Saturday, 8 December 2012

How Routing Algorithms Work [ Very Useful info ]


How Routing Algorithms Work
by Roozbeh Razavi
 
If you have read the article How Routers Work, then you know that a router is used to manage network traffic and find the best route for sending packets. But have you ever thought about how routers do this? Routers need to have some information about network status in order to make decisions regarding how and where to send packets. But how do they gather this information?
 
In this edition of How Stuff Works, we'll find out precisely what information is used by routers in determining where to send a packet.

Continue reading....
How Routing Algorithms Work
   Download : Click me  

Read more »

How RAM Work [ Also Learn How to Install it. ]


How RAM Work
by Jeff Tyson

Random access memory (RAM) is the best known form of computer memory. RAM is considered "random access"because you can access any memory cell directly if you know the row and column that intersect at that cell.
The opposite of RAM is serial access memory (S s a series of memory cells that can only be AM). SAM stores data accessed sequentially (like a cassette tape). If the data is not in the current location, each memory cell is checked until needed data is found. SAM works very w fo re the data is normally stored in the order in which will be used (a good example is the texture buffer memory on a video card). RAM data, on the other hand, can be accessed in any order.

Continue Reading...
How RAM Work and Also Learn How to Install it.

Read more »

How OSI Layers Works [ In Less than 2 Minute ]


How OSI Works also Known as & 7 Layers of Operation System
by Jeff Tyson
Virtually all networks in use today are based in some fashion on the Open Systems Interconnection (OSI) standard. OSI was developed in 1984 by the International Organization for Standardization (ISO), a global federation of national standards organizations representing approximately 130 countries.
The core of this standard is the OSI Reference Model, a set of seven layers that define the different stages that data must go through to travel from one device to another over a network. In this article, you'll find out all about the OSI standard.
The Layers

Continue Reading....
How OSI Layers Works
   Download : Click Me  

Read more »

How Microprocessors Work [ History ]


How Microprocessors Work
by Marshall Brain
 
The computer you are using to read this page uses a microprocessor to do its work. The microprocessor is the heart of any normal computer, whether it is a desktop machine, a server or a laptop. The microprocessor you are using might be a Pentium, a K6, a PowerPC, a Sparc or any of the many other brands and types of microprocessors, but they all do approximately the same thing in approximately the same way.
 
If you have ever wondered what the microprocessor in your computer is doing, or if you have ever wondered about the differences between types of microprocessors, then read on. In this article, you will learn how fairly simple digital logic techniques allow a computer to do its job, whether its playing a game or spell checking a document!

Continue Reading....
How Microprocessors Work

Read more »

How LCDs Work [ Ever Wonder What's Inside LCD ]


How LCDs Work
by Jeff Tyson
 
You probably use items containing an LCD (liquid crystal display) every day. They are all around us -- in laptop computers, digital clocks and watches, microwave ovens, CD players and many other electronic devices. LCDs are common because they offer some real advantages over other display technologies. They are thinner and lighter and draw much less power than cathode ray tubes (CRTs), for example.


But just what are these things called liquid crystals? The name "liquid crystal" sounds like a contradiction. We think of a crystal as a solid material like quartz, usually as hard as rock, and a liquid is obviously different. How could any material combine the two?
 
In this article, you'll find out how liquid crystals pull off this amazing trick, and we will look at the underlying technology that makes LCDs work. You'll also learn how the strange characteristics of liquid crystals have been used to create a new kind of shutter and how grids of these tiny shutters open and close to make patterns that represent numbers, words or images!

Continue Reading....
How LCDs Work [PDF BOOK]

Read more »

How Fingerprint Scanners Work [ PDF BOOK ]


How Fingerprint Scanners Work
by Tom Harris
 
Computerized fingerprint scanners have been a mainstay of spy thrillers for decades, but up until recently, they were pretty exotic technology in the real world. In the past few years, however, scanners have started popping up all over the place -- in police stations, high-security buildings and even on PC keyboards. You can pick up a personal USB fingerprint scanner for less than $100, and just like that, your computer's guarded by high-tech biometrics. Instead of, or in addition to, a password, you need your distinctive print to gain access.
 
In this article, we'll examine the secrets behind this exciting development in law enforcement and identity security. We'll also see how fingerprint scanner security systems stack up to conventional password and identity card systems, and find out how they can fail.

Continue Reading....
How Fingerprint Scanners Work [ PDF BOOK ]

Read more »

How Facial Recognition Systems Work


How Facial Recognition Systems Work
by Kevin Bonsor
A ticket to Super Bowl XXXV in Tampa Bay, Florida, didn't just get you a seat at the biggest professional football game of the year. Those who attended the January 2000 event were also part of the largest police lineup ever conducted, although they may not have been aware of it at the time. The Tampa Police Department was testing out a new technology, called Face It, that allows snapshots of faces from the crowd to be compared to a database of criminal mugshots.

The $30,000 system was loaned to the Tampa Police Department for one year. So far, no arrests have been made using the technology. However, the 36 cameras positioned in different areas of downtown Tampa have allowed police to keep a more watchful eye on general activities. This increased surveillance of city residents and tourists has riled privacy rights groups.
People have an amazing ability to recognize and remember thousands of faces. In this edition of HowStuffWorks, you'll learn how computers are turning your face into computer code so it can be compared to thousands, if not millions, of other faces. We'll also look at how facial recognition software is being used in elections, criminal investigations and to secure your personal computer.

Continue Reading...

How Facial Recognition Systems Work [PDF BOOK]

 Download : Click Me 

Read more »