A short talk on benefits and disadvantages of two of the most known network topologies. [Read more…]
This article will highlight two of the most high-profile computer security violations of 2016, one in the public and second in a private sector. Both of these cases provide an excellent lesson to those involved in implementing solid security policies.
Nowadays, everyone is aware that the data sent over Wi-Fi can be taken by those that can listen and decode the weakly encrypted Wi-Fi signal. I believe that it’s time to retire weak wireless encryption schemes and do not make them available in option menus of Wi-Fi enabled devices – they truly no longer add any benefit. [Read more…]
The following article analyzes the most common security vulnerabilities associated with network systems and provides a summary, as well as a recommendation for prevention of these exploitations. [Read more…]
As we know, the NAND type of memory only allows a finite number of writes. This means that the most pressing issue regarding the reliability of SSD drives (and NAND technology in general) is the life expectancy and durability. [Read more…]
Phase-Change RAM (PCRAM), Resistive RAM (RRAM) and Magnetic RAM (MRAM) are some of the emergent SCM (Storage Class Memory) technologies used for NVM (Non-Volatile Memory). How do these devices actually store binary data, and how do they compare, performance-wise, with standard DRAM/SDRAM devices? [Read more…]
In computer architecture, a term ‘Non-Volatile Memory’ (NVM) is referring to a type of memory that doesn’t require any moving parts to perform the read or write operations, nor it needs to refresh its content periodically in order to keep it stored. [Read more…]
Nowadays, when it comes to privacy, government surveillance is a one of the most talked about topics. [Read more…]
When I direct my mind towards thinking about intellectual property rights, I don’t necessarily see the topic in a context of my local or national community. My initial instinct asked me to explore the subject as a privilege that should be contemplated in a broader context. Not as something that should involve the country borders. I see the right to ownership of the intellectual property almost as a substance, as something that should be deeply rooted in everyone’s moral code, naturally and automatically. [Read more…]
One of the areas of computing in which I expect to see the significant growth within the next decade is the use of the technology called the Blockchain. [Read more…]
Following are unprocessed notes from a recently taken 4 day long TOGAF training. I’ll clean the notes in a near future, so until then, please ignore errors and formatting. However even as it stands, someone may still find it useful, as it’s a collection of the most important course highlights. [Read more…]
Following PDF is one of the best guides to API design I had encountered online. Document is called: “The Little Manual of API Design” by Jasmin Blanchette from Trolltech, a Nokia company. It includes platform-neutral guidance as to how to create an API for an application or service. You’ll find the very important suggestions and ideas, as long as guidance before starting an actual coding of the API. [Read more…]
What other image formats are there, besides JPG, BMP, and GIF? What are the strengths and weaknesses of each? Which ones are replacing web images of the future.
In this article, I’ll talk about PNG and WEBP, two image formats which are gaining as much popularity as JPG and GIF. [Read more…]
This is just a quick look at the advantages and disadvantages of wireless networking, taking in account a wireless technology available as of December 2013. [Read more…]