Direct Memory Access (DMA)
In early computers, all data transfers required the processor to read and write single words from memory until the entire transfer is complete. With DMA, the DMA controller takes control of the system buses to move data between the device and main memory. More ...
The Microcontroller Interrupt System
Events related to peripheral interfaces are asynchronous to the program running on the CPU. The interrupt mechanism allows an external event to temporarily put the normal execution of the microcontroller on hold and force the execution of a specific subroutine. More ...
AMD's Microarchitectures
A microarchitecture describes the physical features, functions, and the technology level of the processes used to manufacture the core of a microprocessor. This article describes the microarchitectures used by AMD. More ...
Introduction to the Raspberry Pi
The Raspberry Pi is a tiny bare-bones computer motherboard. You can easily make it into a Linux PC by connecting your own keyboard, mouse, and display. More ...
AMD's Phenom II Processor
Phenom II is AMD's family of 45 nm multi-core processors and is the successor to the original Phenom. In the Phenom II, the shared L3 cache increased from 2MB to 6MB. The chip has an integrated, dual-channel memory controller that supports DDR3 RAM, and 4000MHz HyperTransport technology. More ...
Virtual Memory and Memory Paging
In the early days of computers, memory chips were small capacity, scarce, and expensive. Because of this a memory management scheme called paging was invented. More ...
Intoduction to Digital Electronics
The entire field of computer technology relies on transistors. This article describes how transistors are constructed and how modern MOSFETs are combined to make digital logic circuits. More ...
Intel's Sandy Bridge Micro-Architecture
"Sandy Bridge" is Intel's code name for a new cpu core microarchitecture. It introduces a few new or improved features. The memory controller, the PCI Express controller, and video circuitry are all located within the processor die and the new ring architecture uses a Last Level Cache between the CPU and graphics cores. More ...
Operating System Memory Protection in a Paged Environment
Memory protection in a paged environment is accomplished by protection bits associated with each frame. For example read-write, read-only or execute-only bit, and valid-invalid bit. Normally, these bits are kept in the page table. More ...
Electronic Circuits Basics
This article's main target is to teach the electronics language to readers that are not familiar with electronics by using a group of rules and simple equations that describe the behavior of every electronic component and the relationship between the components in the circuit. More ...
Multiuser Operating System Functions
Some operating system functions like resource allocation, accounting, protection and security exist not for helping the user, but rather for ensuring the efficient operation of the system itself. More ...
Shortest-Job-First CPU Scheduling Algorithm
CPU Scheduling deals with the problem of deciding which of the processes in the ready queue is to be alocated the CPU. There are many different CPU scheduling algorithms. In this article we describe shortest-job-first scheduling. More ...