- A Practical Introduction to Data Structures and Algorithm Analysis Third Edition (C++ Version) (1.96 MB) In this paper, there is explicit coverage of some design patterns that are encountered when programming the basic data structures and algorithms covered in the book.
- Algorithms and Data Structures (659.21 KB) This paper explains about Resources, Sorting, Data Structures, Trees, Graphs and Analysis of Algorithms.
- Algorithms and Data Structures (1212.14 KB) This paper explains about Fundamental Data Structures, Sorting, Recursive Algorithms, Dynamic Information Structures and Key Transformations (Hashing).
- Data Structures and Algorithms (1095.32 KB) This paper gives a broad understanding of commonly used data structures and their related algorithms.
- Education and Assessment Model (56.09 KB)
- Grammar, Punctuation and Capitalisation (283.6 KB)
- How To Get Published in Scientific Journals (822.02 KB)
- Improving Your Technical Skills (140.22 KB)
- Internet Security - Protecting your Emails (3.44 MB)
- Mathematical Writing (652.33 KB)
- On the Genus of Pancake Network (201.07 KB) We will investigate the upper bound and lower bound for the genus of pancake graph and compare these values with the genus of the star graph as well as that of the hypercube.
- On the implementation of data structures through theory of lists (252.05 KB) The notions of fuzzy lists and intuitionistic fuzzy lists are new and least attended concepts and the works in this paper opens a new application area to develop fuzzy and intuitionistic fuzzy data structures.
- On-line Testing of Software Components for Diagnosis of Embedded Systems (393.22 KB) This paper studies the dependability of component based applications, especially embedded ones, from the diagnosis point of view.
- Ontology for automatic acquisition web user information (385.5 KB) The ontology model is evaluated by comparing it against benchmark models in web information gathering. The results show that this ontology model is successful.
- Ontology visualization protégé tools - A review (909.06 KB) The purpose of this work is to present a study on application of these four methods in the development of different kinds of protege visualization tools and categorize their characteristics and features.
- Ontology-Based Web Query Classification for Research Paper Searching (109.78 KB) We propose Query Classification Algorithm (QCA) for automatic topical classification of web queries based on domain specific ontology.
- Optimal Bidding Strategies using New Aggregated Demand Model with Particle Swarm Optimization (106.86 KB) In this paper, Particle Swarm optimization(PSO) and Artificial Bee Colony (ABC) algorithms are used to determine the optimal bidding strategy in competitive auction market implementation.
- Outlier detection for dynamic data streams using weighted K - means (140.47 KB) This paper presents a new k-means type clustering algorithm that can calculate weights to the variables. This method is efficient for dynamic data streams in order to overcome the global optimum problems
- Participation anticipating in elections using data mining methods (407.22 KB) In this paper, we provide a general schematic of the architecture of participation anticipating system in presidential election by using KNN, Classification Tree and Naïve Bayes and tools orange based on crisp.
- Pattern Recognition Algorithms for Cluster Identification Problem (178.73 KB) In this paper we have used pattern recognition algorithms for representing the graphs and solve the cluster identification problem using K-Means-Mode, single linkage clustering and K-Nearest Neighbor Algorithm.
- Performance Analysis of Edge Detection Methods on Hexagonal Sampling Grid (435.96 KB) In this paper, Edge detection using masks on hexagonal grid, CLAP algorithm on rectangular domain and hexagonal domain, Wavelet based edge detection on rectangular domain are performed.
- Performance Analysis of List Scheduling in Heterogeneous Computing Systems (345.31 KB) In this paper, we analyze the worst-case performance of the list scheduling algorithm for scheduling tasks of a parallel program in a mixed-machine heterogeneous computing system such that the total execution time of the program is minimized.
- Performance Analysis Of Secured Synchronous Stream Ciphers (190.05 KB) Many designs stream ciphers have been proposed in an effort to find a proper candidate to be chosen as world standard for data encryption.
- Performance Evaluation of Password Authentication using Associative Neural Memory Models (291.18 KB) In this paper we proposed performance analysis of password authentication schemes using Associative memories and CSAM using graphical Images.
- Person Identification Using Peg Free Hand Geometry Measurement (221.09 KB) This paper presents the study of personal identification using hand geometry features. The identification is done using Euclidian distance. Results are tested on real time database as well as standard database.
- Plagiarism Detection System (209.34 KB) The important techniques for this system are Merge Sort, Binary Search and Regular Expressions. Also the essence of ordering these techniques to achieve desirable goal in a short span of time is explained.
- Poincare geometry-characterized arrhythmia identification scheme in grid (376.38 KB) This paper propose a new scheme of Poincare geometry-characterized ECG analysis for cardiac disease identification. The Poincare descriptors are evaluated using two kinds of ECG signal R-R intervals and P-P intervals from Physio Bank.
- Position aware and QoS based Service Discovery using TOPSIS for Vehicular Network (128.34 KB) This study proposes Position Aware and QoS based Service Discovery Protocol using TOPSIS (PQoSVSDP).
- Preserving the Privacy and Sharing the Data Using Classification on Perturbed Data (185.49 KB) Data mining tools predict future trends and behaviors, allowing businesses to make proactive, knowledgedriven decisions. Even though data mining successfully extracts knowledge to support a variety of domains
- Printed Document Watermarking Using Phase Modulation (140.42 KB) This paper describes a novel visual information concealment technique, referred to as optical watermarking, for the authentication of original printed documents.
- Prioritized Heterogeneous Traffic-Oriented Congestion Control Protocol for WSNs (503.14 KB) We present detailed analysis and simulation results with the description of our protocol to demonstrate its effectiveness in handling prioritized heterogeneous traffic in Wireless Sensor Networks (WSNs).
- Privilege escalation attack on android and its counter measures (78.68 KB) In this paper we discuss the basics of the privilege escalation attack and the various techniques used to counter and prevent this problem.
- Prototyping of an e-commerce mobile marketing system (895.01 KB) This paper presents the design and prototype of an e-commerce mobile marketing system resolving user acceptance criteria, such as information personalization, privacy protection, up-to-date content and social network.
- Providing a semi-central model for web service composition (266.82 KB) In this research, providing a suggestive model, we performed service orchestration semi-centrally.
- Realizing the need for similarity based reasoning of cloud service discovery (204.15 KB) With the growing abundance of information on the web, it becomes the need of the hour to enrich data with semantics that can be understood and processed by machines.
- Reduplicated MWE helps in improving the CRF based Manipuri POS tagger (406.91 KB) This paper gives a detail overview about the modified features selection in CRF (Conditional Random Field) based Manipuri POS (Part of Speech) tagging.
- Remote sensing and control for establishing and maintaining digital irrigation (213.24 KB) The project deals with data gathering from remote site and issuing control signals to remote appliances in the site; all performed through internet.
- Research on Weakly Hard Real-Time Constraints and Boolean Combination to Support Adaptive QoS (1022.1 KB) This paper researches on weakly hard real-time constraints and their combination to support QoS.
- Review and Analysis of the Issues of Unified Modeling Language for Visualizing, Specifying, Constructing and Documenting (509.42 KB) In this paper,the UML addresses the specification of all important decisions regarding analysis, design and implementation.It enables us to explicitly capture those models that are to be future reference or plain complementary documentation
- Review LRU Algorithm to Implement Proxy Server with Caching Policies (87.97 KB) In order to produce and develop a software system, it is necessary to have a method of choosing a suitable algorithm which satisfies the required quality attributes and maintains a trade-off between sometimes conflicting ones.
- Role of ICT in Reverse Logistics: An Analytical Approach (83.55 KB) This paper highlights certain specific domain where Information and Communication Technology and Network and Communication Technology are used optimally.
- Role of voronoi diagram approach in path planning (137.02 KB) The usefulness of Graph Theoretic approaches mainly the voronoi diagram is provided for the path planning in static and dynamic environment in this paper.
- Routing for Wireless Mesh Networks with Multiple Constraints Using Fuzzy Logic (377.27 KB) To make routing decisions based on more than one constraint,buffer occupancy, node energy and to provide an efficient routing method for wireless mesh networks, a fuzzy multi - constraint AODV routing is proposed in this paper.
- Scheduling and Allocation Algorithm for an Elliptic Filter (1383.37 KB) In this paper execution time and resource utilization is calculated using different scheduling algorithm for an Elliptic Filter and that proposed Scheduling and Allocation increases the speed of operation by reducing the control step.
- Scheduling different customer activities with sensing device (223.25 KB) In this paper, control strategies are identified for allocating different types of tasks (activities) to individual computing elements like Smartphone or microphones.
- Secure Biometric Cryptosystem for Distributed System (226.44 KB) Our work includes the determination of appropriate key sizes with security issues and determines the matching performance using MATLAB and JDK1.6, performance of this system is more than 86.7%.
- Secure storage of data using cryptography for network (313.14 KB) In this paper we have proposed one such algorithm to allow users to share data on a global server within an organization at the same time, allow access to genuine users.
- Secure text message in a 4G compatible MIMO MCCDMA system with Vigenere Cipher and RSA (337.96 KB) In this paper, a comprehensive performance evaluative study has been made on a secured MIMO MCCDMA wireless communication system with implementation of Minimum Mean Square Error and Zero- Forcing Linear channel equalization schemes.
- Secured tree based key management in wireless broadcast services (474.8 KB) In this paper, we propose an efficient key management scheme, namely, Secured Tree Based Key Management (STBKM), to handle key distribution with regard to complex subscription options and user activities.
- Security framework secure cloud with swift identity management framework (478.42 KB) This paper proposes the integration of SWIFT identity management framework into the module using the existing trust relationships in SecureCloud to enhance the security of the SecureCloud framework.
- Semantic information retrieval using ontology in university domain (317.87 KB) The objective of the work done here is to design, develop and implement a semantic search engine- SIEU(Semantic Information Extraction in University Domain) confined to the university domain.
- Semantic knowledge acquisition of information for syntactic web (345.89 KB) In this paper we have explained the concept of converting an HTML page to RDFS/OWL page.
- Semantic Query Optimisation with Ontology Simulation (628.98 KB) This paper proposes an optimised semantic searching of keywords exemplified by simulation an ontology of Indian universities.
- Semantic swarm intelligence for candidate links (501.73 KB) In the proposed system, a hybrid technique combining both the Semantic Ranking and Pheromone Swarm is implemented.
- Semantic web techniques for yellow page service providers (1791.69 KB) This paper explores an alternative – a highly distributed system design meeting a variety of needs – considerably reducing efforts required at a central organization.
- Semi symmetric method of san storage virtualization (89.19 KB) This paper, describing about new proposed method for virtualization, which would be overcome limitations of existed methods for storage virtualization.
- Skin colour segmentation finite bivariate pearsonian type - IIb mixture model (468.02 KB) In this paper we develop and analyze a new skin colour segmentation based on HSI colour space using bivariate Pearsonian type-IIb mixture model.
- Sliding controller design for global chaos synchronization. (127.13 KB) This paper establishes new results for the sliding controller design for the global chaos synchronization of identical hyperchaotic Yujun systems
- SMS Text Compression through IDBE for Effective Mobile Storage Utilization (117.63 KB) The objective involved is designing a semantic dictionary based on Intelligent Dictionary Based Encoding (IDBE) which provides a high text compression ratio to utilize the space in phone’s memory.
- Software design and development of online monitoring system in soc encounter (369.42 KB) This paper presents the design and development of an online monitoring system that collects data over time or distance with a built-in instrument or sensors.
- Software Maintenance Severity Prediction with Soft Computing Approach (858.1 KB) In this paper, we have explored the different predictor models to NASA’s public domain defect dataset coded in Perl programming language.
- Software metrics and Maintainability Relationship with CK Matrix (85.04 KB) This paper presents the relation between software metrics and maintainability and the metrics which characterise the ease of the maintenance process when applied to a specific product.
- Solutions Manual for A Practical Introduction to Data Structures and Algorithm Analysis (414.21 KB) This paper has all the solutions to the exercises from the textbook A Practical Introduction to Data Structures and Algorithm Analysis, 2nd edition.
- Solving a multi-objective reactive power market clearing model using NSGA-II (293.96 KB) This paper presents an application of elitist non-dominated sorting genetic algorithm (NSGA-II) for solving a multi-objective reactive power market clearing (MO-RPMC) model.
- Speaker identification using a nonlinear speech model and Ann (807.95 KB) This paper introduces a nonlinear speech model for improved speaker identification. We modelled the speaker identity using Reconstructed Phase Space of the speech signal and the Phase Space Point Distribution (PSPD) parameters.
- Standard Designs and Their Relatinships (61.52 KB)
- Star varietal cube: A New Large Scale Parallel Interconnection Network (211.51 KB) This paper proposes a new interconnection network topology, called the Star varietal cube SVC(n,m), for large scale multicomputer systems.
- Study of Structural, FT-IR and Nonlinear optical properties of Lithium iodate (507.48 KB) Crystals of lithium iodate were grown by simple evaporation method. Crystals having prism and prismatic pyramidal shapes were obtained.
- Suitability of service oriented architecture for solving GIS problems (736.28 KB) This paper analyzes the architecture and main features of Geographic Information Systems and aims at discussing some important problems emerged in the research of applying GIS in the organizations.
- Survey & taxonomy of key management protocol for wired, wireless networks (252.24 KB) The purpose of this paper is to survey the key management protocols for wired and wireless networks and study their security aspects in terms of key generation, agreement and distribution.
- System-level Optimizations for Memory Access in the Execution Migration Machine (293.82 KB) In this paper, we describe system-level optimizations for the Execution Migration Machine, a novel shared-memory architecture to address the memory wall and scalability issues for large-scale multicores.
- Technical and Financial Analysis of Photovoltaic Water Pumping System for GORGAN, IRAN (373.63 KB) In this paper, we precede the technical and financial study on photovoltaic water pumping system for irrigation of GORGAN’s farm fields (one of Northern Province of Iran) with the RETScreen software tools.
- Technical Challenges of Forensic Investigations in Cloud Computing Environments (175.83 KB) This paper focuses on the technical aspects of digital forensics in distributed Cloud environments.
- Technical Reading and Writing (108.18 KB)
- Technical Writing Made Easier (232.81 KB)
- Testing and Evaluation of a Secure Integrity Measurement System (SIMS) for Remote Systems (293.49 KB) We have designed a novel system called a Secure Integrity Measurement System (SIMS) to provide a practical integrity for flexible and traditional remote systems.
- Texture classification using weighted probabilistic neural networks (126.49 KB) In this project, the novel temporal updating approach is developed for weighted probabilistic neural network (WPNN) classifiers that can be used to classify the textures.
- The ability to provide software engineering graduates to software industry (91.86 KB) A brief discussion about software engineering graduates and educators will be presented in this paper after that it will determines whether there are well qualified software engineering graduates in the Jordanian universities.
- The Benefits of Using Rigorously Tested Routines from Numerical Libraries (275.49 KB) This paper describes the computationally intensive mathematical and statistical methods that are the basis of research and development of geographic information systems.
- The Design of Self-Organising Evolved Polynomial Neural Networks (312.54 KB) In this paper, we discuss a new design methodology for Polynomial Neural Networks in the framework of Learnable Evolution Model.
- The Mayfield Handbook of Technical and Scientific Writing (354.11 KB)
- The Web and Automation (34.89 KB)
- Tracking of moving object in wireless sensor network (156.65 KB) An Energy Efficient Prediction-based Clustering algorithm is proposed to track the moving object in wireless sensor network. This reduces the number of hops between transmitter & receiver nodes,also the number of transmitted packets.
- Triangular fuzzy multinomial control chart with variable sample size (146.86 KB) The main objective is to monitor the performance of a process over time in order for the process to achieve a state of statistical control.
- Trust Based Access Control for Social Networks (STBAC) (89.67 KB) This paper proposes a trust access control called Trust Based Access Control for Social Network, or STBAC, which allows users to share data among their friends, using a trust computation to determine which friends should be given access.
- Two-sided neighbours for block designs with neighbouring effects (83.93 KB) A method for finding left-neighbours and right-neighbours of a treatment in a Balanced Incomplete Block Design incompletely balanced for neighbour competition effects has been suggested in this paper.
- UID Registration via Cloud (746.72 KB) Implementation of UID via Cloud is very easy and can be access by any one and everywhere. As we use private cloud so, Security is not an issue.
- Unit Selection Algorithm Using Bi-grams Model For Corpus-Based Speech Synthesis (320.24 KB) In this paper, we present a novel statistical approach to corpus-based speech synthesis.
- Various statistical classifiers in detecting the diseased citrus leaves (228.73 KB) This research aims to amend citrus production, which knows a low upshot bourgeois on the production and complex during measurements. Nowadays citrus plants grappling some traits/diseases.
- Vehicle license plate recognition using morphology and neural network (427.67 KB) The segmentation result which is sent forward to LP recognition stage will improve further processing’s efficiency.
- Verification of Cooperative Transient Fault Diagnosis and Recovery in Critical Embedded Systems (282.34 KB) The paper is intended to verify the safety and liveness properties that the protocol must satisfy. The correctness of the protocol is verified by the PVS theorem prover.
- Virtual key force (92.46 KB) Securing the sensitive data and computer systems by allowing ease access to authenticated users and withstanding the attacks of imposters is one of the major challenges in the field of computer security. Traditionally
- Virtual private network strategies in the computer communication (142.44 KB) The VPN also uses the authentication information to check that the original data has not been corrupted during transmission, ensuring the integrity of the data.
- Web User Opinion Analysis for Product Features Extraction and Opinion Summarization (278.62 KB) In order to help the customer and the manufacture/merchant we propose a semantic based approach to mine different product features and to find the opinion summarization about each of these extracted product features.
- Weight functions for signal reconstruction based on level crossings (554.04 KB) This paper presents a new threshold level allocation schemes for level crossing based on nonuniform sampling.
- Zest Based Visualization for Requirements Negotiation (239.79 KB) We have formulated a conceptual diagram on which to base the design and development process of the groupware for implementing the Zest algorithm.
- Analysing Algorithms This paper explains about the analysis of insertion sort.
- Artificial Intelligence: Fuzzy Logic Explained This paper explains the fuzzy logic in artificial intelligence.
- Hierarchical State Machines in the Automation Process This article will introduce you to the concept of a Hierarchical State Machine (HSM) and show you how this approach works so well in software engineering for the automation industry.
- Project management of government IT projects This paper deals with system requirement specification and benefits of compiling SRS.
- Software Prioritizes Loop Repairs This paper explains about the software which identifies poorly performing control loops,quantifies the cost of each loop's poor performance and indicates the control loops where optimum performance will yield greatest economic benefit.
- DBMS Overview This paper explains about the characteristic of DBMS.
- DBMS Architecture This paper explains about the 3-tier architecture.
- DBMS Data Models This paper explains about the Entity-Relationship model.
- DBMS Data Schemas This paper explains about the database schema and instance.
- DBMS Data Independence This paper deals with logical and physical data impedance.
- ER Diagram Representation This paper explains about the ER diagram representation.
- Generalization Aggregation This paper deals with generalization,aggregation and inheritance.
- Codd's 12 Rules This paper explains about the Codd's 12 rules.
- Relation Data Model This paper explains about the concepts and constrains of relation data model.
- Relational Algebra This paper explains about the fundamental operations of relational algebra in database management system.
- ER Model to Relational Model This paper explains about the mapping entity diagram to relationship contents.
- SQL Overview This paper explains about the SQL set of commands to define database schema.
- DBMS Normalization This paper explains about the various forms of DBMS normalization.
- DBMS Joins This paper explains about the various types of joins.
- DBMS Storage System This paper explains about the Redundant Array of Independent Disks (RAID).
- DBMS File Structure This paper explains about the various types of file organization.
- DBMS Indexing This paper deals with the order of indexing and structure of B+ tree insertion.
- DBMS Hashing This paper deals with static and dynamic hashing.
- DBMS Transaction This paper explains about the DBMS transaction.
- DBMS Concurrency Control This paper explains about the two categories of concurrency control.
- DBMS Deadlock This paper explains about the deadlock prevention schemes.
- DBMS Data Backup This paper explains about the database and remote backup.
- DBMS Data Recovery This paper explains about the DBMS data recovery.
- Software Testing Overview This paper explains about the verification and validation of software testing.
- Testing, Quality Assurance and Quality Control This paper explains about the testing, quality assurance and quality control.
- Software Testing ISO Standards This paper explains about the software testing ISO standards.
- Software Testing Types This paper explains about the various types of software testing.
- Software Testing Methods This paper explains about the various methods in software testing.
- Levels of Software Testing This paper explains about the various levels of software testing.
- Software Testing Documentation This paper explains about the some commonly used documented artifacts related to Software testing .
- Types of Operating System This paper explains about the various types of operating system.
- Operating System - Properties This paper explains about the properties of operating system.
- Operating System - Processes This paper explains about the process states of operating system.
- OS - Scheduling algorithms This paper explains about the four major scheduling algorithms.
- Operating System - Multi-Threading This paper explains about the mulithreading in operating system.
- OS - Memory Management This paper explains about the memory management in operating system.
- Operating System - Virtual Memory This paper explains about the page replacement,FIFO and optimal page algorithms.
- Operating System - I/O Hardware This paper explains about the i/o hardwares in operating system.
- Operating System - I/O Softwares This paper explains about the i/o softwares in operating system.
- Operating System - File System This paper explains about the file structure.
- Operating System - Security This paper explains about the various securities in operating system.
- Operating System - Linux This paper explains about the components of linux system.
- SDLC Overview This paper explains about the software development life cycle.
- SDLC Waterfall Model This paper explains about the waterfall model design.
- SDLC Iterative Model This paper explains about the iterative model design.
- SDLC Spiral Model This paper explains about the spiral model design.
- Analysing Algorithms This paper explains about the analysis of insertion sort.
- Backtracking This paper explains about the backtracking algorithm.
- Brute Force Algorithm This paper explains about the brute force algorithm.
- Binomial Heap This paper explains about the binomial heaps can be minimum heaps or maximum heaps.
- B-Tree This paper explains about the basic operations on B-tree.
- Stack This paper explains about the basic operation of stack.
- Tree This paper explains about the binary search tree.
- Dictionary This paper explains about the static,semi-dynamic and fully dynamic dictionaries.
- Hash Table This paper explains about the hash tables.
- Divide & Conquer Algorithms This paper explains about the divide and conquer algorithms.
- Dynamic Programming This paper explains about the dynamic programming.
- Graph Algorithms This paper explains about the flavour of graphs.
- Data Structure for Graphs This paper explains about the data structure for graphs.
- Breadth First Search Algorithm This paper explains about the algorithm based on Breadth First Search (BFS).
- Depth First Search Algorithm This paper explains about the algorithm based on Depth First Search (DFS).
- Topological Sorting This paper explains about the topological sorting.
- Single Source Shortest Path This paper explains about the Variant of single-source shortest problems.
- Dijkstra's Algorithm This paper explains about the steps in dijkstra's algorithm.
- Bellman Ford Algorithm This paper explains about the bellman ford algorithm.
- Greedy Algorithm This paper explains about the problems with greedy algorithm.
- Searching Algorithms This paper explains about the various search algorithms.
- Sorting Algorithms This paper explains about the things to be considered and comparison based on sorting algorithms.
- Selection Sort Algorithm This paper explains about the implementation of selection sort algorithm.
- Insertion Sort Algorithm This paper explains about the worst and average case analysis of insertion sort algorithm.
- String Matching Algorithms This paper explains about the string matching algorithms.
- SQLGraph This article explains about the SQL Graph.
- System Components This paper explains about the types of system components.
- Proposals for Achieving Mutual Exclusion This paper explains about the proposals for achieving mutual exclusion.
- Semaphores This paper explains about the mutual exclusion in the concepts of semaphores.
- Necessary and Sufficient Deadlock Conditions This paper explains about the four conditions that must hold simultaneously a deadlock condition.
- Deadlock Prevention This paper explains about the four conditions are necessary for deadlock to occur.
- Deadlock Avoidance This paper explains about the approach to avoid deadlock problem anticipates before it actually occurs.
- Priority Scheduling This paper explains briefly about the priority scheduling.
- Solaris-2 Operating Systems This paper explains briefly about the solaris 2 operating system.
- CPU/Process Scheduling This paper explains briefly about the cpu/process scheduling.
- Operating Systems Services This paper explains about the five services provided by an operating systems to the convenience of the users.
- How to Find the Password on a Router This paper explains about the how to find the password on a router.
- What Is VPN This paper explains about the Virtual Private Network (VPN).
- How Does a Router Work This paper explains about the working of router.
- How to Secure Your Wireless Network Connection This paper explains about the secure wireless network connection.
- Crappy Antennas Wreck Wireless Networks This paper explains briefly about the crappy antennas wreck wireless networks.
- How Do I Increase Wireless Signal Strength This paper explains about the increase in wireless signal strength.
- Why Do I Need a Router This paper describes a router needs.
- ER Model : Basic Concepts This paper explains about the types of atributes and the mapping cardinalities.
- An Overview of EFS This paper explains about the overview of EFS.
- Arithmetic Expressions This paper explains about the types of expressions.
- ADSL Modems This paper explains about the troubleshooting an ADSL modem.
- Assertion in C This paper explains about an assertion in C.
- Automation Testing Vs Manual Testing This article explains about the Manual Testing and Automation Testing.
- Boundary Value Analysis and Equivalence Class Partitioning With Simple Example This article explains about the Boundary value analysis and equivalence partitioning with its simple examples.
- C Bitwise Operators This paper explains about the bitwise operators in C.
- C Constants This paper explains about the C constants.
- C Data Types and Sizes This paper explains about the data types and sizes in C.
- Conditional Access System This article describes about a type of system used in Internet and television broadcasts.
- Difference between Regression Testing vs Retesting? This article offers the Difference between Regression Testing vs Retesting.
- Difference between selenium IDE, RC & WebDriver This article explains about the difference between selenium IDE, RC and webdriver.
- Difference between Verification and Validation This article explains about the Difference between Verification and Validation..
- Distance Vector Routing Protocol This paper explains about the distance vector routing protocol.
- DSL (Digital Subscriber Line) This paper explains about the various DSL technologies.
- Enabling IP Routing This paper explains about the types of ip routing.
- Ethernet Cabling This paper explains about the network cabling.
- Functional Testing Vs Non-Functional Testing This article breifs about type of testing done against the business requirements of application.
- Gray Box Testing This article breifs the testing of software application using effective combination of bothWhite box testing & Black box testing method.
- History of Operating Systems This article describes about the History of Operating Systems.
- How to Access Wireless Router Settings This paper explains about the working of wireless router.
- How to Add a Printer to a Wireless Network This paper explains the working of wireless printer adapter.
- How to Change a WEP Key This paper explains about the changing and removing of WEP key.
- How to Clear the ARP Cache This paper explains deals with alternatives to ARP.
- How to Replace Your Wireless Router Antenna This paper explains about the replacing router antenna.
- How to Write Good Test Cases? This article explains about the test cases.
- IKE (Internet Key Exchange) This paper explains about the internet key exchange in detail.
- Importance of Testing This article explains about the importance of testing.
- Internet Explorer Stored Password Recovery This paper explains about the working of an internet explorer stored password recovery.
- Introduction to JUnit Annotations - Learn JUnit annotations used for your Selenium WebDriver automation This article explains about the introduction to junit annotations.
- Type Conversion and Type casting in C This paper explains about the type conversion and type casting in C.
- Storage Classes in C This paper explains about the various storage classes in C.
- Pointers In C This paper explains about the pointers in C.
- String This paper explains about the string character.
- Seven attributes of Security Testing This article explains about the seven attributes of Security Testing.
- Software Estimation Techniques - Common Test Estimation Techniques used in SDLC This article explains about the different effective software estimation techniques can be used to get the better estimation.
- Software Test Estimation - 10 Tips On How To Estimate More Accurately This article explains about the tips on how to estimate more accurately.
- SQL Functions This article explains about the sql functions with examples.
- SQL GROUP BY Clause This article explains about the sql GROUP by clause syntax.
- SQL INSERT INTO This article explains about the ways to insert data into specified columns only..
- SQL JOIN's This article explains about the sql join's.
- SQL SELECT Query This article explains about the select queries in sql.
- SQL Sub-Queries This article explains about the sub queries in sql.
- SQL UNION This article explains about the union in sql.
- SQL UPDATE and DELETE This article explains about the update and delete command in sql.
- SQL Where Clause This article explains about the where clause in sql.
- Top 10 reasons why there are Bugs in Software! This article explains about the reasons for bugs in software.
- Usability Testing: What? Why? & How? This article explains about the usability testing.
- What is Automation Testing? This article explains about the automation testing.
- What is Black Box Testing? This article explains about the black box testing.
- What is difference between Priority and Severity? This article explains about the difference between priority and severity.
- What is Test data & guidelines to design your Test Data? This article explains about the test data and its guidelines.
- What should be done after a bug is found? This article explains about the steps to be taken after a bug is found.
- Why testing should start early in software development life cycle? This article explains about the testing starts in earliier for sdlc.
- Why Documentation is Important in Software Testing? This article explains about the importance of documentation in software testing.
- V Model This article explains about the V model.
- What is a White Box Testing? This article explains about the white box testing.
- Shared Folder Permissions This paper explains about the shared folder permissions.
- One-Time Pad This paper explains about the historical uses of one time pad.
- Known Plaintext Attack This paper explains about the types of chosen ciphertext attacks.
- TCP Sequence Prediction Attack This paper explains about the TCP sequence prediction attack.
- Proxy ARP This paper explains deals with creating static ARP entries.
- VDSL (Very High Bit-Rate Digital Subscriber Line) This paper explains about the very high bit-rate digital subscriber line in detail.
- IP Access Lists This paper explains about the basic rules for IP access lists.
- What is VLSM? This paper explains about the working of variable length subnet mask.
- Wireless Access Point This paper explains about the WAP applications.
- Understanding Data Encapsulation This paper explains about the data encapsulation.
- What is an L2TP? This paper explains about the working of L2TP.
- Understanding Ethernet Networking This paper explains about the ethernet network design.
- Understanding Frame Relay This paper explains about the configuring a frame relay router address connect broadcast.
- What is EIGRP? This paper explains about the EIGRP basics.
- Spanning Tree Protocol This paper explains about the working of spanning tree protocol.
- Wireless Mesh Network This paper explains about the advantages and applications of wireless mesh network.
- Power Line Networking This paper explains about the Power Line Networking.
- ISDN 30 This paper briefs a type of Integrated Service Digital Network system that is used for the transmission of voice and data over wires.
- Threads This paper briefs about a single sequence stream within in a process.
- Smoke Testing This paper briefly explains on initial testing process exercised to check whether the software under test is ready/stable for further testing.
- What is Cause and Effect Graph Testing Technique - How to Design Test Cases With Example? This paper explains about Cause and Effect Graph Testing Technique .
- What is Globalization, Internationalization and Localization in Software Testing? This paper describes about Globalization, Internationalization and Localization in Software Testing.
- System Testing: What? Why? & How? This article briefs about the testing of behavior of a complete and fully integrated software product based on the software requirements specification (SRS) document.
- Regression testing definition This article briefs on Regression testing definition.
- Positive and Negative Testing In Software Testing This article describes the Positive and Negative Testing In Software Testing.
- What is Manual Testing? This article breifs about a process carried out to find the defects..
- What is Exploratory Testing? - Interesting types of testing This article describes the Interesting types of testing-Exploratory Testing.
- What is Risk Based Testing in Software testing? This paper discusses the Risk Based Testing in Software testing.
- What is a Zeroconf? This article explains about the zero configuration networking.
- How to Use Ping to Test a Network This article explains about How to Use Ping to Test a Network.
- VRRP (Virtual Router Redundancy Protocol) This article offers the Virtual Router Redundancy Protocol.
- DHCP Scope This article discusses about a valid range of IP addresses that are available for assignment.
- Bluetooth DUN This article breifs about the Bluetooth Dial-Up Network Technology.
- MMDS (Multichannel Multipoint Distribution Service) This article affords the a broadband wireless point-to-multipoint specification utilizing UHF (Ultra High Frequency) communications.
- MMS (Multimedia Messaging Service) This article confers about an upgraded version of the SMS Short Messaging Service.
- HSCSD (High Speed Circuit Switched Data) This article describes about the High Speed Circuit Switched Data.
- Wireless Networks and their Types This article describes about the Wireless Networks and Its Type.
- WiFi Scanner This paper explains about an external device that runs on its own power source and can be clipped to a belt.
- Wi-Fi (802.11) This paper describes a number of radio frequencies that can be used for wireless Internetaccess.
- WEP (Wired Equivalent Privacy) This article explains about the Wired Equivalent Privacy-Encryption Algorithm.
- How Does WiFi Work? This article describes about How Does WiFi Work.
- LMDS (Local Multipoint Distribution Service) This article discusses about a broadband wireless point-to-multipoint specification utilizing microwave communications.
- Packet Fragmentation This paper describes the Packet Fragmentation.
- Honey Monkey This article describes breifly about a new way of detecting malicious codes from websites that try to exploit certain vulnerabilities of Internet browsers.\
- Responding to Network Attacks and Security Incidents This article explains about the Responding to Network Attacks and Security Incidents.
- Single Sign-On This article breifly explains about a concept that allows an end-user to access multiple, related but independent, software applications using a single account.
- What Are the Effects of Computer Hacking? This paper confers about the Effects of Computer Hacking.
- Role Based Access Control (RBAC) This paper discusses on Role Based Access Control .
- How Firewall Protection Works This article describes about How Firewall Protection Works.
- Standardization for the operator interface This article describes the Standardization for the operator interface.
- When to use multi-function safety relays This article breifs about When to use multi-function safety relays.
- Bridging safety onto automation networks This article confers the Bridging safety onto automation networks.
- Handling Resource Sharing and Dependancies Among Real-Time Tasks This article explains about how to handle Resource Sharing and Dependancies Among Real-Time Tasks.
- Scheduling Real-Time Tasks in Multiprocessor and Distributed Systems This article discusses the use of multiprocessor and distributed systems in a real time applications.
- Real-Time Communication This paper describes about the applications make specific quality of service demands to the communication network.
- Real Time Databases This article explains the main difference between a conventional database and a Real-Time database lie in temporal characteristics of the stored data, timing constraints imposed on the database operations, and the performance goals.
- Real-Time Task Scheduling This article briefs about the time duration from the occurrence of the event generating the task to the time the task procedures its results.
- Abstraction Barriers and Properties of Data in Python This article discusses about abstraction barriers and properties of data in python.
- Abstractions, First-Class Functions and Function Decorators in Python This article describes abstractions, first-class functions and function decorators in python.
- All About Bits & Bytes This article briefly explains about the Bits-Computers happen to operate using the base-2 number system and Bytes-always bundled together into 8-bit collections.
- An Introduction to Cryptography This paper briefly describes about an Art of writing or hiding secret-Cryptography.
- An Introduction To DKIM This article briefs the Domain Keys Identified Mail, which helps associate a domain with an email message to help prove the authenticity of the message.
- Anatomy of Recursive Functions in Python This article describes about the anatomy of recursive functions in Python.
- Artificial Intelligence (LISP) This article briefs a broad field, and means different things to different people and concerned with getting computers to do tasks that require human intelligence.
- Basic BIOS password crack This article describes about Basic BIOS password crack which is a password hack but it clears the BIOS such that the next time you start the PC, the CMOS does not ask for any password.
- Basics of How SMTP Works This article describes about a Simple Mail Transfer Protocol as the name suggest it is basically used for emails and specified for outgoing mail uses and default sits on TCP Port 25.
- Basics of LAMP - How it Works? This article describes about LAMP-Linux , Apache , MySql , PHP/Perl/Python(CGI) which is a solution stack of opensource programmes and its a platform Wherein each component plays a specific and important role.
- Basics of Pocket PC This article explains a handheld sized computer which runs on Microsoft windows mobile operating systems.
- Blu-Ray Technology This paper explains about a next-generation optical disc format and the format was developed to enable recording, rewriting and playback of high-definition video (HD), as well as storing large amounts of data.
- Bouncy Castle - .Net Implementation - RSA Algorithm This article explains about RSA Encryption, decryption and RSA Algorithm with OAEP padding.
- Bouncy Castle - .Net Implementation – Triple DES Algorithm This paper describes about a simple example to demonstrate Encryption and Decryption techniques using Triple DES algorithms.
- Brain Machine Interfacing Technology This paper describes about a technology, by using which a device can work by taking Neural Signal from a human brain! Especially it’s being designed for those patients.
- Calling User-Defined Functions in Python This article discusses about calling user defined functions in python.
- Class Attributes in OOP This article explains about the Class atrributes in object oriented programming.
- Compressing And Securing Web Code This article defines about Light-weight white-space remover and Standard-aware, safe tool for code optimization that does selective compression/obfuscation.
- Computer Viruses This article explains about a properly engineered virus can have an amazing effect on the worldwide Internet. On the other hand, they show how sophisticated and interconnected human beings have become.
- Concept of Virtual Memory - What and Why This article explains the Basic information, specification and concept of Virtual Memory.
- Conditional Statements in python This article explains about the conditional statements in python.
- Control and Compound Statements in Python This article discusses about the control and compound statements in python.
- Converting Between Numeric Bases This article briefs the base or radix is usually the number of various unique digits, including zero, that a positional numeral system uses to represent numbers.
- Conventional Interfaces in Python This article tells about the conventional interfaces in Python.
- Data Abstraction and Example: Arithmetic on Rational Numbers in Python This article describes about data abstraction and arithmetic on rational number examples in python.
- Data Encryption Standard (DES) Algorithm This article discusses on Algorithms available in Symmetric Key cryptography.
- Database Normalization This paper describes the concept of normalization and take a brief look at the most common normal forms.
- Deadlock This article describes a set of processes is deadlocked if each process in the set is waiting for an event that can be caused by another process in the set.
- Defining Classes in Python This article describes about defining classes in python.
- Defining Functions III: Nested Definitions This article describes about the defining functions III: nested definitions.
- Defining New Functions in Python This article describes how to define new functions in python.
- Denail of Service (DoS) This article briefs about how do intruders wage a DDoS attack against a victim's computer.
- Detect Users Browser Capabilities with PHP This article explains about the browser/platform user which is using for browsing your site so that you can change the content dynamically according to the browser or the platform.
- Dictionaries in Python This article explains about dictionaries and A dictionary contains key-value pairs, where both the keys and values are objects.
- Digital Certificate formats and filename extensions This article discusses about the available formats of Digital certificate, their purpose and some of the technical commands used for requesting and issuing the certificates.
- Digital Certificates and Smart Cards This article briefs about a digital certificates are files which are used to prove the authenticity of the user or computer to whom it is issued.
- Document your code This paper explains the structure of documentation that are acceptable to clients and how can someone other than me can understand my code without going into much details about the code.
- Domain Name Status Codes This article discusses about a Status codes are useful to determine why your domain isn't working, whether your domain is locked to prevent unauthorized domain transfers, and when a domain will be dropped.
- Environments in Python This article explains about envrionments in python.
- Ethical Hacking Basics Class part 1 This article discusses about an ethical hacking is a form of legal hacking that is done with the permission of an organization to help increase its security.
- Ethical Hacking Class part 2 This article describes about a Transmission Control Protocol/Internet Protocol (TCP/IP) suite is so dominant and important to ethical hacking that it is given wide coverage in this article.
- Evaluating Nested Expressions in Python This article explains about the Evaluating Nested Expressions in Python.
- Flow control and QoS This article explains about Flow control which manage the transmit of traffic between two devices; Flow control is concerned with pacing the rate at which frames or packets are transmitted and quality of service.
- Functions as Arguments This article describes how we use functions as arguments in python.
- Functions as General Methods in Python This article explains about the functions as general methods in python.
- Functions as Objects and Role of Objects in Python This article describes about Functions as Objects and Role of Objects in Python.
- Functions as Returned Values and Currying in Python This article explains about the Functions as Returned Values and currying in Python.
- Functions in Python - Part II This article describes about the local names, how to choose names and finuctions as abstraction.
- Generic Functions in Python This article describes about the Generic Functions in Python.
- Hacker and Expert - A Difference This article briefs the difference between an expert and a hacker in detail.
- How FTP Works With Example This paper describes about File Transfer Protocol which is the main net work protocol used for downloading/uploading of files...From one host to another using a TCP based network like INTERNET.
- How HTTP Works? This article explains about the Hyper Text Transfer Protocol which set the foundations for internet and WWW [world wide web].
- How Proxy Works? This article describes about a Proxy (or a Proxy server) acts as an inter-mediator for relaying of requests from set of clients seeking resources from other set of servers.
- How to make a simple shellcode (The basics) This article explains about Shell-code is a piece of object codes that can be injected into the executable stack to get the execution access.
- How Virtual LANs (VLANS) Work This article discusses about a VLAN which is a grouping of computers that is logically segmented by functions, project teams, or applications without regard to the physical location of users.
- Implementing Classes and Objects in OOP This article describes about the Implementing Classes and Objects in Object oriented programming.
- Implementing Lists and Dictionaries in Python This article describes how to implement list and dictonaries in python.
- Inheritance in OOP This article describes about inheritance in object oriented programming.
- Introduction to Bouncy Castle APIs This article briefs about a set of implementations of cryptographic concepts and algorithms-Bouncy Castle APIs.
- Introduction to Cracking - (Part I) This article explains the process of extracting the source code from the compiled exe.
- IP Addresses Explained This paper describes about how the addressing scheme works, Exploiting Services, packets and types of it.
- Jargon Buster [A-M] This article explains the terminology involved in Jargon Buster [A-M].
- Java Control Fundamentals This article examines the standard controls defined by Java. Controls are components that allow a user to interact with your application in various ways.
- Lambda Expressions in Python This article describes about the Lambda Expressions in Python.
- Lists in Python This article explains about the lists in python.
- Load Balancing with HAProxy This paper discusses about an open-source TCP/HTTP load balancer-High Availability Proxy.
- Memoization in Python This article discuss about the Memoization in Python.
- Memory Management Basics This article explains about the Memory is central to the operation of a modern computer System which consists of a large array of words or bytes each with its own address and the basics of its management.
- Memory Management Concepts This article discusses about the concepts of dynamic loading, dynamic linking and shared libraries and different memory mapping schemes and protection.
- Message Passing and Dot Expressions in Python This article describes about Message Passing and Dot Expressions in Python
- Monitor Filesystem Changes in PHP This paper briefs the System tools & monitoring programs are often required to monitor a directory or file(s) for changes, not just content changes, it may even be attribute changes like permissions, timestamps etc.
- Most Common TCP Ports This article explains TCP/IP (Transmission Control Protocol/Internet Protocol), the suite of communications protocols used to connect hosts on the Internet and its ports.
- Multicast This article explains about the Multicast messages which are always sent using UDP, since TCP requires an end-to-end communication channel.
- Multiple Inheritance in OOP This article explains about Multiple Inheritance in object oriented programming.
- Multiple Representations in Python This article explains about Multiple Representations in Python.
- Multithreading This article explains a concept where a program is broken into two or more parts called threads and all these threads run in parallel.
- Mutual Recursion in Python This article explains about the Mutual Recursion in Python.
- MySQL Storage Engines This article explains the data in MySQL is stored in files (or memory) using a variety of different techniques.
- Names and the Environment in Python This article explains about the names and environment In python.
- Native Data Types in Python This article describes about the different types of Native data types.
- Network programming This article describes about three major types of IP addressing (classful, subnetted classful and classless).
- Object Oriented Programming This article describes Object Oriented Programming.
- Object Oriented Programming in Visual Basic This article explains the Visual Basic was Object-Based, Visual Basic .NET is Object-Oriented, which means that it's a true Object-Oriented Programming Language.
- OOP and UML This article describes the OOP-a paradigm which defines the way a developer structures software into objects & UML-a graphic language to depict processes and objects.
- Operators in Python This article explains about the operators used in python.
- Orders of Growth in Python This article explains about the Orders of Growth in Python.
- Packet Sniffers This paper describes about Packet sniffing is listening (with software) to the raw network device for packets that interest you.
- Pairs in Python This article gives a brief explanation on pairs in python.
- PHP On-The-Fly! This article explains about a PHP which can be used for a lot of different things, and is one of the most powerful scripting languages available on the web. Not to mention it's extremely cheap and widely used.
- Prevent DNS Server from being used for a DoS attack This article explains about DNS servers primarily advertise to the world the various records associated with the domain they serve.
- Process Management And Synchronization This article breifs the Properties of the Machine-instruction Approach, General structure of a process and Synchronization With Hardware.
- Programming in Python This article discuss about the Installing Python, Interactive Sessions, Examples of python and Practical Guidance: Errors.
- Propagating Constraints in Python This article describes about propagating constraints in python.
- Qwerty Keypad Vs Touch Screen This article compares the Performances of Qwerty Keypad Over Touch Screen interms of High Speed Typing, Accuracy and Confidence and Hardy, Free From Sensitivity And Calibration Problem and Cost Of Damage Is Less.
- Recovering Lost Hard Disk Data With ddrescue This article explains about a GNU tool for data recovery, it copies data from a file/block devices (cd,dvd,hard disk,flash drive,etc.) to another attempting to recover from read errors, bad sectors, etc.
- Recursion This article explains about the fundamentals of Recursion and its process.
- Recursion in Python This article explains about recursion and recursive functions in python.
- Routing This article describes a special routing protocol called the Gateway-to-Gateway Protocol (GGP) was used within the core of the internetwork, while another protocol called the Exterior Gateway Protocol (EGP) was used between non-core and core routers.
- RSS Feeds This article breifs the Remote Site Syndication which is an excellent marketing tool of the new Internet age which is basically syndicating content from another site.
- Sequence Abstraction and Nested Pairs in Python This article discuss about sequence abstraction and nested pairs in python.
- Sequence Iteration in Python This article explains about the sequence iteration in python.
- Sequences in Python This article describes about the sequences in python with explanation of tuples.
- Socket Server – Creating network servers This article defines the classes for handling synchronous network requests (the server request handler blocks until the request is completed) over TCP, UDP, Unix streams, and Unix datagrams.
- Spamming This article describes an Internet term invented to describe the act of cross-posting the same message to as many newsgroups and/or mailing lists as possible, whether or not the message is germane to the stated topic of the newsgroups or mailing lists that are being targeted.
- Special Methods in Python This article describes about the special methods in python.
- Splitting File into Parts in PHP This article explains about how to split the File into Parts in PHP.
- Storage Architectures This paper describes about direct attached storage, network attached storage and storage area network.
- String Conversion in Python This article describes about String Conversion in Python.
- Strings in Python This article explains about the strings in python.
- System Folders, Normal Folders, and Directories This paper breifs the Strange Folders in Temporary Internet Files and Editing System Folders.
- TCP/IP Client and Server This article explains about how to choose the address for listening and similar modification to the client program is needed before the server can be tested.
- TCP/IP in details This article explains the initial sequence number was exchanged, then it incremented by the size of data sent in bytes.
- The Elements of Programming in Python This article describes about Expressions, Call Expressions, Importing Library Functions in python.
- The Object Metaphor in Python This article describes about the object metaphor in python.
- The OSI model This article breifs the model for OSI and its collection of services/functions.
- The Pop-up Window Primer This article discusses about a pop-up windows were a positive component in the beginning. Created long before tabbed browsers, their purpose was to present information without interfering with the current browser window.
- Track your visitors, using PHP This article describes the traffic analysis tools, ranging from simple counters to complete traffic analyzers.
- TRACING an IP This article shows some easy ways to trace out the geographical location and various other infos like ISP details etc of a remote computer using its IP.
- Tree Recursion in Python This article describes about the tree recursion in python.
- Types of Attacks on Web Servers This article describes the traffic which can derive from hundred or even thousands of individual systems and sometimes the users are not even aware that their computers are part of the attack.
- Types of Functions in python This article describes about the pure and non pure functions in python.
- Types of Object Copy This article describes about one of the most common procedures that occurs in computer programs is the copying of data.
- Types Of Scheduling This article explains about various types of scheduling algorithms and its Criteria.
- Understanding Arbitrary File Upload Vulnerablilities This article explains about how to get the access to the server and execute desired code.
- Understanding Basic SQL Injection This article explains a code injection technique that occurs if the user-defined input data is not correctly filtered or sanitized of the ‘string literal escape characters’ embedded in SQL.
- Understanding LFI and RFI Attacks This article describes Local File Inclusion ( LFI ) is a method of including files on a server through a Modified Special HTTP request and Remove File Inclusion and is quite similar to LFI, Remote File Inclusion ( RFI ) is a method of including Remote files(present on another server) on a server through a Modified Special HTTP request.
- Understanding Public Key Infrastructure This paper describes about Public key infrastructure is an architecture which supports mechanisms like integrity and confidentiality.
- USB Basics This article explains about USB which grew from the requirement for a simple, inexpensive expansion bus for PCs.
- Using PEAR Date, converting between time zones in PHP This article discusses that how to convert temporal values between time zones with the PEAR Date class.
- Very Basics of HTML This article breifs about the HTML document which is made up of small markup tags which the browser you are using reads those tags then preview the results.
- Website Development Approach This article explains the Navigation Design, Content Creation, Browser and Platform Design, Search Engine Friendly, Loading Time Optimization Check.
- What are Torrents and How they Work ? This article explains about Torrents which has a P2P(Peer to Peer) software compatible files they are used to share files in P2P network environments and its working.
- What is a cookie? This article explains about the cookie and compares the difference between session and cookie.
- What is a firewall? This article breifs about a firewall which protects networked computers from intentional hostile intrusion that could compromise confidentiality or result in data corruption or denial of service.
- What is a Virus? This article explins the various ways to avoid getting infected by virus.
- What Is VoIP and How Does It Work This article describes the Voice Over IP (VOIP) has the potential to completely revolutionise the way the worlds phone systems operate.
- What Makes Up a Hard Drive This article explains about a Hard Drives which are one of the most important parts on your computer.
- Which One Is Better: PNG or GIF? This article discusses and compares the difference between GIF-Graphics Interchange Format and PNG-Portable Network Graphics.
- Wireless Application Protocol This paper briefs about Wireless Application Protocol, in which secure specification that allows users to access information instantly via handheld wireless devices such as mobile phones, pagers, two-way radios, smartphones and communicators.
- Abstract Data Types This article describes about the Abstract Data Types in java programming.
- ADD and ADC This paper briefly describes about an one-bit adder and one bit adder with carry.
- Advanced Topics in c++ This articles describes about file handling, reading strings,exceptions and function/classes.
- Arrays and strings This article explains about arrays and strings in c++.
- Arrays in 'C' This article explains the arrays and pointers in c.
- Balanced Binary Search Trees This article describes about the importance of BST, AVL trees and other balanced trees.
- Bellman-ford Algorithm This article describes about the bellman-ford algorithm and generic shortest path algorithm.
- BFS and DFS This article discuss about Breadth first search and Depth first search.
- C++’s Standard Template Library (STL) This article describes about the Standard template library in c++.
- Ciphers This article describes about ciphers and its types.
- Colour This article discusses about colour where the light source has just one single wavelength. This forms monochromatic (or pure spectral) colours.
- Computer Graphics Notes-3D This article explains about the Matrix Stacks, concept of Visible Surface Determination (Hidden Surface Removal), Fractals.
- Computer Graphics Notes-Parametric Curves and Surfaces This article briefs about De Casteljau Algorithm and nature of Curvature, also explains about the Parametric Representation.
- Computer Memory: Bits and Bytes This article describes the basic architecture of computer and memory of the computer briefly.
- Concurrency - General This article describes semaphore patterns, binary lock, ponters to ponderand generalized counter.
- Control Statements in java This article describes about control statements in java.
- Data Transfer Instructions This article explains about Load Program Memory, Load Direct, Shift Instructions, Assembly Process.
- Debugging This article explains the philosophy and the truths of Debugging
- Debugging with Visual Studio 2005 This article describes you a sense of the philosophy of debugging and to teach you how to use some of the practical tools that make testing and debugging easier in Visual studio 2005.
- Debugging with Xcode This article describes you a sense of the philosophy of debugging and to teach you how to use some of the practical tools that make testing and debugging easier in Xcode.
- Defining Scheme Functions in kawa This article describes Defining scheme functions in kawa.
- Deque Implementation Design This article briefs about the various types of deque such as Array Deque, Linked Deque and its implementation design.
- Document Distance Problem This article explains about the algorithm for solving document distance problem.
- Dynamic Programming I This article explains fibonacci warmup, memoization , shortest paths, crazy eights and guessing view points.
- Dynamic Programming II This article discusses about bottom-up implementation, longets common subsequence and parent pointers for guesses.
- Dynamic Programming III This article describes about Text justification, Parenthesization, knapsack, pseudopolynomial time and tetris training.
- Dynamic Programming IV This article explains piano fingering, Structural DP, vertex cover, dominating set and beyond.
- Flow of control This article describes about flow of control in c++.
- Function Call and Return This article deeply discusses about the anatomy of function call and return.
- Functions As Data This article explains Scheme :Functions as data.
- Graphical User Interfaces This article tells about the Graphical User Interfaces in java programming.
- Hashing I : Chaining & Hash Functions This article discusses about the dictionaries, python, chaining , hash functions and simple uniform hashing.
- Hashing II : Table Doubling & Karp-Rabin This article describes about table resizing, amortization,karp-rabin and rolling hash.
- Hashing III : Open Addressing This article describes about the open addressing, uniform hashing and advanced hashing.
- Homogeneous Coordinates This article briefs about Combining Transformations, Affine Transformations and Window to Viewport Mapping.
- Human Computer Interaction Notes This article explains the Interaction Design, Usability and its Goals, Design Conceptualisation, Conceptual Framework, Prototyping and Usability.
- Internal hardware This article explains ALU, Control unit, Cpu and Processor.
- Introduction to C++ This article explains the introduction to C++.
- Linked List This article describes about the Linked list in datatstructures.
- Lower Bounds and Linear time sorting This articles explains about sorting lower bounds and linear time sorting.
- Malware and its types This article describes all malware and its types.
- Mass Storage – Disks This article explains about the mass storage disks in detail.
- Memory This article describes about the memory of the system like RAM, ROM.
- Motherboard and its components This article explains briefly about the motherboard and its components.
- Networking With Python This article explains Python: XML, Sockets, Servers.
- Object-Oriented Programming (OOP) and Inheritance This article describes about Object-Oriented Programming (OOP) and Inheritance.
- Operating Systems Notes This article explains about the System Calls, Processes and Threads, Deadlock, File Systems and Performance issues with standard magnetic disks.
- Packaging Your Program into a Distributable JAR File This article describes Packaging Your Program into a Distributable JAR File.
- Pointers This article explains about pointers in c++.
- Procedural Decomposition This article explains about Procedural Decomposition and example for it.
- Processes & Sockets This article explains about the Processes & Sockets in java programming.
- Program Grading This article explains on the grading program using two areas: functionality and design/style.
- Python Basics This articles decribes about basics of python.
- Recursive Data Types This article describes about the Recursive Data Types in java programming.
- Scheduling and Binary Search Trees This article explains about Runway reservation system and Binary Search Trees.
- Scheme Basics in Kawa This article deals with the scheme basics in open source application called kawa just like UNIX Shells.
- Security Engineering Notes This paper describes about Business Risk Concepts, how to manage the risks, Security Architecture and Access Control.
- Shading Models This article explains about the different types of shading models, Ray Tracing, Rasterisation, Polygon Filling, Anti-Aliasing and its textures, filtering.
- Specifications This article describes about the specifications in java programming.
- Speeding up Dijkstra This article explains about bidirectional search and Goal directed search.
- Stable Sorting & Radix Sort This article decribes about the stable sorting, quick sort and radix sort.
- Synchronization This article about the Synchronization in java programming.
- System Input Devices This article describes all input devices of the computer.
- System Output Devices This article explains all output devices of the computer.
- Templates This article explains templates and operator overloading.
- The UNIX Programming Environment This article explains the compile process, run process and debugger in UNIX.
- Thread Package Documentation This article describes thread functions and semaphore functions.
- Thread Safety This article discuss about the thread safety in java programming.
- Topological Sort and Np-Completeness This article explains the job scheduling , topologoical sort, interactable problems and np-completeness.
- UNIX Basics This article explains basics of UNIX.
- Using Microsoft Visual Studio 2005 This article explains you to use and install Ms Visual Studio 2005.
- Using Xcode for Macintosh This article describes how to write program Using the c++ compiler called Xcode for Macintosh.
- Variables in Java This articles deals with the variables like local, instant and class variables.
- Von-Newman vs. Harvard Architecture This article discusses about Operations on Signed and Unsigned Multi byte Numbers, brge and brsh, Nested Interrupts, Switch Bounce Software Solution, Serial Communication (Start and Stop bit) and UART.
- Peer-to-peer Mobility and a Physical Internet This article briefs about how mobility and the transport of goods could be transformed by peer-to-peer thinking.
- Science City Stores Heat in the Ground This article briefs about waste heat from buildings on the Science City Campus will be stored in the earth during the summer through 800 ground probes.
- A Growing Digital Waste Cloud This article discusses about a predominant infrastructure and business model whereby information, software and other resources are delivered on-demand to users via the Internet.
- Putting Nanotech to Green Use? This article discusses about a Nanotechnology which involves the imaging, measuring, modeling, and manipulating of such minuscule matter.
- Language and Syntax This article explains about how to install and configure your environment, and you will also get an overview of those features.
- Data Types and Referencing This article briefs about defining containers and using them to work with application data.
- Operators, Expressions, and Program Flow This article explains about the looping constructs, and some basic program flow.
- Defining Functions and Using Built-ins This article discusses about different use-cases for functions and how to learn techniques that will allow us to apply the functions to many situations.
- Input and Output This article delas with how to put information or data into a program, and then how to display it or save it to a file.
- Object-Oriented Jython This article explains about the basics of object-oriented programming.
- Exception Handling and Debugging This article explains about the exception handling syntax of the ¬try-except-finally¬ code block and how it is used.
- Modules and Packages for Code Reuse This article explains about the level of the interactive console and simple scripts.
- Scripting With Jython This article briefs about ‘scripting’ as the writing of small programs to help out with daily tasks.
- Jython and Java Integration This article briefs about how to utilize the Python language semantics without migrating to a completely different platform.
- Using Jython in an IDE This article explains about the most widely used IDE options for developing Jython applications, Netbeans and Eclipse. Eclipse offers a truly complete IDE solution for developing Jython applications, both stand alone and web-based.
- Databases and Jython: Object Relational Mapping and Using JDBC This article briefs the different ways to implement database applications in Jython, specifically through the Java database connectivity API or an object relational mapping solution.
- Simple Web Applications This paper describes the ability to make use of Java platform capabilities programming in the Python programming language instead of Java.
- Web Applications With Django This article explains about a full-stack approach, pragmatic design, and superb documentation are some of the reasons for its success.
- Introduction to Pylons This article discusses about Pylons grew out of a need to build web applications in environments that may have existing databases to integrate with, and the applications don’t fit neatly into the class of applications that are loosely defined in the “content management” space.
- GUI Applications This article briefs about reasonably straightforward to translate the Java Swing examples you find into Jython Swing examples.
- Deployment Targets This article describes about Deploying Jython web applications is universally easy to do using the WAR file format.
- Testing and Continuous Integration This article explains about the flexibility of Python to write concise tests for Java APIs, which also tend to be more readable than the ones written with JUnit.
- Concurrency This article explains about the standard mutable Python collection types have been implemented in Jython with concurrency in mind; and Python’s sequential consistency removes some potential bugs.
- Programming via Java-Programming overview This article discusses about the basics of computer programming and the language as a tool for learning the fundamentals of expressing systematic approaches to solving problems.
- Programming via Java-Variables and objects This article explains about the program will associate a name with each object. In programming, we refer to these names as variables.
- Programming via Java More on objects This article explains about Objects and their classes are central to using Java, which is why Java is called an object-oriented programming language.
- Programming via Java Using numbers This article explains about how a program might ask the user for a number and use that number in doing its task.
- Programming via Java Graduating to a bigger sandbox This article briefs about Turtles which can only carry us so far in our quest to learn about programming.
- Programming via Java Conditional execution This article explains about the most natural way of accomplishing this in Java is to use the if statement.
- Programming via Java Strings This article briefs about the Java which includes the String class, each instance of which represents a string of characters. This class is one of the most heavily used in Java.
- Programming via Java More on loops This article discusses about two new categories of statements — the for loop and the break statement. Neither is very complex conceptually, but nonetheless they are convenient enough in practice.
- Programming via Java More on classes This article deals with the Classes are quite important to Java programming; it is time to examine some of their features more closely.
- Programming via Java Subclasses This article describes about a subclass inherits all the instance methods from its superclass.
- Programming via Java Defining methods This article explains about how to define our own methods, creating our own names for them, to do things that we want.
- Programming via Java User interaction This article describes about about two more general Java concepts that will be useful in the future: null references and instance variables.
- Programming via Java Defining classes This article offers the concept of how to write our own classes and get them to interact.
- Programming via Java Recursion This article describes about Self-invocation may at first sound useless or illegal.
- Programming via Java Recursion examples This article explains about the varies examples for recursion.
- Programming via Java Arrays This article explains about an array is essentially a line of variables Each single variable in the array is called an array element.
- Programming via Java Sorting This article deals with Sorting an array is one of the most fundamental problems in computer science.
- Programming via Java File I/O This article explains about a couple of simple ways to work with files using Java's libraries.
- Programming via Java Swing basics This article explains about the basics of swing using java.
- Programming via PHP A brief look at HTML This article describes about a brief introduction to the extensive formatting language.
- Programming via PHP Simple programs This article describes about a very simple PHP program.
- Programming via PHP Accessing user information This article explains about how to compose HTML to request information from the user using a form.
- Programming via PHP Numbers and strings This article explains about the concept of numbers and strings using PHP.
- Programming via PHP Conditional execution This paper briefs the way to test whether they are inverted, and then to silently swap them back into the proper order before proceeding.
- Programming via PHP Database access This article describes about how to provide a Web interface for accessing a database.
- Programming via PHP Repetition This article explains about PHP has a special construct for executing a block of statements multiple times, called the while statement.
- Programming via PHP More SQL This article describes about the primary goal of SOL which is to extend our SQL knowledge beyond the basic SELECT queries.
- Programming via PHP More about forms This article discusses about the transmission protocol used for the Web, actually defines two methods for sending form information to a Web server, called POST and GET.
- Programming via PHP Input validation This article explains about the most useful tools for input validation is PHP's preg_match function.
- Programming via PHP Arrays This article explains about an array in PHP is a powerful structure for a script to remember a conglomeration of data.
- Data & Procedure Java review This article describes about review of object-oriented programming.
- Data & Procedure Hashing This article discusses about a tree which maintain its elements in order, which is useful in some cases.
- Data & Procedure Priority queues This article explains about the Priority Queue ADT which is designed for systems that maintaining a collection of prioritized elements, where elements are removed from the collection in order of their priority.
- Data & Procedure Introduction This article explains about how to handle any computational problem and produce a technique for solving it that is both correct and efficient.
- Data & Procedure Recursion and lists This article explains about the Recursion which is a useful concept for both procedures and data.
- Data & Procedure Reasoning about correctness This paper describes the two procedural concepts that are crucial to our study of data structures: reasoning about a procedure's correctness, and reasoning about a procedure's speed.
- Data & Procedure Reasoning about efficiency This article explains about how to Analyze algorithms' performance.
- Data & Procedure Stacks and queues This article explains about important restrictions of the List ADT, and they occur often enough that computer scientists give them special names.
- Parallel & distributed models This article explains about how to program and demonstrate the Parallel & distributed models.
- Parallel scan This article explains about how to write a program to solve it on a single-processor system, the program would consist basically of a single loop stepping through an array.
- Parallel prefix scan This article describes about prefix scan using parallel method.
- Sorting This article describes about how can we sort an array of numbers quickly when we have many processors.
- Hardness of parallelization This article discusses parallelizability in the context of complexity theory.
- Using the Python Interpreter This paper describes about the interpreter operates somewhat like the Unix shell: when called with standard input connected to a tty device, it reads and executes commands interactively; when called with a file name argument or with a file as standard input, it reads and executes a script from that file.
- Errors and Exceptions This article explains about the Syntax errors, also known as parsing errors, are perhaps the most common kind of complaint you get while you are still learning Python.
- Interactive Input Editing and History Substitution This article describes about the Python interpreter which supports editing of the current input line and history substitution, similar to facilities found in the Korn shell and the GNU Bash shell.
- An indispensable Python : Data sourcing to Data science. This article describes about Data analysis echo system has grown all the way from SQL’s to NoSQL and from Excel analysis to Visualization.
- Big Data? How do you run capacity planning? This article explains about the process for DBA’s and Datawarehouse Architects, also involves about how to drive the capacity planning.
- Data flow: Web log analysis on a Hive-way This article explains the method of flattening up all elements in web log which can support detail user analysis and behavior.
- Hadoop Configuration Simplified : Master Slave Architecture This article explains about Hadoop configuration which has simple components, also which can be divided as Master and Slave components.
- ETL, ELT and Data Hub: Where Hadoop is the right fit ? This article explains about how enterprise can use Hadoop as a data hub along with the existing Datawarehouse set up. “Hadoop as a Data Hub” this line itself raised lot of questions in my mind.
- Operational Data Science This article discusses the term “Data Science” has been evolving not only as a niche skill but as a niche process as well.
- Serial Communication in Java with Example Program This article explains about communication with serial ports includes hardware setup and exiting code.
- Repairing a laptop display that is dim or has a black corner This article briefs the components that is likely to break is something in the LCD assembly.
- Configuring Eclipse, Android Development Plugin and SDK To Work Properly When Directory Pathing Is Wrong This article deals with how to programme in Android and all the needed tools.
- ASCII Code This article explains about how Computer memory saves all data in digital form.
- BCS Architecture This article discusses about the key functionalities and the technical characteristics of the BCS architecture.
- BGP Confederations and Route Reflectors – A design overview. This article explains about a design a network that employs confederations and route-reflectors.
- BGP design for a dual homed enterprise – the bare minimums! This article briefs about a typical dual homed BGP network is preventing your own AS from being a transit network.
- Case Study: Catch This article briefs about the game which will shoot a ball across a window from left to right and you will manipulate a mitt at the right side of the window to catch it.
- Cisco MDIX – a feature that can bring down ports without warning. This paper describes about how to connect unlike devices and a crossover cable to connect like ones, so undoubtedly for a switch to switch connection a crossover cable is used.
- Cisco wireless: locating an access point via it’s LED This article explains about the Cisco Wireless LAN Controller which allows you to make the LED flash on the AP, so you can locate it.
- Cisco WLC and AP upgrade process This article explains about how to upload the new code base onto the controller and reboot, at which point all APs associated to that controller would go into Discovery Mode and try and look for a new controller to associate with.
- Classes and functions This article explains about the function creates a new Time object, initializes its attributes, and returns a reference to the new object.
- Classes and methods This article explains about how to define object-oriented programming, but we have already seen some of its characteristic.
- Classes and objects This article explains about a class in essence defines a new data type. We have been using several of Python’s built-in types throughout this book, we are now ready to create our own user-defined type: the Point.
- Cloud computing – an insight This article describes about the cloud computing concept briefly .
- Computer representation of numbers This article describes about how to keep track of positive and negative values.
- Conditionals This article describes about the modulus operator works on integers (and integer expressions) and yields the remainder when the first operand is divided by the second.
- Configuring SLA monitors and using them for route tracking and graphing WAN conditions. This article briefs about Cisco SLA is a toolkit that enables to monitor and measure network statistics such as packet loss, delay and jitter (variable delay) in near real time.
- Dangers of computer arithmetic This article briefs about the mantissa of a floating point number can only cover a certain range.
- Debugging: How to find the errors This article explains about how to find the root via the bisection technique.
- Decoding the Unique Identifiers This article explains about how to read the ID’s of both the cards that came in my kit, however these ID’s are raw.
- Design and deployment of HSRP in a LAN environment This article briefs about a Hot Standby Routing Protocol was primarily designed for providing layer two redundancy for default gateways (DG) failures on LAN segments.
- Dictionaries This article describes about dictionaries are a different kind of compound type. They are Python’s built-in mapping type.
- Distributed Algorithms in NoSQL Databases This article beefs on a number of distributed activities like replication of failure detection that could happen in a database.
- Fast Intersection of Sorted Lists Using SSE Instructions This article describes about an Intersection of sorted lists is a cornerstone operation in many applications including search engines and databases because indexes are often implemented using different types of sorted structures.
- Finding Roots by "Closed" Methods This article explains about a closed method is one which starts with an interval, inside of which you know there must be a root.
- Finding Roots by "Open" Methods This article discusses about the graphical approach to the method may be described as "follow the slope down to zero".
- Fruitful functions This article explains about the built-in functions we have used, such as abs, pow, and max, have produced results.
- Functions This article explains about a function is a named sequence of statements that performs a desired operation.
- Hierarchical Navigation and Faceted Search on Top of Oracle Coherence This article explains about a pretty typical eCommerce service for hierarchical and faceted navigation, although not without peculiarities, but high performance requirements led us to the quite advanced architecture and technical design.
- HTML forms This article explains about an Interactive forms let web page authors give their pages interactive elements, such as for receiving messages from their readers, much like the reply cards found in some magazines.
- Implementation of MVCC Transactions for Key-Value Stores This article explains about the most widely used software engineering techniques, a cornerstone of the relational databases, and an integral part of the enterprise middleware where transactions are often offered as the black-box primitives.
- Inheritance This article explains about an Inheritance which is the ability to define a new class that is a modified version of an existing class.
- In-Stream Big Data Processing This article briefs on real-time query processing and in-stream processing is the immediate need in many practical applications.
- Iteration This article explains about multiple assignment it is especially important to distinguish between an assignment operation and a statement of equality.
- Linked lists This article describes about a common data structure, the linked lists.
- Linux - User management This article briefs about the file /etc/passwd contains all information regarding the user (login, passwords, etc.). Only the superuser (root) must be able to change it.
- Lists This paper describes about a list is an ordered set of values, where each value is identified by an index.
- MapReduce Patterns, Algorithms, and Use Cases This article explains about a number of Map Reduce patterns and algorithms to give a systematic view of the different techniques that can be found on the web or scientific articles.
- Mobile Communication – Infrared, Bluetooth and NFC This article tells about the technologies such as infrared, bluetooth and NFC those had done their part in different period. .
- Modules and files This article discusses about a module is a file containing Python definitions and statements intended for use in other Python programs.
- NoSQL Data Modelling Techniques This article explains about NoSQL databases are often compared by various non-functional criteria, such as scalability, performance, and consistency.
- Numerical Integration: Basic This article explains about how to use a Newton-Cotes method of order zero.
- Numerical Integration: Intermediate This article explains about the trapezoid method uses information from both the start and the end of each little piece to make a better estimate of the area under the curve.
- Performance of Priority Queue Sorting with Pagination This article explains about a very common task to sort some set of items according to the user-selected criteria and return only the first or N-the page of the sorted result.
- Placing multiple functions in a single source code file This article helps to simplify the design of the code, and makes it much easier to read, too.
- Port/Ports TCP/IP This article describes about the process which consists of being able to send information from various applications over a connection is called multiplexing. In the same way the matter of managing to compare (thus share among the various applications) the data flow is called demultiplexing.
- Probabilistic Data Structures for Web Analytics and Data Mining This article explains about an analysis of such large data sets often requires powerful distributed data stores like Hadoop and heavy data processing with techniques like MapReduce.
- Pseudocode This article briefs about a simplified, half-English, half-code outline of a computer program. It is sometimes given other names, such as Program Definition Language (PDL).
- Queues This article defines about a queue is a line of customers waiting for service of some kind.
- Reading and writing data in files This article explains about Reading multicolumn data and Writing multicolumn data.
- Recursion and exceptions This article explains about the elements of a list can be modified, but the characters in a string cannot. In other words, strings are immutable and lists are mutable.
- Sets of objects This article discusses about how to define a new object to represent a playing card, it is obvious what the attributes should be: rank and suit.
- Setting a static IP address and DNS server in ubuntu This article explains about how to Set a static IP Address.
- Stacks This article deals with an abstract data type, or ADT, specifies a set of operations (or methods) and the semantics of the operations (what they do), but it does not not specify the implementation of the operations.
- Static connected routes and the IGP’s – a weird twist! This article explains about the network statements that we define under the routing protocol are put into the topology table and are therefore advertised to the neighbouring routers running the same IGP.
- Strings This article describes about Strings are qualitatively different from the other four because they are made up of smaller pieces — characters.
- The Cloud Chamber This article explains about some basic concepts on how cloud chambers work. There are three main types of radiation alpha, beta and gamma.
- The MikeNet Neural Network Simulator This article explains about a simulation environment for building connectionist (PDP) models.
- The PiBow Case This article explains about the case offers access to all the ports and the GPIO pins via a ribbon cable.
- The Scanner This article explains about a scanner is an acquisition peripheral for scanning documents, i.e. converting a paper document to a digital image.
- Trees This article describes about a common kind of tree is a binary tree, in which each node contains a reference to two other nodes (possibly None).
- Tricks with Direct Memory Access in Java This article explains about Java was initially designed as a safe, managed environment.
- Ultimate Sets and Maps for Java, Part I This article describes about how to design our own custom indexes and index processors.
- Ultimate Sets and Maps for Java, Part II This article briefly describes about How to efficiently test that a collection of items meets a filtering criteria contains(key1) AND contains(key2) AND …. AND contains (key).
- Using functions as arguments This paper deals with a Scilab routine which evaluates this function repeatedly, and takes some action based on the results.
- Using Heun's Method This article discusses about an Euler's method provides a simple means for calculating new values of some physical quantities, based upon their current values.
- Variables, expressions and statements This article explains about a value is one of the fundamental things — like a letter or a number — that a program manipulates.
- Virtualization – Basics This article gives some interesting details about the virtualization that can be considered as a scaled down version of cloud computing.
- Voice VLANS, Data VLANS and DHCP architectures in centralized and distributed environs. This article explains about how to check out some design challenges for LAN implementation housing a converged voice and data network.
- Advantages of OOP This article provides advantages of oop over traditional structural programming languages.
- Algorithm Development This article describes hoe to develop a java Alpgorithm with pseudocode and stepwise refinement.
- API and Packages This article describes about the Toolboxes, Java's Standard Packages, Using Classes from Package.
- Asynchronous Events: Polling Loops and Interrupts This article discusses about the asynchronous events happens in CPU.
- Black Boxes This article explains about Black boxes concept in order to reduce the complicated task as a single task.
- Block Ads Using the hosts File This article explains how to block ads using the hosts.
- Blocks, Loops, and Branches This article describes about the Blocks, The Basic While Loop and The Basic If Statement.
- Break and continue This article explains how to use break and continue statements in java.
- Building And Integrating CppUnitLite in Eclipse on Linux This article explains step by step explanation on how to build and integrate CppUnitLite in Eclipse on Linux.
- Changing the File system to Read and Write in Recovery Mode This article briefs how to change the file system to read and write in recovery mode in Linux.
- Coding, Testing, Debugging IN JAVA This article explains about the coding, Testing and debugging in Java.
- Constructors and Object Initialization This article discusses about Initializing Instance Variables, Constructors, Garbage Collection.
- Details of Expressions This article explains about Arithmetic Operators, Increment and Decrement, Relational Operators, Boolean Operators, Conditional Operator, Assignment Operators and Type-Casts, Type Conversion of Strings, Precedence Rules .
- Enums and for-each Loops This article discusses the enums and for-each loops.
- Exceptions in Text I/O This article describes about the exceptions in text input and output.
- For Loops This article describes about for loops in java and example for counting divisors.
- Fundamental Building Blocks of Programs This article describes about the basic aspects of the program.
- How to Download and Burn YouTube Videos on a DVD in Linux This article describes how to download to how to Download and Burn YouTube Videos on a DVD in Linux.
- How to Restrict a Login Shell Using Linux Namespaces This article explains about how to restrict a Login Shell Using Linux Namespaces.
- Improving the Built-in Dictionary This article discuss about finding dictionary file, gathering and creating a wordlist, removing duplicates and blank lines etc.
- Initialization in Declarations This article describes about the initialization in declarations in java.
- Installing a Kernel in Ubuntu This article details about the steps to install kernel in ubuntu.
- Introduction to Exceptions This article discusses about exceptions in java.
- Issues while just create a share group, assign SGID to the shared directory in Linux This article briefs the issues while create a share group and assign SGID to the shared directory.
- Java Programming Example: Card, Hand, Deck This article briefs about Designing the classes, The Card Class, Example: A Simple Card Game.
- Javadoc This article explains about javadoc documentation where to place special comments in java source code.
- Likes in Linux This article discuss about the advantages of linux.
- Local File Sharing in Linux This article explains about the local file sharing in Linux.
- Member Variables in java This article discusses about the member variable which can be static or non-static.
- Naming and Scope Rules in Java This article explains about naming and scoping rules in java.
- Nested for Loops This article discusses the nested for loops in java with examples.
- Object-oriented Programming This article discusses about the basics of OOP.
- Objects, Instance Methods, and Instance Variables This article briefs about Objects, Classes, and Instances, Fundamentals of Objects, Getters and Setters.
- OOP Concept – Encapsulation This article discusses about the encapsulation concept in details in object oriented programming.
- Parameters in Java This article explains about Using Parameters, Formal and Actual Parameters, Overloading.
- Programming Environments This article discusses about JDK, Command Line Environment, IDEs and Eclipse, The Problem of Packages.
- Programming with Objects This article describes about Some Built-in Classes, Wrapper Classes and Autoboxing, The class "Object", Object-oriented Analysis and Design.
- Psensor Temperature Monitor This article describes how to test the temperature of the monitor.
- RCPlive: Inter-VLAN Routing This article briefs about the rcplive in Inter-Vlan routing.
- Return Values In Java This article discusses about the The return statement, Function Examples.
- Secure Delete This article describes how to delete securely in ubuntu.
- Securing a Web Server Using a Linux Namespaces Sandbox This article discusses about the securing a Web Server Using a Linux Namespaces Sandbox.
- SSD or HDD – Virtual Machine This article briefs about solid state drive and hard drive and which has faster performance in Virtual Machine.
- Static Subroutines in Java This article explains about the subroutine definitions and calling subroutines.
- Stop the Hard Drive Grinding at Login This article discusses about the reasons and solutions for hard drive grinding at login.
- Strings, Objects, Enums, and Subroutines This article explains Built-in Subroutines and Functions, Operations on Strings and Introduction to Enums.
- Text Input and Output in java This article describes about a first text input example, text output, textIO input functions, formatted output, Introduction to File I/O, Using Scanner for Input.
- The 3N+1 Problem in java This article discusses about the 3n+2 Problem in java in detail.
- The Basic Java Application This article describes about the basics of java application.
- The do..while Statement in java This article describes about the do..while Statement in java with example.
- The Fetch and Execute Cycle: Machine Language This article explains how the cpu fetch and execute the machine language.
- The if Statement in java This article explains about The Dangling else Problem,The if...else if Construction, If Statement Examples.
- The Java Virtual Machine This article explains about how a java program works.
- The Switch Statement in java This article describes about The Basic switch Statement, Menus and switch Statements, Enums in switch Statements, Definite Assignment.
- The While Statement in java This article explains about the while statements in java with example.
- Throwing Exceptions and Global and Local Variables This article describes about Throwing Exceptions,Global and Local Variables.
- Try..catch in java This article describes about try and catch in java.
- Understanding The Virtualization Lifecycle In The Context Of Cloud Computing: A Beginner’s Approach This article briefly discusses about at the Virtualization lifecycle in the context of Cloud IaaS.
- Variables and the Primitive Types This article explains about the variable and primitive types of java.
- What are PID and PPID? This article discuss about process id and parent process id in linux.
- Which is Faster: SSH or FTP? This article explains steps to test which mode of transfer is faster, Secure shell or File Transfer protocol.
- Abstract Classes This article explains about the abstract classes.
- Architecture of Distributed Systems This article explains the communication, performance and scalabilty and architecture of distributed systems.
- Array Initialization This article describes about array initialization with examples.
- Arrays and for Loops This article discusses about the arrays and for loops with necessary examples.
- Arrays and Strings in CPP This article discusses the arrays and strings with single, double and multi dimensional arrays.
- Arrays, for-each Loops and Array Types in Subroutines This article describes about the arrays, for-each loop and arrays types in subroutiines.
- ATM and Client - Server Model This article discusses the ATM and Client-server Model in detail.
- Banker's Algorithm This article describes about the deadlock avoidance with the banker's algorithm.
- Benefits of Multithreading and Process Vs Thread This article explains about the Multithreading benefits and comparison between process and thread.
- Bus Based and Switch Multicomputers This article explains the Bus Based and Switch Multicomputers.
- Bus Based and Switched Microprocessor This article discusses the Bus Based and Switched Microprocessor.
- Channels, International Compatibility and Frames This article explains the Channels with their international compatibiltiy, Frames and their subfield.
- Class Specification and Objects in CPP This article explains the class specifications, class objects, scope resolution operator and access members.
- Classical IPC Problems This article explains the dining philoshopers problem, readers and writers problem and sleeping barbers problem.
- Communication in Distributed System and Remote Procedure Call This article describes the Communication in Distributed System and RPC, its principles and examples of RPC.
- Constructors and Destructors in CPP This article explain using constructor and destructor in CPP.
- Creating and Using Arrays This article explains about creating and using arrays with examples.
- Data Dissemination and Management This article explains the three kinds of broadcast models, namely push-based broadcast, On-demand (or pull-based) broadcast, and hybrid broadcast.
- Deadlock and its conditions This article describes the deadlock and conditions of deadlock and examples.
- Deadlock Modeling and Prevention This article discusses the deadlock modeling and prevention with methods for handling deadlock.
- Defining Member Functions and Data Hiding in CPP This article describes the defining member functions and data hiding in cpp.
- Device Controllers, Memory Mapped I/O and Port Mapped I/O This article describes the Device Controllers, Memory Mapped I/O and Port Mapped I/O in detail.
- Different Data Types This article describes the different data types and Modifying the Basic Types.
- Distributed and Real Operating System This article describes about the distributed system, distributed operating system and real operating system.
- Distributed System - An Introduction This article describes the distributed system introduction, advantages and disadvantages.
- DMA, Layers in I/O and Device Drivers This article explains the DMA, Layers in I/O and Device Drivers.
- Dynamic Arrays This article discusses about the dynamic arrays.
- Evolution of Operating System - I This article explains the multitasking system, serial processing, simple batch processing and multiprogrammed batch system.
- Extending Existing Classes in Java This article briefs about extending existing classes in java.
- Fault Tolerance This article explains the Fault Tolerance, classification of failures and challenges facing fault tolerance.
- File Operation and Structure This article describes the file operation and structure.
- File System Layout, Directories and Access Control Matrix This article describes the File System Layout, Directories and Access Control Matrix.
- File Systems, Naming and Attributes This article explains the file-system, naming and attributes.
- Files Organization and Access Mechanism This article explains various types of file organization and access mechanisms with file allocation methods.
- Fragmentation and Segmentation This article explains the internal, external fragmentation and segmentation.
- Function Components and Arguments Passing in CPP This article explains the general form of function components and arguments passing in cpp.
- Function Overloading in CPP This article describes how to use the same name for two or more functions.
- GUI Components and Layout This article explains about the grphical user interface components and layouts.
- GUI Events and Listeners This article discusses about the events and listener of GUI.
- Heterogeneity, Interoperability and Quality of Context in Mobile Devices This article describes the Heterogeneity, Interoperability, Context awareness and Quality of Context in Mobile Devices.
- Implementation of Process This article discusses about the implementation of process, context switching, threads and multithreading.
- Inheritance and Class Hierarchy in Java This article explains about the inheritance and class hierarchy in Java.
- Input and Output Systems This article explains what is I/O system and some operational parameters.
- Interfaces This article discusses about the interfaces in java.
- Interrupt driven I/O, DMA and Disks This article explains the interrupt driven i/o, DMA and disks.
- IP Address and IPV4 Header This article explains the IP Address and IPV4 Header.
- IP addresses are divided into class This article describes the ip address divided into class.
- JFrame and JPanel This article describes the components of content to use GUI applications Jframe and Jpanel.
- Kernel - An Introduction This article explains Introduction, Context switching (Kernel mode and User mode), First level interrupt handing, Kernel implementation of processes.
- Kernel Data Structures This article describes the process relations, task structures, process ids, timing and files, I nodes.
- LAN and WAN This article discusses about the Local Area Network and Wide Area Network in detail.
- Linux and its Characteristics This article discusses about the characteristics of linux, kernel directory structure in linux and introduction to linux kernel.
- Logical and Deployment Architectural View This article describes the Logical Architectural View: Composition of Web Services and the Deployment Architectural View: From Application Servers to Peer-to-Peer.
- Main Algorithms of a Linux Kernel This article explains the main algorithms of a linux kernel, with signals, Booting the systems, hardware, software and Timer interrupts.
- Memory and Memory Management This article explains types of memory, memory mangement and two major schemes of memory management.
- Memory Management with Bitmaps and Linked List This article explains the Memory Management with Bitmaps and Linked List.
- Memory Partitioning This article describes two types of memory partitioning namely Fixed Partitioning and Dynamic/Variable Partitioning.
- Mobile Device Technologies - I This article describes the mobile app development, mobile app testing and mobile device management.
- Mobile Device Technologies - II This article discusses the Device management specifications, OTA, Adaptation and its models.
- Multi-dimensional Arrays This article describes about creating and using multi-dimensional arrays.
- Multi-Threading Model and Inter process Communication This article describes the multithreading model and interprocess communication in detail.
- Nested Classes This article describes about nested classes in java.
- Operating System Functions This article discusses the operating system functions like files, system call, shell and kernel.
- Operating System Introduction This article explains about the operating system and two views of the operating system.
- Operating System Structure - I This article describes the structure of operating system and structuring mechanism of the operating system like monolithic system, layered system.
- Operating System Structure - II This article discusses the structure of operating system and structuring mechanism of the operating system like client server model and virtual system.
- Operators in CPP This article explains the four main classes of operators : arithmetic, relational, logical and bitwise.
- Overview of C++ This article explains the OOP concept with encapsulation, polymorphism and inheritance.
- Page Replacement Algorithms This article explains different types of page replacement algorithm.
- Paging This article describes the paging in detail.
- Parameterized Constructors This article discusses about the parameterized constructors in cpp.
- Partially Full Arrays This article explains about the partial full arrays in detail.
- Pervasive Web Application Architecture This article describes the Pervasive Web Application Architecture.
- Pointers & User-defined types in CPP This article describes the pointers and user-defined types in cpp.
- Polymorphism in Java This article discusses about the polymorphism.
- Presentation technologies This article explains the Presentation Technologies like XSL, XFORMS and XHTML.
- Process - An Introduction This article discusses the process, process model and process creation.
- Process Functions This article explains, unix system call, process termination, process states and process control block.
- Programmed I/O This article describes the Programmed input/output.
- Race Condition and Avoiding Race Conditions This article explains the race condition and avoiding race condition.
- RAID, Terminal Types and Clock This article discusses the Raid 0 to 7.
- Recursive Functions in CPP This article discusses the recursive function definition with a simple example.
- Scheduling - An Introduction This article discusses about the scheduling, its criteria and types.
- Scheduling Algorithms - I This article explains FCFS, Shortest job first, and round robin scheduling algorithms.
- Scheduling Algorithms - II This article describes Priority scheduling, multilevel queue, guranteed and lottery scheduling.
- SOA, Architecting Web Services, Technology Stack This article explains the Service- oriented Architecture, Architecting Web services and webservices technology stack in detail.
- Static Data Members in CPP This article explains the static data members in cpp with example program.
- Structuring with Schemas This article describes a simple XML document, xml declaration and its components, document type declaration and XML based Standards.
- Swapping, Noncontinuous memory Location This article discusses the swapping, logical vs physical address, noncontiguous memory location and virtual memory.
- Techniques for avoiding Race condition - I This article describes some techniques for avoiding race conditions like disabling interrupts, lock variables, strict alteration, peterson's solution and TSL instruction.
- Techniques for avoiding Race condition - II This article discusses about the sleep and wakeup, semaphores, monitors and message passing.
- The Basic GUI Application This article describes about the two basic GUI of java. i.e. Standalone appilcations and applet.
- this and super This article describes the Special Variable this, The Special Variable super, Constructors in Subclasse.
- Types of Wireless LANs This article describes the types of Wireless Local area network, Wireless distribution systems, roaming and Wireless Standards.
- Web services This article describes the webservices, Business Motivation, B2B E-Commerce, Technical Motivation for websevrices and Limitations of CORBA and DCOM.
- XML schema types and DTD types This article describes the XML Schema and its types also the DTD and its types in detail.
- XML, benefits and advantages This article explains the xml , its benefits and its advantages over HTMl, EDI and Databases.
- I/O techniques This article discusses the physical I/O Path from the CPU storage system.
- A physical centralized architecture This article explains the centralized architecture, basic 2-tier client-server architecture and classification of DBMS.
- Absolute positioning This article explains the absolute positioning, positioning elements and advantages of dynamic XHTML.
- Abstract classes using virtual functions This article discusses the Abstract classes using virtual functions with example.
- Accessing I/O devices in system memory This article describes the Accessing i/o devices in system memory.
- Addressing modes of computer - I This article explains the implementation of variables and constants and indirection and pointers.
- Addressing modes of computer - II This article describes the indexing and arrays and relative addressing.
- Advantages and functions of DBMS This article discusses the advantages, functions of DBMS and Role of DB Administrator.
- Applications in CPP This article explains the applying generic functions in cpp with example.
- Architecture of DBMS This article explains the three different levels of the architecture are three different views of the data.
- Assembly language This article explains the assembler directives, assembly and execution of programs and number notations.
- Associative mapped caches This article describes the Associative mapped caches in detail with diagram.
- Asymmetric storage virtualisation This article describes the Asymmetric storage virtualisation.
- Asynchronous bus This article explains about the asynchronous bus in detail.
- Attributes and data integrity This article explains the types of attributes and data integrity in detail.
- Availability of disk subsystems This article explains the availability of disk subsystems.
- Base class in CPP This article explains the base class in inheritance concept in cpp with example.
- Basic concepts of memory system This article explains the block diagram of CPU main memory connection, memory access time and memory cycle time.
- Basic input/output operations This article discusses the basic input and output operations.
- Basic operational concepts of computer This article describes the basic operational concepts of computer with a diagram.
- Basic syntax of HTML This article describes the basic syntax and text markup of Html.
- Basics of javascript This article discusses the introduction to javascript.
- Box model and background images in HTML This article explains the box model and background images in html.
- Bus structure and performance of a computer This article explains the bus structure and performance of a computer briefly.
- Buses in computer architecture This article explains about the synchronous bus in computer architecture.
- Cache memory This article explains the cache memory, primary and secondary addresses, Hits and misses.
- Caching: acceleration of hard disk access This article discusses the Cache on the hard disk, Write cache in the disk subsystem controller and Read cache in the disk subsystem controller.
- Cascade style sheet - introduction This article describes the cascade style sheet in detail.
- CD-ROM - functions This article discusses the strengths and weakness, storage as hierarchy and buffer management of CD-ROM functions.
- CGI.pm MODULE This article explains a sample Common gateway interface page written in Perl using CGI.pm.
- Changing colors and fonts This article explains the changing colors and fonts with programs.
- Characteristics of DBMS This article describes the characteristics of DBMS, DBMS utilities and difference between File system and DBMS.
- Classical viewing This article explains the three basic elements for viewing.
- Compact Disc read only memory This article explains the introduction and physical organization to CD-ROM.
- Comparison: Fibre channel SAN, FCoE SAN, iSCSI SAN and NAS This article explains the comparison of the different I/O paths of SCSI, iSCSI, Fibre Channel, FCoE and NAS.
- Connectivity part This article discusses the connectivity part in detail.
- Constructors, destructors and inheritance in CPP This article discusses two major questions. First, when are base-class and derived-class constructors and destructors called? Second, how can parameters be passed to base-class constructors?
- Cookies and its uses This article discusses the uses of cookies like Session management, Personalization and Tracking.
- Coordinate systems, frames and affine transformers This article explains the Coordinate systems, frames and Affine transformations.
- Copy constructors in CPP This article describes the copy constructor in cpp with program and definition.
- CPP stream classes This article explains the cpp stream classes with predefined streams.
- Data compression and its types This article describes the data compression, compact notation and run-length coding.
- Data model This article explains the five types of data model in detail.
- DBMS languages This article describes the DDL, DML, amd DBMS interfaces.
- Defining logic instructions This article discusses the Shift and rotate instructions in detail.
- Design using static and dynamic memory chips This article describes design using both static and dynamic memory chips.
- Different RAID levels This article explains different levels of RAID in detail.
- Direct mapped caches This article explains the direct mapped caches with diagram.
- Direct memory access (DMA) This article discusses about the DMA, bus, centralized and distributed arbitration.
- Display the contents of a file and detecting end of file This article discusses the display the contents of a file and detecting end of file in c++.
- Domain name conversion This article explains the web browsers, www and client server in detail.
- Dragging and dropping elements This article describes the dragging and dropping elements in detail.
- Dynamic content This article describes the dynamic content in detail.
- Dynamic objects and pointers to objects in CPP This article explains the dynamic objects and pointer to objects in cpp with example.
- Encoding of machine instructions This article explains encoding of machine instructions.
- Exceptions This article describes the Recovery from Errors, Debugging and Privilege Exception.
- Fibre channel (FC) - 0 This article explains the fibre channel-0 cables, plugs and its signal encoding.
- Fibre channel (FC) - 1 This article describes the 8b/10b encoding, ordered sets and link control protocol.
- Fibre channel (FC) - 2 This article discusses the fibre channel data transfer and a three-layer hierarchy for the transmission of data.
- Field and record organization This article describes the field and record organization.
- Font styles and images in HTML This article discusses the font styles and images tag in html.
- Formatted I/O and I/O manipulators This article discusses the formatting using the ios members and I/O manipulators types.
- Forms in HTML This article discusses the forms with Radio buttons, check boxes, Menus, Reset and Submit buttons and Text areas.
- Frames in HTML This article explains the frames tag and frameset tag in detail.
- Friend functions in CPP This article explains the friend functions in cpp with definition and example program.
- Fstream and the file classes in CPP This article describes the fstream and the file classes, opening and closing a file and reading and writing text files.
- Fundamentals of computer design This article explains the Classes of Computers, Desktop computing and servers.
- Generic functions and classes in CPP This article discusses the generic functions and classes in cpp with definition and example.
- Geometric objects and transformations – I This article discusses Scalars, points and vectors.
- Geometric objects and transformations – II This article discusses the Transformations in homogeneous coordinates, Concatenation of transformations, World Space and The Modeling Transform.
- Granting access in CPP This article discusses how to grant access in cpp.
- Graphics architectures and programmable pipelines This article explains the Graphics Architectures with Early Graphics system and Display processor architecture & Programmable Pipelines with Terminologies, Graphics Pipeline, Vertex Processor, Clipping and Rasterization.
- Graphics programming This article discusses the sierpinski gasket in graphics programming.
- Graphics systems and models This article discusses the Applications of computer graphics, Graphics systems and output devices.
- Handling multiple devices This article explains Vectored Interrupts, Interrupt Nesting and Simultaneous Requests.
- Hard disks and internal I/O channels This article discusses the hard disks and internal input/output channels.
- Images and imaging systems This article describes the Images - Physical and synthetic, Image formation models and Imaging systems.
- Implementation considerations on virtualisation This article describes the realisation of the virtualisation entity, Replacement of storage devices, Efficient use of resources by dynamic storage allocation, Efficient use of resources by data migration etc.
- Informal design guidelines for relational schema This article explains the Semantics of the Attributes, Reducing the Redundant Value in Tuples, Reducing Null values in Tuples and Disallowing spurious Tuples.
- Inheritance and protected members in CPP This article explains the Inheritance in cpp with definition and example.
- Input and interaction This article explains the Project Sketchpad, Input devices, Incremental (Relative) Devices, Logical and Graphical Logical Devices, Input Modes, Request Mode and Event Mode.
- Instant copies This article explains the instant copies.
- Instruction execution and straight-line sequencing This article describes the Branching, Conditional codes and Generating memory addresses.
- Instruction set architecture and trends This article explains the instruction set and trends.
- Instructions of computer This article explains the Register transfer notation, Assembly language notation and Basic Instructions.
- Intelligent disk subsystems This article explains the architecture of intelligent disk subsystem.
- Interface circuits - I This article describes the interface circuits with parallel ports.
- Interface circuits - II This article discusses the interface circuits with serial ports.
- Internet - An introduction This article describes the brief introduction to the internet.
- Interrupt hardware This article discusses about the interrupt hardware and enabling and disabling interuppts.
- Introduction to Database This article explains the introduction, data, information, metadata and database.
- Introduction to ER model This article describes the introduction and symbol of ER model, ER model concepts and types of attributes.
- Introduction to the design and specification of the file structures This article explains the heart, history of file structures and fundamental file processing operations.
- Link services This article explains the Link services and its login and addressing.
- Links, ports and topologies This article discusses the Links, ports and topologies.
- List tag in HTML This article explains the List tag in html.
- Lists in CPP This article explains the lists with definition and an example program.
- Local file systems This article describes the File systems and databases, Journaling, Snapshots and Volume manager.
- LUN masking This article discusses the LUN masking in detail.
- Maps in CPP This article describes the maps with explanation and an example.
- Memory chips This article discusses about the memory chips in detail.
- Menus and picking in GL This article explains the menus and picking in graphical language with an example.
- Moving elements and element visibility This article discusses the Moving Elements and Element Visibility with an example programs each.
- Network attached storage This article discusses the Network Attached Storage in detail.
- Network file systems and file servers This article explains the basic principle of network file systems.
- OpenGL - animating interactive programs This article describes the Double Buffering, Writing Modes such as XOR write, Rubberbanding and XOR in OpenGL.
- OpenGL - clients/servers and display lists This article describes the clients and servers and display lists.
- OpenGL - color This article discusses the RGB color and Indexed color.
- OpenGL - control functions This article describes the Control Functions (interaction with windows), Aspect ratio and viewports, The main, display and myinit functions and Control Functions.
- OpenGL - modeling and programming event driven input This article discusses the Display Lists And Modeling, Programing Event Driven Input such as Window Events, Keyboard Events, The Display and Idle callbacks and Window Management.
- OpenGL - viewing This article explains the Viewing, OpenGL Camera, Orthographic view & Transformations and Viewing.
- OpenGL primitives and attributes & approximating a sphere This article explains the Primitives and attributes, Polygon Issues and Approximating a sphere.
- Opening and closing files This article describes the opening and closing of files.
- Operator overloading using a friend function This article discusses the operator overloading using operator+() is made into a friend with example.
- Passing objects as arguments in CPP This article describes the passing objects as arguments in cpp.
- Passing parameters to base class constructors This article describes how to pass arguments to a constructor in base class.
- Performance bottlenecks in file servers This article describes the performance bottlenecks in fileservers.
- Peripheral devices of computer This article discusses about the magnetic disk drives, hard disk drive, Platters and Read/Write Heads, Drive Electronics, Data organization on the Disk and Disk Drive Dynamic Properties.
- Portability and standardization This article discusses about the sequential access, direct access, keyed access.
- Primitive data types in HTML This article explains the primitive data types in html.
- Protected base class inheritance and inheriting multiple base classes This article describes how to inherit a baseclass as protected and a derived class to inherit two or more base classes.
- Pseudo classes and properties in HTML This article discusses the pseudo classes and properties in Html.
- Pure virtual functions This article describes the pure virtual function with a general form and a simple program an example.
- Query string format This article describes the query string format with its URL encoding.
- Random access memory (RAM) This article describes the cache memory, memory interleaving and virtual memory.
- Reacting to mouse click This article discusses the Locating the Mouse Cursor and Reacting to a Mouse Click.
- Reading and writing files This article explains the read and write functions and files.
- Refresh operation and semi-conductor ROM memories This article discusses the refresh operation and semi conductor read only memories in detail.
- Relationships of ER model This article describes the degree of relationship, replacing ternary relationship and cardinality.
- Relative positioning This article describes the natural position in the documents flow.
- Remote mirroring This article describes the remote mirroring in disk subsystems.
- Returning objects and arrays of objects in CPP This article discusses the returning objects and array of objects in cpp with its definition and an example program.
- Rotation, translation and scaling This article describes the rotation, translation and scaling.
- San architecture and hardware devices This article explains Creating a network for storage and Storage area network hardware devices.
- Secondary storage and system software - I This article discusses the disks and organization of disks.
- Secondary storage and system software - II This article describes the cost of a disk access, effect of block size and disk as a bottle neck.
- Seeking This article describes the seeking with Cstreams.
- Server-centric IT architecture and its limitations This article discusses the server centric IT architecture and its limitations.
- Shared disk file systems This article discusses the Shared disk file systems in detail.
- SIC architecture This article explains the SIC architecture in detail.
- Slow movements of elements This article explains the move Image( ) function in java script.
- Small computer system interface This article describes the small computer system interface.
- Stacking elements This article explains the stack elements with an example program.
- Stacks and queues This article explains the stacks and queues of the computer memory.
- Standard I/O interfaces This article describes the PCI bus, data transfer, SCSI bus and device configuration.
- Storage virtualisation This article discusses the definition of storage virtualisation.
- Storage virtualisation on block or file level This article explains the storage virtualisation on block or file level.
- Storage virtualisation on various levels of the storage network This article discusses the Storage virtualisation in the server, Storage virtualisation in storage devices, Storage virtualisation in the network.
- Storage virtualisation using RAID This article describes the virtualisation in storage using RAID concept.
- Storage-centric IT architecture and its advantages This article describes storage centric IT architecture and its limitations.
- String in HTML This article explains the strings, implicit conversion type and explicit conversion types.
- Subroutines in computer organization This article describes the Subroutine nesting and the processor stack, Parameter passing and the stack frame.
- Symmetric storage virtualisation in the network This article explains the data access layer and a volume management layer.
- Tables in HTML This article describes the Table tag with some examples in html.
- The common gateway interface This article explains the Common Gateway Interface and its linkage.
- The database system environment This article explains the Typical DBMS Component Modules.
- The direct access files system This article explains the DAFS, its server and clients.
- The fibre channel protocol stack This article explains the fibre channel protocol stack.
- The general parallel file system This article describes the applications of GPFS file system and additional management unit.
- The openGL This article describes the OpenGL application programming Interface and its functions.
- The synthetic camera model and programmer's interface This article discusses the synthetic camera model and programmers interface with 3D API.
- The view transform This article describes the Effect of the Viewing Transformation.
- The web programmer’s toolbox This article explains the Document languages and programming languages.
- Types and functional unit of computers This article discusses about the different types of computers, input, memory, ALU, output and control unit.
- Typical organization of a dynamic memory chip This article explains the Typical organization of a dynamic memory chip and Design consideration for memory systems.
- Universal serial bus (USB) This article explains USB, Port limitation, device characteristics and plug - play.
- Unix directory structure and physical devices and logical devices This article explains the special characters in files, Unix directory structure and physical devices and logical devices.
- USB architecture This article discusses the USB architecture in detail.
- Using inheritance for record buffer classes This article explains how to use inheritance for record buffer classes.
- Virtual base classes in CPP This article explains the an element of ambiguity can be introduced into a C++ program when multiple base classes are inherited.
- Virtual function and virtual attribute in CPP This article discusses the Calling a Virtual Function Through a Base Class Reference and Virtual Attribute Is Inherited.
- Virtual function in CPP This article describes how virtual functions are executed in cpp.
- Virtual functions are hierarchical This article explains the virtual functions are hierarchical with an example.
- Virtual Memory This article describes the virtual memory, its advantages, memory menagement by segmentation and paging.
- Web servers This article describes the Web Server Operation, Web Server Operation Details, Difference between apache and IIS and HTTP.
- A high level introduction to OGSI This article explains a high level introduction to OGSI.
- Activity Diagrams This article discusses the activity diagrams with action states.
- Advanced Classes I This article explains the Scope of a Classifier and Visibility of a Classifier.
- Advanced Classes II This article describes the advanced classes Abstract, Root, Leaf and Polymorphic Elements, attributes, operations and template classes.
- Advanced Relationships This article describes the Stereotypes for Dependency relationship and Association Classes.
- Bubble sorting with example in C/C++/JAVA This article describes the bubble sort in c,c++ and java.
- Business on demand and infrastructure virtualization This article explains the Business On demand and infrastructure virtualization.
- Class Diagrams This article explains the Steps involved in modeling, To model simple collaborations and To model a logical database schema with reverse and forward engineering.
- CMM - II This article discusses the new constructs for resource modeling, CMM-Defined Manageability Interfaces.
- Collaborations This article discusses the behaviour and organization of collaborations with modeling Realization of a Use Case and Realization of an Operation
- Commercial Data Centre This article explains the commercial data centre in grid computing.
- Common Distributed Logging This article explains the OGSA logging service architecture model
- Common Management Model (CMM) This article describes the common management model with managebility interfaces, domain-specific interfaces.
- Component Diagrams This article describes the components diagrams with modeling Source Code, Executable Release, Physical Database and Adaptable Systems.
- Control Structures and Statements in C and CPP This article explains the Control structures and statements in C and C++.
- Current Grid Activities This article discusses the current grid activities in detail.
- Data and Network Requirements This article discusses the Data grid and Tera grid.
- Deployment Diagrams This article explains the deployment diagrams and its components.
- Device Files API This article describes the device files API in detail with a program.
- Difference Between Procedure Oriented (POP) and Object Oriented Programming (OOP) This article explains the differences between the POP and OOP.
- Directory Files API This article discusses the directory files API with the use of the functions.
- Discussion on relationship between Web Service and Grid Service This article discusses the Interaction aware state information and application aware state information with stateful web services and grid services.
- Early Grid Activities This article explains the computational and data grids.
- Events and Signals This article explains the events and kind of events with Modeling family of signals and Exceptions.
- Exec Functions This article explains the exec functions with program and changing user ID's, Group ID's.
- File and Record Locking This article explains the madatory lock and advisory lock in detail.
- Grid Applications This article explains the scheduler, resource broker, load balancing, grid portals and Integrated solutions.
- Grid Architecture This article discusses the grid architecture in detail.
- Grid Architecture and Relationship This article describes the Grid Architecture and Relationship to other distributed technologies.
- Grid Business Areas This article describes the grid business ares like Life sciences, financial services, higher eductaion, engineering services, research collboration and government.
- Grid Computing - Introduction This article describes how grid Computing equates to the world's largest computer.
- Grid Computing Road Map and Autonomic Computing This article discusses the grid computing road map and autonomic computing.
- Grid Infrastructure This article discusses the security, resource management, information services and data mangement.
- Grid Service - I This article discusses the naming and change Management recommendations.
- Grid Service Handle Resolution Concepts This article describes the Grid service handle resolution concepts.
- Grid Services This article describes the Grid services with diagram.
- Grid Services and Client Programming Models This article explains the Grid services and client programming models.
- Grid Services and Service Programming Models This article discusses the Grid services and service programming models.
- Inheritance and Polymorphism This article discusses the Generalization, Abstract operations and classes and Advanced Generalization.
- Insertion sorting algorithm with example code in C/CPP/Java languages This article describes the Quick sorting algorithm with example code in c/cpp/java languages.
- Instances This article explains the instances with Modeling Concrete Instances and Modeling Prototypical Instances.
- Interaction Diagrams This article explains the sequence and colloboration diagrams with Modeling Flows of Control by Time Ordering and Modeling Flows of Control by Organization.
- Interactions This article explains the Creation, Modification, and Destruction of links, sequencing, Representation of interactions with Modeling a Flow of Control.
- Interfaces types and roles This article explains the Interface relationships, types, roles and Static and Dynamic modeling in UML.
- Introduction to Service Data Concept This article describes the Introduction to service data concepts
- Introduction to Software Architecture This article discusses the Design frameworks, Design pattern and Architecture description language (ADL).
- Introduction to UNIX This article discusses the UNIX, ANSI and POSIX standards.
- Job control in UNIX This article discusses the job control in unix.
- Legion This article discusses the Legion core object and relationship.
- Lifecycle of grid service instance This article explains the service lifecycle management using a soft-state approach and service operation extensibilty features.
- Lock Promotion and Lock Splitting This article explains the lock promotion and lock setting with the procedure for setting the mandatory locks for unix.
- NASA Information Power Grid This article explains the NASA information power grid in detail.
- National Fusion Collaboratory This article explains about the national fusion collaboratory project.
- Object Diagrams This article describes the Modeling Object Structures.
- Online Media and Entertainment This article describes the online media, entertainment and functional requirements of OGSA.
- Open Grid Services Architecture This article explains the Open Grid Services Architecture with clarification and usage of resources and services.
- Organization Building Grid Computing This article explains the Organization Building and Using Grid-Based Solutions to solve computing.
- Organization developing grid computing toolkits and framework This article explains the organization developing grid computing toolkits and framework.
- Organization developing grid computing toolkits and framework - I This article describes the Condor and Condor-G, Nimrod, parametric computational experiments, unicore and NMI.
- Organization developing grid standards This article describes Global gird forum in detail.
- Orphaned Process Groups This article explains the orphaned process group with a program.
- Package - Introduction This article discusses the introduction to packages, Nested packages, Package dependencies, Transitivity, Package generalization, Cyclic package dependencies and Architectural analysis.
- Packages This article explains the Importing and Exporting, Generalization with Modeling Groups of Elements and Modeling Architectural Views.
- Policy Architecture This article explains the levels of abstration and a sample policy service work.
- Process Accounting This article discusses the process accounting with example program.
- Process Groups and Sessions This article describes the process groups and sessions.
- Process Identifiers This article explains the fork, file sharing and work functions in detail.
- Processes and Threads This article describes the processes and threads with Flow of Control, Classes and Events with Modeling Multiple Flows of Control and IPC.
- Quick sorting algorithm with example code in C/CPP/Java languages This article discusses the Quick sorting algorithm with example code in c/cpp/java languages.
- Race Condition in UNIX This article discusses the situation when mutliple process trying to do something with shared data.
- Relationship and dependency among resources This article explains the Relationship and dependency among Resources.
- Relationship between web service and grid service This article describes the Relationship between web service and grid service.
- Security Architecture This article explains the grid service security architecture.
- Selection sort in C/C++/Java programming languages This article discusses the selection sort in c,c++ and java.
- Semantic Grids This article discusses the semantic web architecture.
- Service domains This article explains the OGSA Service domain Architecture.
- Service oriented architecture This article explains the Service Oriented Architecture briefly.
- Service oriented architecture and grid This article describes the Service Oriented Architecture and Grid in detail.
- Signals and deamon processes This article describes the introduction to signals and deamon processes.
- Soap - introduction This article discusses the introduction to the SOAP.
- Soap features and modules This article explains the SOAP models, modules and features.
- State chart diagrams This article explains the state chart diagrams with modeling reactive objects.
- State machines This article discusses the state machine with modeling lifetime object.
- System functions This article describes about the system functions with a program.
- The grid computing anatomy This article describes the grid computing organization and their roles.
- The grid problem This article explains the concept of virtual organization.
- The OGSA platform components This article discusses the OGSA platform components like OGSA infratstructure, hosting environment etc.
- The posix.1 fips standard This article describes POSIX 1 Federal Information Processing Standard.
- The unix kernel support of the signals This article discusses the unix kernel support of the signals.
- Unix files This article describes the UNIX and POSIX file types.
- Use case diagrams This article describes the Modeling the Context of a System and Requirements of a System.
- Use cases This article discusses the Actors, Use Cases & Flow of Events, scenarios with Modeling the Behavior of an Element.
- User identification This article explains the user identification with program in detail.
- User process (UP) This article discusses the user process definition and elements etc.
- User process structures and phases This article describes the UP phases and structures like Inception phase, Elaboration phase, Transition Phase and Construction Phase.
- Void pointers in C This article explains the void pointers in C.
- Wait and waitpid functions This article explains the wait function with a program and its characteristics.
- Waitpid This article discusses the waitpid with program and functions.
- Web service architecture This article describes the XML, related technologies and their relevance to webservices.
- Web service interoperability and its roles This article explains the Web service interoperability and roles of WSI Organization.
- "Computers In The Air" - What Is Cloud Computing? This article describes the cloud computing process of the Saas, Iaas, Paas.
- 5 Reasons to Update Windows XP to Service Pack2 This article discusses the Microsoft released Service Pack 2 for Windows XP OS.
- 5 Simple Steps to a Quieter PC This article explains the quieter PC in the cases, isolaters, controllers.
- 5 Ways to Back up Your Data This article explains the few methods of the hard drive protected.
- 5 Ways to Block Pop Ups This article describes the pop up blocker applications.
- 5 Ways to Block Spam This article explains the five ways to block spam.
- A Brief History of Apple Computers This article explains a brief history od apple computers.
- ABCs of DVD Drive Abbreviations This article explains the DVD drives of different formats.
- An Introduction to the Linux Command Line This article explains the various commands of the linux.
- Basics of RAID This article describes the RAID of multiple disk drives in detail.
- Blogging Basics This article explains the basics of the blogging.
- Bluetooth Basics This article describes the BT uses of cell phones, PDAs, and laptops
- Bringing Windows to the Linux Desktop This article discusses the Windows programs using MS Office and Adobe Photoshop.
- Building Your Own External Hard Drive This article explains building your own external hard drive.
- Can ASPS Save Your Software Budget? This article explains the how ASP save the software budget.
- Case Modding This article describes the Case modding in detail.
- Choosing a Home Network Configuration This article discusses how to choose a home network configuration.
- Computer Cooling Tips - I This article describes the computer cooling tips.
- Computer Cooling Tips - II This article describes some key features to look for to keep your components running cool.
- Computer Interconnections I This article discusses the computer interconnections in detail.
- Computer Interconnections II This article explains about the USB, Parallel and Serial ports in detail.
- Computer Interconnections III This article disucsses about the sound devices and cards.
- Computer Interconnections IV This article explains about the video cabling in detail.
- Computer Maintenance This article discusses the maintanence of the computer.
- Copying Favorites and Bookmarks to another Computer This article explains how to copy favourites and bookmarks to another computer.
- Customize Your Blog This article discusses how to customize your blog with some easy HTML
- Dual Display Desktop This article explains building dual monitor display.
- Expansion Cards - III This article describes about the PCI and AGP in detail.
- Expansion Cards Part 1: (Of A 3 Part Series) This article explains the formats of PCI, AGP, and PCI Express.
- Expansion Cards Part 2: AGP This article discusses the speed and greater bandwidth and PCI bus.
- Extending the Life of Your Laptop Battery This article discusses the types of battery power performance.
- Five Essential Apps for the Ubuntu User This article discusses the Ubuntu Linux distributions in detail.
- Flash Memory Part 1 This article explains the Devices such as MP3 players, PDAs, mobile phones, digital cameras and PC.
- Flash Memory Part 2 This article discusses the CompactFlash, SmartMedia, xD, and Memory Stick.
- Four Ways to Back Up and Share Files In "The Cloud" This article explains the hard drives dropping in the cloud storage.
- Get Familiar with Linux This article describes the linux pre-installed with Windows or Mac OS X
- Global Positioning System (GPS) This article explains the global positioning system in detail.
- Going Virtual With Virtualbox This article explains the virtualization of host OS and guest OS.
- Hard Drives: ATA versus SATA This article discusses the processors, memory, and video cards in the hard drive.
- Hardware Support on Linux This article discusses the GNU/Linux using the hardware support.
- High Resolution Audio This article discusses the high resolution audio in detail.
- History of Microprocessor - I This article discusses the history of microprocessor in detail.
- History of Microprocessor - II This article describes how microprocessors grew out of a programmable calculator into the first personal computers.
- History of the Internet This article discusses the history of internet.
- How to backup securely This article discusses how to backup securely.
- How to build a computer – I: choosing computer components This article explains how to build a computer.
- How to build a computer - II: choosing computer components This article discusses about the HDD, RAM and Motherboard.
- How to build a computer – III: choosing computer components This article explains the CPU (central processing unit), CPU heat sink/fan and Thermal paste.
- How to build a computer – IV: choosing computer components This article describes how to build a computer with Hard drive cable, Floppy drive cable, CD/DVD drive cable, Video card and Sound card.
- How to install or replace an optical drive This article explains how to install or replace an optical drive.
- How to recover data from a dead hard drive This article describes how to recover your valuable data from a dead computer.
- How to stop phishing, spyware and spam This article explains how to stop phishing, spyware and spam.
- How-to: install a new hard drive This article explains how to install a new hard drive.
- Improving your google searches This article explains the files, booleans and techniques of google search.
- Installing a DVD/CDRW drive This article describes the steps involved in installing a DVD/CD drive.
- Installing a graphics card This article discusses how to install a graphics card in PC.
- Installing a PCI sound card This article explains the steps involved in installing a sound card.
- Installing a power supply This article explains the steps involved in installing a power supply.
- Installing computer peripherals This article describes how to install computer peripherals.
- Installing the MOTHERBOARD, CPU, HEAT SINK, FAN and RAM This article explains the steps involved in Installing the Motherboard, CPU, Heat Sink, Fan and RAM.
- Installing windows XP This article explains the information on installing Windows XP.
- Introducing…windows vista – part I This article explains the new attitude of Vista capabilities and applications.
- Introducing…windows vista – part II This article describes the windows vista in the capabilities and features.
- Introduction to tablet PCS This article discusses the introduction to tablet PC's in detail.
- Keeping windows clean This article discusses how to keep windows without affecting any spyware or malware.
- Laptop accessories This article explains the recommended laptop accessories in detail.
- Linux on your laptop This article describes the hardware supported and test drive on the linux.
- Making sure the most important layers of API space stay open This article explains the most important layers of API.
- Memory basics – An introduction This article explains the basics of the memory.
- Monitors - LCD vs CRT This article explains the LCD (Liquid Crystal Display) and CRT (Cathode Ray Tube).
- Motherboard basics This article describes the main board and primary circuit board in central processing unit (CPU).
- Power & your PC This article explains the power of electrical outlet and voltages.
- Protecting your identity This article explains how to protect the secret identity.
- Remote desktop in windows XP This article discusses setting up Remote desktop in windows XP.
- Replacing your laptop's keyboard This article discusses the general overview to replace your laptop's keyboard.
- Resurrecting an old pc with Linux This article explains the various types of the linux.
- Scanning photos and film This article explains the devices used for scanning photos.
- SCSI basics This article discusses the basics of the Small computer system interface.
- Securing your wireless network This article describes the tech tips on wireless networking.
- Setting up a home or office wireless sound system This article discusses the wireless sound system and advantages.
- Setting up a home wireless network This article describes tips for setting up a Home wireless network.
- Spice up your blog This article explains Spice up your blog with simple formatting.
- Starting your own blog This article discusses how to start a own blog.
- Step up to double layer DVD This article explains the double layer dvd functions.
- Test driving Linux using a live CD This article discusses the linux using a live CD.
- The basics of computer mice This article discusses the basics of the computer mice.
- The future of computer technology This article discusses the future of computer technology.
- Things to consider when choosing a computer case This article describes the computer factors, size, features and power supply.
- USB 3.0 - it's about time This article describes the high-bandwidth and hot-pluggable interface using USB.
- Voice over internet protocol - VOIP: introduction This article discusses the voice over internet protocol technology.
- Windows keyboard shortcuts This article discusses the shorcut keys of windows.
- Wireless networking - I This article explains capabilities and hardware of wireless networking in detail.
- Wireless networking - II This article discusses the setup and security of wireless networking.
- "The entity-relationship model-toward a unified view of data" This article discusses the entity-relationship model-toward a unified view of data.
- “A Relational Model of Data for Large Shared Data Banks” This article explains the relational model of data is proposed as a basis for protecting users of formatted data systems.
- A Review of “The Entity-Relationship Model” This article describes the used as a basis for unification of different views of data.
- A Review of Basic Knowledge of Database System This article discusses the fundamental assumption of the relational model is that all data.
- A Study on CSS This article discusses a study on cascading style sheet.
- A Study on Javascript This article discusses the concept and design of the javascript also its advantages.
- A study on UML This article explains the study on UML in detail.
- Activity Diagram This article discusses the activity diagram with reading and constructing.
- Algebra of Systems This article explains the focuses more on mathematical theory and simulation of the process of designing.
- Arrays and Its Basics This article explains the arrays and its basics
- Business Processes This article discusses the business processes in detail.
- Business Systems This article explains about the business systems in detail.
- Class Diagrams: Generalization and Reading This article discusses the generalization and reading class diagrams.
- Communication Diagram This article discusses the communication diagram of the IT system.
- Compiling, Running and Debugging Java Programs This article discusses the eclipse IDE is an open-source product that was originally created with a substantial code.
- Composing GUI in Java This article describes composing GUI with Jpanel and layouts.
- Compounding Shapes in Java This article discusses the compounding shapes in java.
- Computing the Mode in Java This article discusses the computing the mode in java.
- Concurrency Control This article explains the expansion of a system the reliability of a system in the concurrency control mechanisms.
- Conditional Execution in Java This article explains the conditional execution like if statement in java.
- Conditional Execution in Java II This article discusses the else clause and braces in java.
- Constructing Class Diagrams This article explains the constructing class diagrams.
- Constructing Communication Diagrams This article explains constructing communication diagrams.
- Constructing Diagrams in the Process View This article explains the constructing diagrams in the process view.
- Constructing Package Diagrams This article discusses the constructing package diagrams.
- Constructing Sequence Diagrams This article discusses constructing sequence diagrams.
- Constructing Statechart Diagrams This article discusses how to construct statechart diagram.
- Constructing the External View of an IT System This article discusses the constructing the external view of an IT system.
- Creating a Table in SQL This article describes how to create a table in SQL.
- CSS Box Model This article explains the CSS Box model.
- CSS Comments This article describes about the comments in cascading style sheet.
- CSS Selectors This article discusses the CSS Selectors and its types with syntax.
- CSS Statements, Rules, Declaration Blocks and Selectors This article discusses about CSS statements, rules, declaration blocks and selectors.
- CSS Syntax This article explains the syntax of cascading style sheet.
- CSS Type Selectors This article explains the CSS type selectors.
- CSS Universal Selectors This article describes the description, syntax and example of CSS Universal Selectors.
- Database Summary (Part 1) This article explains the summarized and memorized on the learning activities on database concept.
- Defining Methods in Java This article explains the defining methods in java.
- Defining Methods in Java - II This article discusses the definign methods in java.
- Defining Subclasses in Java This article discusses the defining subclasses in java.
- Developing a wordpress plugin This article discusses the new functions and data will be added to make it a more powerful and useful plugin.
- Distributed Computing This article discusses about the distributed computing.
- Embeded SQL This article describes the techniques of the SQL statements.
- Enlightenment from our product and the database course This article discusses the just like our database knowledge, technology.
- Exceptions in java programming language This article discusses the java exception is an object that describes an exceptional condition that has occurred in a piece of code.
- Features of CSS This article describes features of CSS in detail.
- Generalization, Specialization and Inheritance This article discusses the generalization, specialization and Inheritance.
- Get started with PHP This article describes the PHP code is embedded into the HTML source document.
- Grouping of CSS selectors This article describes the description, syntax and example of grouping CSS Selectors.
- History and relationships of SGML, HTML and XML This article explains the SMGL, HTML and XML are all markup languages.
- History of UML: Methods and Notations This article discusses about the methods and notations in the history of UML
- How Recursion Works In Java This article describes the recursion works in java.
- How to Transform an Entity-Relationship Model into a Relational Model? This article discusses the two models used in database design are the Entity-Relationship Model and the Relational Model.
- HTML5: Aside Element Tutorial This article explains the aside element tutorial.
- HTML5 Canvas Element Tutorial This article discusses the Description, Usage, Attributes, Example, Result and Compatibility of HTML5 canvas element.
- HTML5 Details Tag and Element This article explains the Description, Usage, Attributes, Example and Result, Compatibility of HTML5 details element.
- Information Systems and IT Systems This article explains the information systems and IT systems.
- Inheritance (IS-A) Vs. Composition (HAS-A) Relationship This article describes one of the advantages of Object-Oriented programming language is code reuse.
- Introduction to Data and Procedure This article explains the introduction to data and procedure.
- Introduction to Distributed Database System This article explains the database in which storage devices are not all attached to a common CPU.
- Introduction to HTML 5 – Part 2 This article discusses the Description, Usage, Attributes, Example, Result and Compatibility of HTML5 article element.
- Introduction to HTML5 This article explains the introduction to Html 5 in detail.
- Introduction to Java Programming Language This article explains the introduction of the java programming language is used in critical applications.
- Introduction to Some Useful Functions in PHP This article describes the PHP is a powerful language and it offers many functions.
- Introduction to the case study (UML) This article explains the introduction to the case study of UML.
- Introduction to UML This article discusses about the introduction to Unified modeling language.
- Java Arithmetic Operators This article explains the use arithmetic operators to perform calculations with values in programs.
- Java Arrays This article explains the array is a group of similar typed variables that are referred to by a common name.
- Java Assignment Operators This article describes the assigning a value to a variable seems straightforward enough.
- Java Branching Statements This article explains the java provides three branching statements break, continue and return.
- Java Class, Methods, Instance Variables This article describes the programs consist of two elements: code and data.
- Java Conditional or Relational Operators This article discusses the relational operators determine the relationship that one operand has to the other.
- Java Development Environment Setup This article explains the develop and run any java program you need to install JDK in your system.
- Java for Loop This article describes the for loop is a special loop that is used when a definite number of loop iterations is required.
- Java Logical Operators This article describes the use logical operators to combine these conditions.
- Java Object Oriented Programming Concepts This article discusses the about Java OOP’S concepts with examples and its features of Object Oriented Programming.
- Java Packages This article explains the Java classes need to organize them in packages (think file directories).
- Java Primitive Data Type This article describes the primitive types is a special group of data types.
- Java Program Structure This article discusses the java program to understand structure and features of class.
- Java Switch Statement This article explains the uses control statements to cause the flow of execution.
- Java Wrapper Classes This article discusses the "wrap" the primitive data type into an object of that class.
- Javascript Charts This article describes the modify the interface of our plugin and visualize our data in javascript.
- Learning Data Serialization from Our Lecturing Preparing This article describes the data and data serialization in order to create applications.
- Learning From Brief Introduction to Database This article describes the some basic knowledge about database.
- Modeling Business Systems This article explains the modeling business systems.
- Modeling IT Systems This article explains the modeling IT systems with different views of system.
- More on Classes in Java This article discusses the packages, static methods and constants.
- More on Loops in Java This article explains the for loop and break in java.
- Objects and their classes in java This article discusses the objects and their classes in Java.
- One Model—Two Views This article explains the two views of UML diagram.
- Parallel Computing This article explains the parallel computing in detail.
- Personal Database Learning Summary This article describes about the database learning in the DBMS.
- Personal Summarize of E-R Model This article explains the concept of the ER model and its structure, steps of draw a diagram.
- Query Events and Mutation Events This article discusses the query events and mutation events in external view of IT systems.
- Reading Communication Diagrams This article describes the reading communication diagram of the IT systems.
- Reading Statechart Diagrams This article explains the reading state chart diagrams.
- Reasoning about Correctness This article explains the reasoning about correctness.
- Reasoning about Efficiency This article discusses the reasoning about the efficiency in detail.
- Recursion and Lists This article discusses the recursion and lists.
- Recursion in Java – An Introduction This article explains the introduction to the recursion in java.
- Recursion versus Iteration in Java This article explains the recursion versus iteration in java.
- Relational Model Vs XML This article describes the use an XML data representation even for non-XML data.
- Repetition Statement This article explains the repetition statement in java.
- Requirement Specification of UML This article describes the requirement specification of UML in detail.
- Seeing What Happens Inside the IT System This article explains the interaction view of the IT system.
- Sequence Diagram This article explains the interaction view of the IT system with sequence diagram.
- Sorting in Java This article explains merge sort, insertion sort and selection sort.
- Stacks in Data and Procedures This article describes the stacks in data and procedures.
- State Chart Diagram This article discusses the state chart diagram of the behaviour view in the IT systems.
- String Methods and Equality Test in Java This article explains the string methods and equality test in java.
- Strings in Java This article discusses the strings in java.
- Structural View: Objects and Classes This article explains the structural view of an IT systems with objects and classes.
- Subclasses in Java This article explains the subclasses in java.
- Subclasses in Java - II This article discusses the Subclasses and variables.
- Summary of Database Storage and Querying This article explains the more on the logical model of a database rather than the physical model.
- Summary of Transaction This article discusses the basic concepts of the transaction.
- Swing Basics in Java This article discusses the swing basics, with simplest GUI and inserting components.
- Terminology of System Integration This article discusses the terminology of the system integration.
- The Business System Model as Foundation This article discusses the business system model as foundation.
- The Function and Relationship of Wordpress' Database Table This article discusses the catogorized as the entities and their relationships of database tables.
- The Life of an Object – IT Systems This article explains the life of an object in IT systems.
- The Models of Our Case Study This article explains the models pf our case study in detail.
- The User View of an IT Systems This article discusses the user view of an IT systems.
- Transaction This article explains the transaction is a sequence of read and write operations on a certain database.
- UML: Class Diagram This article explains the UML class diagram in detail.
- UML: Effects This article discusses the effects on UML.
- UML: External View This article discusses the external view of unified modeling language.
- UML: Model This article discusses the model of the unifies modelling language.
- UML: Package Diagram This article explains the package diagram in internal view of UML.
- UML: Use Case Diagram This article explains the use case diagram of IT systems.
- UML: Models, Views, and Diagrams This article discusses the UML, its models, views and diagrams.
- Understanding of SVN Structure This article discusses the versions of files such as source code, web pages, and documentation.
- Use Case Sequence Diagram This article explains the use case sequence diagrams.
- User Interaction in Java This article explains the user interaction in java.
- Using Numbers in Java This article explains how to use numbers in java with numeric types and return values.
- Using Numbers in Java - II This article discusses the arithmetic and Exceptions in java.
- Variables and Objects in Java This article discusses the variables and objects in java
- Variables and Objects in Java - II This article explains the variable assignment and instance methods.
- While Loops in Java This article discusses the loop is a sequence of instructions that is continually repeated until a certain condition is reached.
- Seven things to consider when choosing a pda This article explains the things to be consider while choosing personal digital assistant.
- 5 tweaks to make after installing an ssd drive This article discusses the five tweaks to make after installing an SSD drive.
- A compilation of errors This article describes the compilation of errors in erlang.
- A set of sets This article discusses a set of sets in erlang.
- A simple guide to building your own linux kernel This article explains a simple guide to building your own linux kernel.
- A study on javascript This article describes an introduction to javascript.
- A study on jmeter and remote servers This article discusses the study on Jmeter and remote servers.
- Accessing a home laptop remotely from android This article explains accessing a home laptop remotely from android.
- Accessing linux data partitions from windows This article describes how to access linux data partitions from windows.
- Add markup tags This article explains how to add markup tags.
- Adding colors in the html5 This article explains adding colors in the Html5.
- Adding supervision and namespaces This article discusses the adding supervision and namespaces in detail.
- Advanced uses of csrf This article discusses the advanced uses of CSRF in detail.
- An event module This article explains an event module in detail.
- An introduction to linux networking This article describes the basics of linux networking.
- Analysis of a wordpress plugin exploit This article discusses the plugin is Custom Contacts Form in the wordpress.
- Anonymous functions This article describes the anonymous functions in detail.
- App development on the cloud made easy with paas This article explains the app development on the cloud made easy with platform as a service.
- Are we afraid of test automation This article explains whether are we afraid of test automation.
- Array data structure This article explains the array data structure in detail.
- Automated backups This article describes the automated backups in detail.
- Automating a legacy system This article discusses the automating a legacy system.
- Backup strategies for linux (and other) operating systems This article explains how to backup the files in linux os.
- Basics of scaling: cache everything This article explains the various techniques used to scale your applications better.
- Basics of scaling: load balancers This article describes the load balancers allow you to distribute load between several servers.
- Boolean algebra and comparison operators This article discusses the Boolean Algebra and Comparison operators in erlang programming.
- Bootstrap – a starter for the impatient This article describes the man pages and Similarities Between Linux & DOS.
- Building the semantic web This article explains the building the semantic web.
- Cfm connectivity cheatsheet This article describes the CFM connectivity cheatsheet in detail.
- Checking for root kits This article discusses the checking for root kits.
- Choosing a boot loader This article explains how to choose a boot loader.
- Compiling linux software from source code This article explains the compiling linux software from source code in detail.
- Compiling the code in erlang This article describes the compiling the code in erlang.
- Concepts of concurrency This article explains the concept of concurrency.
- Configuring apache 2 on debian, ubuntu This article discusses the configuring apache 2 on debian and ubuntu.
- Configuring lilo, the linux loader This article discusses the configuring LILO and the linux loader.
- Create application icons on the linux kde 3 desktop This article explains how to create application icons on the linux KDE 3 Desktop.
- Create system icons on the linux desktop This article discusses how to create system icons on the linux desktop.
- Creating, editing and managing vms This article explains the creating, editing and managing VM's.
- Customize your linux desktop This article describe some of the ways you can customize your Linux desktop
- Customize your linux desktop- II This article explains how to customize the themes in linux.
- Cyber attacks explained: cryptographic attacks This article describes the cyber attacks like cryptographic attacks in detail.
- Cyber attacks explained: dns invasions This article explains the cyber attacks like DNS invasions.
- Cyber attacks explained: DOS and DDOS This article discusses the cyber attacks like DOS and DDOS.
- Cyber attacks explained: packet crafting This article describes the cyber attacks like packet crafting in detail.
- Cyber attacks explained: packet spoofing This article explains the cyber attacks with packet spoofing.
- Cyber attacks explained: the man in the middle This article explains the cyber attacks like man in the middle.
- Cyber attacks explained: web exploitation This article discusses the cyber attacks like web exploitation
- Cyber attacks explained: wireless attacks This article explains the cyber attacks like wireless attacks in detail.
- Data types This article discusses the data types in detail.
- Dealing with exceptions This article explains the dealing with exceptions.
- Demystifying backups This article discusses the demystify backup in linux.
- Deploy a dns server in a secure way This article explains how to deploy a DNS server in a secure way.
- Difference between performance testing and functional automated testing This article discusses the difference between performance testing and functional automated testing.
- Disable sendfile when using nginx + vagrant This article describes the nginx setup going as your development environment.
- Display your linux system information This article discusses the display your linux system information.
- Do i need antivirus and anti-malware software on linux This article discusses about the antivirus and anti-malware software on linux.
- Don’t use symlinks in vagrant for config files This article discusses the use restart/reload your Vagrant VM.
- Dynamite-strong typing This article discusses the dynamite strong typing in erlang.
- Editing files with emacs This article discusses the editng files in linux with emacs.
- Editing files with vi This article describes the editng files with vi.
- Encrypted malware payloads This article discusses the concepts of encrypted malware payloads.
- Ethernet protection switching This article explains the ethernet protection switching in detail.
- Exploring the different linux career opportunities This article discusses the explore the different linux career opportunities.
- Extend wireless router capabilities using a netbook or laptop This article discusses about wireless router in detail.
- Extended javascript projects This article explains the extended javascript projects.
- Finding the right linux distribution This article explains how to find the right linux distribution.
- For type junkies This article explains the for type junkies.
- Framesets in HTML This article explains the framesets in html.
- G.8032 ring advanced protection switching This article describes the ring advanced protection switching.
- Game trading between two players This article explains game trading between two players.
- Generic finite-state machines This article discusses the generic finite state machines.
- Getting started with cygwin This article discusses the Cygwin is a collection of tools which provide a Linux.
- Getting started with HTML This article discusses the how to start with Html.
- Getting started with vagrant This article describes the using a simplified command line interface.
- Graphic applications software This article discusses the graphic applications software.
- Graphics programming in linux This article describes the graphics programming in linux.
- Guards in erlang This article discusses the syntax of guards in erlang programming.
- Higher order functions in erlang This article explains the higher order functions in erlang.
- How bash redirection works under the hood This article discusses the how bash redirection works under the hood.
- How linux creates processes This article explains the uses of Linux creates every process.
- How linux pipes work under the hood This article describes the concepts of Linux & Unix based operating systems.
- How to find the ip address of skype user This article discusses the ipaddress of skype user.
- Html form of javascript This article discusses the html form of javascript in detail.
- Html hypertext links This article discusses the html hypertext links in detail.
- HTML interface This article discusses the html interface in detail.
- HTML5 canvas This article describes the html5 canvas in detail.
- Improve multi-os computer performance through cross swapping This article explains how to improve multi-os computer performance through cross swapping.
- Install linux from usb on system without bios support for usb boot This article describes how to install linux from USB on system without BIOS support for USB boot.
- Installing .TGZ .TXZ .TLZ AND .TBZ FILES This article explains how to install .tgz .txz .tlz and .tbz files
- Installing linux software applications (package repositories) This article describes the installing linux software applications.
- Installing linux software applications (packages) This article explains linux software and its applications.
- Installing software on linux This article explains how to install softwares on linux.
- Introducing samba 4 now, even more awesomeness This article describes the SAMBA in server.
- Is "Directory" Or "Folder" The Correct Term in Linux This article discusses which is the correct term in linux directory or folder.
- IT pays to be a linux expert This article explains about the value of linux in IT.
- JavaScript - creating a TOC This article discusses creating a TOC in the javascript.
- JavaScript comments This article explains the java script comments.
- JavaScript Template This article explains the javascript template in detail.
- JMeter – Private Remote Servers or a Service? This article explains whether the Jmeter is a private remote servers or a service.
- JMeter and Oracle Webcenter This article discusses the Jmeter and Oracle Webcenter in detail.
- Jmeter and webdriver – why would you want to combine them? This article explains the three Reasons to combine JMeter and WebDriver in performance testing a webapplication.
- Jump, Loop and Call Instructions This article explains the jump, loop and cal instructions in detail.
- Keeping Messages Secret This article explains about the program in erlang.
- Key-Value Stores This article explains the key-values stores in detail.
- Kill an Unresponsive Program Gracefully This article explains how to kill an unresponsive program gracefully.
- Learn the Art of Linux Troubleshooting This article explains the art of linux troubleshooting in detail.
- Learning C++ Coding On Linux This article explains the learning c++ coding on linux.
- Links in Erlang This article discusses the links in erlang.
- Linux - Give That Old Hardware A New Lease on Life This article explains the linux in detail.
- Linux - Is It Right For Me or My Business This article discusses whether the linux os is right for the business.
- Linux: Adding File Systems to the Tree This article explains the adding file systems to the tree in linux.
- Linux and Its Distributions This article explains what is linux and its distributions.
- Linux Command Line Basics This article explains the linux command line basics.
- List Comprehensions This article discusses the list comprehensions in erlang programming.
- Lists in Erlang This article explains the lists in erlang programming
- Loading Library Files in C++ This article discusses how to load library files in c++.
- Long Running PHP Script Gotcha This article explains the PHP mostly affects long running scripts.
- Making Animated GIF with GIMP This article discusses how to make animated GIF with GIMP
- Manage Your E-Mail Inbox This article explains how to manage our email inbox.
- Managing Linux Software with YUM and RPM This article explains the managing linux software with yum and rpm.
- Managing Software with 'URPM' This article discusses how to manage software with urpm.
- Maps, Filters, Folds and More This article explains the maps, filters, folds and more.
- Markup Languages This article explains the markup languages in detail.
- Modules This article explains what are modules and modules declarations.
- More about Modules This article discusses more about the modules in erlang programming.
- More Recursive Functions This article discusses the more recursive functions.
- More than Lists This article discusses the lists in erlang.
- Move Your IE Favorites to Firefox Bookmarks This article explains the how to move your IE favourites to firefox bookmarks.
- Moving Applications When You Upgrade Your Computer This article discusses the moving applications when you upgrade your computer.
- Networking in Linux This article discusses the linux networking in detail.
- Networking Windows and Linux This article explains the networking windows and linux.
- NGINX Syntax Highlighting For Sublime This article explains the sublime text has no built-in support for Nginx configuration files.
- Not Entirely Unlike Linear Scaling This article discusses the not entirely unlike linear scaling.
- Numbering Systems This article explains the numbering systems in detail.
- Numbers and Invariable Variables This article explains the numbers and invariable variables in Erlang programming.
- Numbers in JavaScript This article explains the numbers in javascript in detail.
- OAM CFM This article explains what is OAM CFM and what does it mean?
- Objects in JavaScript This article discusses the object in javascript.
- Open Telecom Platform This article explains the open telecom platform.
- Operators in JavaScript This article discusses the operators in javascript.
- Optimizing Your PHP with XDebug This article discusses the lot of PHP applications with xdebug.
- Organize Your Documents and Files This article discusses the how to organize your documents and files.
- Partitions: Planning Your Linux Installation This article discusses the partitions planning your linux installation.
- Pattern Matching This article explains the pattern matching in erlang.
- Playing Hide and Seek With Passwords This article describes the how to assign passwords.
- Quick Sort in Erlang This article explains the quick sort in erlang.
- Radians and Degrees in JavaScript This article explains the radians and degrees in javascript.
- Raising Exceptions This article discusses the raising exceptions in erlang.
- Records This article discusses the records in erlang.
- Recover Deleted Files in Linux This article explains the recover deleted files in linux.
- Requirements for Load & Performance Testing This article discusses the requirements for load and performance testing.
- Revamp Your IT Career as a Cloud Security Expert This article explains the revamp your IT career as a cloud security expert.
- Reverse Polish Notation Calculator This article explains the reverse polish notation calculator.
- Root, Command, Login & Directory This article describes about the root, command, login and directory in linux.
- Rootkits: The Enemy Within This article explains the rootkits in detail.
- Run-Time Errors This article explains the runtime errors in detail.
- Secure Upload Methods in PHP This article discusses the secure uploads in PHP.
- Secure Your Network with Firewall Builder This article explains how to secure your network with network builder.
- Secure Your PHP Application This article describes how to secure the PHP application.
- Securing Apache This article discusses the securing apche in linux.
- Securing Apache: Attacks on Session Management This article explains the attacks on session management.
- Securing Apache: Attacks That Target PHP-Based Instances This article explains the attacks that targets PHP based instances for secure apache.
- Securing Apache: DoS & DDoS Attacks - I This article describes on DoS/DDoS attacks, which have been among the major threats to Web servers.
- Securing Apache: DoS & DDoS Attacks - II This article explains how DDoS is attacked in detail.
- Securing Apache: HTTP Message Architecture - I This article explains HTTP response splitting and HTTP request smuggling.
- Securing Apache: HTTP Message Architecture - II This article explains HTTP request splitting attacks and HTTP response smuggling attacks.
- Securing Apache: Mod Security This article discusses the mod_security for securing apache server.
- Securing Apache: The Basics - I This article explains the basics of securing apache.
- Securing Apache: The Basics - II This article discusses the phases in Apache request processing.
- Securing Apache: The Basics - III This article explains securing your applications and learn how break-ins occur.
- Securing Apache: XSS Injections - I This article explains the XSS injections in securing apache.
- Securing Apache: XSS Injections - II This article discusses about the types of vulnerabilities.
- Securing Apache: XSS Injections - III This article describes the latest trends in XSS.
- Securing Apache: Fool-Proofing the Server OS This article discusses the fool-proofing the server os in securing apache.
- Securing Database Servers This article explains the secure database servers.
- Selecting Performance Test Tooling – Part 1 This article discusses how to select performance test tooling in detail.
- Selecting Performance Test Tooling – Part 2 This article explains the selecting perforamnce test tooling with Jmeter.
- Selecting Performance Test Tooling – Part 4 This article explains the performance test tooling in detail.
- Selecting Performance Test Tooling – Part 3 This article discusses about Some challenges in the PoC, Sikuli and SilkTest.
- Selective Receives This article explains the'flushing' concept makes it possible to implement a selective receive which can give a priority to the messages you receive by nesting calls.
- Set Up a Certificate Authority in RHEL5 This article describes how to set up a Certificate Authority in RHEL5.
- Setting a 1080p HDTV as A Monitor Connected To a VGA Port This article discusses how to setup a 1080p HDTV as a monitor connected to a VGA port.
- Setting Up a Lamp Server Remotely This article describes the setting up a LAMP server remotely.
- Setting Up VPS on LINUX This article explains how can setup a virtual private server in linux.
- Shared Computing — Where PCI Performs and USB Lags This article explains the shared computing where PCI performs and USB lags.
- Shared Directories in Ubuntu This article explains sharing a directory with other account users on the same computer using Ubuntu.
- So what is /Proc Anyways? This article describes the certain commands used in the proc.
- Specific vs Generic This article explains the specific vs generic in detail.
- State your state This article explains the state your state in detail.
- Storage Management Using Openfiler – II This article describes the storage management using openfiler.
- Technical skills are a must for modern testers This article explains the technical skills are must for modern testers.
- Test Automation – Finding Your Starting Point This article explains the test automation finding your starting point.
- Test Automation in Agile and Why It Fails This article discusses the test automation in agile and why it fails.
- Test Automation Metrics – Mashing Up Non-Test Data This article explains the test automation metrics in detail.
- Test Automation Metrics – What Do You Report On? This article discusses what to report on test automation metrics.
- The Advantages of Computer Hardware Designed For Linux This article explains the advantages of computer hardware designed for linux.
- The Basic Server in Erlang This article describes the basic server in erlang.
- The Comprehensive Lamp Guide This article explains the comprehensive LAMP guide.
- The Comprehensive Lamp Guide - II This article discusses the comprehensive LAMP guide in detail.
- The Cost of Test Automation This article discusses the cost of test automation.
- The Difference for Test Automation between Cutting Edge and Legacy Software This article explains the difference for test automation between cutting edge and legacy software.
- The Event Server in Erlang This article explains the event server in erlang.
- The Linux (Virtual) File System This article explains the virtual file system in detail.
- The Need of Secured E-Mail This article explains the need of secured email in detail.
- Thinking Recursively This article discusses the recursive functions in detail.
- Time out Program in Erlang This article describes the timeout program in erlang.
- Tips and Tricks for Using Two Factor Authentication Technology This article explains the tips and tricks for using two factor authentication
- Troubleshooting in Linux This article discussses the troubleshooting in linux.
- Try a Try in a Tree This article describes the Try syntax in erlang.
- Ubuntu Server Failure This article explains the ubuntu server failure in detail.
- Understanding Arrays This article describes the arrays & hash maps are one of the cornerstones of modern computer programming.
- Understanding Network Blocks This article discusses the understanding network blocks.
- Understanding the PHP-FPM Status Page This article explains the features of the PHP-FPM pool.
- Understanding the Problem This article discusses the understanding the network the problem.
- Users and Groups This article discusses the users and groups.
- Variables: HTML Interface of JavaScript This article explains the variables with html interface of javascript.
- Varnish VCL Syntax Highlighting For Sublime This article describes the Sublime Text editor and many non-standard languages.
- Virtualbox This article describes the virtualbox in detail.
- Virtualization in Linux This article discusses the virtualization in linux.
- VMware Player This article explains the Vmware player in detail.
- Wait, there's more in Erlang This article discusses the about the exceptions in detail.
- Web Application Frameworks This article describes about some web application framework.
- What is an Operating System This article discusses the operating system in detail.
- What the IF This article explains the if statement in erlang.
- When is Automation Useful? This article explains when is the automation useful.
- Where did the files go in Linux? This article describes the file path of linux.
- Why CSRF Works This article explains the working of Cross-Site Request Forgery Attacks.
- Why Use Vagrant? This article describes the differences between Windows and Linux, many of which affect PHP, Node.js, Ruby, etc.
- Why You Should Be Using CloudFlare This article explains the CDN can significantly speed up your website.
- Why You Should Be Using Strace This article explains the used to monitor the system calls used by a program.
- WIP: Circuit Sandbox This article discusses the create logic gates and build circuits.
- Wireless Networking in Linux This article explains wireless networking in linux.
- Working and Tags of HTML This article describes how HTML works and an introduction on its tags.
- Arithmetic Expressions in C Programming - I This article describes arithmetic expressions like unary operators and comma operators.
- Arithmetic Expressions in C Programming - II This article explains the arithmetic expressions like ternary operators, modulus and logical operators.
- Arrays in C Programming This article explains the arrays in c promming
- C Preprocessor This article explains the c preprocessor for the purpose like Including header files, Conditional compilation and Macro definitions.
- Classification of Software Bugs This article explains the classification of software bugs in detail.
- Compiling a simple C Program - I This article discusses how to compile a c program in detail.
- Compiling a simple C Program - II This article explains the compiling and executing a c program.
- Constants in C Programming This article explains the constants in C Programming.
- Control of Flow of C Programming - I This article discusses the for, while and do statements in c programming.
- Control of Flow of C Programming - II This article explains the break, continue, if and if-else statements in c programming.
- Control of Flow of C Programming - III This article discusses the nested if, else-if, switch and goto statements in c programming.
- File Handling in C Programming This article discusses handling files in C Programming.
- Functions in C Programming This article explains the functions in c programming.
- History of C Programming Language This article explains the history of C Programming Language.
- Input and Output of C Programming This article explains the input and output of c programming in detail.
- Operation on Bits This article discusses the operation on bits in C Programming.
- Pointers in C Programming This article explains the pointers in c programming.
- Searching and Sorting in C Programming This article discusses the searching and sorting in c program.
- Strings in C Programming This article discusses the strings in c programming.
- Structures in C Programming This article discusses the structures in c programming.
- The World of Dynamic Programming This article discusses the world of dynamic programming.
- Unions in C Programming This article explains the unions in c programming.
- Variables in C Programming This article discusses the variables in c Programming.
- A Brain inside a Chip This article discusses the brain inside a chip.
- Advanced driver management in windows 7 This article explains the device manager, driver installation and Searching for drivers.
- Advanced sharing settings in windows 7 This article explains the settings of the advanced sharing things.
- App switching and snapping in windows 8.1 This article describes the App Switching,
App Snapping and Closing Apps. - Application compatibility issues in windows 7 This article explains the application of compatibility troubleshooting.
- Apply updates to windows 7 image using dism This article explains the current packages and its adding packages of mount image.
- Basics of cryptography This article discusses the digital signatures, Need and Techniques of Cryptography.
- Basics of cryptography - II This article explains the basics of cryptography in detail.
- Closer to quantum internet This article discusses how closer the quantum internet.
- Configure ipv4 in windows 7 This article discusses the network and sharing center of the configure IPV4.
- Configure ipv6 in windows 7 This article describes the network and sharing center in the configure IPV6.
- Configure security zones in windows 7 This article describes the using "Custom level" button to change the default security level of each zone.
- Configuring branchcache in windows 7 This article explains the branchcache configuration in group policy and configuration in command line.
- Configuring offline files in windows 7 This article discusses the offline files configuration and multiple users.
- Configuring power options in windows 7 This article describes find the power options screen in control panel.
- Configuring windows firewall with advanced security in windows 7 This article describes the windows firewall with advanced security.
- Create a vpn connection in windows 7 This article explains the how to creating the VPN Connection.
- Create a windows 7 USB installation source This article explains the during the process of USB flash drive.
- Create virtual hard disk (vhd) using disk management in windows 7 This article discusses the disk management, initialize and format.
- Create virtual hard disk (vhd) using diskpart in windows 7 This article describes the run CMD in User Account Control prompt.
- Create winpe using waik for windows 7 This article discusses the run deployment tools in CMD and create winPE ISO.
- Credential manager in windows 7 This article describes the use credentials from the Manager.
- Customizing windows 8.1 This article discusses the start screen and the settings screen options.
- Description of typical network services on servers This article discusses the description of typical network services on servers.
- Desktop environment in windows 8.1 This article discusses the all applications of the Start Screen of Windows 8.
- Difference between the network and the workstation operating systems This article discusses the difference between the network and the workstation operating systems.
- Different types of system vulnerabilities and attacks This article explains the different types of system vulnerabilites and attacks.
- Directaccess feature in windows 7 This article discusses the use DirectAccess feature and its connection.
- Editing ntfs permissions in windows 7 This article describes the editing NTFS permissison in the windows 7.
- Event viewer in windows 7 This article describes the using filters and event viewer.
- Examples of cryptographic attacks This article explains the attacks related to passwords are often password cracking or password guessing.
- Exceptional problems demand exceptional computers This article explains the exceptional problems demand exceptional computers.
- File explorer in windows 8.1 This article explains the use File Explorer to work with files on folders on our local computer and network locations.
- Internet connection sharing (ics) configuration in windows 7 This article explains the two network connections of the ICS configuration.
- Introduction to servers This article explains the introduction to servers.
- Introduction to windows 7 This article describes the Windows 7 Editions and its home basic in the hardware requirements.
- Is D-wave a quantum computer? This article discusses the D-Wave quantum computer.
- Libraries in windows 8.1 This article discusses the libraries and its managing libraries.
- Manage existing windows 7 images This article discusses the using a Deployment Image Servicing and Management tool.
- Managing local authentication in windows This article describes the Credentials Manager run as command, account policies and smart cards.
- Managing services in windows 7 This article explains the services snap-in, services and CMD.
- Migrate to windows 7 using usmt This article explains the running USMT on source computer and destination computer.
- Migrate to windows 7 using WET This article describes the running of the Windows Easy Transfer (WET).
- Migrate to windows 8 using windows easy transfer (WET) This article describes the run the WET tool in Windows 8.
- Monitoring performance in windows 7 This article explains the performance of the monitor and data collector sets.
- Mount and unmount windows 7 image using imagex and dism This article explains the image location of mount image using imageX and DISM.
- Overview of different application server models This article describes the overview of different applications server models.
- Overview of four main access control models This article discusses the overview of four main access
- Overview of network types and topologies This article discusses the overview of network types and topologies.
- Overview of new user interface in windows 8 This article describes the user interface and the navigation style.
- Overview of typical windows server roles This article describes the overview of typical windows server roles.
- Prepare for windows 7 image capture This article describes the use to capture Windows images.
- Printer configuration in windows 7 This article discusses the installing and managing the printer.
- Removable storage and system security in windows 7 This article describes the use removable storage access and windows portable devices.
- Running apps as different users with run as in windows 7 This article explains the running apps in the different users.
- Satellite based quantum cryptography This article explains the satellite based quantum cryptography
- Service windows 7 image using dism This article describes the working with features, mounting image and unmounting image.
- Stage a driver in windows 7 This article describes the list of all nonstandard drivers.
- The difference between unicast, multicast and broadcast messages This article explains the difference between unicast, multicast and broadcast messages.
- Uac configuration in windows 7 This article discusses the user accounts in control panel.
- Upgrade to windows 7-overview This article discusses the different editions, platforms and its hardware requirements.
- Upgrading to windows 8 This article discusses the Upgrade Options and Upgrade Assistant.
- Usage of disk defragmenter tool in windows 7 This article discusses the usage of the disk defragmenter tool.
- Usage of disk quotas in windows 7 This article discusses the open properties of our disk and then open the Quota tab.
- User account policies in windows 7 This article discusses the user account policies in the windows 7.
- Using disk management and diskpart to mange disks in windows 7 This article explains the create simple volume using disk management.
- Using msconfig in windows 7 This article discusses the using msconfig tool.
- Viewing system information in windows 8.1 This article explains the have full access to Windows settings and information.
- Windows 7 image capture demonstration This article describes the prepare the reference system and run WinPE.
- Windows 7 image deployment demonstration This article explains the Boot Into WinPE, Connections, Installation and its uses.
- Windows 8 editions and system requirements This article explains the Windows 8 features and require additional requirements.
- Working with libraries in windows 7 This article explains the network locations and sharing libraries on the network.
- Working with shared folders in windows 7 This article discusses the working of the shared folders of the windows 7.
- Working with windows firewall in windows 7 This article discusses the two type of firewalls are involved in the windows 7.
- ‘Man-In-The-Middle’ Attack On Data Being Transferred Over Network This article discusses the data is being transferred over the network.
- Adapter Design Pattern (Wrapper) This article explains the provides a wrapper over a sub-system.
- Array Implementation Of Stack This article describes the implementation of Stack is usually using linked list.
- Big And Little Endian This article explains the two ways of storing multibyte data.
- Boundary Conditions In Image Morphology This article discusses the boundary conditions in image processing.
- Build Binary Tree From Ancestor Matrics This article discusses the ancestor matrix of a binary tree.
- Check If A Binary Tree Is Complete Binary Tree This article explains the binary tree where each level is completely filled.
- Check If A Tree Is Almost Complete Binary Tree This article discusses the pointer to the root node of the binary tree.
- Check If All Leaf Nodes Are At The Same Level This article describes the function to check if all leaf nodes of the tree are at the same level.
- Compute X^N (X To The Power N) This article explains the compute uses of minimum number of multiplications.
- Convolution This article discusses the Image convolution is a linear image processing operation.
- Creating An Encrypted Disk Image On OSX This article discusses how to create an encrypted disk image on OSX.
- DHCP Snooping This article discusses the DHCP snoofing in detail.
- Factory Design Pattern This article discusses the object-oriented Creational design pattern.
- Find Number Occurring Odd Number Of Times In An Array This article explains the find the number repeating odd number of times.
- Find Two Elements In An Array Whose Sum Is X This article explains the find two elements in the array of integers.
- Generalization: Rank Order Filters This article decsribes the brick rank order filter evaluates, for every pixel.
- How Is Rasterop Implemented Efficiently? This article explains the implemented by shifting and masking operations.
- Implementation Of Affine Transformations This article explains the two different approaches to implement an affine transformation on an image.
- Implementation Using The Van Herk/Gil-Werman Algorithm This article discusses the algorithm is similar to our fast method for convolution.
- Internet Of Things This article discusses the internet of things in detail.
- Internet Of Things Applications This article explains the applications of Internet of things.
- Islands In A Two Dimensional Array This article describes the each element in the array is connected to eight other elements.
- Light Emitting Diodes : Introduction This article discusses the Light emitting diode in detail.
- Linear Search In Detail This article discusses the method for finding a particular value in a linear list of values.
- Linked List Implementation Of Stack In C++ This article explains the implement the Stack data structure in C++.
- Mobile Technologies For Traffic Control This article explains the mobile technologies for traffic control in detail.
- Next Greater Power Of 2 This article explains the integer in greater than or equal to n which is a power of 2.
- Non-Recursive Solution To Tower Of Hanoi This article discusses the new activation record for each call on the stack.
- Number Of Nodes In A Binary Tree This article discusses the function return the total number of nodes in a Binary tree.
- Number Of Possible Triangles From Given Array Of Numbers This article explains the number of possible triangles from given array of numbers.
- Overview Of Image Scaling This article discusses the implement of both image processing and image analysis.
- Print All Nodes At Distance K From Root Of A Binary Tree This article describes the print all the nodes which are at distance ‘k’ from the root.
- Print First Non-Repeating Character In The String This article describes the print the first character that is repeating later in the string.
- Proxy And Http Authentication And Authorization Needs A Reboot This article explains the proxy and HTTP authentication.
- Reverse Map Delegation This article discusses the RFC 2317 allocation of sub-nets on non-octet boundaries.
- Rotation And Fast Rotation By Area Mapping This article explains the rotation and fast rotation by area mapping.
- Rotation By Sampling And Shear This article discusses the rotation by sampling and the sher.
- Searching In A Linked List This article describes the function which will search for a value in the list.
- Shearing An Image This article describes the useful to arbitrary horizontal line, and vertical shears.
- Singleton Class With Public Constructor This article describes the constructors to be defined as private member of the class
- Singleton Design Pattern This article discusses the creation of only one instance(object) of a particular class.
- Smart Grid This article discusses the introduction, history and benefits of the Grid.
- Stealth (A.K.A. DMZ Or Hidden Master) Name Server This article explains the name server which does not appear in any publicly visible NS Records for the domain.
- Summary Of Available Implementations This article explains the Summary of available implementations.
- The Destination Word Accumulation Implementation Of Binary Morphology This article discusses the Tdestination word accumulation implementation of binary morphology.
- The Rasterop Implementation Of Binary Morphology This article explains the rasterop implementation of binary morphology.
- The Tophat And H-Dome Transforms This article explains the tophat transform is a composite operation and h-dome transform uses grayscale reconstruction.
- What Else Can You Do With Rasterop? This article discusses the transforms on a two-dimensional image that encompass translation, shear, rotation and scaling.
- What Is Fork? How Processes Are Created Using Fork This article describes the meaning of the fork and its processes.
- What Is Rasterop This article decsribes the operations in image composition, image transformation and image analysis is the rasterop.
- What Is The Calling Sequence For Rasterops? This article discusses the use application programmer's interface (API) for rasterop.
- What Special Cases Have Been Implemented? This article decsribes the rasterop to treat the special cases efficiently.
- What Types Of Image Scaling Are Useful? This article explains the color images used in colormapped grayscale.
- What’s Next For The Internet Of Things This article describes what is next for Internet of things.
- Wireless Mobile Medical Devices This article explains the wireless mobile medical devices in detail.
- A Deep Dive into C# Abstract Class This article explains a Deep Dive into C# Abstract Class.
- A Deep Dive into C# Errors or Exceptions Handling This article describes the a deep dive into C# errors or exceptions handling.
- A Deep Dive into C# Interface This article describes a Deep Dive into C# Interface.
- A Deep Dive into C# Property This article discusses a Deep Dive into C# Property.
- A Module’s Name This article discusses the achieved using the name attribute of the module.
- Access Modifiers in Java This article explains the Access Modifiers in Java.
- An Internet Protocol Address is Not a Personal Identifier This article explains an internet protocol address is not a personal identifier.
- Arraylist in Java This article describes the arraylist in java.
- Backing Up Linux - II This article discusses the Backing up linux in detail.
- Backing Up Linux and Other Unix(-Like) Systems This article explains the backing up linux and other unix systems in detail.
- Backing Up Linux: General Warnings This article describes the general warnings while backing up linux.
- Basics of Python This article explains the Python concept using constants and variables.
- Basics of Synchronization in Java This article explains the basics of synchronization in java.
- Best Practices for Multithreading in Java This article discusses the best practices for multithreading in java.
- Best Practices for Serialization in Java This article discusses the best practices for serialization in java.
- Best Practices for Using and Writing Exceptions in Java This article explains the best practices for using and writing exceptions in java.
- Break Statement and Continue Statement This article explains the break statement is used to break out of a loop statement.
- C Sharp Delegates and Plug-in Methods with Delegates This article discusses the Csharp delegates and plug-in methods with delegates.
- C Sharp Extension Method This article explains the C Sharp extension method
- C Sharp Generic Delegates Func, Action and Predicate with Anonymous Method This article describes the C Sharp Generic delegates Func, Action and Predicate with anonymous method.
- C Sharp Var Data Type and Anonymous Type This article describes the C sharp var data type and anonymous type.
- Change the Background of Finder Windows This article discusses the change the background of finder windows.
- Check the Available Hard Drive Space on a Mac This article discusses how to check hard disk space on a Mac.
- Class and Object Variables This article describes the bound to the namespaces of the classes and objects.
- Classes and Methods This article discusses the new class using the class statement and the name of the class.
- Classes and Objects in Java This article discusses the classes and objects in java.
- Computers and the Tragedy of the Commons This article discusses the computers and the tragedy of the commons.
- Constant in C Language This article describes the constants in C language.
- Constructor in C Sharp This article explains the constructor in CSharp.
- Constructors in Java This article describes the constructors in java.
- Copying File Contents Using Streams, Readers & Writers This article explains the copying file contents using streams, readers and writers.
- Create a Keyboard Shortcut for Any Menu Item This article explains how to create a keyboard shortcut.
- Creating a Dedicated 5GHZ Airport Network This article explains the creating dedicated 5GHZ Airport network.
- Data Structures This article explains the used to store a collection of related data.
- Data Types in C Language This article explains the Data Types in C language.
- Deadlock in Java with Example This article discusses the deadlock in java with example.
- Decision Control Constructs in Java This article explains the Decision control constructs in java.
- Default Argument Values This article describes the some parameters optional and use default values in case.
- Difference between Constant and Readonly and Static This article discusses the difference between Constant and ReadOnly and Static.
- Difference between Ref and Out Parameters This article describes the Difference between ref and out parameters.
- Difference between Response.Redirect and Server.Transfer This article explains the Difference between Response.Redirect and Server.Transfer
- Docstrings This article describes the documentation strings, usually referred to by its shorter name docstrings.
- Enable Intellisense in SQL Server 2005, 2008 This article discusses the how to enable Intellisense In Sql Server 2005, 2008.
- Encryption as a Munition This article explains the encryption process in detail.
- Evaluation Order and Expressions This article describes the evaluation order and the expressions.
- Exceptions This article explains the occur when exceptional situations occur in your program.
- Explicit and Automatic String Conversion in Java This article discusses the explicit and automatic string conversion in java.
- Function Parameters This article describes the Parameters are specified within the pair of parentheses in the function.
- Functions This article discusses the functions are reusable pieces of programs.
- Getting Started with Perl on Mac OS X This article describes the getting started with perl on mac os x.
- Handling Exceptions This article discusses the handle exceptions using the try..except statement.
- How to Add Page Numbers To a Microsoft Word Document This article explains how to add page numbers to a microsoft word document.
- How to Benchmark your MAC This article explains how to benchmark your Mac.
- How to Burn an ISO Disc Image on your MAC This article discusses how to burn an ISO disc image on your Mac.
- How to Change the Margins in a Microsoft Word Document This article discusses the how to change the margins in a microsoft word document.
- How to Change your Mac's DNS Servers This article explains how to change the DNS servers in Mac.
- How to Change your Mac's Startup Disk This article describes about changing the Mac's startup.
- How to Configure Network Locations in OS X This article discusses how to configure network locations in OSX.
- How to Configure Your Mac's Firewall This article explains the configure your Mac's firewall.
- How to Connect to Hidden Wireless Networks This article explains how to connect to hidden wireless networks.
- How to Create User Accounts In Mac OS X This article explains how to create a user account in Mac.
- How to Disable Automatic Login This article describes disabling automatic login.
- How to Disable Inline Attachments in Mail.App This article describes how to disable inline attachments in mail.app.
- How to find the best DNS Servers This article discusses how to find the best DNS servers.
- How to find your Mac's IP Address This article discusses the how to find your mac's IP address.
- How to Insert Values to Identity Column in SQL Server This article discusses how to insert values to identity column in SQL Server.
- How to make an OS X Recovery USB Drive This article discusses how to make an OSX recovery USB drive.
- How to Minimize Windows in Slow Motion This article discusses how to minimize windows in slow motion.
- How to Monitor your Mac's Memory Usage This article discusses how to monitor the Mac's memory usage.
- How to Move Your Email to another Mac This article discusses how to move the email from one to another mac.
- How to Password Protect your Mac This article explains how to password protect your mac.
- How to Set a Static IP Address in Mac OS X This article explains how to set a static IP address in Mac OSX.
- How to Set File Permissions in Mac OS X This article explains how to set file permission in Mac OS.
- How to Set your Mac's Time Zone This article explains how to set the time zone in Mac.
- How to Take a Screenshot on Your Mac This article explains how to take a screenshot on your Mac.
- How to Use your Mac as a Wireless Router This article discusses MAC as a wireless router.
- Import Statements in Java This article describes the import statements in java.
- Important JDBC Core API Classes, Interfaces and Exceptions This article discusses the important JDBC core classes, Interfaces and exceptions.
- Important Methods of the Thread Class This article discusses the important methods of the thread class.
- Inner Classes in Java This article explains the inner classes in java.
- Input and Output This article explains the using the raw_input() function and print statement.
- Installation of Python This article explains the Installation on Windows using Python.
- Interface Vs Abstract Class This article explains the Interface Vs Abstract Class.
- Introduction of Python This article describes the Introduction and features of the Python.
- Introduction to C Language This article discusses the Introduction to C Language.
- Introduction to C Sharp This article discusses the introduction to csharp.
- Introduction to Exceptions in Java This article explains the exceptions in java.
- Introduction to JDBC This article describes the introduction to JDBC.
- Introduction to Multithreading in Java with Example This article explains the introduction to multithreading in java with example.
- Introduction to Strings in Java This article describes the introduction to strings in java.
- Jump Statements in C# This article explains the Jump statements in C#.
- Keyword Arguments This article explains the use the keyword instead of the position to specify the arguments to the function.
- Literals in Java This article discusses the literals in java.
- Local Variables This article explains the variable names are local to the function.
- Logical and Physical Line This article explains the Python implicitly assumes that each physical line corresponds to a logical line.
- Looping Constructs in Java - For and For-Each This article explains the Looping constructs in java - for and for-each.
- Making Your Own Modules This article describes the use the same dotted notation to access members of the module.
- Methods in Java This article describes the methods in java in detail.
- Methods of Python This article describes the way of storing any information and manipulated.
- Migrations in MYSQL This article discusses the migrations in mysql.
- Modules This article explains the reuse a number of functions in other programs.
- More about Strings This article describes the some useful methods of this class are demonstrated.
- Moving Mail.App Rules to a Different Mac This article explains how to move mail.app rules to a different mac.
- New Features Added To C# 5.0 This article describes about the New features added to C# 5.0.
- Object Oriented Programming This article explains the blocks of statements which manipulate data.
- Object-Oriented Programming (OOP) Concepts with Examples This article explains the object oriented programming in detail.
- Object-Oriented Programming Concepts This article describes the Object Oriented Programming concepts.
- Open Source versus Proprietary Software This article describes the open source versus proprietary software.
- Packages in Java This article discusses the packages in java.
- Packaging and Deploying a Web Application into Standalone Apache Tomcat This article explains the packaging and deploying a web application into standalone apache tomcat.
- Partial Class, Interface or Struct in C Sharp with Example This article describes the Partial Class, Interface or Struct in C Sharp with example.
- Partial Methods in C Sharp with Example This article discusses the Partial Methods in C Sharp with example.
- Path Vs Classpath This article discusses the path vs classpath.
- Paying Twice To Store Data on Disks This article describes the storing data on disks.
- Python Operators This article discusses the operators and their usage.
- Raising Exceptions This article describes the name of the error/exception and the exception object that is to be thrown.
- Reading Data from Keyboard Using Datainputstream, Bufferedreader and Scanner This article discusses the reading data from keyboard using datainput stream, bufferedreader and scanner.
- Safe type casting with is and as operator This article discusses the Safe Type Casting with IS and AS Operator.
- Schedule Your Mac to Automatically Sleep This article discusses how to schedule your mac automatically to sleep.
- See how much RAM is installed in your Mac This article discusses how much RAM is installed in your Mac.
- Sequence This article discusses the three types of sequences.
- Set scroll bars to always display on your Mac This article explains how to set scroll bars to always display on your Mac.
- Speed up Safari: Lose the Previews This article explains how to speed up Safari.
- SQL Joins are Easy This article discusses the SQL joins in detail.
- SQL Server 2012 New Features and Programmability Enhancements This article discusses the SQL Server 2012 New Features and Programmability Enhancements.
- SQL Server Naming Conventions and Standards This article describes the SQL Server Naming Conventions and Standards.
- Still Waiting For Internet Protocol Version 6 This article describes the internet protocol version 6 in detail.
- Stream Class Constructors - A Quick Reference This article describes reference on stream class constructors in detail.
- String Interning and Performance Tuning in Java This article ineterfering and performance tuning in java.
- Strings This article discusses the Strings are basically just a bunch of words.
- Surround Sound in Linux This article describes the surround sound in linux in detail.
- Swap the Values of Two Columns in SQL Server This article describes the swap the values of two columns in SQL server.
- The Domain Name System This article discusses the domain name system in detail.
- The FOR Loop This article describes the another looping statement which iterates over a sequence of objects.
- The GLOBAL Statement This article discusses the variable defined outside a function with the global statement.
- The IF Statement This article explains the if statement is used to check a condition.
- The RETURN Statement This article discusses the return statement is used to return from a function.
- The Spectrum of Programming This article explains the spectrum of programming in detail.
- The WHILE Statement This article discusses the while statement allows you to repeatedly execute a block of statements.
- Traversing, Comparing and Copying Arrays This article discusses the traversing, comparing and copying arrays.
- Understanding Boxing and Unboxing in C# This article discusses the understanding Boxing and Unboxing in C#.
- Understanding Case Expression in SQL Server with Example This article explains the understanding Case Expression in SQL Server with Example.
- Understanding Collections and Collections Interfaces This article explains the understanding collections and collections interfaces.
- Understanding Decision Making Statements in C# This article explains the Understanding decision making statements in C#.
- Understanding Delegates in C# This article discusses the understanding delegates in c#.
- Understanding Inheritance and Different Types of Inheritance This article explains the understanding inheritance and different types of inheritance.
- Understanding Type Casting or Type Conversion in C# This article explains about understanding Type Casting or Type Conversion in C#.
- Understanding Virtual, Override and New Keyword in C# This article describes the Understanding virtual, override and new keyword in C#.
- UNIX as Political Culture This article explains the unix in detail.
- Using a Source File This article describes the Python program is composed of statements.
- Using CPAN to Extend Perl on Mac OS X This article explains the using Cpan to extend perl on mac OSX.
- Using the Interpreter Prompt This article discusses the open the Python prompt by typing python.
- Variables and Data Types in Java This article explains the variables and datatypes in java.
- Why Don’t We Train For Better Security? This article discusses thewhy don’t we train for better security.
- Why Power Outages Are Bad For Your Data This article explains when power failure occurs, what happen hardware-wise and software-wise.
- Wrapper Classes, Auto-Boxing and Auto-Unboxing This article discusses the wrapper classes, auto-boxing and auto-unboxing.
- Writing Custom Exceptions in Java This article discusses the writing custom exceptions in java.
- 3 Technologies Transforming the Manufacturing Industry This article explains the 3 technologies transforming the manufacturing industry.
- 3 Tips for Tracking Inventory with GPS This article explains the 3 tips for tracking inventory with GPS.
- 3D? Lets Go One More! 4D! This article explains the 3D printing becoming more accessible and developed.
- 5 Ways to Best Leverage Your “Internet of Assets” This article explains the 5 ways to best leverage your “internet of assets”.
- ASUS 1005HA - ACPI and CPU Fan Failure This article discusses the ASUS 1005HA - ACPI and CPU fan failure.
- Brief Note on the MYSQL Master-Slave Replication This article explains the brief note on the mysql master-slave replication.
- Computer Chips Modeled After the Human Brain This article explains the computer chips modeled after the human brain.
- Debian - How to Monitor Battery Capacity This article describes the debian - how to monitor battery capacity.
- Debian - How to Turn Off the System Bell This article explains the Debian - how to turn off the system bell.
- Expanding the Relevance of Lean Manufacturing to Data This article explains the expanding the relevance of lean manufacturing to data.
- Faster than Light Travel is Possible; Creating the Warp Drive This article describes the faster than light travel is possible; creating the warp drive.
- Final Cut Pro Getting Started This article explains the final cut pro getting started.
- Fresh Install of the Debian Wheezy This article describes the fresh install of the debian wheezy.
- From Real To Virtual and Back: Current and Future Trends in 3D Imaging This article explains the current and future trends in 3d imaging.
- Generating Graphics Using a Reluctant Office PC Running MS Word This article explains the generating graphics using a reluctant office pc running MS Word.
- Global Traceability: Harnessing the Power of Big Data This article describes the global traceability: harnessing the power of big data.
- How to Access Linux Extended File System Using Windows This article explains the how to access linux extended file system using windows.
- How to Access Single-User Mode without Password This article discusses the how to access single-user mode without password.
- How to Add SSH Menu to Unity Launcher This article explains the how to add SSH menu to unity launcher.
- How to Change the MAC Address of an Ethernet Interface This article discusses the how to change the mac address of an ethernet interface.
- How to Clear Up Pending RESYNC on RAID Array This article explains the how to clear up pending resync on raid array.
- How to Copy Answers to the Configuration Questions for Debian Packages This article discusses the how to copy answers to the configuration questions for debian packages.
- How to Create Persistent Reverse SSH Tunnel This article discusses the how to create persistent reverse SSH tunnel.
- How to Determine Whether the Operating System is 32-Bit or 64-Bit This article discusses the how to determine whether the operating system is 32-bit or 64-bit.
- How to Disable Autoplay in Windows XP This article describes the how to disable autoplay in windows XP.
- How to Edit Files Using Notepad++ Over SSH File Transfer Protocol This article describes the how to edit files using notepad++ over SSH file transfer protocol.
- How to Enable VPN Connections inside Network Manager This article describes the how to enable VPN connections inside network manager.
- How to Enforce Read-Only Mode on Every Connected USB Storage Device This article describes the how to enforce read-only mode on every connected USB storage device.
- How to Fix Error When Moving Events between Calendars This article discusses the how to fix error when moving events between calendars.
- How to Inspect PostgreSQL Queries This article explains the how to inspect postgreSQL queries.
- How to Perform Unattended Upgrades This article describes the how to perform unattended upgrades.
- How to Programmatically Create System User with Defined Password This article describes the how to programmatically create system user with defined password.
- How to Relay Selected Mailboxes Using ISPconfig 3 This article explains the how to relay selected mailboxes using ISPconfig 3.
- How to Setup KVM Full Virtualization Solution This article describes the how to setup KVM full virtualization solution.
- How to Take Control over Configuration Files This article explains the how to take control over configuration files.
- How to Terminate Active SSH Sessions This article discusses the how to terminate active SSH sessions.
- How to Terminate PostgreSQL Sessions This article describes the how to terminate postgreSQL sessions.
- How to Use Nearest Debian Mirror This article explains the how to use nearest debian mirror.
- How to Use Virtual Desktops on Windows This article discusses the how to use virtual desktops on windows.
- Installing Libreoffice in Ubuntu This article explains the installing libreoffice in ubuntu.
- IoT and Energy Efficiency Spur Automation Investments Listen This article discusses the IoT and energy efficiency spur automation investments.
- Leveraging the Industrial Internet for Operational Excellence This article describes the leveraging the industrial internet for operational excellence.
- New Plausible Theory of Black Holes: Gateways to Other Universes This article explains the new plausible theory of black holes.
- New Type of Hypervelocity Star Found: Just Passing Through This article explains the new type of hypervelocity star found.
- Our Special Time in the Universe This article describes the our special time in the universe.
- Pooping Dogs Perceive Earth’s Magnetic Field This article discusses the pooping dogs perceive earth’s magnetic field.
- Semi-Intelligent Screensaver This article discusses the semi-intelligent screensaver.
- Space Dust Brings Water and Organics to Planets Simultaneously This article discusses the space dust brings water and organics to planets simultaneously.
- Taking Lean to the Supply Chain This article describes the taking lean to the supply chain.
- The Digital Factory: Bridging the Gap between Planning, Design & Execution This article discusses the digital factory: bridging the gap between planning, design & execution.
- The Value of Peer Review This article describes the value
- of peer review in the IT systems.
- Triple Star System Paves Road to Understanding Gravity This article discusses the triple star system paves road to understanding gravity.
- Ubuntu - Boot to RAM - Couple of Notes This article explains the ubuntu - boot to ram - couple of notes.
- Ubuntu - How to Encrypt Swap Partition This article discusses the ubuntu - how to encrypt swap partition.
- Ubuntu - How to Generate QR Codes This article describes the ubuntu - how to generate QR codes.
- Ubuntu and Recent Problems Related to PHP This article describes the ubuntu and recent problems related to php.
- Unprecedented Changes and Extinctions Occurring in Marine Life This article discusses the unprecedented changes and extinctions occurring in marine life.
- Virtualbox - How to Control Virtual Machine Using Shell This article discusses the virtualbox - how to control virtual machine using shell.
- What is it virtualization, and what is its role in manufacturing’s future? This article discusses the virtualization, and its role in manufacturing’s future.
- When Virtual Manufacturing Becomes Reality This article discusses the virtual manufacturing becomes reality.
- Why Manufacturers Can’t Afford to Ignore Digital Transformation This article explains the manufacturers can’t afford to ignore digital transformation.