Welcome to esiq.org
|
Web Hosting - Sharing A Server – Things To Think About
You can often get a substantial discount off web hosting fees by sharing a server with other sites. Or, you may have multiple sites of your own on the same system. But, just as sharing a house can have benefits and drawbacks, so too with a server.
The first consideration is availability. Shared servers get re-booted more often than stand alone systems. That can happen for multiple reasons. Another site's software may produce a problem or make a change that requires a re-boot. While that's less common on Unix-based systems than on Windows, it still happens. Be prepared for more scheduled and unplanned outages when you share a server.
Load is the next, and more obvious, issue. A single pickup truck can only haul so much weight. If the truck is already half-loaded with someone else's rocks, it will not haul yours as easily.
Most websites are fairly static. A reader hits a page, then spends some time skimming it before loading another. During that time, the server has capacity to satisfy other requests without affecting you. All the shared resources - CPU, memory, disks, network and other components - can easily handle multiple users (up to a point).
But all servers have inherent capacity limitations. The component that processes software instructions (the CPU) can only do so much. Most large servers will have more than one (some as many as 16), but there are still limits to what they can do. The more requests they receive, the busier they are. At a certain point, your software request (such as accessing a website page) has to wait a bit.
Memory on a server functions in a similar way. It's a shared resource on the server and there is only so much of it. As it gets used up, the system lets one process use some, then another, in turn. But sharing that resource causes delays. The more requests there are, the longer the delays. You may experience that as waiting for a page to appear in the browser or a file to download.
Bottlenecks can appear in other places outside, but connected to, the server itself. Network components get shared among multiple users along with everything else. And, as with those others, the more requests there are (and the longer they tie them up) the longer the delays you notice.
The only way to get an objective look at whether a server and the connected network have enough capacity is to measure and test. All systems are capable of reporting how much of what is being used.
Most can compile that information into some form of statistical report. Reviewing that data allows for a rational assessment of how much capacity is being used and how much is still available. It also allows a knowledgeable person to make projections of how much more sharing is possible with what level of impact.
Request that information and, if necessary, get help in interpreting it. Then you can make a cost-benefit decision based on fact.
Staying Computer Safe while Searching for Freebies on the Net Who doesn’t love the idea of getting something for nothing? Free stuff can bring a smile to anyone’s face, and the Internet is destination number one when you are looking for cash in on a few freebies. The downside of free stuff online is that if you aren’t careful, the free item could end up causing plenty of headaches and heartaches, not to mention a lot of cold, hard cash. If you want to score with free stuff online, make safety your number one priority by following these tips. First and foremost, treat your personal information like its cash. That might sound a little dramatic, but anyone who manages to steal your identity online is after one thing, and one thing only, your money and any addition money they can grab by cashing in on your credit. Protecting your name, address, credit card number, bank account number, phone number, social security number, and so on and so forth when you are registering for free offers is the first step to making sure you don’t get hustled when you’re just trying to enjoy a good freebie. That means that if you are asked for some personal information that you don’t feel comfortable handing out, let the freebie go. Likewise, make sure the site from which you are getting your free stuff has a privacy policy and that you know it, understand it, and can live with it. Speaking of that site that is handing out the free goods: just who are these people? If you were walking down the street and a shady looking person said they would give you a free DVD player if you followed them, chances are you would run the other way. Online, it is hard to tell the legitimate people from the people looking at you like a free lunch, but there are a few red flags you can look out for. Does the website look like it was thrown up in about 5 minutes, full of clip art and bad spelling? Is it hard to find information about where the website is registered, or where the business the website is supposedly promoting is registered? If the website purports to be affiliated with a certain brand you know, does it really look like it is, or does the logo look different/colors look off? If you can’t get a reasonable feel for who are dealing with online, don’t deal with them. Red flag number one? Asking for too much personal info should send you running. Another way to protect yourself is to build a virtual fortress around your computer. The net is filled with people who know how to walk right into your virtual home – your computer – and flip through everything you have on there, taking whatever they want. Many of these kinds of hackers draw you in by creating phony freebie websites. The way to keep them out is to keep your computer on lockdown. Make sure your firewall is stronger than you think it needs to be, and make sure it is always updated. Also, make sure you have antivirus software on the patrol for you and that you keep this software updated as well. Last but not least, keep those passwords in the vault, and make sure they are extra strong. No freebie website has any reason to ask you about the passwords for your accounts so don’t give them away – and don’t give them to anyone else online for that matter. Also, if you’re using your birthday or child’s name as password, don’t. Sure, it isn’t as easy to remember, but your password should be a random word and contain a collection of numbers and symbols as well. This will give you the extra layer of protection to make sure your online house is in order when you cash in on the freebies. Events of copyright infringement The Events of Copyright Infringement: Innocent People Infringing Accidentally Copyright infringement is in the news a lot lately – it’s hard to miss stories about kids being carted off to jail or seriously fined for downloading music or movies off the internet. I’ve even heard about a lady was fined for tens of thousands of dollars because of the events of copyright infringement – her grandson downloading music, and she couldn’t prove it wasn’t her. The events of copyright infringement are complicated – and not easy to define. Surfing the internet has its advantages and disadvantages, that’s for sure. We’re able to find useful information quickly, but how close are we pertaining to copyright laws? Do we even know what is and is not acceptable? A couple of the more pertinent questions have been asked below: If you hear a great new band, and then download a song from MySpace, is that legal or not? The events of copyright infringement are not only limited by Kazaa, Morpheus, or some other file sharing peer to peer (P2P) service. If you download a song - no matter if you’re on a website or a MySpace page - and it isn’t coming from the artist themselves, you may want to think about downloading it. Chances are, if it’s not coming from them, you can’t have it – unless it is under a Creative Commons License. Creative Commons gives the exact ways in which you can use the license – and many times those are completely free and legal to download – so make sure you check if it’s under a CC License. If I’m writing a paper, or article, and I want to quote another website, can I? First of all, did you know the minute you write or create something, you hold the copyright to it? ESPECIALLY if you’re writing it online – it’s very easy to track things in the internet page. So, if you’re writing a blog, all the things you’ve written (no matter good or bad) are there permanently, thanks to archive.org, and you can review last versions of your web pages. Sometimes, people we can use – rather heavily – someone else’s work in our own, and think we’re small and anonymous. That no one will notice by the time you get it down – you’re just ‘borrowing’ it. Before you begin quoting anyone’s website – from CNN to your local neighborhood hardware store – you need to ask the person who holds the copyright if you can. Usually, they’ll let you if you attribute to them. Depending who you talk to, you’ll either have to pay royalties or license rights to republish. If you don’t ask before you quote, you’re beginning the events of copyright infringement and you are opening yourself up for a lawsuit. As you can see, the events of copyright infringement can begin at any time, beginning with normal ‘everyday’ activities. It’s just as easy to infringe on as it is to be infringed upon. Make sure you check your copyright using CopyScape or some other service, and you can check your work against other works on the internet, and make sure that you’re not infringing someone or vice versa. In this day it’s easy to protect yourself from getting infringed upon, and the events of copyright infringement are easy to track. It’s easy for innocent people to get caught in copyright infringement, like children they didn’t know what they could and couldn’t do. Make sure, in all you do, that you’re striving to do the best you can, and you’ll be certain not to fall victim to your own infringing demons. |