Advert

ITIL Service Support

Last edited by . Total of no comments in the discussion.

Like anything else, ITIL software is backed up by the ITIL Service Support. ITIL, or Information Technology Infrastructure Library, is a system of software that has been approved by a standard of specifications under the authority of the British Office of Government Commerce. ITIL software generally falls under the category of customer service or system analysis. ITIL Service Support is used to help users with problems that they may experience with various ITIL software. In this article, we will go over and label the different parts of ITIL Service Support. Read More

Share on:

How to Perform a DNS Lookup

Last edited by . Total of no comments in the discussion.
DNS Lookup using IPConfig DisplayDNS Command

DNS, Domain Name System, is a complex hierarchical system which helps map Internet addresses with their respective machines over the World Wide Web. When a domain is created and hosted, a variety of information is linked with it. DNS Lookup is generally a process of digging out this related information for a specified domain name. This set of information could include pieces like domain availability, IP addresses, name servers, expiration date, registration/creation date, owner of the domain, etc. There are multiple ways to perform a DNS Lookup. Online Tools Many Read More

Share on:

What is a Zeroconf?

Last edited by . Total of no comments in the discussion.

Zeroconf (zero configuration networking) refers to several protocols and techniques that are used together to create an IP (Internet Protocol) network with no special configuration servers or manual operator intervention. These networks allow novices to connect computers, network devices, scanners, and printers to create a functioning network without requiring manual configuration. Zeroconf does not require the user to set up Domain Name System services (DNS), Dynamic Host Configuration Protocol (DHCP), or manually configure the computer’s network settings. The three primary technologies that comprise a zeroconf network are automatic resolution and Read More

Share on:

Composite Video

Last edited by . Total of no comments in the discussion.

A Composite Video is analog television signal's format before a sound signal is combined with it and modulated onto an RF carrier. It is the most common type of video interface that is used for receiving and sending an analog video signal to and from a television set. A CVBS (Composite Video with Burst and Sync) is usually used to designate a composite video and CVBS. Modulating the proper RF carrier frequency with composite video allows the composite video to be easily directed to any available broadcast channel. For most Read More

Share on:

What is a Cutoff Frequency?

Last edited by . Total of 1 comment in the discussion.

Cutoff frequency (corner or break frequency) is commonly used in the physics and electrical engineering fields. This frequency causes a device to stop operating in an efficient manner, resulting in it shutting down or being cut off. More technically, the cutoff frequency reduces energy flow through the device and prevents it from working as designed. That is to say, insufficient power prevents the device from operating efficiently. Cutoff Frequency Application Cutoff frequency is most commonly applied in the communications field. The phenomenon is found throughout many frequency ranges. If a Read More

Share on:

How OnStar Works

Last edited by . Total of 3 comments in the discussion.

OnStar was developed and deployed by General Motors for the purpose of providing fast and effective response in the event of vehicular accidents. OnStar has now been improved to provide more than the basic services. Now, it provides assistance with directions, car breakdown help as well as communications and leisure services. OnStar is a system for your automobile that performs many different functions, the most advertised being the fact that the company is alerted when you get in a car accident and they respond immediately by contacting you through the Read More

Share on:

DFS (Distributed File System)

Last edited by . Total of 1 comment in the discussion.

DFS (Distributed File System) provides a mechanism for administrators to create logical views of folders and files, regardless of where those files are physically located on the network. DFS also allows administrators to distribute shared folders and work loads across several servers for more efficient network and server resources use. Fault tolerance network storage resources are also available by using DFS. DFS is a service that provides a single point of reference and a logical tree structure for file system resources that may be physically located anywhere on the network. Read More

Share on:

Auger Electron Spectroscopy

Last edited by . Total of no comments in the discussion.

Pierre Auger discovered the Auger effect with x-rays that were involved in simultaneous cloud chamber usage. Auger observed that excited atoms emitted energetic electrons when the atoms relaxed. When the Auger effect was first discovered, it served little to the scientific community and was not utilized until the 1950s. The effect was then used to help improve the experimentation of chemical/compositional surface environments, in metallurgy, and in microelectronics. How Auger Electron Spectroscopy Works Auger Electron Spectroscopy is when specialized equipment that can test samples of materials is used to measure Read More

Share on:

Point-to-Point Protocol

Last edited by . Total of no comments in the discussion.

The Point-to-Point protocol (PPP) originally emerged as an encapsulation protocol for transporting IP traffic over point-to-point links. PPP also established a standard for the assignment and management of IP address, synchronous (start/stop) and bit-oriented synchronous encapsulation, network protocol multiplexing, link configuration, link quality testing, error detection, and option negotiation for such capabilities as network layer address negotiation and data compression negotiation. PPP supports these functions by providing an extensible Link Control Program (LCP) and a family of Network Control Program (NCP) to negotiate optional configuration parameters and facilities. In addition Read More

Share on:

ATM Skimmer

Last edited by . Total of 2 comments in the discussion.

An ATM skimmer is a card reader that is installed on some ATMs by criminals in order to steal the card numbers and PINs of the victims who use them. ATM skimmers vary in sophistication, but may be installed either directly within an ATM or next to it and may either interfere with the ATM’s regular functions or simply trick the victim into swiping his/her card. ATM skimming has been performed since the 1990s, but has recently become much more popular due to smaller computers and other advanced technologies.   Read More

Share on: