A 16-bit bus can transfer 16 binary bits simultainiously. This requires 16 separate metal traces on a PC board.
We also need traces for control signals. The whole group of traces is referred to as a bus. More ...
How to Optimize Your Solid State Drive
Solid state drives or SSDs are replacing the slower, chunkier magnetic hard drives
in the personal computers. SSDs function very differently from magnetic drives so
it needs to be treated differently. More ...
Pentium P5 Processor
The Pentium P5 processor was introduced in 1993 was the first superscalar processor. It featured
two integer pipelines and a pipelined floating-point unit. This article describes other innovations introduced in the P5. More ...
Stored Program Architecture
Almost every computer system ever made is based on the stored program architecture designed
in 1945 design by the mathematician John Von Neumann. He described a system where data and
instructions would be stored in memory. More ...
Steps For Designing a Crisis Management Plan
There are six steps for defining a crisis management plan that can be easily remembered
using the word CRISIS. Use the steps of CRISIS to be ready to deal with emergencies
that your organization might face. More ...
How to Choose a Topic for Your Blog
The first thing you need to do to start a blog is to decide what your blog will be about.
If your primary goal is to generate revenue then you need to choose a topic that will attract a large audience. More ...
The Network Technician Career Field
As a Network Technician you'll have an interesting job where you'll be respected and highly rewarded.
Network Technicians are responsible for an organization's computer and network infrastructure.
The national median salary for Network Technicians is $57,500 to $67,800, while the top 10 percent earn about $112,000. More ...
How Computer Chips are Made
The oxygen is removed from silica by heating it with carbon. A tiny seed of silicon is then dipped
into molten silicon. As the tiny crystal is slowly lifted out of the crucible silicon crystallizes around it. More ...
What is Cross Site Scripting?
Cross-site scripting attacks are used to steal information from your browser when you
visit websites such as ecommerce stores, forums, and even your email accounts. More ...
What Kind of Fire Extinguisher Should I Buy?
A fire extinguisher is something you simply must have. It can keep a small fire from raging out of control.
There are several types of extinguishers, designed for different kinds of fires. More ...
Wireless Router Problems and Solutions
While many routers offer good features, most still come with flaws such as confounding setups or limited security.
This articles provides six router problems and possible solutions. More ...
How to Make Money With Your Wood Turning Skills
As woodturning skills advance, the enthusiast sometimes questions how to make money with
these skills. How to take it to the point of it becoming a full time occupation. Here are few things to keep in mind. More ...
Program Flow Charting
Depending upon the language used, program code my be difficult for humans to
read and understand. However, one type of programming that is very easy to
understand is flow charting. More ...
Fiverr Money Making Tips
Anyone can make money from Fiverr gigs. Though, some people find it difficult to actually
keep making money, to help out, here are tips from Fiverr experts. More ...
How to Repair Low Memory Errors
A low memory error is a reflection of low memory problems with RAM or Virtual memory.
Often, this error can be easily reversed by freeing up memory for your system's use.
This article will show you to speed up your memory with just a few clicks. More ...
How to Configure a Cisco Router
Use a terminal emulation program to access the routers console. The router and it will show
the boot up screen in the console window. You may use this set up mode to configure the router. More ...
Nine Tips for Writing Children's Stories
How would you like to make some money from an idea you dreamed up in five minutes at bedtime?
Not only can it be profitable, it can be a lot of fun too. Hardly like work at all! More ...
Man in the Middle Attack
In a Man in the Middle (MIM) attack the hacker places eavesdropping equipment between the
sending device and the receiving device. He intercepts the data, records it and possibly
modifies it, then sends it on to the intended receiving device. More ...
Network Topology Diagram
An IT manager must know the network topology and should always have it in front of his eyes.
Here, we review the process of the network topology discovery and network diagram creation using the specialized software. More ...