Students Corner

PCI Express is positioned as the industry's third-generation I/O technology. First generation was ISA, second generation being PCI, and the third generation, PCI Express. PCI Express is designed to be a general-purpose serial I/O interconnects that can be used in multiple market segments, including desktop, mobile, server, storage and embedded communications. PCI Express can be used as a peripheral device interconnects, a chip-to-chip interconnects, and a bridge to other interconnects like 1394b, USB2.0, and Ethernet. It can also be used in graphics chipsets for increased graphics bandwidth. PCI Express is an implementation of the PCI computer bus that uses existing PCI programming concepts and communications standards, but bases it on a much faster serial communications system. PCI Express is intended to be used as a local bus only. The PCI Express multi-drop, parallel bus topology provides Host Bridge and several endpoints. This introduces a new element, the switch into the system which replaces the multi drop bus and is used to provide fan-out for the I/O bus.Read more..
Your rating: None Average: 2 (2 votes)

The popularity of mobile computing and communications devices can be traced to their ability to deliver information to users when needed. Users want ubiquitous access to information and applications from the device at hand, plus they want to access and update this information on the fly. 

The ability to use applications and information on one mobile device, then to synchronize any updates with the applications and information back at the office, or on the network, is key to the utility and popularity of this pervasive, disconnected way of computing. Read more..

Your rating: None Average: 3.7 (27 votes)

While magnetic and semi-conductor based information storage devices have been in use since the middle 1950 s, today s computers and volumes of information require increasingly more efficient and faster methods of storing data. While the speed of integrated circuit random access memory (RAM) has increased steadily over the past ten to fifteen years, the limits of these systems are rapidly approaching. In response to the rapidly changing face of computing and demand for physically smaller, greater capaticy, bandwidth, a number of alternative methods to integrated circuit informationWhile magnetic and semi-conductor based information storage devices have been in use since the middle 1950 s, today s computers and volumes of information require increasingly more efficient and faster methods of storing data.Read more..
Your rating: None Average: 3.9 (16 votes)

Artificial Intelligence has long been considered as fruit of our intentions to realize nature in our mechanized- human lives; just as aero planes were, of our desire to fly with like the birds of flight. Case-based reasoning (CBR), is the process of solving new problems based on the solutions of similar past problems. An auto mechanic who fixes an engine by recalling another car that exhibited similar symptoms is using case-based reasoning. A lawyer who advocates a particular outcome in a trial based on legal precedents or a judge who creates case law is using case-based reasoning. Case-based reasoning is a prominent kind of analogy making. 

It has been argued that case-based reasoning is not only a powerful method for computer reasoning, but also a pervasive behavior in everyday human problem solving. Or, more radically, that all reasoning is based on past cases experienced or accepted by the being actively exercising choice – prototype theory – most deeply explored in human cognitive science. Read more..

Your rating: None Average: 3 (5 votes)

As cell phones become a part and parcel of our life so do the threats imposed to them is also on the increase. Like the internet, today even the cell phones are going online with the technologies like the edge, GPRS etc. This online network of cellphones has exposed them to the high risks caused by malwares viruses, worms and Trojans designed for mobile phone environment. The security threat caused by these malwares are so severe that a time would soon come that the hackers could infect mobile phones with malicious software that will delete any personal data or can run up a victimAs cell phones become a part and parcel of our life so do the threats imposed to them is also on the increase. Like the internet, today even the cell phones are going online with the technologies like the edge, GPRS etc. This online network of cellphones has exposed them to the high risks caused by malwares viruses, worms and Trojans designed for mobile phone environment.Read more..
Your rating: None Average: 3.5 (11 votes)

4G

 The technology called 4G has redefined the whole concept of today’s sophisticated communication. According to the Wireless World Research Forum (WWRF), 4G is a combination of wired and wireless networks in computer, consumer electronics and communication technology systems based on the internet technology, that can merge applications like the Wi-Fi and WiMAX capable of transmitting at a speed ranging from 100 Mbps (in cell-phone networks) to 1 Gbps (in local Wi-Fi networks).

Read more..

Your rating: None Average: 3.6 (9 votes)

Search

Loading

Sponsered links

Bookmark Us!

Share/Save

Page Rank

Quotes

If you born as a poor, its not your mistake.But if you dead as a poor, its your own mistake
— Bill Gates

Explore Tags

Follow Us