Wednesday , June 28 2017
Home / Technology

Technology

Grapes production in Afghanistan

Introduction Grapes and raisins are the productive horticultural crops of Afghanistan due to large area of plantation and the high value received from. Grapes in Afghanistan are mostly growing by traditional system called earth–trellised “Jui” system, freestanding head system, and now it’s practicing T and I (cordon) systems. Cultural practices ...

Read More »

Understanding the Challenges of Digital Data in Afghanistan

By: Sayed Marjan Zazai In many developed nations, offshore outsourcing posed a challenge to the national economy even while firms benefited from offshore outsourcing’s superior skills at lowering costs. This recent business model has evolved to a premium experience that has come to satisfy customer expectations with a sensible business ...

Read More »

د افغانستان سايبري اکر

سايبري فضا، سايبري امنيت، سايبري جنګ، سايبري شخړې او…. سايبر يو مختاړى دى، چې د كمپیوټر او معلوماتو د عصر  د يوې برخې، نظر، شخص د توصيف لپاره كاريږي. په ټوله كې د ماشين او ژوندي موجوداتو ترمنځ اړيكو ته د لومړي ځل لپاره د سايبر كلمه كارول شوې ده. ...

Read More »

په افغانستان کې تلیفوني اړیکې خونديتوب: مکالمې څنګه اورېدل کیږي؟

‌BY: Mohammad Shafi Wardak د اړیکو په نړۍ کې ګرځنده یا موبایل ټلیفون اوس یوه اړینه وسیله ده. په افغانستان کې کابو ۸۰سلنه وګړي موبایل کاروي. دلته ګرځنده ټلیفونونه (موبایل) سربیره پر دې چې خلک یې سره تړلي، سوداګریزې پراختیا، او ژوند کې یې پراخې اسانتیاوې هم رامنځ ته کړې ...

Read More »

افغانستان په تشیا کې: افغان سټ ۱

BY: Mohammad Shafi Wardak مصنوعي سپوږمکۍ، د انسان په لاس جوړه شوې سپوږمکۍ ده ، چې تشیا ته لیږل کیږي او د ځمکې پر مدار شاوخوا ګرځي. مصنوعي سپوږمکۍ د بېلابېلو انساني چارو لپاره کارول کیږي. له مخابراتي او څېړنیزو څیړنو نه نیولې تر هوا پیژندنې، جاسوسۍ، پوځي، او ډول ...

Read More »

Private VLAN: A simple Layer 2 security approach

by: MUHAMMAD ZUBAIR WARSAJI Abstract The last two years have seen some major online security breaches that made headlines around the world. Some victims were more well-known names, such as Sony and MasterCard. The rising threat of so-called ‘Hactivists’ around the world means that network security must be integrated into ...

Read More »

Before and After Social Media

By: Dr Hamdullah Mohib What is Social Media? When we hear the term Social Media, most of us imagine social networks such as Facebook, Twitter, Reddit, Pinterst, etc. But long before these networks were created, social media existed and it changed the world. Social media has different definitions for different people but the one common thing ...

Read More »

The State of Telecoms and Internet in Afghanistan at a Glance

by: JAVID HAMDARD OVERVIEW Just eleven years ago Afghanistan had a barely functional post-war telecom infrastructure and no services. Afghans had to travel to neighboring countries to make a phone call. Since its evolution into relative modernity starting April 2002, the telecom sector in Afghanistan has witnessed an unprecedented and ...

Read More »

Hackers in Battles and Wars

by: MUHAMMAD ZUBAIR WARSAJI Internet, a virtual space, is what we depend on every single day and has changed the way we communicate. It has not only provided ease of communication but has also opened a new frontier to fight battles and wars, since almost all mission critical government infrastructure ...

Read More »