Skip to main content

Jabber


Here two different Jabber is discussed :-

1.     In networks, a Jabber is any device that is handling electrical signals improperly, usually affecting the rest of the network.
In an Ethernet network, the devices compete for use of the line, attempting to send a signal and then retrying in the event where someone else tried at the same time. It is a device that is always sending, and effectively bringing the network to a halt. It is generally the result of a bad network interface card. 
Jabber is a continuous stream of random data transmitted over a network as the result of some malfunction.

2.     Jabber is the technology that was an open-source XML-based instant messaging platform, design for instant messaging and digital communications. It works in similar way as e-mail, using a distributed architecture. It adds a suffix to each address after "@" sign (for instance user@msn) like an e-mail addressing system. This enables a Jabber server to read addresses from the different messaging systems and know where they are available . It was adopted by major platforms like Google Talk and other VoIP structures. Both Microsoft and Facebook have followed suit by using the elements of XMPP for specific messaging services. The benefits of using XMPP is its ability to be customized without a monolithic central control, as well as competitive security features.

Comments

Popular posts from this blog

Atanasoff - Berry Computer ( ABC )

The Atanasoff – Berry Computer (ABC)   was the first electronic computer, designed and built by Lowa State College Mathematics and Physics professor John Vincent Atanasoff and his assistant, Clifford E. Berry ( a graduate student) . They worked in the basement of the physics building at Lowa State College on the computer from 1939 until 1942 when it was abandoned due to World War II . Unfortunately, after being abandoned , it was neglected and eventually disassembled for parts. In 1994, a team from Lowa state University began to rebuild the computer, finishing it in 1997. The system weighed more than seven hundred pounds (320 kg). It contained approximately 1-mile (1.6 km) of wire, 280 dual-triode vacuum tubes, 31  thyratrons , and was about the size of a desk.  The idea behind the ABC were later used in the construction of the ENIAC, the world’s first general purpose computer. Purpose / Working ABC was designed only to solve systems of  l...

Integrated Injection Logic (I2L)

Integrated Injection Logic (I2L) was disclosed in 1972 at International Solid State Circuits Conference by C. M. Hart and A. Slob of Philips, The Netherlands, and by H. H. Berger and S. K. Wiedmann of IBM, West Germany simultaneously. The basic logic unit is a multiple output inverter which is physically realized as a conventional npn multi-emitter transistor operated in the inverse mode. Base drive to the npn inverters is supplied by multicollector lateral pnp current source transistors. The emitter of the pnp transistor is referred to as the injector, and a single injector distributes base drive to many npn logic units. The outputs of I2L units may be " wire AND " with outputs from other units for NAND implementation of logic functions. I2L is a bipolar LSI circuit technique which achieves high packing density and good power-delay efficiency using conventional bipolar processing. It uses the properties of ion implantation to achieve improved performance ca...

Virus

Virus  A virus is a computer code or program, which is capable of affecting your computer data badly by corrupting or destroying them. Computer virus has the tendency to make its duplicate copies at a swift pace, and also spread it across every folder and damage the data of your computer system. A computer virus is a malicious software program or "malware" which, when infecting your system, replicates itself by modifying other computer programs and inserting its own code. Types Of Virus :- File Infector Virus Multipartite Virus Resident Virus Boot Virus Macro Viruss Overwrite Virus Web Scripting Virus Impact of Virus :- Disrupts the normal functionality of respective computer system. Disrupts system network use. Modifies configuration setting of the system. Destructs data. Disrupts computer network resources. Destructs of confidential data. Infected computer programs may include data files, or even the "boot" sector of the hard dr...