Skip to main content

Posts

Showing posts from February, 2016

Popular posts from this blog

CISC VS RISC computers (all details)

CISC Introduction            The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way. Intel's   Pentium   microprocessors are CISC microprocessors. CISC is a   processor design   where single   instructions   can execute several low-level operations (such as a load from   memory , an arithmetic   operation , and a   memory store ) or are capable of multi-step operations or   addressing modes   within single instructions. The primary goal of CISC architecture is to complete a task in as few lines of assembly as possible. This is achieved by building processor hardware that is capable of understanding & executing a series of operations, this is where our CISC architecture introduced. The CISC approach attempts to minimize the number of instructions per program, sacrificing

DHCP principle , DHCP server and client communication process

1. Explain with principle: the DHCP server and client communication process DHCP stands for Dynamic Host Configuration Protocol. It handles the automatic assignment of IP addresses and other configuration settings for devices on your network. DHCP automates Network and Sharing Center in your control panel. This is especially good for people who have laptops, aren't hooked up to the Internet all the time and often move from place to place with their portable devices. They can simply get a new IP address as needed without having to do it manually. DHCP is designed to make the assignment of IP addresses and other network configuration information faster and easier. DHCP is a protocol that uses Level 4 on the OSI model. It communicates using User Datagram Protocol (UDP) datagrams through UDP Port 68. DHCP works with most current and past Windows clients, and also Linux, Macintosh, and many network-capable printers. DHCP is desi

Recommendation System literature review | Building a recommendation system

People have always relied on the recommendations from their peers or the advice of experts to support their decision making. Amazon.com has been using collaborative filtering for a decade to recommend products to their customers, and Netflix valued improvements to the recommender technology underlying their movie rental service at $1M via the widely published Netflix Prize [6]. Research on recommender algorithms garnered significant attention in 2006 when Netflix launched the Netflix Prize to improve the state of movie recommendation. The objective of this competition was to build a recommender algorithm that could beat their internal CineMatch algorithm in offline tests by 10%. It sparked a flurry of activity, both in academia and amongst hobbyists. The $1 M prize demonstrates the value that vendors place on accurate recommendations [8]. Recommender Systems provide the users with the suggestions of information that may be useful to the users to make their decisions on various sit

CISC and RISC CPUs

CISC Introduction            The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way. Intel's   Pentium   microprocessors are CISC microprocessors. CISC is a   processor design   where single   instructions   can execute several low-level operations (such as a load from   memory , an arithmetic   operation , and a   memory store ) or are capable of multi-step operations or   addressing modes   within single instructions. The primary goal of CISC architecture is to complete a task in as few lines of assembly as possible. This is achieved by building processor hardware that is capable of understanding & executing a series of operations, this is where our CISC architecture introduced. The CISC approach attempts to minimize the number of instructi

A tiny glass disc can store 360TB of data for 13.8 billion years

It's estimated that humans are producing the equivalent of 10 million Blu-ray discs' worth of data  every single day  - and all of those ones and zeroes have to be stored somewhere. Now researchers in the UK just might have the solution: a five-dimensional (5D) digital data disc that can store 360 terabytes of data for some 13.8 billion years. To create the data disc, researchers from the University of Southampton  used a process called femtosecond laser writing, which  creates small discs of glass using an ultrafast laser that generates short and intense pulses of light. These pulses can write data in three layers of nanostructured dots separated by 5 micrometres (that's 0.005 mm). So where do the five dimensions come from? First there's the three-dimensional position of each dot within the layers, and then the extra dimensions are the size and orientation of the dot. The nanostructures created by the technology can be read using an optical microscope in tandem

Microsoft rolling out Windows 10 Mobile preview build 10586.107 for Insiders

Microsoft has pushed out another Windows 10 Mobile preview build bearing version number 10586.107 for members of the Windows Insiders Programme. The cumulative update is now available for Insiders in Slow ring, after it made its way through the Fast ring.

Facebook will now offer to hide your ex from you after a breakup

  Share on Facebook   (26k)   Tweet     Share     Pin   The more ubiquitous Facebook becomes  around the world, the more likely you are to one day have an  ex-boyfriend, -girlfriend, or -spouse using the service . So what happens when you break up, and you continue to see the trail of their life without you all over the News Feed? Until now, you've had to hide that person, unfriend them, or block them outright. But that won't sever the connection altogether — you may be still tagged in your ex's old photos, for example, or see their name pop up as a suggestion when you write a message. That starts to change today  with new tools  that will pop up when you go to change your relationship status. The tools have three major components: limiting how much of your ex you see on Facebook; limiting how much your ex sees of you on Facebook; and limiting people's ability to see past posts where the two of you are together. "This work is part of our ongoing effort to

Windows 10 Preview Build 14257 for PC Available for insiders

If you are using  Windows 10  Insider Preview (previously known as Technical Preview) in your computer, here is a good news for you. Microsoft has  released  a new update  Build 14257  of Windows 10 to public which comes with many bug fixes and improvements. This is the 5th Insider Preview build of Windows 10 released after the  November Update build 10586  (Threshold 2). This new build also comes via new "RS1" (RedStone1) development branch. This build doesn't contain big noticeable changes or exclusive features. It is basically focused on bug fixes and general improvements. WHAT'S FIXED: The issue of periodic app crashes or other memory related app errors due to a memory management change has been resolved. If you were having issues launching the Git client for Windows, you should now be able to launch it in this build. The Connect button now shows up again in Action Center. F12 Developer Tools will now load correctly in  Microsoft Edge  web browser. [F