Windows and other operating systems have a WiFi signal strength meter, but this is usually basic software and does not really tell the user much about the wireless signal. Fortunately, there are many other programs that do the same thing, but show the user more details about the wireless connection. We will describe some of these programs. Net Stumbler Net Stumbler does several things. It is a wireless signal strength meter that gives detailed reports to the user about the wireless network. Net Stumbler also provides the user with a Read More
What is Tethering?
Tethering means using a mobile phone (or any other Internet-capable device) as a modem for a laptop or other Internet capable units. A phone that can access the Internet is connected to the other device with a USB cable or Bluetooth connection. If a mobile plan allows the phone to be tethered, you can save money, because you don’t have to pay for multiple Internet data plans. What Are the Benefits of Tethering? Internet tethering connects a 3G or 4G enabled phone with a laptop or other devices (that don’t Read More
VoIP Codecs
A codec (Coder/Decoder) converts analog signals to a digital bitstream, and another identical codec at the far end of the communication converts the digital bitstream back into an analog signal. In the VoIP world, codecs are used to encode voice for transmission across IP networks. Codecs for VoIP use are also referred to as vocoders, for "voice encoders". Codecs generally provide a compression capability to save network bandwidth. Some codecs also support silence suppression, where silence is not encoded or transmitted. Codec Algorithm Bit Rate (Kbps) Comments ITU G.711 PCM Read More
Firefox Extensions
Firefox Extensions are programs in Firefox that allow users to edit the way Firefox works and add new functions to their browser. Firefox Extensions are most commonly used to add RSS readers and text editors to Firefox, but can be used for a wide variety of purposes. While “Firefox Extensions” can actually be used with many different Mozilla products, they are more popular for use in Firefox as it is, by far, the most popular Mozilla product. Firefox Extensions can also be created by any Firefox user, but are usually Read More
How to Connect an Xbox 360 to the Internet
One of the perks of the seventh generation video game consoles–those that are currently out–is that they have the ability to connect to the Internet and allow users to play against people around the world. The Xbox 360 is one of these consoles that, with the help of Xbox Live, can connect to the Internet. So long as the game has an online feature–which most have now–you can play for as long as you want against anyone else that is playing. The first step in connecting to the Internet is Read More
eSATA (External Serial Advanced Technology Attachment)
eSATA stands for External Serial Advanced Technology Attachment. It is meant to be an external interface for SATA technologies. SATA or Serial ATA (Advanced Technology Attachment) is the next generation of drive interfaces, its predecessor being the Parallel ATA (PATA). PATA Anyone who has opened up their computer must have noticed the flat, 40-wire parallel cables that are used to connect the hard disk, CDROM and other devices to their respective controllers; these are typical PATA connections. PATA has been the standard in connectivity for a while and served the Read More
Device Driver has corrupted the executive memory pool
If you receive an error message which reads: Windows error "Device Driver has corrupted the executive memory pool., it basically means that there is a corruption with a driver somewhere on your system. This issue can occur when an attempt to touch invalid memory at a process IRQL that is too high occurs. This is almost always caused by drivers that have corrupted the system pool. The number one cause for this problem is overwriting the end of a memory buffer; this overwrites the pool header for the NEXT block Read More
How to Control Documents
As organizations grow, their potential to increase the collaboration potential of on-line technologies also grow. Therefore, the need to implement document production control early in a project’s life cycle has proven to be critical to success. Some may argue that document control is another layer of bureaucracy. However, for projects that involve many contributors, document controls make it easier for team members to find the most updated, relevant content that pertains to their interests or the assigned sub-components of a project. Understanding how to control documents is fundamental to setting Read More
How a Nuclear Bomb Works
A nuclear bomb uses a nuclear reaction to generate energy (heat and radiated particles). The energy released is millions or in some cases billions of time stronger than TNT; the whole process is carried out in a very short time, providing huge destructive power. There are two types of nuclear reactions, fission and fusion. During fission the nucleus are broken apart and in fusion, they collapse one toward the other. Extremely heavy elements as uranium and plutonium are used in fission bombs and hydrogen (the lightest element) is used for Read More
Geostationary Satellite
Geostationary satellites are located exactly above the earth’s equator and revolve around the earth in a circular orbit. Their revolving speed and direction (west to east) are exactly same as that of the earth, which makes it look stationary from the earth’s surface. The exact altitude of these satellites above the equator is approximately 36,000 Kilometers (22369 Miles). A geostationary satellite has to be at a set distance above the earth or it will suffer altitude decay. If it is too far from the Earth, it will escape the Earth’s gravitation Read More
Share on: