rtmnumobile.blogspot.com
Mobile Computing: Data Mining
http://rtmnumobile.blogspot.com/2011/02/data-mining-mba-it-semester-2nd-unit.html
Nagpur University Syllabus MBA , IT Notes/Articles. Thursday, February 3, 2011. Are: Association, Sequencing, Classification, Clustering and Forecasting. Data mining applications are available on all size systems for mainframe, client/server and PC platforms. Relational database storage and management technology is adequate for many data mining applications less than 50 gigabytes. Data mining process. And are Predictive Model, Summary Model, Network Model and Association model. General mining software.
rtmnuittrends.blogspot.com
IT trends-latest/recent trends in information technology: Nagpur university syllabus (Revised) MBA 3 rd sem IT
http://rtmnuittrends.blogspot.com/2011/01/nagpur-university-syllabus-revised-mba.html
IT trends-latest/recent trends in information technology. Nagpur University Syllabus MBA 2 nd and 3 rd sem IT Notes/Articles. Saturday, January 29, 2011. Nagpur university syllabus (Revised) MBA 3 rd sem IT. Paper -III: Innovations in IT. Unit I: IT Enabled Services ( ITeS): Outsourcing -. India as Ideal Destination, India Outsourcing History,. Outsourcing Writing to India, Call Centers in India,. Offshoring, Nearshoring, Homeshoring,. Unit II: Ntewroking Technology &Systems. Mobility Management and Mobi...
rtmnuittrends.blogspot.com
IT trends-latest/recent trends in information technology: December 2010
http://rtmnuittrends.blogspot.com/2010_12_01_archive.html
IT trends-latest/recent trends in information technology. Nagpur University Syllabus MBA 2 nd and 3 rd sem IT Notes/Articles. Wednesday, December 8, 2010. IPOD is the combination of digital media player and the hard drive for storing and playing the media files. IPOD is the portable media player which was designed by apple in October 23, 2001. It mainly consists of hard drive and the touch screen. IPOD stores the media files in the flash memory. The storage capacity varies from 2 gb to 160 gb. IPOD can p...
rtmnumobile.blogspot.com
Mobile Computing
http://rtmnumobile.blogspot.com/2011/02/nagpur-university-syllabus-revised-mba.html
Nagpur University Syllabus MBA , IT Notes/Articles. Sunday, February 6, 2011. Nagpur university syllabus (Revised) MBA 2 nd sem IT. Paper-II: Internet Technologies and Trends. Unit I: Internet -. Working of Search Engines: Yahoo, Google, Dogpile and Met Crawler, Mailing: Authorization, Working of Rediffmail, Hotmail and Yahoomail, Chatting: RLC Concept, Video Conferencing. Unit II: IT Trends -. Unit V: Knowledge Management -. Unit VI: E-Learning -. Categories (Library / Bookshop, Showcase, Product and Se...
rtmnumobile.blogspot.com
Mobile Computing: December 2010
http://rtmnumobile.blogspot.com/2010_12_01_archive.html
Nagpur University Syllabus MBA , IT Notes/Articles. Friday, December 10, 2010. Mobility management is nothing but the technique in which uninterrupted signal connectivity is maintained, when a mobile device changes location from cell Ci to Cj or from network Ni to network Nj . Following are the two important points to ensure constant connectivity:. 1 Infrastructure management that connects two or more cells or networks. The technique of mobility management is as shown in following diagram:.
rtmnuittrends.blogspot.com
IT trends-latest/recent trends in information technology: Wireless Network
http://rtmnuittrends.blogspot.com/2011/02/wireless-network.html
IT trends-latest/recent trends in information technology. Nagpur University Syllabus MBA 2 nd and 3 rd sem IT Notes/Articles. Friday, February 4, 2011. A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier. The last link with the users is wireless, to give a network connection to all users in a building or campus. The backbone network usually uses cables. The wireless LAN connects to a wired LAN. For temporary situations such as meetings and conferences. Physical an...
rtmnumobile.blogspot.com
Mobile Computing: October 2010
http://rtmnumobile.blogspot.com/2010_10_01_archive.html
Nagpur University Syllabus MBA , IT Notes/Articles. Sunday, October 31, 2010. Network security and privacy. Is needed in order to maintain privacy. Thus network must provide security to the data whenever transmitted from one end point to another end point. The desirable properties of secure communication are confidentiality. Is first encrypted and then transmitted over the network and is then recovered into plain text at destination by using decryption. Process of Cryptography. Digital signature and digi...
rtmnumobile.blogspot.com
Mobile Computing: September 2010
http://rtmnumobile.blogspot.com/2010_09_01_archive.html
Nagpur University Syllabus MBA , IT Notes/Articles. Thursday, September 30, 2010. Here we talk about the access to transmission media in wireless networks through various modulation methods and controlling the access by multiplexing the modulated signals. When the wireless stations in same cell access the transmission medium uses different ratio carrier frequencies then is called as FDMA i.e frequency division multiple access as shown in figure. GSM communication standards uses TDMA and FDMA where as som...