Advert

How to Copy a Directory from DOS to UNIX

Last edited by . Total of no comments in the discussion.

DOS and Unix are both well-seasoned operating software. While they don’t have a graphical user interface, they definitely suffice for those who like barebones, efficient software. For those who still have DOS files on their PC and would like to switch them over to UNIX, here are some tips. Even though DOS and Unix are similar in some respects, there are major differences, especially if you are transferring over files or a directory of files. Most DOS files are usually saved on older computers with diskettes (remember those?). In order Read More

Share on:

How Does Sound Travel?

Last edited by . Total of 2 comments in the discussion.

Sound is characterised as a series of waves that move through a particular medium. A medium is some sort of a subtance–whether it be water, plasma, air, a solid, or anything else–that these waves move through. The waves cause the particles in this substance to vibrate which is how the sound is potentially heard. A medium is absolutely necessary for sound to travel. Without it, there is no sound. In other words, sound cannot travel in a vacuum. Creating Sound and Receiving Sound Before sound can travel, it needs to Read More

Share on:

Reset IBM ThinkPad BIOS Password

Last edited by . Total of 72 comments in the discussion.
Thinkpad

An IBM ThinkPad laptop can have three hardware password sets: Power-On Password Hard Disk Password Supervisor Password Power-On Password RT/CMOS RAM has 8 bytes reserved for the power-on password and the check character. The 8 bytes are initialized to hex 00. The microprocessor can access these bytes only during POST. After POST is completed, if a power-on password is installed, the password bytes are locked and no program can access them. During power-on password installation, the password (1 to 7 characters) is stored in the security space. Installing the password Read More

Share on:

Data Error Cyclic Redundancy Check

Last edited by . Total of 10 comments in the discussion.

The “Data Error Cyclic Redundancy Check (CRC)” is a problem with the mathematical process the computer does in order to ensure that data is properly transferred from a particular source to a specified destination. During the cyclic redundancy check, the computer determines if the data being transferred is not damaged. When users get a “Data Error Cyclic Redundancy Check” message, this could very well mean that the data they are transferring is corrupted. Often times, users encounter “Data Error Cyclic Redundancy Check” while attempting to read and/or copy data derived Read More

Share on:

How Does Nuclear Energy Work?

Last edited by . Total of no comments in the discussion.

Nuclear energy is an incredibly effective way of generating electricity and providing power to tens of thousands of households in the region it powers. By creating a fission reaction and breaking apart an atom of uranium, the power plant is able to create incredible amounts of energy. While the explanation of nuclear energy is simple, the true might of nuclear energy requires such exact and detailed calculations. Otherwise, situations such as the Meltdown at Chernobyl can occur. What is Fission? Fission is a reaction that takes a compound such as Read More

Share on:

How to Connect to WiFi

Last edited by . Total of no comments in the discussion.

Wi-Fi is a registered trademark for products that adhere to IEEE 802.11 standards. These products are certified by the Wi-Fi alliance and the Wi-Fi trademark is owned by them. The certification indicates that wireless devices can recognize and communicate with each other irrespective of their manufacturer. The Wi-Fi alliance is basically a syndicate of individual companies that work together to provide wireless products based on the same IEEE 802.11 standards. They provide certification for products based on a series of test events. If a product passes these tests, their manufacturer Read More

Share on:

How to Uninstall Windows Media Player

Last edited by . Total of no comments in the discussion.

Windows Media Player has been deployed with all installations of the Microsoft produced Windows Operating System for the past decade. The current versions of the application mix in social media sharing applications along with the ability to watch movies and listen to music. Although Microsoft has expanded the “friendliness” of Windows Media Player with non-proprietary multi-media file formats in recent versions, many users will have the desire or need to remove the player from their computer. Unfortunately, it is not a straight forward task to remove the player like it Read More

Share on:

Enterprise Data Management

Last edited by . Total of no comments in the discussion.

Every company, organization, and agency needs a way to efficiently retrieve, retain, organize, and present data. Because of this fact, many business and social entities use enterprise data management software and concepts to keep track of the information that keeps their business or organization alive and making a profit. There are many enterprise data management programs on the market and several important aspects that make up an enterprise data management system. In this article, we will go over what makes enterprise data management systems and several popular enterprise data management Read More

Share on:

FAIS (Fabric Application Interface Standard)

Last edited by . Total of no comments in the discussion.

FAIS (Fabric Application Interface Standard), is a project of the ANSI/INCITS T11.5 task group. The purpose of FAIS is to define a common Application Programming Interface (API) framework for implementing storage applications in a storage networking environment. FAIS was proposed in T11/03-305v2: Project Proposal For A New INCITS Standard Fabric Application Interface Standard (FAIS). A good overview of FAIS is A New Standard for Fabric Intelligence by Tom Clark. FAIS (Fabric Application Interface Standard) is presented here courtesy of The Enterprise Storage Management FAQ.

Share on:

CSMA/CD

Last edited by . Total of 19 comments in the discussion.

CSMA/CD (Carrier Sense Multiple Access / Collision Detection) is the protocol used in Ethernet networks to ensure that only one network node is transmitting on the network wire at any one time. Carrier Sense means that every Ethernet device listens to the Ethernet wire before it attempts to transmit. If the Ethernet device senses that another device is transmitting, it will wait to transmit. Multiple Access means that more than one Ethernet device can be sensing (listening and waiting to transmit) at a time. Collision Detection means that when multiple Read More

Share on: