You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
G Suite
G Suite is a suite of cloud computing, productivity and collaboration tools, software and products developed by Google, first launched on August 28, 2006 as Google Apps for Your Domain. G Suite comprises Gmail, Hangouts, Calendar, and Currents for communication; Drive for storage; Docs, Sheets, Slides, Keep, Forms, and Sites for productivity and collaboration; and, depending on the plan, an Admin panel and Vault for managing users and the services. It also includes the digital interactive whiteboard Jamboard. While these services are free to use for consumers, G Suite adds enterprise features such as custom email addresses at a domain (@yourcompany.com), option for unlimited cloud storage (depending on plan and number of members), additional administrative tools and advanced settings, as well as 24/7 phone and email support. Being based in Google's data centers, data and information is saved instantly and then synchronized to other data centers for backup purposes. Unlike the free, consumer-facing services, G Suite users do not see advertisements while using the services, and information and data in G Suite accounts do not get used for advertisement purposes. Furthermore, G Suite administrators can fine-tune security and privacy settings. As of April 2020, G Suite had 6 million paying businesses, and 120 million G Suite for Education users.
  • 2.6K
  • 04 Nov 2022
Topic Review
Wolfram Alpha
Wolfram Alpha (also styled WolframAlpha, and Wolfram|Alpha) is a computational knowledge engine or answer engine developed by Wolfram Alpha LLC, a subsidiary of Wolfram Research. It is an online service that answers factual queries directly by computing the answer from externally sourced "curated data", rather than providing a list of documents or web pages that might contain the answer as a search engine might. Wolfram Alpha, which was released on May 18, 2009, is based on Wolfram's earlier flagship product Wolfram Mathematica, a computational platform or toolkit that encompasses computer algebra, symbolic and numerical computation, visualization, and statistics capabilities. Additional data is gathered from both academic and commercial websites such as the CIA's The World Factbook, the United States Geological Survey, a Cornell University Library publication called All About Birds, Chambers Biographical Dictionary, Dow Jones, the Catalogue of Life, CrunchBase, Best Buy, the FAA and optionally a user's Facebook account.
  • 2.6K
  • 02 Nov 2022
Topic Review
Comparison of Mail Servers
This is a comparison of mail servers: mail transfer agents, mail delivery agents, and other computer software that provide e-mail services. Unix based mail servers are built using a number of components because a Unix style environment is, by default, a toolbox operating system. A stock Unix-like server already has internal mail, more traditional ones also come with a full MTA already part of the standard installation. To allow the server to send external emails, an MTA such as Sendmail, Postfix, or Exim is required. Mail is read either through direct access (shell login) or mailbox protocols like POP and IMAP. Unix based MTA software largely acts as enhancement or replacement of the respective system's "native" MTA. Windows servers do not natively implement email. Windows based MTAs therefore have to cover the whole set of email related functionality.
  • 2.6K
  • 11 Nov 2022
Topic Review
Cybersecurity Information Sharing Act
The Cybersecurity Information Sharing Act (CISA S. 2588 [113th Congress], S. 754 [114th Congress]) is a United States federal law designed to "improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes". The law allows the sharing of Internet traffic information between the U.S. government and technology and manufacturing companies. The bill was introduced in the U.S. Senate on July 10, 2014, and passed in the Senate October 27, 2015. Opponents question CISA's value, believing it will move responsibility from private businesses to the government, thereby increasing vulnerability of personal private information, as well as dispersing personal private information across seven government agencies, including the NSA and local police. The text of the bill was incorporated by amendment into a consolidated spending bill in the U.S. House on December 15, 2015, which was signed into law by President Barack Obama on December 18, 2015.
  • 2.6K
  • 07 Nov 2022
Topic Review
Byzantine Fault Tolerance
Byzantine fault tolerance (BFT) is the dependability of a fault-tolerant computer system, particularly distributed computing systems, where components may fail and there is imperfect information on whether a component has failed. In a "Byzantine failure", a component such as a server can inconsistently appear both failed and functioning to failure-detection systems, presenting different symptoms to different observers. It is difficult for the other components to declare it failed and shut it out of the network, because they need to first reach a consensus regarding which component has failed in the first place. The term is derived from the Byzantine Generals' Problem, where actors must agree on a concerted strategy to avoid catastrophic system failure, but some of the actors are unreliable. Byzantine fault tolerance has been also referred to with the phrases interactive consistency or source congruency, error avalanche, Byzantine agreement problem, Byzantine generals problem, and Byzantine failure.
  • 2.5K
  • 28 Nov 2022
Topic Review
History and Implementations of ZFS
The history and implementations of ZFS covers the development of the ZFS file system. ZFS began as part of the Sun Microsystems Solaris operating system in 2001. Large parts of Solaris - including ZFS - were published under an open source license as OpenSolaris for around 5 years from 2005, before being placed under a closed source license when Oracle Corporation acquired Sun in 2009/2010. During 2005 - 2010, the open source version of ZFS was ported to Linux, Mac OS X (continued as MacZFS) and FreeBSD. In 2010, the illumos project forked a recent version of OpenSolaris, to continue its development as an open source project, including ZFS. In 2013 the co-ordination of open source ZFS moved to an umbrella organization, OpenZFS, which allowed any person or organization that wished to use the open source version of ZFS, to collaborate in developing and maintaining a single common version of ZFS. illumos remains very closely involved with OpenZFS. As of 2018, there are two main implementations of ZFS, both quite similar: Oracle's implementation, which is closed source and part of Solaris, and OpenZFS, which is widely used to provide ZFS on many unix-like operating systems.
  • 2.5K
  • 23 Nov 2022
Topic Review
Bidirectional Text
Bidirectional text is the text containing both text directionalities, both right-to-left (RTL or dextrosinistral) and left-to-right (LTR or sinistrodextral). It generally involves text containing different types of alphabets, but may also refer to boustrophedon, which is changing text directionality in each row. Some writing systems including the Arabic and Hebrew scripts or derived systems such as the Persian, Urdu, and Yiddish scripts, are written in a form known as right-to-left (RTL), in which writing begins at the right-hand side of a page and concludes at the left-hand side. This is different from the left-to-right (LTR) direction used by the dominant Latin script. When LTR text is mixed with RTL in the same paragraph, each type of text is written in its own direction, which is known as bidirectional text. This can get rather complex when multiple levels of quotation are used. Many computer programs fail to display bidirectional text correctly. For example, the Hebrew name Sarah (שרה) is spelled: sin (ש) (which appears rightmost), then resh (ר), and finally heh (ה) (which should appear leftmost). Note: Some web browsers may display the Hebrew text in this article in the opposite direction.
  • 2.5K
  • 28 Nov 2022
Topic Review
Docker
Docker is a set of platform as a service (PaaS) products that use OS-level virtualization to deliver software in packages called containers. The service has both free and premium tiers. The software that hosts the containers is called Docker Engine. It was first started in 2013 and is developed by Docker, Inc.
  • 2.5K
  • 18 Oct 2022
Topic Review
Go Variants
There are many variations of the simple rules of Go. Some are ancient digressions, while other are modern deviations. They are often side events at tournaments, for example, the U.S. Go Congress holds a "Crazy Go" event every year.
  • 2.5K
  • 25 Nov 2022
Topic Review
Forscene
Forscene is an integrated internet video platform, video editing software, covering non linear editing and publishing for broadcast, web and mobile. Designed by Forbidden Technologies plc to allow collaborative editing of video, it is capable of video logging, reviewing, publishing and hosting to HD quality. The system is implemented as a mobile app for Android and IOS devices and as a web application with a Java applet as part of its user interface. The latter runs on platforms without application installation, codec installation, or machine configuration and has Web 2.0 features. Forscene won the Royal Television Society's award for Technology in the post-production process in December 2005, and is now used internationally. The underlying compression technology and the user interface are covered by separate patents.
  • 2.5K
  • 19 Oct 2022
Topic Review
Multimodal Affective Brain–Computer Interfaces
Multimodal affective brain-computer interfaces(aBCI) use techniques from psychological theories and methods (concepts and protocols), neuroscience (brain function and signal processing) and computer science (machine learning and human-computer interaction) to induce, measure and detect emotional states and apply the resulting information to improve interaction with machines (Mühl, C.; et al.).We assume that multimodal emotion recognition based on EEG should integrate not only EEG signals, an objective method of emotion measurement, but also a variety of peripheral physiological signals or behaviors. Compared to single patterns, multimodal emotion processing can achieve more reliable results by extracting additional information; consequently, it has attracted increasing attention. Li at el. (Li, Y.; et al.) proposed that in addition to combining different input signals, emotion recognition should include a variety of heterogeneous sensory stimuli (such as audio-visual stimulation) to induce emotions. Many studies (Huang, H.; et al.; Wang, F.; et al.) have shown that integrating heterogeneous sensory stimuli can enhance brain patterns and further improve brain–computer interface performance.
  • 2.5K
  • 01 Mar 2021
Topic Review
Binary Adder
An adder, or summer, is a digital circuit that performs addition of numbers. In many computers and other kinds of processors adders are used in the arithmetic logic units (ALUs). They are also used in other parts of the processor, where they are used to calculate addresses, table indices, increment and decrement operators and similar operations. Although adders can be constructed for many number representations, such as binary-coded decimal or excess-3, the most common adders operate on binary numbers. In cases where two's complement or ones' complement is being used to represent negative numbers, it is trivial to modify an adder into an adder–subtractor. Other signed number representations require more logic around the basic adder.
  • 2.5K
  • 30 Nov 2022
Topic Review
Principles of Grid Generation
Grids or meshes are geometrical shapes (formed after discretisation of the geometric domain) which are small-sized discrete cells that cover the physical domain, whose objective is to identify the discrete volumes or elements where conservation laws can be applied. They have applications in the fields of computational fluid dynamics (CFD), geography, designing and many more places where numerical solutions to the partial differential equations (PDEs) are required. Numerical grid generation is the crucial initial step involved in computing numerical solutions to the equations that describe a physical process. The accuracy of the solution depends upon the quality of the grid generated. A well-constructed grid can improve the quality of solution whereas, deviations from the numerical solution can be observed with a poorly constructed grid. Techniques for creating the cell forms the basis of grid generation. Various methods for the grid generation are discussed below.
  • 2.5K
  • 28 Oct 2022
Topic Review
Bullet Journal
Bullet Journal is a method of personal organization developed by designer Ryder Carroll. The system organizes scheduling, reminders, to-do lists, brainstorming, and other organizational tasks into a single notebook. The name "Bullet Journal" comes from the use of abbreviated bullet points to log information, but it also partially comes from the use of dot journals, which are gridded using dots rather than lines. First shared with the public in 2013, it has become a popular method, garnering significant attention on Kickstarter, Instagram, Facebook, YouTube, and Pinterest.
  • 2.5K
  • 31 Oct 2022
Topic Review
Kerberos (Protocol)
Kerberos (/ˈkɜːrbərɒs/) is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. Its designers aimed it primarily at a client–server model, and it provides mutual authentication—both the user and the server verify each other's identity. Kerberos protocol messages are protected against eavesdropping and replay attacks. Kerberos builds on symmetric-key cryptography and requires a trusted third party, and optionally may use public-key cryptography during certain phases of authentication. Kerberos uses UDP port 88 by default. The protocol was named after the character Kerberos (or Cerberus) from Greek mythology, the ferocious three-headed guard dog of Hades.
  • 2.5K
  • 25 Oct 2022
Topic Review
Hyperbolic Function
In mathematics, hyperbolic functions are analogs of the ordinary trigonometric functions defined for the hyperbola rather than on the circle: just as the points (cos t, sin t) form a circle with a unit radius, the points (cosh t, sinh t) form the right half of the equilateral hyperbola. Hyperbolic functions occur in the solutions of many linear differential equations (for example, the equation defining a catenary), of some cubic equations, in calculations of angles and distances in hyperbolic geometry, and of Laplace's equation in Cartesian coordinates. Laplace's equations are important in many areas of physics, including electromagnetic theory, heat transfer, fluid dynamics, and special relativity. The basic hyperbolic functions are: from which are derived: corresponding to the derived trigonometric functions. The inverse hyperbolic functions are: The hyperbolic functions take a real argument called a hyperbolic angle. The size of a hyperbolic angle is twice the area of its hyperbolic sector. The hyperbolic functions may be defined in terms of the legs of a right triangle covering this sector. In complex analysis, the hyperbolic functions arise as the imaginary parts of sine and cosine. The hyperbolic sine and the hyperbolic cosine are entire functions. As a result, the other hyperbolic functions are meromorphic in the whole complex plane. By Lindemann–Weierstrass theorem, the hyperbolic functions have a transcendental value for every non-zero algebraic value of the argument. Hyperbolic functions were introduced in the 1760s independently by Vincenzo Riccati and Johann Heinrich Lambert. Riccati used Sc. and Cc. (sinus/cosinus circulare) to refer to circular functions and Sh. and Ch. (sinus/cosinus hyperbolico) to refer to hyperbolic functions. Lambert adopted the names but altered the abbreviations to what they are today. The abbreviations sh, ch, th, cth are also at disposition, their use depending more on personal preference of mathematics of influence than on the local language.
  • 2.4K
  • 10 Nov 2022
Topic Review
Environmental Niche Modelling
Environmental niche modelling, alternatively known as species distribution modelling, (ecological) niche modelling, predictive habitat distribution modelling, and climate envelope modelling refers to the process of using computer algorithms to predict the distribution of species in geographic space on the basis of a mathematical representation of their known distribution in environmental space (= realized ecological niche). The environment is in most cases represented by climate data (such as temperature, and precipitation), but other variables such as soil type, water depth, and land cover can also be used. These models allow for interpolating between a limited number of species occurrence and they are used in several research areas in conservation biology, ecology and evolution. The extent to which such modelled data reflect real-world species distributions will depend on a number of factors, including the nature, complexity, and accuracy of the models used and the quality of the available environmental data layers; the availability of sufficient and reliable species distribution data as model input; and the influence of various factors such as barriers to dispersal, geologic history, or biotic interactions, that increase the difference between the realized niche and the fundamental niche. Environmental niche modelling may be considered a part of the discipline of biodiversity informatics.
  • 2.4K
  • 31 Oct 2022
Topic Review
Social Engineering (Security)
In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information. This differs from social engineering within the social sciences, which does not concern the divulging of confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme. It has also been defined as "any act that influences a person to take an action that may or may not be in their best interests." An example of social engineering is the use of the "forgot password" function on most websites which require login. An improperly-secured password-recovery system can be used to grant a malicious attacker full access to a user's account, while the original user will lose access to the account.
  • 2.4K
  • 08 Nov 2022
Topic Review
Fog and Edge Computing
The fourth industrial revolution heralds a paradigm shift in how people, processes, things, data and networks communicate and connect with each other. Conventional computing infrastructures are struggling to satisfy dramatic growth in demand from a deluge of connected heterogeneous end points located at the edge of networks while, at the same time, meeting quality of service levels. The complexity of computing at the edge makes it increasingly difficult for infrastructure providers to plan for and provision resources to meet this demand. While simulation frameworks are used extensively in the modelling of cloud computing environments in order to test and validate technical solutions, they are at a nascent stage of development and adoption for fog and edge computing. This paper provides an overview of challenges posed by fog and edge computing in relation to simulation.
  • 2.4K
  • 23 Dec 2020
Topic Review
Video Toaster
The NewTek Video Toaster is a combination of hardware and software for the editing and production of NTSC standard-definition video. The plug-in expansion card initially worked with the Amiga 2000 computer and provides a number of BNC connectors on the exposed rear edge that provide connectivity to common analog video sources like VHS VCRs. The related software tools support video switching, chroma keying, character generation, animation, and image manipulation. Together, the hardware and software provided, for a few thousand U.S. dollars, a video editing suite that rivaled the output of contemporary (i.e. early 1990s) professional systems costing ten times as much. It allowed small studios to produce high-quality material and resulted in a cottage industry for video production not unlike the success of the Macintosh in the desktop publishing (DTP) market only a few years earlier. The Video Toaster won the Emmy Award for Technical Achievement in 1993. Other parts of the original software package were spun off as stand-alone products, notably LightWave 3D, and achieved success on their own. As the Amiga platform lost market share and Commodore International went bankrupt in 1994 as a result of declining sales, the Video Toaster was moved to the Microsoft Windows platform where it is still available. The company also produces what is essentially a portable pre-packaged version of the Video Toaster along with all the computer hardware needed, as the TriCaster. These became all-digital units in 2014, ending production of the analog Video Toaster line.
  • 2.4K
  • 11 Oct 2022
  • Page
  • of
  • 48
Academic Video Service