Engineering Concepts Tutorials

Engineering Concepts Tutorials for UML, Operations Research, Numerical Methods and many more.
  Title / Author Replies
Views Reverse Sort Order
A binary-safe function is a function or operation that can be performed on a binary file without modifying the contents of the file. This ensures that the file is not corrupted or mutilated by the function or operation. Binary data is encoded as a string of ones and zeros (bits), but is not...
1
6,889
Hard Drives are one of the most important parts on your computer. They are also one of the most expensive. All hard drives share a basic structure and are composed of the same physical features. However, not all hard drives perform the same way, as the quality of the parts of the hard drive will...
0
6,670
Define the Multicore Computing As software developers we have enjoyed a long trend of consistent performance improvement from processor technology. In fact, for the last 20 years processor performance has consistently doubled about every two years or so. But, day by day the truth is realizing...
3
6,390
Introduction First and foremost, we need to define what we mean by Natural Language Processing or NLP. The first and most general definition is simply that NLP encompasses anything a computer needs to do in order for it to understand natural language (whether it be typed or spoken). We'll...
0
6,284
HAProxy stands for High Availability Proxy, is an open-source TCP/HTTP load balancer. In case you are new to the idea of a load balancer, the work of a load balancer is to distribute incoming requests to an array of upstream servers so as no single upstream server is overworked/overloaded by...
0
6,150
Using authoritative name service, DNS servers primarily advertise to the world the various records associated with the domain they serve. Because users prefer common names and networks prefer numbers, DNS servers handle the translation between what a user types in a browser—such as...
0
6,084
Continuation from Denail of Service (DoS) by Pradeep. Have you ever tried to make a telephone call but couldn't because all the telephone circuits were busy? In fact, in India, telephone companies used to air commercials on television and radio that suggested you avoid peak calling times by...
3
5,942
The Component Object Model (COM) is a softwarearchitecture that allows applications to be built frombinary software components. COM is the underlyingarchitecture that forms the foundation forhigher-level software services, like those provided byOLE. OLE services span various aspects of...
1
5,907
Digital certificates are files which are used to prove the authenticity of the user or computer to whom it is issued. It is very similar to an identification proof like passport, driving license or PAN, which gives assurance to the other party that the transaction of information from the...
4
5,650
Introduction Fuzzy systems is an alternative to traditional notions of set membership and logic that has its origins in ancient Greek philosophy, and applications at the leading edge of Artificial Intelligence. Yet, despite its long-standing origins, it is a relatively new field, and as such...
6
5,562
Introduction Multithreading is a concept where a program is broken into two or more parts called threads and all these threads run in parallel. Multithreading can make programs more responsive and effective and it increases its performance too. For example, today web pages need to display...
0
5,554
What is VNC? - A practical introduction VNC stands for Virtual Network Computing. It is, in essence, a remote display system which allows you to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of...
2
5,454
It might happen that your hard disk died on you, or the DVD backup you had does not read correctly. Generally, CD & DVD media retain data correctly for a few years (or more, depending on the quality of the media), after which data loss starts slowly with read errors increasing from the outer tracks...
1
5,350
GSM, short for Global System for Mobile Communication, is the standard behind digital mobile phones. It has opened up a new era of digital communications, which extends beyond voice to include data. GSM was planned from the outsell to provide a full range of data and fax transmission on the move,...
0
5,205
What is Blu-ray? Blu-ray, also known as Blu-ray Disc (BD) is the name of a next-generation optical disc format. The format was developed to enable recording, rewriting and playback of high-definition video (HD), as well as storing large amounts of data. The format offers more than five times...
4
5,043
I have nothing to say the guide is self explanatory about itself, if a m confusing u read on.... lol BIOS Beep Codes When a computer is first turned on, or rebooted, its BIOS performs a power-on self test (POST) to test the system's hardware, checking to make sure that all of the system's...
1
5,041
Public Key Infrastructure Public key infrastructure is an architecture which supports mechanisms like integrity and confidentiality. It is heavily used in e-commerce, where business transactions are frequent and should be much secured. In fact business transaction starts only after the two...
0
4,945
SPF or Sender Policy Framework is a system created to prevent e-mail spam & e-mail spoofing. It does so by verifying the sender's IP address is a authorized one for the domain the mail is originating from. SPF requires domain admins to add DNS TXT or SPF records specifying hosts/IPs allowed to...
0
4,903
Analytics and its tools have been very well received by bigger corporations in the recent past. This technical term has gained a lot of importance in the technology world. Corporations such as Google, Facebook are investing heavily to create a unique platform to do big data analysis. This analysis...
0
4,768
Net - The Net is a common term for the Internet. Netiquette - The ethical and cultural rules of using the Internet, such as not posting advertisements to Usenet discussion groups (unless they allow them), not posting the same message to several newsgroups, avoidance of 'shouting' in e-mails...
1
4,758