8PSK (8 Phase Shift Keying) is a phase modulation algorithm. Phase modulation is a version of frequency modulation where the phase of the carrier wave is modulated to encode bits of digital information in each phase change. The “PSK” in 8PSK refers to the use of Phased Shift Keying. Phased Shift Keying is a form of phase modulation which is accomplished by the use of a discrete number of states. 8PSK refers to PSK with 8 sates. With half that number of states, you will have QPSK. With twice the Read More
UMASK
umask is a Unix shell built-in command that automatically sets file permissions on newly created files. The umask command can be confusing to use because it does work as a mask. In other words, the user sets the permissions that he/she does not want in the umask. To calculate permissions that will result from specific umask values, subtract the umask from 777. Note, however, that files are not usually created with the execute permission by default, so the final permissions for files will omit the “x” permission. For example, if Read More
Alternatives to Google AdSense
Google AdSense is the leader in web-based content-sensitive marketing. Webmasters place Google AdSense JavaScript code on their web pages and Google AdSense serves advertisements based on the web page’s content. Some webmasters are either not accepted into the Google AdSense program or do not wish to do business with Google. For those webmasters, there are many alternatives to Google AdSense: 24-7 RealMedia adagency1 AdBrite AdDynamix AdEngage Adgenta AdKnowledge AdPepper Adtegrity Advertising.com AffiliateFuture BardzoMedia Bidvertiser BlinkAds Burst Media Casale Media Chitika ClickBooth Clicksor ClickThruTraffic ClickXchange ClixGalore Commission Junction Read More
How a Smart Card Reader Works
Smart Card Readers are also known as card programmers (because they can write to a card), card terminals, card acceptance device (CAD), or an interface device (IFD). There is a slight difference between the card reader and the terminal. The term ‘reader’ is generally used to describe a unit that interfaces with a PC for the majority of its processing requirements. In contrast, a ‘terminal’ is a self-contained processing device. Smart cards are portable data cards that must communicate with another device to gain access to a display device or Read More
How to Use Microsoft Word
What is Microsoft Word? Microsoft Word is a powerful text editor that comes with the Microsoft Office software bundle. Microsoft Word allows the user to edit text in a wide variety of ways through the use of font styles, font sizes, layouts, background and foreground colors, tables, links, and more. Microsoft Word is also able to process text in a number of languages and provides the user with a current word count, character count, and page count. Microsoft Word saves documents in the .doc and .docx file formats and can Read More
Laser
Laser is the abbreviation of the term "light amplification by stimulated emission of radiation." It is an apparatus that emits a special form of light. The emission of light by a laser is known as stimulated emission. The essential parts of a laser are a gain medium and an optical cavity. There should also be an external source of energy to be supplied to the gain medium. Gain medium is a material that has got the characteristics to amplify light. The gain medium in a laser can be a material Read More
FTP (File Transfer Protocol)
FTP (File Transfer Protocol) is the generic term for a group of computer programs aimed at facilitating the transfer of files or data from one computer to another. It originated in the Massachusetts Institute of Technology (MIT) in the early 1970s when mainframes, dumb terminals and time-sharing were the standard. Traditionally, when communications speeds were low (ranging from the then-standard 9.8 kbps to the "fast" 16.8 Kbps unlike today's broadband 1 Mbps standard) FTP was the method of choice for downloading large files from various websites. Although the FTP programs Read More
Tunneling
Tunneling is a way in which data is transferred between two networks securely. All the data being transferred is fragmented into smaller packets or frames and then passed through the tunnel. This process is different from a normal data transfer between nodes. Every frame passing through the tunnel will be encrypted with an additional layer of tunneling encryption and encapsulation, which is also used for routing the packets to the right direction. This encapsulation would then be reverted at the destination with decryption of data, which is later sent to Read More
NTSC (National Television Systems Committee)
NTSC (National Television Systems Committee) is the standard for analog television transmission in the United States and many other counties worldwide. NTSC was developed in 1953 by the National Television System Committee. Alternatives to NTSC were developed later, including PAL and SECAM. NTSC provides 482 lines of vertical resolution and 16 million colors. NTSC transmits 525 lines, but some lines are used for sync, vertical retrace, and closed captioning. NTSC delivers 29.97 frames per second. NTSC does this by delivering 59.94 interlaced half-frames per second. Interlacing is a technique of Read More
DMAIC
DMAIC is a basic Six Sigma methodology component- a way to improve work processes by eliminating defects. The Six Sigma methodology is widely used in many top corporations in the United States and around the world. It is normally defined as a set of practices that improves efficiency and eliminate defects. Six Sigma has been around for more than 20 years and TQM (Total Quality Management) and Zero Defect principles have heavily influenced it. In its methodology, it asserts that in order to achieve high quality manufacturing and business processes, Read More
Share on: