1. Remote Access VPN

Remote access VPN connections enable users working at home or on the road to access a server on a private network using the infrastructure provided by a public network, such as the Internet. From the user’s perspective, the VPN is a point-to-point connection between the computer (the VPN client) and an organization’s server. The exact infrastructure of the shared or public network is irrelevant because it appears logically as if the data is sent over a dedicated private link.

2. Site-to-Site VPN

Site-to-site VPN connections (also known as router-to-router VPN connections) enable organizations to have routed connections between separate offices or with other organizations over a public network while helping to maintain secure communications.

VPN Protocols

There are a number of VPN protocols in use that secure the transport of data traffic over a public network infrastructure. Each protocol varies slightly in the way that data is kept secure.

1. IP security (IPSec)

IP security (IPSec) is used to secure communications over the Internet. IPSec traffic can use either transport mode or tunneling to encrypt data traffic in a VPN. The difference between the two modes is that transport mode encrypts only the message within the data packet (also known as the payload) while tunneling encrypts the entire data packet. IPSec is often referred to as a "security overlay" because of its use as a security layer for other protocols.

2. Secure Sockets Layer (SSL) and Transport Layer Security (TLS)

Secure Sockets Layer (SSL) and Transport Layer Security (TLS) use cryptography to secure communications over the Internet. Both protocols use a "handshake" method of authentication that involves a negotiation of network parameters between the client and server machines. To successfully initiate a connection, an authentication process involving certificates is used. Certificates are cryptographic keys that are stored on both the server and client.

3. Point-To-Point Tunneling Protocol (PPTP)

Point-To-Point Tunneling Protocol (PPTP) is another tunneling protocol used to connect a remote client to a private server over the Internet. PPTP is one of the most widely used VPN protocols because of it's straightforward configuration and maintenance and also because it is included with the Windows operating system.

4. Layer 2 Tunneling Protocol (L2TP)

Layer 2 Tunneling Protocol (L2TP) is a protocol used to tunnel data communications traffic between two sites over the Internet. L2TP is often used in tandem with IPSec (which acts as a security layer) to secure the transfer of L2TP data packets over the Internet. Unlike PPTP, a VPN implementation using L2TP/IPSec requires a shared key or the use of certificates.

Where is VPN technology used?

VPN technology is used in large corporations, educational institutions, and government agencies to enable remote users to securely connect to a private network.

VPN vs Leased Lines / Dial-up connections

Leased lines, such as ISDN (integrated services digital network, 128 Kbps), are private network connections that a telecommunications company could lease to its customers. Leased lines provide a company with a way to expand its private network beyond its immediate geographic area. These connections form a single wide-area network (WAN) for the business. Though leased lines are reliable and secure, the leases are expensive, with costs rising as the distance between offices increases.

Today, the Internet is more accessible than ever before, and Internet service providers (ISPs) continue to develop faster and more reliable services at lower costs than leased lines. To take advantage of this, most businesses have replaced leased lines with new technologies that use Internet connections without sacrificing performance and security. Businesses started by establishing intranets, which are private internal networks designed for use only by company employees. Intranets enabled distant colleagues to work together through technologies such as desktop sharing. By adding a VPN, a business can extend all its intranet's resources to employees working from remote offices or their homes.

Advantages of VPN Technology

1. Use of internet as communication channel

A VPN is a inexpensive effective way of building a private network. The use of the Internet as the main communications channel between sites is a cost effective alternative to expensive leased private lines. The costs to a corporation include the network authentication hardware and software used to authenticate users and any additional mechanisms such as authentication tokens or other secure devices. The relative ease, speed, and flexibility of VPN provisioning in comparison to leased lines makes VPNs an ideal choice for corporations who require flexibility. For example, a company can adjust the number of sites in the VPN according to changing requirements.

2. VPNs enable file sharing, screen sharing, video conferencing and similar network services.

3. Allows you to be at home and access your company's computers in the same way as if you were sitting at work.

4. Almost impossible for someone to tap or interfer with data in the VPN tunnel.

5. If you have VPN client software on a laptop, you can connect to your company from anywhere in the world.

Disadvantages of VPN Technology

1. Lack of Quality of Service (QoS) management

There are several potential disadvantages with VPN use. The lack of Quality of Service (QoS) management over the Internet can cause packet loss and other performance issues. Adverse network conditions that occur outside of the private network is beyond the control of the VPN administrator. For this reason, many large corporations pay for the use of trusted VPNs that use a private network to guarantee QoS.

2. Vendor interoperability

Vendor interoperability is another potential disadvantage as VPN technologies from one vendor may not be compatible with VPN technologies from another vendor. Neither of these disadvantages have prevented the widespread acceptance and deployment of VPN technology.

3. Setup is more complicated than less secure methods. VPN works across different manufacturers' equipment, but connecting to a non-NETGEAR product will add to difficulty, since there may not documentation specific to your situation.

4. The company whose network you connect to may require you to follow the company's own policies on your home computers.

Read More
Posted in Others | No comments

Tuesday, 15 May 2012

Basic Points of SOA (Service Oriented Architecture)

Posted on 19:05 by Unknown
1. SOA stands Service Oriented Architecture.

2. SOA is not a specific technology, nor a specific language. It is just a blueprint, or a system design approach.

3. The key concepts of SOA are services, high interoperability and loose coupling.

4. SOA states that every component of a system should be a service, and the system should be composed of several loosely-coupled services.

5. A service means a unit of a program that serves a business process. A service is typically hosted on a remote machine (provider), and called by a client application (consumer) over a network. After the provider of a web service publishes the service, the client can discover it and invoke it. The communications between a web service and a client application use XML messages.

The client application is unaware of how the service is implemented, or of the signature that should be used when interacting with those services. The client application interacts with these services by exchanging messages. What a client application knows now is only the interfaces, or protocols of the services, such as the format of the messages to be passed in to the service, and the format of the expected returning messages from the service.

6. Web services are the most popular and practical way of realizing SOA. Each web service has a unique URL, and contains various methods. When calling a web service, you have to specify which method you want to call, and pass the required parameters to the web service method. Each web service method will also give a response package to tell the caller the execution results.

7. "Loosely-coupled"  means that these services should be independent of each other. A change to one service does not affect any other service. Also, the deployment of a new service does not affect any existing service. This greatly eases release management and makes agility possible.

8. As OOPs replaced various procedural techniques, SOA replaced various existing communication technologies like RPC, DCOM, and CORBA

Read More
Posted in Others | No comments

Friday, 6 April 2012

What is Tethering and Hotspot?

Posted on 10:01 by Unknown
Tethering means sharing the Internet connection of an Internet-capable mobile phone or internet tablet with other devices like laptop.

This sharing can be offered over:

  • A wireless LAN (Wi-Fi),
  • Bluetooth, or
  • USB
In the case of tethering over wireless LAN, the feature may be branded as a mobile hotspot. The Internet-connected mobile phone acts as a portable router when providing tethering services to others.

Why Tathering?

  • When traveling, in places where local Wi-Fi hotspots are unavailable or inconvenient
  • In rural areas or other residential locations where no high-speed Internet access options exist.
  • As an emergency fall back option in the home, when the primary form of high-speed Internet access is unavailable due to service outage.
  • You can also surf the web more securely using a tethered cell phone, because your information is being sent directly through the phone, for example, over a public open wireless hotspot.
  • You may also conserve some laptop battery power, because you can turn off wi-fi on your laptop while you use your tethered cellular modem.
Why not Tathering?
  • A mobile broadband data plan with tethering option is required; these may be more expensive than standard home broadband and may also limit the amount of network traffic.
  • Connections often run at very low speeds (data rates significantly less than 1 Mbps)
  • Phone and cellular network providers may forbid using some devices for tethering, or void their warranty.
  • Using your cell phone's data service for your laptop will, however, drain the phone's battery more quickly, especially if you're using bluetooth to connect. If you have a USB port on your laptop that can also charge devices, tethering via USB would be a better way to connect.
  • You also may not be able to use your voice service on the cell phone while it is tethered, depending on your particular phone and connection method.
Hotspot

A hotspot is any location where Wi-Fi network access (usually Internet access) is made publicly available.

Technically speaking, hotspots consist of one or several wireless access points installed inside buildngs and/or adjoining outdoor areas.

A hotspot is a site that offers Internet access over a wireless local area network through the use of a router connected to a link to an Internet service provider. Hotspots typically use Wi-Fi technology.
Read More
Posted in Others | No comments

Monday, 2 April 2012

Basics of IBM Websphere MQ (Part 1)

Posted on 18:48 by Unknown
IBM WebSphere MQ is a family of network software products launched by IBM in March 1992.
It allows independent and potentially non-concurrent applications on a distributed system to communicate with each other.

IBM WebSphere MQSeries allows different applications to communicate asynchronously through queues across different operating systems, different processors, and different application systems.

Queue Manager: The primary component of a WebSphere MQ installation is the Queue Manager. The queue manager handles storage, timing issues, triggering, and all other functions not directly related to actual movement of data.Queue managers communicate with the outside world.

Naming convention for Queue Managers: Naming convention of Queue Manager includes Name of the MQ Manager, Server on which Queue Manager is hosted and Port of the server.

For example: MQUPPAQM on 235.21.108.25(1414)

Queues: These transmit data in FIFO order. These are of following types:

Local Queues: Local queues represent the location in which data is stored awaiting processing.

Remote Queues: Remote queues represent a queue on another queue manager. They define the destination queue, which is one element of the routing mechanism for messages.

Transmission Queue: connects Local Queue to Remote Queue.

Channels: Communication between queue managers relies on channels. Each queue manager uses one or more channels to send and receive data to other queue managers. A channel is unidirectional. A second channel is required to return data.

In a TCP/IP based network, a channel will send or receive data on a specific port. A sending channel has a defined destination and is associated with a specific transmission queue, the mechanism by which messages are queued awaiting transmission on the channel; a receiving channel will receive data from any other queue manager with a sending channel of the same name. When a receiving channel receives a message, it is examined to see which queue manager and queue it is destined for. In the event of a communications failure, MQ can automatically re-establish a connection when the problem is resolved.

Listener: The "listener" has the function of detecting connections from incoming channels and manages the connection of the sending to the receiving channels.

MQ Messages are made up of two parts:

1. MQMD (MQ Message Descriptor / Header)
2. Application Data (Message Body)

1. Message Descriptor: It contains the control information about the message data like type of message, persistence and non-persistence of message, msgID, corrleationID etc.


2. Application Data
The application data section contains the actual data sent from one program to another, and its content and structure are defined by the applications that use it. Generally, the application data only contains information that is meaningful to the applications, since the control information in the message descriptor is sufficient.


Types of Messages:

1. Datagram: Use a datagram when you do not require a reply from the application that receives the message (that is, gets the message from the queue).

An example of an application that could use datagrams is one that displays flight information in an airport lounge. A message could contain the data for a whole screen of flight information. Such an application is unlikely to request an acknowledgement for a message because it probably does not matter if a message is not delivered. The application sends an update message after a short period of time.

2. Request: Use a request message when you want a reply from the application that receives the message.

An example of an application that could use request messages is one that displays the balance of a checking account. The request message could contain the number of the account, and the reply message would contain the account balance.

3. Reply: Use a reply message when you reply to another message.

When you create a reply message, respect any options that were set in the message descriptor of the message to which you are replying. Report options specify the content of the message identifier (MsgId) and correlation identifier (CorrelId) fields. These fields allow the application that receives the reply to correlate the reply with its original request.

4. Report: Report messages inform applications about events such as the occurrence of an error when processing a message. They can be generated by:

A) A queue manager,
B) A message channel agent (for example, if they cannot deliver the message), or
C) An application (for example, if it cannot use the data in the message).

Persistent and Non-Persistent Messages: Persistent messages are written to logs and queue data files. If a queue manager is restarted after a failure, it recovers these persistent messages as necessary from the logged data. Messages that are not persistent are discarded if a queue manager stops, whether the stoppage is as a result of an operator command or because of the failure of some part of your system.
Correlation ID: Whenever a message is put in the queue, if it is successfully put, an ID is generated called Correlation ID. Any reply to that message will be matched with that correlation ID.
Read More
Posted in Others | No comments
Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • 13 Things to keep in mind before using DLL in Delphi
    Keep in mind the following tips when writing your DLL: 1. Make sure you use the proper calling convention (C or stdcall). 2. Know the correc...
  • How to use TADOTable in Delphi XE2?
    Following is the code snippet which will show you how to use TADOTable in Delphi XE2? procedure TClass1.GetDataFromADOTable; begin   try    ...
  • How to use FindComponent function in Delphi XE2?
    Following is the code snippet which will show you how to use FindComponent in Delphi XE2? procedure TClass1.UseFindComponent(FieldName : str...
  • Online Finance Degrees
    There is a great demand for professionals with profound knowledge of finance and accounting in most of the reputed banks and financial insti...
  • How to grab the recruiter’s attention with your resume?
    Did you know that the average recruiter spends about 8 to 10 seconds glancing at your resume before s/he moves on to the next? So, whether y...
  • 5 ways to handle workload at your workplace
    With bigger workloads, tighter deadlines and more pressure, the temptation to pack in as many tasks as possible is hard to resist. But juggl...
  • Online Marketing Degrees
    Because global competition has become so intense, it should come as no surprise that companies invest heavily in their marketing and promoti...
  • Frameset, Frame and IFrame Elements in HTML
    Frame Element With frames, you can display more than one HTML document in the same browser window. Each HTML document is called a frame, and...
  • Oracle Streams: An Overview
    Oracle Streams enables information sharing. Each unit of shared information is called a message. The stream can propagate information within...
  • Phonegap: An amazing combination of HTML5, CSS3 and Javascript
    Phonegap (Cordova) = HTML5 + CSS3 + Javascript What a great combination!! How easy is Phonegap to learn!!! A great enhancement in mobile tec...

Categories

  • AJAX
  • C++
  • CSS
  • Delphi
  • DOTNET
  • HTML
  • Javascript
  • jQuery
  • Management
  • Online Degrees
  • Oracle
  • Others
  • Phonegap
  • PHP
  • Unix
  • XML

Blog Archive

  • ▼  2012 (155)
    • ▼  September (64)
      • Online Music Degrees
      • Online Accredited Degrees
      • Online Advertising Degrees
      • Online Finance Degrees
      • Online Marketing Degrees
      • Online Forensic Science Degrees
      • Online DBA (Database Administrator) Degrees
      • Online Biology Degrees
      • Online Geography Degrees
      • Online History Degrees
      • Online Art Degrees
      • Online Sports Degrees
      • Online Agriculture Degrees
      • Online Library Science Degrees
      • Online Environmental Science Degrees
      • Online Business Degrees
      • Online Physical Education Degrees
      • Online Science Degrees
      • 5 Tips to enjoy your workplace
      • 5 E-mail Etiquette You Must Know
      • How to grab the recruiter’s attention with your re...
      • 30 Facts About Google Adsense You Must Know
      • Working of the JSP Container
      • List of 70 basic commands of UNIX
      • 13 Point comparison between SQL and PLSQL
      • 10 Rules of Operator Overloading in C++
      • 6 Point comparison between Apache and IIS Web Servers
      • 5 Qualities of a good manager
      • Never try to fake your Resume / CV
      • How to write a cover letter of your resume?
      • The crucial first 5 minutes of an Interview
      • Rejected in an Interview? Don't Lose Your Heart
      • 6 FAQ’s in an interview
      • 5 ways to get into the good books of the boss
      • 5 Reasons to Quit Your Job
      • Online Web Designing Degrees
      • Online BBA Degrees
      • Online MA Degrees
      • Online BA Degrees
      • Online Human Resource (HR) Degrees
      • Online Graduate Degrees
      • Online Master Degrees
      • Online Fashion Design Degrees
      • Online Bachelor Degrees
      • Onlin PhD Degrees
      • Online Nursing Degrees
      • Online MBA Degrees
      • Online Doctorate Degrees
      • Online Psychology Degrees
      • Online Social Science Degrees
      • Online Law Degrees
      • Online Accounting Degrees
      • Online Medical Degrees
      • Online Engineering Degrees
      • Online Professional Degrees
      • 3 Things to keep in mind while you quit your job
      • Planning a job change? Tips to negotiate salary
      • How to use SaveToFile and LoadFromFile in Delphi XE2?
      • How to use TADODataset, TDatasource and TDBGrid in...
      • Embarcadero HTML5 Builder Features List
      • 5 ways to handle an interview over a video call
      • List of 8 job interview goof-ups
      • Anatomy of the commonly asked interview question “...
      • Use Social Networking Sites To Groom Your Career
    • ►  August (11)
    • ►  July (4)
    • ►  June (3)
    • ►  May (25)
    • ►  April (48)
Powered by Blogger.

About Me

Unknown
View my complete profile