Water-based bomb inhibitors are water-filled devices that are used to attenuate or weaken the effects of a bomb blast. Water is used as a bomb inhibitor for these devices as water has a relatively high mass and is relatively available in almost any area. Water-based bomb inhibitors are successful in reducing blast and fragmentation by 90%. They also eliminate the risk of fire, reduce loss of property as well as casualty incidence. Furthermore, it preserves forensic evidence. It’s easy to install, too. Bomb inhibitors are gaining popularity all over the Read More
Ethernet at the Physical Layer
Ethernet is the most popular Local Area Network architecture that was jointly developed by Digital Equipment Corporation, Intel Corporation and Xerox Corporation. It consists of certain specifications and standards as well as hardware devices and components. Ethernet provides services corresponding to physical layer and data link layer of the OSI reference model. Each Ethernet physical layer protocol has a three part name that summarizes its characteristics. The components specified in the naming convention correspond to LAN speed, signaling method, and physical media type. The following table summarizes the differences between Read More
Data Governance
Data governance is a discipline found within the workforce where there is a grouping of data quality and management, risk management and business process management when dealing with the handling of data found in an organization. The ultimate goal with data governance is to have control — ideally positively — over the data in the organization. Specifically, they want to control the processes and methods in which the data is handled by their data stewards. The fundamental purpose of data governance, as described above, is to somehow mesh all the Read More
802.1X
802.1X is an IEEE standard for EAP encapsulation over wired or wireless Ethernet. 802.1X is also known as EAPoL (EAP over LAN). This only makes sense when you recall that EAP was originally designed for use over PPP. 802.1X Roles 802.1X defines three roles: Name Description Supplicant User or client requesting authentication Authentication Server The server providing authentication Authenticator The device which the Supplicant requests access to, and which requests access from the Authentication Server. 802.1X and RSN 802.1X is particularly well suited for wireless LAN applications because it requires Read More
DisplayPort
DisplayPort is the new digital display interface standard. It has been recently approved (5/2006) by VESA and will be hitting the markets in 2008. For most computer users, the fairly big and bulky VGA port is familiar. While the VGA port has been extremely reliable and has delivered competent performance, the new standard – the Display Port – is considered to be quite an upgrade from traditional VGA ports and is on par with HDMI. The DisplayPort will be mainly manufactured by large computer makers to send video, as well Read More
Iterations
An Iteration involves repeating some portion of a program, a specified number of time or until a particular condition is satisfied. This repetitive operation in C and C++ is achieved through for, while and do–while loop. How does a for loop work? A for loop is the easiest iteration loop to understand the C and C++ loops. All the loop elements are gathered at one place unlike the other loops, where, the loop elements are scattered all over the loop body. Syntax: for( initialization ; condition ; increment or decrement Read More
How to Backup iPhone SMS
The iPhone has continued to expand its user-base by offering them the ability to talk, email, chat, text, and surf the Internet on a single device. Unfortunately, many iPhone users lose or break their phones, which results in a loss of valuable data. Thankfully, users have the option of backing up all of their phone data, contacts, etc. on their computer in case something happens to the phone. There are also many third-party applications on the market that can be purchased to backup texts. However, the cheapest way to access Read More
How Does a Tablet PC Work?
Mobile computing has become nothing short of a necessity in the information age. Laptops, PDAs, and other digital communication and computer devices have quickly become imperative in conducting business for professionals that cannot be restrained to their office or homes all of the time. Rapid advances in technology have enabled device manufacturers to release products that were virtually unthinkable only a few short years ago. One of the most innovative and popular mobile computing innovations that has gained a great deal of popularity and support in recent years has been Read More
Streaming
Streaming is a process by which video is created and passed to a viewer in real time. For example, a live video that is being watched by someone around the world is known as a video stream. History of Streaming Streaming has always been of interest to computer users; however, because bandwidth was so expensive, it was difficult to transfer the video. However, when high speed Internet became more affordable for the average person a lot more people became interested in watching live feeds. Specifically, the reason that the average Read More
What is the Wii U?
The Wii U is the next sixth generation game console to replace the current Wii system. The Wii U was unveiled during the 2011 Electronic Entertainment Expo on June 7th, 2011 and is expected to be released in 2012. The Wii U was designed to compete with other game consoles on the market, such as the Xbox 360 and PlayStation 3, while providing HD quality and more advanced network infrastructure. While Microsoft and Sony are not expected to release any new hardware in the near future, the Wii U is Read More
Share on: