A Cray SuperComputer Comes To The University Of Toronto
.... Cray's circuits permit an array
of data (known as a 'vector') to be processes as a SINGLE entity. So,
where the IBMPC may require several clock cycles to multiply two numbers,
the Cray performs everything in one clock cycle. This power is measured in
Millions of Floating Point Operations Per Second (MFLOPS) - which is to
say the rate at which floating-point operations can be performed. The Cray
MFLOPS vary as it does many activities, but a rate of up to 210 MFLOPS
(per CPU) can be achieved.
The seco .....
|
|
Object-Oriented Database Management Systems
.... different data models can
be big and substantial. Second is the common theoretical framework.
Although there is no standard object-oriented model, most object-oriented
database systems that are operational or under development today share a
set of fundamental object-oriented concepts. Therefore the implementation
issues in OODBMSs that arise due to these concepts are universal. The
third characteristic is that of experimental activity. Plenty of
prototypes have been implemented and some !
of them bec .....
|
|
A Look At Public Key Encryption
.... in our message with the letter that comes four places
later in the alphabet. D would become H; R would become V, and so on. You,
or anyone else who knows the key can easily switch the H back to a D, the V
back to an R, and figure out where to meet. Theses two examples are on
opposite sides of the spectrum, but both have their similarities and their
differences.
The major difference complexity, the government pays mathematicians to
research complex algorithms by which to encode the messages, like the
.....
|
|
Even From It's Humble Beginnings, The Internet Has Always Been A Battlefield Between Phreaks And Administrators
.... offenders. Even from its beginnings, the Internet
has always been a battlefield between phreaks and administrators.
The Internet hasn't always been a public forum. In fact, the Internet has
been around for years. The Internet is just a new fad ("The More I Learn"
A1). The Internet originally began as DARPANET, a government-created
network, which was designed for defense communications. The Net structure
is such that it could survive a nuclear war ("Internet History"). The
creation of the Net can not .....
|
|
Classification Analysis
.... the computer itself is basically useless. Another form of output,
which is rarely noticed by many computer users however, is the printer.
Many people have probably used a printer before, but it is just that they
never realize it is also a form of output.
As opposed to 'output', 'input' consists of components that take in
information from the users themselves so that the computer will know the
tasks it is supposed to perform and accomplish. The keyboard is classified
as a form of input because .....
|
|
As A Technology, It Is Called Multimedia
.... This
souped-up television will itself be a powerful computer. This, many
believe, will be the world's biggest media group, letting consumers tune
into anything, anywhere, anytime.
The most extraordinary thing about the multimedia boom, is that so many
moguls are spending such vast sums to develop digital technologies, for the
delivering of programs and services which are still largely hypothetical.
So what is behind such grand prophecies? Primarily, two technological
advances known as digitization (i .....
|
|
Internet Regulation: Policing Cyberspace
.... War projects of the
1950s.2 The United States Government owns the Internet and has the
responsibility to determine who uses it and how it is used. The government
must control what information is accessible from its agencies.
This material is not lawfully available through the mail or over the
telephone, there is no valid reason these perverts should be allowed
unimpeded on the Internet. Since our initiative, the industry has
commendably advanced some blocking devices, but they are not a substitute
for .....
|
|
Government Censorship Would Damage The Atmosphere Of The Freedom To Express Ideas On The Internet; Therefore, Government Should Not
.... It is also essential to give a brief history on the internet.
3.The U.S. government is now trying to pass bills to prevent misuse of the
Net.
II. In order to understand the need for the ever-growing body of
legislation, it is important to explore the controversy, and the current
problems involved with the Net as it exists must be introduced.
1. The problem that concerns most people is offensive materials such as
pornography.
2. Another crucial internet crime is the stealing of credit card numbers.
III .....
|
|
The Vast Cyber-frontier Is Being Threatend With Censorship From The Government
....
The congress overwhelmingly passed the bill with a landslide 414-16 House
vote and a 91-5 Senate vote.2 It seems now that the wide bill might not be
what it cracked up to be, as it stands now, anyone who might upload James
Joyce's Ulysses could be placed in jail for two years and have up to a
$250,000 fine.3 Representatives of on-line services industries were
concerned about the bill, and feared they could be held criminally
responsible for Internet conversations.4
"We face a unique disturbing and ur .....
|
|
Parity/Non-parity Check
.... an error.
Odd Parity codes add a check bit to code combinations that have an
even number of 1 bits. Thus,all characters transmitted have an odd number
of bits. Odd and even parity care similar in nature. They are both designed
to signal an error in the even that data are lost or added.
.....
|
|
Semiconductors : The Silicon Chip
.... memories, infrared
detection and lenses, light-emitting diodes (LED), photosensors, strain
gages, solar cells, charge transfer devices, radiation detectors and a
variety of other devices. Silicon belongs to the group IV in the periodic
table. It is a grey brittle material with a diamond cubic structure.
Silicon is conventionally doped with Phosphorus, Arsenic and Antimony and
Boron, Aluminum, and Gallium acceptors. The energy gap of silicon is 1.1
eV. This value permits the operation of silicon semi .....
|
|
Economic Consequences Of Software Crime
.... computer, or lend,
copy or distribute software for any reason without the prior written
consent of the software manufacturer. Many software managers are
concerned with the legal compliance, along with asset management and costs
to their organizations. Many firms involve their legal departments and
human resources in regards to software distribution and licensing.
Information can qualify to be property in two ways; patent law and
copyright laws which are creations of federal statutes, which are subject .....
|
|
The Internet: How It Works And How It Effects The World
.... the military
sites, and ARPANET, which had all the nonmilitary sites. "The two
networks remained connected, however, thanks to a
technical scheme called IP (Internet Protocol), which enabled traffic to be
routed from one net to another as needed. All the networks connected by IP
in the Internet speak IP, so they can all exchange messages." (Levine 12)
Even though there were only two networks at that time, IP was made to allow
thousands of networks. The IP is designed so that every computer on an I .....
|
|
Windows 95 Beats Mac
.... components on older PCs. Mac userw will claim that they
always had the convenicnce of a plug and play system, ubt the difference
shows in teh flexibility of the two systems.
Another set of arguments Mac users use in favor of their sysstems over
PCs is in multimedia and networking capabilities. Mac users gloat that the
Mac has networking technology built in the system. Even if a user did not
use it, the network is included with the system. They cited that for the PC
users and Pc users hate the fact .....
|
|
Development Of The Submarine
.... for the development of nuclear missile submarines,
there is a need to examine the political climate of the world in the era after
World War II. The realignment of the superpowers after the war resulted in a
unique situation. The two major naval powers of the day, Great Britain and the
United States, were now allied against the greatest land power in history in the
Soviet Union. In the period from 1955 to 1965, the advantage was heavily in
favor of the U.S. As the United States had developed the atomic a .....
|
|
|
|