The Summit 5

The Summit 5

by Daniel Jolayemi, July 22, 2019

Register FREE for The Summit The Summit 5.0 goal is to bring together bright minds to give talks that are idea-focused, and on a wide range of subjects, to foster learning, inspiration and wonder-and provoke conversations that matter. This year, Outstanding Global Leader – Quantum 360 will change your life. … Continue reading

PROXY SERVER

PROXY SERVER

by Daniel Jolayemi, March 15, 2019

With the growing reliance on connectivity to the World-Wide Web, many organizations have been experiencing trouble servicing their users with adequate access and response time as network and server loads have increased dramatically. Increased bandwidth (i.e., more or "bigger" connections to Web) can relieve the access problem, but increasing bandwidth may not decrease the response time for users. Additionally, increase bandwidth comes at greatly increased cost due to typical monthly charges. Therefore, many organizations, including businesses, schools, universities, government, and military organizations have turned to the use of proxy servers.

Response: 6 Comments
Computer Science as a Discipline

Computer Science as a Discipline

by Daniel Jolayemi, March 5, 2019

Many people applied for computer science with hope that it’s similar in context to one of those regular courses offered by computer training schools. It is not until they are greeted with some coding stunts in programming courses that they realize they are in for a higher drill. Even towards … Continue reading

Response: 2 Comments
PROXY SERVER AS A CUSTOMIZED FIREWALL FOR INTERNET SECURITY AND INTER-NETWORK TRAFFIC GATEWAY

PROXY SERVER AS A CUSTOMIZED FIREWALL FOR INTERNET SECURITY AND INTER-NETWORK TRAFFIC GATEWAY

by Daniel Jolayemi, April 16, 2019

Firewalls and proxy servers are two technologies that are very common when we talk about the internet. Both serve very similar roles as gateways for packets to pass through to get to its destination. Despite this, there is one fundamental difference between a firewall and a proxy server. The primary … Continue reading