Computer Madness and Childhood Addiction

Posted on June 6, 2016 By

gaming child

Sitting all day playing games or writing on a computer is a health hazard, especially for young children who become addicted. Movement of any form is addictive and the computer or other devices used for the purpose of amusement should be carefully monitored. It is easy for parents to sit children in front of a screen while they have ‘time out’ form supervising them and answering their continuous tirade of questions.

The brain is developing and channels must be open for the success of the child in later life. These channels are like arteries that are pushed free of blockage by learning. But it is only the right kind of teaching that makes a difference in their capabilities as young adults.

One of my grandsons was given a phone by a friend and this became so precious to him that he even took it into the shower with him. He barely raised his head from the screen as he skipped classes at school, became non co-operative at home, even quite abusive, and his world began to fall apart.

In a fit of rage a

Computer    


How to Build A CPU

Posted on June 3, 2016 By

cpu1

As we stepped into the information era, more high-tech devices are required to access this information. All those devices require a powerful CPU to process massive data in order to let people access the latest information. People always think that creating a CPU is the same as printing an electronic board. However, the manufacturing of CPU is closely related to chemistry.

When companies like Intel and AMD decide to make CPUs, the ultimate puzzle for them is how to organize something with 1,000,000,000 pieces, and then create a plan so it can be put together correctly and at once. Most CPUs, both commercial and professional, are smaller than half of a credit card size. The only way to solve this problem is to use chemistry. The process of making CPU is called fabrication. The structure of CPU is so complex that even a single dust could ruin the complex circuitry on a chip.

The main component of chips is silicon, and sand has a high percentage of silicon. First silicon is purified to less than one alien atom per billion. The most common way

Computer     , , ,


What Does “Cloud Computing” Actually Mean?

Posted on May 18, 2016 By

cloud11

To understand cloud computing as a concept, forget the hard drive!

There is no place in cloud computing for such a device, the hard drive is classified as local storage; it’s onsite and available to the network of users, but there isn’t designated hardware or a server for data storage included.

Cloud computing = internet.

To be classed as cloud computing, the service must be accessed via a network and this is normally the internet. It takes its name from the days when the internet was depicted in presentations as a big fluffy cloud with wires.

As the internet is broadly available and in an ever-growing number of locations, home and field based staff can access data via the internet without having to be physically present in the office. Also, if a sleepless team leader wants to access their report to work on it at 3a.m. then, if it is stored to a cloud and they can use the internet, then they will be able to work on it.

There are three cloud options on the market and they are relatively inexpensive as the service providers use

Computer    


The Internet of Things, Artificial Intelligence and Robotics

Posted on June 20, 2016 By

Nothing is going to change the way we live our lives more than the Internet of things, artificial intelligence and robotics. While these technologies will make life a lot easier and businesses more efficient and profitable there is a huge flip side as well. This has to do with employment prospects and if some prominent scientists are to be believed artificially intelligent machines might one day turn on their creators and destroy all humanity.

The Internet of things is expected to connect people, data, processes and devices on a gargantuan scale by the end of the decade – a whopping 50 billion connections. Before one starts worrying about the prospects of humanity being at risk from a take-over by machines, one needs to figure out how the opportunities presented by the Internet of things are put to optimal use, which in itself will require some doing.

The biggest existential threat to us will not be from sci-fi movie like scenarios where artificially intelligent machines and robots will rebel against humans, but by the security vulnerability that this mass scale convergence could give rise to. A less than perfectly designed system could for example impact upon the whole network and lead

Computer    


Showcasing the Potential of the Latest Technology

Posted on May 3, 2016 By

Did you ever recognize how technologies present new trends in sustaining the system? The integration of different operational concepts must be distributed across the network. When operations are implemented in real-time the management of data can become compounded. Information access in real-time requires special treatment. The golden rule is that it should be simple yet precise in execution. Whatever expenditure you have made on the network should offer a good return. New technologies develop methodologies allowing the organization to maximize the network. You need an enhanced scope and new technologies proffer systematic solutions without any disruption.

How will you devise a seamless integration of different activities across the network? Initially you need to outline your requirement and evaluate how various access points across the network should be checked and maintained consistently. The benefit of devising strong parameters gives leverage to the administrator to effectively control the activities across the network. Safety is surely an important and fundamental requirement in developing a string of strong systems to support the network architecture. If your system is complex and the flow of data is more than normal you need to go for expert opinion to cater to the strategic requirements of your

Computer    


Robotics Technology: The Future Of The World

Posted on April 20, 2016 By

Today’s robotics systems operate by way of hydraulic, pneumatic, and electrical power. Electric motors have become progressively smaller, with high power-to-weight ratios, enabling them to become the dominant means by which robots are powered.

Robots are, of course, comprised of several different elements, depending on their purpose. The hand of a robot, for instance, is referred to in the industry as an “end effector.” End effectors may be specialized tools, such as spot welders or spray guns, or more general-purpose grippers. Common grippers include fingered and vacuum types. Another central element of robotics control technology is the sensor. It is through sensors that a robotic system receives knowledge of its environment, to which subsequent actions of the robot can be adjusted. Sensors are used to enable a robot to adjust to variations in the position of objects to be picked up, to inspect objects, and to monitor proper operation (although some robots are able to adjust to variations in object placement without the use of sensors, provided they have sufficient end effector flexibility). Important sensor types include visual, force and torque, speed and acceleration, tactile, and distance sensors. The majority of industrial robots use simple binary sensing, analogous to

Computer    


Computer Thieves Lurking on Facebook

Posted on April 3, 2016 By

My computer is less than 3 weeks old and has highly sophisticated protection against viruses and malware, and so forth, but it can’t be protected against all cyber-crime. The crooks are learning their trade in easily accessible classes and are robbing people using their computers. It is a crime that law-enforcers are unable to keep ahead of. As technology moves forward so do the powers of those who are out to cheat and steal.

They are highly trained and experts are manipulating the facts and now they appear to be using social media sites like Facebook for victims. When viewing some videos posted on my page there was nothing to alert me to the fact that someone was tapping into my computer. Within minutes a huge message was written across the browser warning me that malware was affecting it and not to open or close any windows until checking with the technician for which a number was given.

Of course one automatically takes notice of such a warning and the number was rung and a man with a heavy accent promised that he was able to fix the computer. What he needed me to do was type in the name

Computer     , , ,