Skip to main content

Posts

Showing posts from September, 2017
Intel Demos 3D XPoint Optane Memory DIMMs, Cascade Lake Xeons Come In 2018 by Paul Alcorn May 19, 2017 at 11:20 AM 13 Comments Using 3D Xpoint as an intermediary memory layer between DRAM and NAND is one of the most promising aspects of Intel's and Micron's new persistent media, but the speedy new DIMM form factor retreated into the shadows after the Storage Visions 2015 conference . The disappearance fueled many of the rumors that 3D XPoint isn't living up to the initial endurance claims, largely because using the new media as memory will require much more endurance than storage devices need. Aside from Intel CEO Brian Krzanich's casual mention during the company's Q4 2016 earnings call that products were shipping, we haven't seen much new information. That changed

wish you a happy Durga navmi ( jai Mata Di)

Sarva Mangal Mangalye, Shive Sarwatha Sadhike, Sharanye Tryambake Gauri Narayani Namostute. Maha Navami ki Hardik Shubhkamnayen!
TYPES OF HACKERS Hackers can be classified into different categories such as white hat, black hat, and grey hat, based on their intent of hacking a system. These different terms come from old Spaghetti Westerns, where the bad guy wears a black cowboy hat and the good guy wears a white hat. White Hat Hackers White Hat hackers are also known as  Ethical Hackers . They never intent to harm a system, rather they try to find out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments. Ethical hacking is not illegal and it is one of the demanding jobs available in the IT industry. There are numerous companies that hire ethical hackers for penetration testing and vulnerability assessments. Black Hat Hackers Black Hat hackers, also known as  crackers , are those who hack in order to gain unauthorized access to a system and harm its operations or steal sensitive information. Black Hat hacking is always illegal beca

what is computer haking

what is computer hacking In computer networking, hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. A hacker is any person engaged in hacking. The term hacking historically referred to constructive, clever technical work that was not necessarily related to computer systems. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on networks and computers over the internet.​ Origins of Hacking M.I.T. engineers in the 1950s and 1960s first popularized the term and concept of hacking. Starting at the model train club and later in the mainframe computer rooms, the hacks perpetrated by these hackers were intended to be harmless technical experiments and fun learning activities. Later, outside of M.I.T., others began applying the term to less honorable pursuits. Before the internet became popular, for example, several hackers in the U.S. experimented with methods

What is a robots.txt File?

What is a Screenshot? A screenshot is a picture of your computer’s monitor screen. It can be the whole screen, just the active window or depending on what you use, it can be just a piece of the viewable area of the computer monitor screen. What is a robots.txt File? A robots.txt file is a text file placed in the root of your website or blog that contains instructions for the bots (spiders, search engine bots). When a bot first arrives at the site it looks for the robots.txt file. If it does not find one it will look for and gather information about all the files on your site. e.g. If Google’s bot (GoogleBot) visits your site and there is not a robots.txt file or instruction in your robots.txt file limiting what it is allowed to look at it will have a look at everything it can find and eventually all it found will be in it’s search results. Not a good thing if there is some stuff you want kept out of the search results. Even if you have a robots.txt file there are some not

mistory of computer

अभिकलित्र के भाग [ संपादित करें ] मोटे तौर पर अभिकलित्र के चार भाग होते हैं। निजी अभिकलित्र (पीसी) के प्रमुख भाग एक अभिकलित्र (संगणक) निम्नलिखित चार भागों से मिलकर बनता है : निविष्ट यंत्र , संसाधन यंत्र , निर्गम यंत्र और भंडारण यंत्र। (युक्ति को यंत्र भी कहा जता है।) निविष्ट यंत्र [ संपादित करें ] निविष्ट यंत्र  उन उपकरणों को कहते हैं जिसके द्वारा निर्देशो और आंकडों को संगणक में भेजा जाता है। जैसे- कुन्जी पटल (की-बोर्ड),  माउस , जॉयस्टिक, ट्रैक बाल आदि। कीबोर्ड माउस माइक्रोफ़ोन  या माइक क्रमवीक्षक  (स्कैन्नर),  अंकीय कैमेरा टच-स्क्रीन ,  टच-पैद केंद्रीय प्रक्रमन इकाई [ संपादित करें ] केंद्रीय प्रक्रमन इकाई ( सीपीयू ) , संसाधन युक्ति या विचार युक्ति - यह अभिकलित्र की मूल संक्रियात्मक इकाई है जो आगम उपकरणों द्वारा दिए गए आंकड़ों के अनुरूप कार्य कर उसे निर्गत इकाई को भेजती है। इसके तीन भाग होते हैं: बही या पंजी (रजिस्टर)  - सबसे पहले जिन आंकड़ों या सूचनाओं पर काम करना होता है, उन्हें अभिकलित्र स्मृति से बही में अंकित किया जाता है। अलग अलग प्रक्रियाओं क

evolution of computer

623 ई. : जर्मन गणितज्ञ  विल्हेम शीकार्ड  ने प्रथम यांत्रिक कैलकुलेटर का विकास किया। यह कैलकुलेटर जोड़ने, घटाने, गुणा व भाग में सक्षम था। 1642 ई. : फ्रांसीसी गणितज्ञ  ब्लेज़ पास्कल  ने जोड़ने व घटाने वाली मशीन का आविष्कार किया। 1801 ई. : फ्रांसीसी वैज्ञानिक जोसेफ मेरी जैकार्ड ने लूम (करघे) के लिए नई नियंत्रण प्रणाली का प्रदर्शन किया। उन्होंने लूम की प्रोग्रामिंग की, जिससे पेपर कार्डों में छेदों के पैटर्न के द्वारा मशीन को मनमुताबिक वीविंग ऑपरेशन (weaving operation) का आदेश दिया जाना सम्भव हो गया। 1833-71 ई. : ब्रिटिश गणितज्ञ और वैज्ञानिक  चार्ल्स बैबेज  ने जैकार्ड पंच-कार्ड प्रणाली का प्रयोग करते हुए 'एनालिटिकल इंजन' का निर्माण किया। इसे वर्तमान कम्प्यूटरों का अग्रदूत माना जा सकता है। बैबेज की सोच अपने काल के काफी आगे की थी और उनके आविष्कार को अधिक महत्व नहीं दिया गया। 1889 ई. : अमेरिकी इंजीनियर हरमन हॉलेरिथ ने 'इलेक्ट्रो मैकेनिकल पंच कार्ड टेबुलेटिंग सिस्टम' को पेटेंट कराया जिससे सांख्यिकी आँकड़े की भारी मात्रा पर कार्य करना सम्भव हो सका। इस मशीन का प्रयोग अमेरिकी

interview questions part 2

What is Text Formatting? Ans.  Text formatting refers to the attributes of text other than the actual text itself. For example:  bold, italics, underlining, color, and size , are all formatting attributes of text. The location of text can also be considered part of the formatting. Text can be automatically  centered, indented, or positioned  in other ways. When you wish to change the format of text, you usually have to select the text, then do the formatting by clicking the appropriate buttons. Occasionally, there are exceptions to the select-then-do paradigm. In Microsoft Word, there is a feature called Format Painter with which you click some already formatted text, then click the Format Painter toolbar button, then drag the mouse cursor across some other text. The other text will be "painted" with the formatting of the original text selected. If you double-click the Format Painter button, then it will be "locked" and you can paint lots of text. When you are d