Search
All categories
Results 101 - 125 of about 579
  • CD, CD audio and CD-ROM

    The Compact Disc was invented by Sony and Philips in 1981 in order to serve as a high-quality compact audio storage device which allowed for direct access to digital sound tracks. It was officially launched in October 1982. In 1984, the ... Read more

    Computer
    October 7, 2012 at 02:35 PM
  • The USB (Universal Serial Bus)

    Introduction to the USB USB (Universal Serial Bus) is as its name suggests, based on serial type architecture. However, it is an input-output interface much quicker than standard serial ports. Serial architecture was used for this type of ... Read more

    Computer
    October 16, 2008 at 09:43 AM
  • Connecting the computer to a HIFI sound system

    Why connect a computer to a sound system? These days, computers provide sound quality that is as good as hifi sound systems. It is possible to use them to listen to music, in particular thanks to mp3 files that provide sound quality that ... Read more

    Practical notes
    October 16, 2008 at 09:43 AM
  • Operating system

    Description of the operating system Roles of the operating system Components of the operating system Multi-threaded systems Multi-processor systems Embedded systems Real time systems Types of operating system Description of the operating ... Read more

    Operating System
    March 15, 2018 at 03:48 PM
  • Modem

    A quick history of the modem The first coding to enable long distance communication was Morse, which was developed by Samuel F.B Morse in 1844. This code is made up of dots and dashes (a sort of binary language...) and made it possible to ... Read more

    Internet Technologies
    October 16, 2008 at 09:43 AM
  • LZW Compression

    LZW compression Abraham Lempel and Jakob Ziv are the creators of the LZ77 compressor, invented in 1977 (hence its name). This compressor was then used for filing (ZIP, ARJ and LHA formats use it). In 1978 they created the LZ78 compressor ... Read more

    Video
    October 16, 2008 at 09:43 AM
  • RTP/RTCP protocols

    Document written by Nico VanHaute, Julien Barascud and Jean-Roland Conca Introduction: What are RTP and RTCP? The spread of computers, added to the availability of cheap audio/video computer hardware, and the availability of higher ... Read more

    Internet (protocols)
    October 16, 2008 at 09:43 AM
  • Information systems director (ISD)

    Information systems director (ISD) An information systems director (also called an IS director) has both managing and technical skills. He/she is in charge of bringing information systems in line with the company's plans, setting and ... Read more

    IT professions
    October 16, 2008 at 09:43 AM
  • Cathode Ray Tube monitor (CRT)

    Cathode ray tube monitor Most monitors (computer screens) use cathode ray tubes (or CRT for short), which are glass vacuum tubes into which an electron gun emits a flow of electrons guided by an electrical field towards a screen covered in ... Read more

    Computer
    April 28, 2009 at 10:40 AM
  • OOP - Inheritance

    The concept of inheritance Inheritance is specific to object-oriented programming, where a new class is created from an existing class. Inheritance (often referred to as subclasses) comes from the fact that the subclass (the newly created ... Read more

    Object-Oriented Programming
    October 16, 2008 at 09:43 AM
  • The concept of objects

    The concept of objects Object-oriented programming consists of arranging data in modular sets of elements of real world information (called a domain. These data elements are called objects. This data is grouped according to the main real ... Read more

    Object-Oriented Programming
    March 8, 2018 at 09:52 AM
  • The GSM standard

    Introduction to the GSM standard The GSM (Global System for Mobile communications) network is, at the start of the 21st century, the most commonly used mobile telephony standard in Europe. It is a so-called "second generation" (2G) ... Read more

    Mobile phones
    October 16, 2008 at 09:43 AM
  • The Sasser worm

    Introduction to the Sasser virus Appearing in May 2004, the Sasser virus (also known as the W32/Sasser.worm, W32.Sasser.Worm, Worm.Win32.Sasser.a, Worm.Win32.Sasser.b or Win32.Sasser) is a virus which exploits a security hole in the LSASS ... Read more

    Viruses and threats
    October 16, 2008 at 09:43 AM
  • Positioning elements in CSS

    Using style sheets along with the and tags, you can specify the location of text or images down to the pixel. This is possible with versions 4 and higher of Netscape and Internet Explorer; however, the technique is still problematic and may ... Read more

    CSS
    October 16, 2008 at 09:43 AM
  • VPN - Virtual Private Networks

    The concept of virtual private networks Operation of a VPN Tunneling protocols The PPTP protocol The L2TP protocol The IPSec protocol The concept of virtual private networks Local area networks (LANs) are the internal networks of ... Read more

    Introduction to Networks
    November 12, 2012 at 12:44 PM
  • Rules for proper email use

    Netiquette Netiquette (a contraction of the words "Net" and "etiquette") refers to the set of rules governing correct behavior on the Internet, in order to respect others and be respected in turn. They serve as guidelines for civility and ... Read more

    Email
    October 16, 2008 at 09:43 AM
  • Intrusion detection systems (IDS)

    Introduction to intrusion detection systems An IDS (Intrusion Detection System) is the term for a mechanism which quietly listens to network traffic in order to detect abnormal or suspicious activity, thereby reducing the risk of intrusion ... Read more

    Intrusion detection
    October 16, 2008 at 09:43 AM
  • Agile Methods (RAD, XP)

    Agile methods "Agile methods" software development (also called Agile Modelling denoted AG for short) reduce software lifecycle time (thus speeding up development) by firstly developing a prototype version, then integrating functionality ... Read more

    Software engineering
    October 16, 2008 at 09:43 AM
  • Information security officer (ISO)

    Information security officer (ISO) An ISO (information security officer) is in charge of setting and a company's security policy. He/she also plays a critical role in informing, advising, and alerting the general management on matters ... Read more

    IT professions
    October 16, 2008 at 09:43 AM
  • Data transmission - Multiplexing

    Introduction to multiplexing Multiplexing refers to the ability to transmit data coming from several pairs of equipment (transmitters and receivers) called low-speed channels on a single physical medium (called the high-speed channel). ... Read more

    Data transmission
    October 16, 2008 at 09:43 AM