FCC ID stands for Federal Communications Commission Identification. An FCC ID is the number found in all computer hardware components. FCC ID numbers, usually found on the circuit boards, are helpful in finding information about the manufacturers of the hardware devices. An FCC ID has 2 elements. The first is a three-character Grantee Code which usually begins with an alphabetic character and does not contain 1s or 0s. The FCC permanently assigns this code to a company for authorization of radio frequency equipment. It represents the Grantee or Applicant and Read More
What is a PPPoA?
PPPoA (Point-to-Point Protocol over ATM) is a network protocol that encloses PPP frames into AAL5 and is primarily used with DSL and DOCSIS Internet providers. The PPPoA standard offers classic PPP features, including compression, encryption, and authentication support. When used for encapsulation on ATM networks, the protocol can reduce overhead by just over 0.5% when compared to the PPPoE standard, while supporting the VC-MUX and LLC based encapsulation types. PPPoA and PPPoE: A Comparison Both PPPoE (Point to Point over Ethernet) and PPPoA allow an Internet Service Provider to provide Read More
Virtual Memory
Computer users place great demands on their computers and computing devices today more than ever before. The size and complexity of modern sophisticated computer applications the vast amounts of information that is being stored, shared, and utilized daily requires that large amounts of computer memory remain available so the computer can access and present data in an effective manner. Virtual memory is a rather ingenious method of harnessing the computer's actual memory capacity and manipulating it using a combination of the operating system and memory hardware capabilities. Data can be Read More
Isochronic Tones
Isochronic tones are used in brain entrainment. When a single isochronic tone is repeated rapidly and a pause of silence follows each pulse, the brain produces a similar frequency. Isochronic tones can change a person’s mood, affect a person’s physical attributes, and produce effects such as lucid dreaming, out-of-body experiences, or hypnosis. Isochronic tones are similar to binaural and monaural beats but differ because they do not change. How Brain Entrainment Works Brain entrainment is a relatively new field of study that involves frequency production in the brain. When the Read More
How to Unblock Facebook
On occasion, Facebook and other popular sites such as Orkut, YouTube, and Hulu may block users. Fortunately, users may use a proxy to unblock themselves. However, this may not work as Facebook and similar sites rely heavily on javascript for basic functionality. That is to say, although the user will be able to visit the site, using any web proxy without javascript enabled will not work. Therefore, Javascript enabled proxies may solve this problem. Many proxies do not support this, but those that do are not enabled by default. There Read More
Serial ATA
Serial ATA is an enhancement to the ATA standard for for connecting storage to PC’s. All versions of ATA up until ATA-7 in 2004 utilized parallel transfer of data from the motherboard to the drive controller built onto the disk. The ATA-7 specification introduced Serial ATA. Serial ATA Standards The original Serial ATA standard offered miniminal improvement over the existing 133MBps bandwidth of the existing Parallel ATA standard. Serial ATA standards are constantly evolving to meet higher bandwidth requirements. Serial ATA Type Bandwith Bus Speed Signal Rate SATA-150 150MBps 1500MHz Read More
What Causes Dreams?
The cause of dreams is not known concretely. However, there are a series of theories that many psychologists present about the origin of dreams and, more importantly, the cause of them. Each theorist is unique and, until recently, few were based on science because there wasn't much neurological understanding. With the arrival of science, though, entirely different theories appeared about the different types of dreams. Freud on Dreams Sigmund Freud is known for saying that dreams were "the royal road to the unconscious." He felt that one could figure out Read More
Macintosh Spyware Removal Software
The Macintosh platform suffers from fewer spyware applications, and there are correspondingly fewer Mac spyware removal programs. MacScan MacScan is designed to detect, isolate and remove spyware, keystroke loggers, trojans, and bring awareness to remote administration type applications which could have been maliciously or inadvertently installed on your Macintosh. MacScan is available for Mac OS and Mac OS X containing the latest definitions for spyware. MacScan detects, isolates and removes: Spyware Keystroke Loggers Trojan Horses Administration Applications MacScan will locate these stealth software applications, warn you of their presence, and Read More
Magnetic Water Treatment
It is common for those who receive hard water all over the world to attempt to find a plausible technique or treatment system to soften the water. Magnetic water treatment is a way to eliminate or reduce the water’s hardness. This technique is also referred to as Anti-scale Magnetic Treatment” (AMT). Those who magnetically treat water claim that passing water through a strong magnetic field changes water molecules and eliminates the need to chemically soften water. These claims are quite controversial as they have not been proven scientifically. How Does Read More
NMI Parity Check/Memory Parity Error
Windows Operating System (OS) users may encounter the NMI Parity Check/Memory Parity Error during the computer start-up process. The error is normally displayed when a computer hangs or stops responding during the Windows start-up process, and may be the result of a number of hardware or hardware configuration problems. What does the NMI Parity Check/Memory Parity Error Look Like? A number of error codes can be displayed when the error occurs. These include: NMI: Parity Check/Memory Parity Error, NMI: Bus Timeout, NMI: Software NMI generated, NMI: Eisa IOCHKERR board x, Read More
Share on: