Bus versus Star Network Topology
A short talk on benefits and disadvantages of two of the most known network topologies. Bus Topology A bus network topology refers to the pattern in which the machines are...
Read full article βShowing 45 articles in the Information Technology category.
β Back to all categoriesA short talk on benefits and disadvantages of two of the most known network topologies. Bus Topology A bus network topology refers to the pattern in which the machines are...
Read full article βThis article will highlight two of the most high-profile computer security violations of 2016, one in the public and second in a private sector. Both of these cases provide an...
Read full article βNowadays, everyone is aware that the data sent over Wi-Fi can be taken by those that can listen and decode the weakly encrypted Wi-Fi signal. I believe that itβs time...
Read full article βThe following article analyzes the most common security vulnerabilities associated with network systems and provides a summary, as well as a recommendation for prevention of these exploitations. Un-patched Network Devices...
Read full article βPhase-Change RAM (PCRAM), Resistive RAM (RRAM) and Magnetic RAM (MRAM) are some of the emergent SCM (Storage Class Memory) technologies used for NVM (Non-Volatile Memory). How do these devices actually...
Read full article βAs we know, the NAND type of memory only allows a finite number of writes. This means that the most pressing issue regarding the reliability of SSD drives (and NAND...
Read full article βIn computer architecture, a term βNon-Volatile Memoryβ (NVM) is referring to a type of memory that doesnβt require any moving parts to perform the read or write operations, nor it...
Read full article βNowadays, when it comes to privacy, government surveillance is a one of the most talked about topics. In my view, what truly opened the gates to monitoring of individuals like...
Read full article βWhen I direct my mind towards thinking about intellectual property rights, I donβt necessarily see the topic in a context of my local or national community. My initial instinct asked...
Read full article βOne of the areas of computing in which I expect to see the significant growth within the next decade is the use of the technology called the Blockchain. Let me...
Read full article β