conveylive.com

Browse Pages

Browse latest Pages

Browse latest pages published by users of conveylive. Sign in to rate articles according to your like or dislike. You may also post comments and discuss.

Computer and Technology

Showing pages 1-10 of 51 First     1   2    3    4    5    Next  Last

Comparison between MacBook and Dell's Laptops

by Zico Mathews | Nov 7, 2009
Review and comparison among Dell's Latitude Z, Inspiron 11z and MacBook Pro
  Ask your friend or any teenager having some money in their pocket, which brand would they like to buy if they were to buy a  computer? I guess their answers would vary from person to person and yet it's predictable that most people's answer would either be Apple's MacBook or Dell's... »read more
Rating: 5 Rating 1 Rating 2 Rating 3 Rating 4 Rating 5 | Views: 3333 | Computer and Technology

Google Latitude : Broadcasting Your Location

by Tina S | Jan 4, 2010
Google Latitude broadcasts your location from your mobile phone, letting your friends know where you are and keep in touch anywhere in the world..
   Google Latitude is a location-aware mobile app developed by Google. Latitude allows a mobile phone user to allow certain people on to track their location. Via their own iGoogle accounts, the user's cell phone location is mapped on Google Maps. The user can control the accuracy and... »read more
Rating: 0 1 2 3 4 5 | Views: 2235 | Computer and Technology

Optical Fiber

by Tracy Pettigrue | Sep 28, 2009
Optical Fiber
An optical fiber (or fibre) is a glass or plastic fiber designed to guide light along its length by confining as much light as possible in a propagating form. In fibers with large core diameter, the confinement is based on total internal reflection. In smaller diameter core fibers, (widely used... »read more
Rating: 5 Rating 1 Rating 2 Rating 3 Rating 4 Rating 5 | Views: 2010 | Computer and Technology

Sessions and cookies - Adding state to a stateless protocol

by Syeda Tasneem Rumy | Dec 9, 2009
Knowing if a user has been there before is often required and therefore something known as cookies and sessions have been implemented in order to cope with that problem.
Introduction HTTP is a stateless protocol. This means that each request is handled independently of all the other requests and it means that a server or a script cannot remember if a user has been there before. However, knowing if a user has been there before is often required and therefore... »read more
Rating: 0 1 2 3 4 5 | Views: 2253 | Computer and Technology

Power Line Communication

by Tracy Pettigrue | Sep 28, 2009
PLC
PLC, which stands for Powerline Communications, is a breakthrough communications technology for high-speed data, voice and media transfer over existing power lines. PLC provides home networking and broadband internet access using existing electric infrastructures without the need to install new... »read more
Rating: 0 1 2 3 4 5 | Views: 1724 | Computer and Technology

Computer Security System

by Tina S | Oct 28, 2009
Potential Impact of Computer Security
  A computer can be considered secure if it and its software can be depended upon. This does not mean that it is absolutely impenetrable to crackers, viruses and other forms of unauthorized entry. The only computer that is absolutely secure is unplugged and locked in a vault somewhere.... »read more
Rating: 0 1 2 3 4 5 | Views: 2170 | Computer and Technology

Research Work on the Software Engineering Techniques used in a Local Software Firm

by Syeda Tasneem Rumy | Sep 12, 2009
Research Completion date: 19th March 2008
Introduction   Software Engineering is an engineering discipline that is concerned with all aspects of software production from early stages of system specification to maintaining the system after it has gone into use. Software engineering is not just concerned with the... »read more
Rating: 0 1 2 3 4 5 | Views: 1896 | Computer and Technology

Overview of Expert Systems

by Randy Trevor | May 17, 2010
- A collection of software packages and tools used to develop expert systems
Can… Explain their reasoning or suggested decisions Display intelligent behavior Draw conclusions from complex relationships Provide portable knowledge   Expert system shell A collection of software packages and tools used to develop expert systems... »read more
Rating: 0 1 2 3 4 5 | Views: 5361 | Computer and Technology

Reflections on Trusting Trust

by Derek Thompson | Sep 30, 2010
To what extent should one trust a statement that a program is free of Trojan horses? Perhaps it is more important to trust the people who wrote the software.
TURING AWARD LECTURE by KEN THOMPSON   INTRODUCTION I thank the ACM for this award. I can't help but feel that I am receiving this honor for timing and serendipity as much as technical merit. UNIX 1 swept into popularity with an industry-wide change from central mainframes to... »read more
Rating: 0 1 2 3 4 5 | Views: 3290 | Computer and Technology

A Short Operating System Timeline

by Zakir Hossain | Dec 6, 2009
A short list of interesting development in Operating Systems
A brief time line of the operating systems throughout the history that caught my interest which are very study able; these systems, I thought to have some major impact on how the world is today. The information given here is collected from different websites. 1956: GM-NAA I/O 1959: SHARE... »read more
Rating: 5 Rating 1 Rating 2 Rating 3 Rating 4 Rating 5 | Views: 3697 | Computer and Technology

First     1   2    3    4    5    Next  Last